Skip to main content

Basic PC Shortcut Keys


Basic PC Shortcut Keys


Basic Shortcut Keys

The followings are some basic PC shortcut keys that are supported in most IBM compatible computers. They are also supported in most application software.
Use at your own risk.
Shortcut Keys Supported Window Versions Description
Alt + e 95, 98, ME, NT, 2000, XP, Vista Pull down the top Edit menu.
Alt + f 95, 98, ME, NT, 2000, XP, Vista Pull down the top File menu
Ctrl + a 95, 98, ME, NT, 2000, XP, Vista Select all text.
Ctrl + c 95, 98, ME, NT, 2000, XP, Vista Copy selected item(s) (to clipboard).
Ctrl + f 95, 98, ME, NT, 2000, XP, Vista Find.
Ctrl + v 95, 98, ME, NT, 2000, XP, Vista Paste copied item(s) from clipboard
Ctrl + x 95, 98, ME, NT, 2000, XP, Vista Cut.
Ctrl + Ins 95, 98, ME, NT, 2000, XP, Vista Same as Ctrl + c
Ctrl + (left arrow) 95, 98, ME, NT, 2000, XP, Vista Move one word to the left at a time.
Ctrl + (right arrow) 95, 98, ME, NT, 2000, XP, Vista Move one word to the right at a time.
Shift + Ins 95, 98, ME, NT, 2000, XP, Vista Same as Ctrl + v
Shift + Delelte (or Del) 95, 98, ME, NT, 2000, XP, Vista Cut. Or permanently delete selected item(s) on Windows Explorer.
F1 95, 98, ME, NT, 2000, XP, Vista Help.
Home 95, 98, ME, NT, 2000, XP, Vista Jump to the beginning of the line or page.
Ctrl + Home 95, 98, ME, NT, 2000, XP, Vista Jump to the beginning of the document or page.
End 95, 98, ME, NT, 2000, XP, Vista Jump to the end of the line or page.
Ctrl + End 95, 98, ME, NT, 2000, XP, Vista ump to the end of the document or page.
Shift + Home 95, 98, ME, NT, 2000, XP, Vista Set selection (highlight) from current position to beginning of the line or page.
Shift + End 95, 98, ME, NT, 2000, XP, Vista Set selection (highlight) from current position to end of the line or page.
Shift + (left arrow) 95, 98, ME, NT, 2000, XP, Vista Set selection (highlight) from current position to the left, one character at a time.
Shift + (right arrow) 95, 98, ME, NT, 2000, XP, Vista Set selection (highlight) from current position to the right, one character at a time.
Shift + (down arrow) 95, 98, ME, NT, 2000, XP, Vista Set selection (highlight) from current position to the next line down.
Shift + (up arrow) 95, 98, ME, NT, 2000, XP, Vista Set selection (highlight) from current position to the next line up.

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...