Browse Definitions :
Definition

hot key

A hot key is a key or a combination of keys on a computer keyboard that, when pressed at one time, performs a task (such as starting an application) more quickly than by using a mouse or other input device. Hot keys are sometimes called shortcut keys. Hot keys are supported by many operating system and applications.

The specific task performed by a particular hot key varies by operating system or application. However, there are commonly-used hot keys. For example, pressing the F1 key in any application running Windows usually brings up a help menu. The "Alt + F4" combination results in closing the current application or, if no application is open, shutting down Windows. To find out which hot keys are used in an application, search the index in that application's help menu using the words "hot keys" or "shortcut keys."

The "F" or function key that come on most computer keyboards can be viewed as a built-in set of hot keys or potential hot keys whose use is determined by the operating system or the current application. Some operating systems or applications allow certain hot keys to be set up to perform a task specified by the user or to start a specific application. For example, a user could set up one hot key to start a music compact disk (CD) and another to adjust the speaker volume.

Microsoft's sales literature refers to hot keys as though they are keys separate from function keys.

This was last updated in April 2005
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close