Browse Definitions :
Definition

shortcut

In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation. In Windows 95 and later operating system s, a shortcut is a computer desktop icon that enables a user to easily see and select a particular program or data object. The operating system comes with some shortcuts already visible on the desktop. A user can remove these or add new ones.

To create a shortcut in Windows 95 or 98, click on My Computer, then click on your "C" drive (or other drive where your files may be). Find the folder or file that you want to put on your desktop, click on it with the right mouse button, and select Create Shortcut from the pop-up menu. A new icon will now appear in My Computer. Hold the left mouse button down and drag the new icon to your desktop (you may need to minimize the My Computer window to do this). Now your new file or program will always be visible for quick selection on your desktop without having to go through Start menus or the Windows file manager.

In the Macintosh operating system, a shortcut is called an "alias".

This was last updated in April 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close