Attend IT Limited Blog

Tip of the Week: Organization Inside Windows 10

Tip of the Week: Organization Inside Windows 10

If you don’t take care of your PC’s files, you will quickly discover that it’s easy to lose track of where everything is. You have countless file types, folders, and applications sitting around without any real sense of organization or continuity. Today, we’re going to focus on how to help you better organize your files in a way that it easy to find and understand. You should be able to do so in either your operating system file explorer or in your cloud-based file storage.

There are three ways you can organize your files. You can distribute them based on clients (or projects), dates, or file types. We’ll focus on how it can be beneficial to organize your files based on the file type.

A file-based setup helps you group all files in folders designed to hold a specific file type. If you have a lot of ebooks, for example, they would be placed in a folder that is labeled “ebooks,” meaning they are all located in the same place, not all over your desktop or Downloads folder. This file organization method focuses on making sure all files are in places where they belong. This could take some work, but it’s well worth the effort.

If you work for a business, chances are they use a shared network of some sort with its own custom file storage nomenclature, so be sure to do your research before making any major changes in file storage.

Tip #1: Stick to Your Filing System

Once you’ve made your choice on a filing system, it’s important to stick to it. File things away as soon as you can; this keeps folders like Downloads from getting too out of control. Plus, you mitigate the risk of misplacing files by putting them in the right location as soon as possible.

Tip #2: Avoid the Desktop & Download Folders

That being said, it might be tempting to just choose your desktop or the downloads folder for storing files, but you should avoid doing so at all costs. The issue stems from the fact that your desktop only has so much real estate, meaning that it will fill up before long and leave you with a giant mess to clean up. If you put the files where they are supposed to go as soon as possible, you can avoid clutter and wasted time by knowing exactly where files are located soon after the download.

Tip #3: Sort Once a Week

If you aren’t able to file away files where they belong immediately, you need to make it a point to do it periodically. We suggest once every week or once every 10 days or so. If you go any longer than this, chances are it will get pretty messy.

Tip #4: Naming Practices

A great way to sort out of your files, even in folders, is to use a naming convention that distinguishes them from each other. That being said, having a ton of files with the same names will be confusing. Therefore, you should shoot for specifics when putting together file names.

Managing your files doesn’t have to be challenging. Attend IT Limited can help you out with that. To learn more, reach out to us at 020 8626 4485.

Your IT Budget Says a Lot about Your Business
Best Practices for Setting Up Your Backups and You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 29 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Network Security Technology Business Computing Tip of the Week Best Practices Cloud Managed IT Services Hosted Solutions Privacy Malware Disaster Recovery Data Recovery Hackers communications Data Backup Outsourced IT Data Business Productivity Innovation Backup Productivity IT Services Cloud Computing Cybersecurity Email IT Support Software VoIP Business Continuity Mobile Devices Small Business Computer Internet Upgrade Saving Money Internet of Things Efficiency Business Management Microsoft IT Support Managed IT Automation Information Technology Managed IT services Hardware BDR Server Mobility Phishing Mobile Device Management Smartphone Budget Windows 7 Collaboration Artificial Intelligence Avoiding Downtime Save Money BYOD Risk Management Virtual Private Network Password Network Compliance Spam Ransomware User Tips Firewall Managed Service Provider History Quick Tips Cost Management Hosted Solution Remote Computing Data Management Communication Audit Conferencing Value Business Technology Solid State Drive MSP Workplace Tips Automobile Data Breach Saving Time Printing Data Security Passwords Windows 10 Remote Workers Personal Information Computers Redundancy Tech Term Android Recovery Networking Gadgets Document Management Telephone Systems Router Smartphones IT Service Content Filtering Managed Service Devices Paperless Office Manufacturing Hybrid Cloud Hard Drives Going Green Operating System Software as a Service Spyware Backup and Disaster Recovery Commerce Mobile Computing Applications Facebook Mobile Office Cybersecurty Financial Technology Upgrades IoT Telephony Computer Repair Connectivity Employee-Employer Relationship Business Intelligence Windows Server 2008 Unified Communications Advertising Shadow IT Big Data SMB Active Directory Apple Break/Fix Window 10 Update Development WPA3 Downtime Legal Antivirus Wasting Money Dark Web Windows Server Streaming Media App Browser intranet Employees Remote Monitoring Human Resources Evernote Instant Messaging User Error Online Storage Wireless Internet Administration Help Desk File Storage Word Education Cleaning E-Commerce Wireless Technology Holiday Computing Amazon Social Engineering Content Filter SaaS Managed IT Service Marketing Work/Life Balance Employer-Employee Relationship Copiers Payroll Vulnerability Regulation Mobile Mobile Device OneNote Government Data Loss Hacking Customer Relationship Management Gamification Colocation Phone System Bandwidth Application Payment Cards Data Protection Money Entertainment Samsung Analysis Virtual Assistant Nanotechnology Machine Learning Monitoring Office 365 Voiceover Internet Protocol Professional Services Workers Black Market Disaster Meetings VPN Save Time Smart Technology Voice over Internet Protocol Hacker Chromebook Two-factor Authentication End of Support Flexibility Proactive HIPAA Training Alexa for Business Transportation Encryption Electronic Medical Records Management Printers Google iPhone Lifestyle Business Telephone The Internet of Things Microsoft Office Travel Smart Tech Vendor Social Media Project Management e-waste Fiber Optics Students Utility Computing Proactive IT Private Cloud Windows 10 Cybercrime Virtualization Azure Point of Sale Facebook Privacy Gmail Wasting Time Scalability Websites Company Culture Mobile Security Information Augmented Reality Safety Cast Google Drive Health Legislation Smartwatch Computer Fan Tablets Office Tips Microsoft Word Business Strategy Chrome File Sharing Identity Theft Office YouTube Keyboard Shortcuts Hard Disk Drive Shortcut WannaCry HaaS Tech Support PowerPoint Accessory Alert Internet Exlporer Gifts Data Theft Politics Charger Identity NFL Maintenance Managing Stress Emergency Myths Display Consultant Windows Comparison Language Vendor Management Server Maintenance Inventory Testing Social Storage Worker Commute Scam Holidays Excel Licensing USB Books Robot Fraud 5G Peripheral Emails IT Solutions Humor Experience Data Privacy Television CrashOverride eWaste Threats Google Assistant Co-Managed Services HBO Search Specifications Investment Communitications Computer Care Security Cameras Processor Camera Sports Wireless IT budget OneDrive Financial PDF Best Practice Virtual Reality Edge Medical IT Access Control Webinar WIndows Server 2008 Credit Cards How To Micrsosoft Hard Drive Windows Ink Device Security Worker Scams Twitter Telephone Touchscreen Miscellaneous Sales Virus ROI Hosted Desktop Unsupported Software Benchmarks Projects WiFi Data Storage Relocation Cortana Blockchain Sabotage Bring Your Own Device iOS Sync Apps Users Law Enforcement Google Docs Ciminal eCommerce Memory Admin IT solutions Patch Management FAQ Current Events Music Digital Signage Google Maps Battery Employee Managed Services Provider Computer Forensics Hyperlink IT Management Retail Windows Server 2008 R2 Smart Devices App store Root Cause Analysis Unified Threat Management Screen Mirroring Video Games Identities Wi-Fi Computer Accessories PC Text Messaging Updates Settings Reputation Microsoft Excel Windows 10s Outlook Adobe Wireless Charging Analytics