Skip to main content

Function Keys Shortcuts

Function Keys Shortcuts (F1 - F12)


Function Keys
(Function Keys)


F1
  • It is used to open the help window in almost all programs.
  • Also used to enter BIOS or CMOS Some computers allow you to enter BIOS setup using different keys like F2, F10, Delete, Esc.
  • Pressing Window + F1 will open the Microsoft Windows Help and Support Center.

F2
  • In Microsoft Windows, it is used to rename an icon, file, or folder that the user selects.
  • In Microsoft Excel, the F2 key allows you to edit the selected cell in the Excel sheet.
  • In Microsoft Word, pressing Ctrl+F2 will open the print preview window and Alt+Ctrl+F2 will open the new file or document.
  • In addition, it is also used to enter the CMOS setup.

F3
  • It is mainly used to open a search function for many programs.
  • At the MS-DOS or Windows command line, it gives users the option to repeat the last command entered.
  • In Microsoft Word, if you press Shift + F3, it allows you to change the selected text from uppercase to lowercase or a capital letter at the beginning of each word.
  • In Microsoft Outlook, if you press the Windows key + F3, the advanced search window will open.
  • Additionally, it is also used to open Mission Control on an Apple computer.

F4
  • Its use is to open the search window in Windows 95 to XP.
  • It is used to open the address bar in Internet Explorer and Windows Explorer.
  • In Microsoft Word, it allows you to repeat the last action performed. For example, if you want to retype the last word or sentence multiple times, you can use this key.
  • If you press Alt+F4, it will close the currently open window in Microsoft Windows. In addition, it is also used to shut down the system, for that you need to press Alt+F4 on the desktop screen, you will see a dialog, then click the OK button, and the system will shut down.

F5
  • It is mainly used to refresh or reload the document page or window.
  • If you press Ctrl + F5 or Shift + F5 in a web browser, it completely refreshes the web page, clears the cache, and re-downloads the entire content of the web page.
  • Gives users the option to access the Find, Replace, and Go To dialog box in Microsoft Word.
  • In addition, it is also used to start the slideshow in PowerPoint.

F6
  • It helps users to move the cursor to the address bar in Internet browsers like Internet Explorer, Mozilla Firefox, Google Chrome, etc.
  • In Microsoft Word, pressing Ctrl+Shift+F6 allows you to switch between other open Word documents.
  • Also, reduce the laptop speaker volume (on some laptops).

F7
  • It is commonly used to check the spelling and grammar of a document in Microsoft programs like Microsoft Word, Outlook, etc.
  • If you press Shift+F7, it allows you to check the thesaurus of the selected word in Microsoft Word, and PowerPoint.
  • Gives users the option to enable Caret Browsing in Mozilla Firefox.
  • Also used to increase the laptop speaker volume (on some laptops).

F8
  • The F8 function key allows users to enter the Windows boot menu, usually used to access Windows safe mode.
  • Some computers also use it to access the Windows recovery system, but it may require a Windows installation CD.
  • Additionally, it displays a thumbnail image for all workspaces on macOS.

F9
  • It is used to send and receive emails in Microsoft Outlook.
  • It is also used to update documents in Microsoft Word.
  • Its use is to access the Measurements toolbar in Quark 5.0.
  • Helps reduce screen brightness on some laptops.
  • Gives users the option to display a thumbnail for each window in a single workspace on macOS 10.3 or later.
  • On the Apple computer, pressing the Fn and F9 keys together will open Mission Control.

F10
  • Allows you to activate the menu bar of an open application in Microsoft Windows.
  • Shift+F10 is used to open right-click options on a selected word, icon, file, or Internet link.
  • Allows users to access the hidden recovery partition on Compaq, HP, and Sony computers.
  • Gives users the option to enter the CMOS setup on some computers.
  • It is also used to increase screen brightness on some laptops.
  • In macOS 10.3 or later, shows all open windows for the active program.

F11
  • It is used to enable and disable full-screen mode in all modern internet browsers.
  • Allows users the option to access the hidden recovery partition on eMachines, Gateway, and Lenovo computers.
  • In macOS 10.4 or later, it's used to hide all open windows and show the desktop.

F12
  • It is used to open the Save As option where you can save a file with a different name in Microsoft Word, Excel, etc.
  • By pressing Ctrl+F12, you can open a file or document in Word, Excel, etc.
  • Shift+F12 is used to save a file in Microsoft Word like we do use Ctrl+S.
  • If you press Ctrl+Shift+F12 in Microsoft Word, it will open the print preview window of a document or file like we do with Ctrl+P.
  • F12 is also used to open a firebug or browser debugging tool.
  • On Apple computer 10.4 or later, F12 is used to show or hide the dashboard.
  • Also, it provides a list of bootable devices on a computer at startup. You can choose that device from the list, which you have connected to your PC to boot, such as a hard drive, DVD or CD drive, floppy drive, USB drive, and network.

Comments

Popular posts from this blog

Languages in DBMS

Languages in DBMS Structured Query Language(SQL) as we all know is the database language by the use of which we can perform certain operations on the existing database and also we can use this language to create a database. SQL uses certain commands like Create, Drop, Insert, etc. to carry out the required tasks. These SQL commands are mainly categorized into five categories as: DDL – Data Definition Language DQL – Data Query Language DML – Data Manipulation Language DCL – Data Control Language TCL – Transaction Control Language Now, we will see all of these in detail. DDL (Data Definition Language): DDL or Data Definition Language actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the database schema and is used to create and modify the structure of database objects in the database. DDL is a set of SQL commands used to create, modify, and delete database structures but not data. These commands are normally ...

Indexing in DBMS

Indexing in DBMS Indexing is used to optimize the performance of a database by minimizing the number of disk accesses required when a query is processed.  The index is a type of data structure. It is used to locate and access the data in a database table quickly. Index structure: Indexes can be created using some database columns. The first column of the database is the search key that contains a copy of the primary key or candidate key of the table. The values of the primary key are stored in sorted order so that the corresponding data can be accessed easily.  The second column of the database is the data reference. It contains a set of pointers holding the address of the disk block where the value of the particular key can be found. Indexing Methods Ordered indices The indices are usually sorted to make searching faster. The indices which are sorted are known as ordered indices. Example: Suppose we have an employee table with thousands of record and each of which is 10 byte...

SQL Injection

SQL Injection The SQL Injection is a code penetration technique that might cause loss to our database. It is one of the most practiced web hacking techniques to place malicious code in SQL statements, via webpage input. SQL injection can be used to manipulate the application's web server by malicious users. SQL injection generally occurs when we ask a user to input their username/userID. Instead of a name or ID, the user gives us an SQL statement that we will unknowingly run on our database. For Example - we create a SELECT statement by adding a variable "demoUserID" to select a string. The variable will be fetched from user input (getRequestString). demoUserI = getrequestString("UserId"); demoSQL = "SELECT * FROM users WHERE UserId =" +demoUserId; Types of SQL injection attacks SQL injections can do more harm other than passing the login algorithms. Some of the SQL injection attacks include: Updating, deleting, and inserting the data: An attack can mo...