ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Prank Your Co-Worker By Changing the Size of Their Desktop Icons

b2ap3_thumbnail_desktop_icons_tip_400.jpgIt’s fun to find new ways to customize your PC’s desktop to fit your taste and personality. In fact, we bet that your current wallpaper image speaks volumes about who you are. Did you know that you can even adjust your desktop’s icon sizes?

There are several possible reasons as to why you would want to change the size of your desktop icons.

It may be that you have simply run out of space on your desktop and instead of taking the time to delete unused icons, you find it easier to just make the icons smaller to open up more desktop space (not a best practice). Or, maybe your eyesight would prefer the icons be just slightly larger. Or better yet, making the icons as large as possible makes for a quick office prank whenever a co-worker leaves their computer unattended and unlocked (again, this might not be a best practice).

Whatever reason you have for adjusting your desktop’s icon sizes, here’s how you do it. It’s as easy as clicking the desktop to activate it, holding down the [Ctrl] Key, and then moving the mouse scroll wheel forward or backward to adjust the icon sizes to be smaller or larger. You can make a subtle adjustment that’s not too noticeable. You can make the icons super small; or, you can have a single icon to take up most of the screen.

Alternatively, you can adjust the icon sizes by right clicking the desktop, going to view, and then selecting Large icons, Medium icons, or Small icons.

desktop icons

Using this desktop menu is an easy way to return the desktop icons to their normal size by selecting “Medium icons.”

What’s your preferred desktop icon size and what’s that say about you? How well would your co-worker react to returning to their computer and finding their icons to be ginormous? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Managed Service Windows 10 Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Data Management Internet of Things Saving Money Operating System Government Workplace Strategy Networking Windows Artificial Intelligence Gadgets Managed IT services Encryption Business Technology Mobile Device Management Blockchain App WiFi Virtualization Spam Server Information Remote Bandwidth Budget Gmail Office Two-factor Authentication Apple Office 365 Information Technology Employee/Employer Relationship History Analytics Big Data Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Voice over Internet Protocol IT Management Remote Computing Help Desk Training Hacking Cost Management Hacker Document Management Patch Management Vendor Save Money Employer-Employee Relationship Remote Monitoring Compliance Alert IBM Mobile Office BYOD Website Hiring/Firing Computing Outlook Managed Services Password Vendor Management Hard Drive Data loss Legal Money Data storage Customer Service Applications Search... Unified Threat Management Firewall Best Practice Project Management Vulnerabilities Augmented Reality Retail Word Cleaning Healthcare Websites Content Filtering Remote Workers Robot Meetings Mobility User Router Windows 7 Free Resource Google Maps Scam The Internet of Things YouTube Windows 11 How To Chrome VPN Twitter Laptop Update Law Enforcement End of Support Printer Mobile Computing Data Breach Marketing Paperless Office Running Cable Antivirus Social Sports SaaS DDoS Maintenance Travel Virtual Reality Storage Social Engineering Cryptocurrency Monitoring iPhone Black Market Education Cortana Computer Care Downloads Lithium-ion battery Vulnerability Saving Time Politics HIPAA Machine Learning Settings Software as a Service Managed Services Provider Processors Data Protection Computers Bitcoin Solid State Drive Virtual Private Network Telephone Current Events Chromebook Drones Excel Solutions Automobile Integration Tech Terms Images 101 Wireless Technology Display eWaste PowerPoint How To Managed IT Microchip Administration Virtual Assistant Flexibility Digital Presentation Downtime Employees Safety Specifications Taxes Avoiding Downtime IT Consultant Identity Theft Hack Virtual Desktop Notifications Holidays Customer Relationship Management Unified Communications Processor Experience Co-Managed IT Entertainment Google Docs Cooperation Physical Security Video Conferencing Bluetooth Distributed Denial of Service Virtual Machines Office Tips Disaster Private Cloud Computer Repair Memory Multi-factor Authentication Start Menu Professional Services Computing Infrastructure Azure Business Communications Recovery Vendor Mangement Service Level Agreement Internet Service Provider Competition Flash Management Regulations Compliance Telephone Systems Samsung Device security Managed IT Service Troubleshooting Business Growth Workplace Strategies LiFi Uninterrupted Power Supply Wireless Headphones Memes Entrepreneur Webcam Microsoft Excel Business Cards Tech Human Resources Documents Business Mangement Going Green Net Neutrality Application Error Financial Data Banking Tablets Business Intelligence Google Wallet Bookmark Risk Management Messenger IT Deep Learning Supercomputer Piracy Google Calendar Term Google Apps Securty Download Smart Technology Virus Telework Domains Business Metrics HTML Business Owner Hosted Solution Browsers Smartwatch Books Nanotechnology Communitications Motion Sickness Microsoft 365 Language Software License Society Comparison Google Play Google Drive Upload Procurement Social Network FinTech Visible Light Communication Knowledge Data Analysis CES Reading Corporate Profile Screen Reader IT Assessment Monitors Telephony Trends Supply Chain Management Public Speaking Employer Employee Relationship Mobile Technology Value Windows 8 Television Security Cameras Streaming Media Supply Chain Customer Resource management Organization Cabling Devices Cyber security Inbound Marketing G Suite Tip of the week Advertising Fileless Malware Relocation Tablet Smart Devices Keyboard Displays VoIP Gamification Remote Working Hard Drives Work/Life Balance Tracking Company Culture Tech Support Mouse Workplace Telephone System AI Regulations Trend Micro intranet Web Server Transportation Directions Digital Security Cameras Wireless Backup and Disaster Recovery Electronic Health Records Shortcut Electronic Payment Content Heating/Cooling Digital Payment Desktop Wasting Time Environment SharePoint In Internet of Things Windows XP Scams Electronic Medical Records Hacks Worker Accountants eCommerce Social Networking Network Congestion Modem Phone System Videos Reliable Computing Access Database Surveillance Writing Time Management Public Cloud Managing Costs Cables Health IT Equifax SSID Hard Drive Disposal Employer/Employee Relationships Audit Media Scalability Spyware Tactics Development Username Text Messaging File Sharing Virtual Machine Proactive IT Administrator Point of Sale Redundancy Reviews Bring Your Own Device Startup Optimization Freedom of Information Computer Accessories email scam Teamwork Navigation 2FA Staffing Cache Addiction Unified Threat Management Data Storage IP Address Workers Mobile Security Hypervisor Music Shortcuts User Tip Shopping Legislation News Medical IT CCTV SQL Server Printing Evernote Paperless Network Management Touchscreen PCI DSS Licensing Be Proactive Botnet Emergency Proxy Server Gig Economy Rental Service Emails Humor Micrsooft Computer Malfunction Fake News

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?