ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Prank Your Co-Worker By Changing the Size of Their Desktop Icons

b2ap3_thumbnail_desktop_icons_tip_400.jpgIt’s fun to find new ways to customize your PC’s desktop to fit your taste and personality. In fact, we bet that your current wallpaper image speaks volumes about who you are. Did you know that you can even adjust your desktop’s icon sizes?

There are several possible reasons as to why you would want to change the size of your desktop icons.

It may be that you have simply run out of space on your desktop and instead of taking the time to delete unused icons, you find it easier to just make the icons smaller to open up more desktop space (not a best practice). Or, maybe your eyesight would prefer the icons be just slightly larger. Or better yet, making the icons as large as possible makes for a quick office prank whenever a co-worker leaves their computer unattended and unlocked (again, this might not be a best practice).

Whatever reason you have for adjusting your desktop’s icon sizes, here’s how you do it. It’s as easy as clicking the desktop to activate it, holding down the [Ctrl] Key, and then moving the mouse scroll wheel forward or backward to adjust the icon sizes to be smaller or larger. You can make a subtle adjustment that’s not too noticeable. You can make the icons super small; or, you can have a single icon to take up most of the screen.

Alternatively, you can adjust the icon sizes by right clicking the desktop, going to view, and then selecting Large icons, Medium icons, or Small icons.

desktop icons

Using this desktop menu is an easy way to return the desktop icons to their normal size by selecting “Medium icons.”

What’s your preferred desktop icon size and what’s that say about you? How well would your co-worker react to returning to their computer and finding their icons to be ginormous? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Disaster Recovery Holiday Covid-19 Managed Service IT Support Browser Apps Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Remote Work Data Management Saving Money Operating System Government Workplace Strategy Gadgets Networking Artificial Intelligence Windows Managed IT services Spam Business Technology WiFi Mobile Device Management Bandwidth Blockchain Remote Encryption Server App Virtualization Information Office 365 Budget Apple Employee/Employer Relationship Information Technology Gmail History Office Two-factor Authentication BDR Wi-Fi Analytics Cybercrime Access Control Conferencing Data Security Big Data Health Remote Computing Hacker IT Management Training Cost Management Compliance Document Management Patch Management Help Desk Employer-Employee Relationship Hacking Voice over Internet Protocol Save Money Vendor Remote Monitoring Hiring/Firing Managed Services Outlook Vulnerabilities Password Money BYOD Customer Service Computing Unified Threat Management Vendor Management Firewall Hard Drive Augmented Reality Word Data loss IBM Website Search... Legal Best Practice Data storage Retail Alert Mobile Office Applications Project Management Black Market Free Resource User Cleaning Websites Robot How To Monitoring Meetings Mobility Healthcare Chrome Social Sports SaaS DDoS Google Maps Scam iPhone Mobile Computing Twitter Education VPN Cortana Content Filtering Marketing Law Enforcement Update End of Support Running Cable Printer Windows 11 Router Storage Paperless Office The Internet of Things YouTube Antivirus Data Breach Travel Maintenance Remote Workers Virtual Reality Social Engineering Windows 7 Laptop Cryptocurrency Virtual Private Network Start Menu Computer Care Downloads Downtime Safety Current Events Multi-factor Authentication Politics Vulnerability Solutions Machine Learning Settings Virtual Desktop Software as a Service Experience Data Protection Saving Time Integration Solid State Drive Images 101 Display PowerPoint Computers Bitcoin Chromebook Drones Administration Disaster Employees Telephone Presentation Avoiding Downtime Automobile Specifications Tech Terms IT Consultant Holidays Lithium-ion battery How To Excel Microchip Managed IT Customer Relationship Management Cooperation Flexibility Digital Video Conferencing Co-Managed IT Processors Entertainment Virtual Machines Taxes Computer Repair Hack Virtual Assistant Identity Theft Notifications Professional Services Unified Communications Google Docs Physical Security Bluetooth Processor Distributed Denial of Service Office Tips Wireless Technology Managed Services Provider HIPAA eWaste Private Cloud Memory Cables Google Apps Touchscreen Navigation intranet Addiction Botnet email scam Mobile Security Rental Service Emergency Micrsooft Wireless Telework Shortcut Computer Malfunction Heating/Cooling Communitications User Tip Environment Microsoft 365 Legislation News Flash Smartwatch Vendor Mangement Point of Sale Windows XP Business Growth Procurement Evernote Samsung Business Owner Social Networking Network Management Telephone Systems FinTech Uninterrupted Power Supply Webcam IT Assessment Proxy Server Emails Fake News Shortcuts CES Business Mangement Banking Google Wallet Supply Chain Management Tablets Value Service Level Agreement Computing Infrastructure Device security Messenger Deep Learning Organization Cyber security Management Smart Devices Supercomputer Wireless Headphones Microsoft Excel Google Calendar Be Proactive Business Metrics Virus Hosted Solution Remote Working Tech Inbound Marketing Going Green Business Cards Motion Sickness Books Staffing AI Trend Micro Error Google Drive Society IP Address Electronic Health Records Bookmark Transportation Comparison Language Workplace Strategies Digital Security Cameras Term Wasting Time Download Piracy Modem HTML Reading Knowledge Monitors Corporate Profile Electronic Payment Visible Light Communication eCommerce Telephony Windows 8 Surveillance Browsers Employer Employee Relationship Nanotechnology Television Videos Google Play Cabling Managing Costs Upload Software License Social Network G Suite Phone System SSID Relocation Displays Recovery Tablet Advertising Competition Media VoIP Tech Support Development Data Analysis Tracking Employer/Employee Relationships Screen Reader Mouse Work/Life Balance Smart Technology Mobile Technology LiFi Security Cameras Entrepreneur Virtual Machine Trends Application Optimization Customer Resource management Web Server Devices Documents Reviews 2FA Fileless Malware Digital Payment Business Intelligence Teamwork In Internet of Things Tip of the week SharePoint Company Culture Hacks Network Congestion Data Storage Worker Hypervisor Gamification Computer Accessories Telephone System Medical IT Regulations Reliable Computing Writing Securty Shopping Access Supply Chain Paperless Time Management Domains Directions Public Cloud SQL Server Backup and Disaster Recovery Desktop PCI DSS Licensing Content Humor Electronic Medical Records Accountants Scalability Audit Gig Economy Spyware Workplace Business Communications Proactive IT Internet Service Provider File Sharing Azure Database Administrator Text Messaging Bring Your Own Device Redundancy Regulations Compliance Managed IT Service Public Speaking Memes Health IT Equifax Cache Scams Streaming Media Human Resources Unified Threat Management Music Net Neutrality Workers Troubleshooting Tactics Hard Drive Disposal Financial Data Keyboard Username Hard Drives IT CCTV Startup Freedom of Information Printing Risk Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?