XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Your Guide to Using Multiple Displays

Tip of the Week: Your Guide to Using Multiple Displays

Depending on the task you’re trying to work on, it can sometimes seem like there just isn’t enough space on your computer monitor. One of the best solutions is to add another monitor. However, this sometimes requires more that just plugging another display into your system. For this week’s tip, we’ll review the steps to connecting multiple displays to your workstation.

Preparation
Connecting multiple monitors is a process, so before you begin, you should make sure you have all your ducks in a row. First, you need to make sure that your computer is capable of supporting multiple monitors in the first place.

To do so, you need to make sure you have sufficient graphics ports to connect these multiple monitors to. Look at the back of your computer and check for graphics ports, or ones labeled DVI, HDMI, DisplayPort, or VGA. Depending on what you see, your computer may or may not have a discrete graphics card, which dictates whether or not you can most likely use more than two monitors. If you only have a motherboard, two displays are generally your cap, while three or more - in addition to the first two - suggest that you have the separate graphics card.

However, even this doesn’t always mean that you can use more than two displays. Checking for the make and model of your graphics card and running it through a quick Google search with the amount of monitors you’d want to use should tell you if your card can support them.

If not, there is always the possibility of adding an additional graphics card, as long as you have the real estate and a sufficient power supply in your computer to support it. If you do, you will want to be sure that you use the same brand of card as your system currently uses. This will improve your performance and cause much less trouble for you in the long run. In addition to this, you will also need to be sure that you have the appropriate connector cables, and that they will connect properly between your tower and your display.

From there, all you have to do is obtain the additional monitors you want to use, which will be dictated by your budget, your needs and intended use, and your available real estate.

Setup and Configuration
Unfortunately, you still aren’t quite ready to dive back in - you need to tell your computer itself to play nice with all these monitors, too. Fortunately, the Windows operating system makes this fairly simple.

Press Windows + P to pull up a simple menu of your display modes. These modes are as follows:

  • PC screen only - Your primary monitor will be the only one utilized.
  • Duplicate - All monitors will show the same desktop.
  • Extend - The monitors work collaboratively to provide a single, expanded desktop.
  • Second screen only - Your secondary monitor will be the only one utilized.

Generally speaking, you will most likely want to utilize the ‘Extend’ setting.

Once you have done all this, you will want to right-click anywhere on your desktop to pull up your Display settings. Using the diagram provided, mimic the way your screens are set up, each numbered box representing one of them. Clicking Identify will have the screens identify themselves by number. You can also adjust whether your taskbar is displayed on all screens and change up your desktop customization for each.

It doesn’t take much to help boost your productivity at work, which means even the smallest changes can make a big difference. How many monitors do you prefer to use? Tell us in the comments!

How to Be Selective when Picking a Backup Solution
EHR and Other Technologies Moving Healthcare Forwa...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Gadgets Malware Network Security Email Quick Tips Efficiency Network IT Support Innovation Business Management IT Services Social Media Business Business Continuity Smartphones Server Miscellaneous Upgrade Virtualization Communication User Tips Communications Disaster Recovery Windows Data Backup Computer Managed IT Services Microsoft Office Smartphone Data Recovery Users Passwords Mobile Device Management Browser Holiday Android Save Money WiFi Internet of Things Marketing Tech Term Outsourced IT Alert Ransomware BDR Artificial Intelligence Vendor Management Mobile Computing Cloud Computing Cybercrime Remote Monitoring Windows 10 Router Chrome Productivity Operating System Bring Your Own Device Apple BYOD Computers Cybersecurity Information Technology Automation Avoiding Downtime Telephone Systems Current Events Health Managed IT Services Spam Best Practice History Going Green Collaboration Big Data Remote Computing IT Solutions VPN Firewall The Internet of Things Employer-Employee Relationship Phone System Wireless Technology IT Consultant Proactive IT Application Hacking Social Engineering Trending Printer Facebook Office IT Support Lithium-ion Battery Budget Mobility Money Mobile Device Excel Bandwidth App Windows 10 iPhone Training Business Managament Mouse Private Cloud Two-factor Authentication Content Filtering Fax Server Office 365 Encryption Recovery Applications Maintenance Windows 8 Business Intelligence How To Unified Threat Management Networking Phishing Humor Customer Relationship Management Blockchain Outlook Hard Drives Word Tutorials Settings Value Virus Sports Data Security Redundancy Law Enforcement Access Control Apps Antivirus Save Time Information PowerPoint Analytics Website Google Drive Managed IT File Sharing User Error Data Protection Gmail Conferencing Entertainment Connectivity Wi-Fi Retail Social Inbound Marketing Vulnerability Tablet Search Human Resources Data Management Twitter Identity Theft Document Management Streaming Media Risk Management Administration Network Congestion Hacker Voice over Internet Protocol IT Management Social Networking Digital Payment Tech Support Computer Repair Servers Saving Time Machine Learning Scam Office Tips Analysis Administrator Downtime Software as a Service Compliance Managed Service Memory Flexibility PDF Bluetooth Update End of Support Instant Messaging Safety People HaaS Environment Virtual Assistant Comparison YouTube OneNote Samsung Telephony Government Windows 7 Meetings Google Docs Online Currency Biometrics Data Storage Healthcare Botnet Webinar Recycling Telephone System Point of Sale IT service Touchscreen DDoS Keyboard Solid State Drive Help Desk Work/Life Balance Data Breach Education Credit Cards Black Market Statistics Workers Smart Tech Cleaning Password Skype Video Surveillance Wireless Physical Security Programming Public Cloud Robot Fraud USB CES Augmented Reality Intranet IT Plan Data loss Running Cable SaaS IBM Piracy Wearable Technology Spam Blocking Net Neutrality Data storage Leadership Content Management Unsupported Software Paperless Office Infrastructure Business Technology Internet Exlporer Best Available Computer Accessories eWaste Display Windows 10s Customer Service Wiring Windows Server 2008 Amazon Web Services eBay Monitor Digital Signage Business Owner Debate Enterprise Content Management Employee/Employer Relationship Hosted Computing Proactive Software Tips Remote Work Charger Cast Consultant Students Bing Password Manager Alerts Hiring/Firing Cache Project Management Unified Communications Backup and Disaster Recovery HIPAA Cameras Devices GDPR Online Shopping Text Messaging Reputation Google Search Password Management Staff Internet exploMicrosoft Hosted Solution Inventory Remote Monitoring and Maintenance Gaming Console Computer Care Licensing Shortcuts Business Mangement Work Station Virtual Reality IoT Data Warehousing Specifications NarrowBand WIndows 7 Wireless Internet Warranty Start Menu Theft Digital Signature Uninterrupted Power Supply Audit Printer Server Shortcut Thought Leadership E-Commerce Regulations Evernote Customers ISP IT Security NIST Advertising Netflix Worker Commute Line of Business HBO Print Server User Electronic Health Records eCommerce Travel Criminal Remote Support Bloatware Millennials Chromecast Root Cause Analysis nternet Crowdfunding Managing Stress Domains Wire Microchip Mobile Cortana Distributed Denial of Service Files Multi-Factor Security Strategy Computer Fan Content Filter Camera Wireless Charging File Versioning Supercomputer Science Cryptocurrency Notifications Company Culture Authentication MSP Frequently Asked Questions Smartwatch Law Firm IT Vendor Entrepreneur Insurance Webcam Workforce Laptop Smart Office Professional Services Google Apps Colocation Safe Mode Lifestyle Macro Shadow IT FENG LinkedIn Storage Flash Fiber-Optic SharePoint Multiple Versions Knowledge Tablets Hybrid Cloud Patch Management Windows Media Player Virtual Desktop Nanotechnology Remote Worker Tip of the week Amazon Employee Hiring/Firing HVAC Security Cameras Co-managed IT 360 Emails Windows 8.1 Update Cost Management Practices Telecommuting Touchpad Screen Mirroring Search Engine Tools PC Care IaaS Computing Infrastructure Analyitcs Accountants Scheduling Legal Electronic Medical Records Addiction Virtual Private Network Sync 3D Cables Relocation Restore Data Upgrades Transportation Television Troubleshooting Webinar Benefits Automobile Public Computer IT solutions Battery Video Games Employer Employee Relationship CrashOverride Cryptomining Smart Technology Books Thank You Loyalty Regulation Scalability Experience Two Factor Authentication Content Emergency Congratulations Music How to Worker Utility Computing Techology Printers Audiobook Assessment Rootkit Politics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *