(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Your Guide to Using Multiple Displays

Tip of the Week: Your Guide to Using Multiple Displays

Depending on the task you’re trying to work on, it can sometimes seem like there just isn’t enough space on your computer monitor. One of the best solutions is to add another monitor. However, this sometimes requires more that just plugging another display into your system. For this week’s tip, we’ll review the steps to connecting multiple displays to your workstation.

Preparation
Connecting multiple monitors is a process, so before you begin, you should make sure you have all your ducks in a row. First, you need to make sure that your computer is capable of supporting multiple monitors in the first place.

To do so, you need to make sure you have sufficient graphics ports to connect these multiple monitors to. Look at the back of your computer and check for graphics ports, or ones labeled DVI, HDMI, DisplayPort, or VGA. Depending on what you see, your computer may or may not have a discrete graphics card, which dictates whether or not you can most likely use more than two monitors. If you only have a motherboard, two displays are generally your cap, while three or more - in addition to the first two - suggest that you have the separate graphics card.

However, even this doesn’t always mean that you can use more than two displays. Checking for the make and model of your graphics card and running it through a quick Google search with the amount of monitors you’d want to use should tell you if your card can support them.

If not, there is always the possibility of adding an additional graphics card, as long as you have the real estate and a sufficient power supply in your computer to support it. If you do, you will want to be sure that you use the same brand of card as your system currently uses. This will improve your performance and cause much less trouble for you in the long run. In addition to this, you will also need to be sure that you have the appropriate connector cables, and that they will connect properly between your tower and your display.

From there, all you have to do is obtain the additional monitors you want to use, which will be dictated by your budget, your needs and intended use, and your available real estate.

Setup and Configuration
Unfortunately, you still aren’t quite ready to dive back in - you need to tell your computer itself to play nice with all these monitors, too. Fortunately, the Windows operating system makes this fairly simple.

Press Windows + P to pull up a simple menu of your display modes. These modes are as follows:

  • PC screen only - Your primary monitor will be the only one utilized.
  • Duplicate - All monitors will show the same desktop.
  • Extend - The monitors work collaboratively to provide a single, expanded desktop.
  • Second screen only - Your secondary monitor will be the only one utilized.

Generally speaking, you will most likely want to utilize the ‘Extend’ setting.

Once you have done all this, you will want to right-click anywhere on your desktop to pull up your Display settings. Using the diagram provided, mimic the way your screens are set up, each numbered box representing one of them. Clicking Identify will have the screens identify themselves by number. You can also adjust whether your taskbar is displayed on all screens and change up your desktop customization for each.

It doesn’t take much to help boost your productivity at work, which means even the smallest changes can make a big difference. How many monitors do you prefer to use? Tell us in the comments!

How to Be Selective when Picking a Backup Solution
EHR and Other Technologies Moving Healthcare Forwa...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Data Tech Term Outsourced IT Data Recovery IT Support Microsoft Cloud Computing Software IT Services Saving Money Internet of Things Internet Business Continuity Efficiency Hardware BDR Communications Communication Small Business Cybercrime Cybersecurity Smartphones Business Ransomware Disaster Recovery User Tips Android Artificial Intelligence Server Computers Avoiding Downtime Smartphone Save Money Windows How To Gadgets Browser Managed IT Alert Managed IT Services Network BYOD Computer Chrome Money Phishing Firewall Passwords Applications Productivity Business Intelligence Social Engineering Workplace Tips Law Enforcement Windows 10 Data Security Data Protection Miscellaneous Mobility Business Management Social Media Collaboration Vulnerability Mobile Device Management Two-factor Authentication Router Word VPN Facebook Connectivity Managed Service Provider Productivity Budget Flexibility Private Cloud Bandwidth Office 365 Telephone Systems Proactive IT Redundancy IT Support Upgrade Remote Monitoring Identity Theft Operating System Spam Virtualization Blockchain Document Management Compliance Managed Service Hacking Training Update Workers Infrastructure Unsupported Software Settings Physical Security Data Storage Automation Servers Data Breach Apps Virtual Assistant Sports Government Content Filtering Office Tips Microsoft Office Mobile Device Mobile Computing Google Drive Spam Blocking CES Big Data App Quick Tips Website Value Solid State Drive Holiday Public Cloud Encryption Employer-Employee Relationship Networking Password Data loss Content Management Paperless Office Bring Your Own Device Access Control Data storage OneNote Smart Tech Comparison Business Owner IT Management Unified Threat Management Information Technology Work/Life Balance Information Windows 10 Windows 7 Credit Cards File Sharing Wi-Fi IT Plan Analysis Internet exploMicrosoft Cast Human Resources Healthcare Recovery Patch Management Wireless Charging Regulations Nanotechnology Business Technology Downtime eWaste Wire Augmented Reality Fraud Frequently Asked Questions Practices Millennials Save Time Cortana Computer Fan Skype Current Events Storage Wireless Technology Wiring Office Computer Care Accountants Lifestyle Password Management Safety HaaS Advertising Staff Electronic Health Records IBM Scam Fiber-Optic User Error Root Cause Analysis Criminal Botnet webinar The Internet of Things Amazon Excel Hosted Computing Workforce Marketing Hacker Colocation FENG Password Manager Start Menu Knowledge HIPAA Camera Relocation Software Tips Samsung NIST Entertainment Charger Digital Signature Google Docs Emails Machine Learning Hiring/Firing Health Cables Flash Devices Telephone System Meetings Travel Conferencing Smart Office USB Amazon Web Services Tip of the week Inventory Telecommuting Computing Infrastructure Electronic Medical Records Business Mangement Mobile Network Congestion Addiction Humor IoT Cryptocurrency Data Warehousing Voice over Internet Protocol YouTube PDF Black Market Files Windows 10s Unified Communications Thought Leadership Data Management Reputation Internet Exlporer Apple Online Shopping Windows Server 2008 Remote Work Gmail Professional Services IT Consultant Cache Keyboard HBO Safe Mode Theft Sync Supercomputer Streaming Media MSP Hybrid Cloud Strategy Multi-Factor Security HVAC Customer End of Support Screen Mirroring Software as a Service Students Hosted Solution Hard Drives iPhone Emergency Evernote Authentication Monitor History CrashOverride Recycling Tools Leadership Wireless Internet Outlook SaaS Insurance Specifications Audit Google Apps Telephony Content Filter Legal Risk Management Remote Worker Cleaning Trending Netflix Education Enterprise Content Management Content Lithium-ion battery Computer Accessories Scalability Music Two Factor Authentication 5G Best Practice Politics Tech Support Audiobook Proactive Vendor Management WiFi Shadow IT Bluetooth Wearable Technology Assessment Twitter Virtual Reality Competition Remote Monitoring and Maintenance Customer Relationship Management Transportation Automobile Books Television IP Address Printers Fun Users Worker Commute Line of Business Webinar Customer Service Benefits Regulation Worker Instant Messaging Troubleshooting Public Computer Mobile Office Administration Domains Video Games Loyalty Smart Technology Wireless IT solutions Company Culture Battery Techology Rootkit How to Employer Employee Relationship Public Speaking Remote Computing Experience Search Presentation Managing Stress