Flylib.com
Mac OS X to the Max: Desktop Keyboard Shortcuts
Previous page
Table of content
Next page
Table 4.4 lists keyboard shortcuts for working with the Finder.
Table 4.4. Keyboard Shortcuts for the Finder
Action
Keyboard Shortcut
Add to Favorites
+T
Close Window
+W
Connect to Server
+K
Duplicate
+D
Eject
+E
Empty Trash
Shift+
+Delete
Find
+F
Force Quit
Option+
+Escape
Go to Folder
Shift+
+G
Hide Finder
+H
Hide Toolbar
+B
Log Out
Shift+
+Q
Mac Help
+?
Make Alias
+L
Minimize Window
+M
Move to the Applications directory
Option+
+A
Move to the Computer directory
Option+
+C
Move to the Favorites directory
Option+
+F
Move to the Home directory
Option+
+H
Move to the iDisk directory
Option+
+I
Move to Trash
+Delete
New Finder Window
+N
New Folder
Shift+
+N
Select All
+A
Show Info
+I
Show Original
+R
Show View Options
+J
Previous page
Table of content
Next page
Special Edition Using Mac OS X v10.2
ISBN: 0789729040
EAN: 2147483647
Year: 2005
Pages: 260
Authors:
Brad Miser
BUY ON AMAZON
Network Security Architectures
Secure Networking Threats
Components of a Hardening Strategy
Campus Trust Model
Network Design Considerations
Network Security Management Best Practices
Cisco IOS Cookbook (Cookbooks (OReilly))
Using Custom Queues with Priority Queues
Using Class-Based Weighted Fair Queuing
Preventing Unauthorized Configuration Modifications
Filtering by Source or Destination IP Address
Debugging HSRP
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Logistics in Tesco: Past, Present and Future
Transforming Technologies: Retail Exchanges and RFID
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Special Edition Using Crystal Reports 10
Implementing Parameters for Dynamic Reporting
Benefits of Cross-Tabs
Using Advanced Cross-Tab Features
Crystal Enterprise Architecture Overview
An Overview of the Crystal Reports 10 .NET Components
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Authenticating Firewall Sessions (Cut-Through Proxy Feature)
Selective Inspection
Failover and Redundancy
Deployment Scenarios
Deployment Scenarios
DNS & BIND Cookbook
Asking Questions You Cant Find Answers To
Introduction
Testing a Name Servers Configuration
Running a Name Server in a chroot( ) Jail
Handling Windows Registration with a BIND Name Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies