Printscreen - How can I do?

TSIA

I assume you mean screen capture?

Simultaneously press the volume key keys power of about one second, you should hear a beep and it should show in the notifications section that a screenshot was captured.

Click the notification to see the image in the gallery and then send it or do whatever you want with the image.

Tags: Motorola Phones

Similar Questions

  • How can I connect to someone who is hacking my network?

    How can I connect to someone who is hacking my network?

    Hi Frank,.

    What kind of network - your internet connection?  your intranet from home or the office (and it is wireless or wired or both)?  An ad - hoc network or a network based on the domain server (and if the latter, what type of server)?  The network hosts a web site, an exchange server that is accessible by internet, or also allowed incoming connections?  How many computers is on the network and what are the current use operating systems and who do you think are presented?  If you use a router, is protected by a router security identifier unique and a password (no admin / admin or other default standard settings, everyone knows) and a unique key and what type of security type (WPA, WPA2,...) and what type of encryption code?  This can be verified by the computer and others need to be checked or enabled via the router you can reach most likely through your browser by typing 192.168.1.1 where you would normally enter a URL.  If this isn't the correct code, then see below for IPCONFIG and would probably be the address that you want as the gateway by default and possibly the address of the DHCP server or the DNS server address as well and use what is there instead.  What type of method of internet access (DSL, cable, Satellite,...)?

    How do you know if that someone is hacking your system?  What evidence do you have that it happens or happened?  How do you think that piracy happens - happens through your connections in real-time (as if someone used a remote access or remote desktop) or it occurs because you seem to see the proof of it (if so, what evidence)?  I am trying to determine if a person has a path in your system directly or whether you are infected with malware that allows a periodic access or 'appear' as you are being hacked, when you are just infected.

    Do you notice it when it is real or only later after it occurred?  What exactly is the pirate make - information collection, change of information, install programs, remove programs or information, theft of bandwidth, or you are not sure and don't know exactly?  This happens only when you are connected to the internet or does it also occur when you are not connected and just using the computers and devices that are other interconnected?  If it isn't when it is connected to the internet, which helps limit the possibilities.

    If you are present and it's ongoing, click on start / all programs / accessories / right-click on command prompt and click Run as administrator.  Then type IPCONFIG/all and enter.  Which should display all connections to your computer, and if anyone is connected, this connection must appear, as well as login information and include information such as address TCP/IP (which may be useful to know).  Create a capture image or printscreen of the information.

    If you use Vista or Windows 7, go to start / Control Panel / Network and sharing Center / discover computers and devices.  Is there a link that doesn't seem right or that you don't recognize?  Come back and click on manage network connections.  Are there connections that you don't recognize?  If so, click on them and learn what you can about the properties and other information - create a capture of information or save a printscreen image.

    You use the Windows Firewall and is it activated and functioning?  Open and check exceptions and remove the items that you do not use or do not need - by default adds a lot of things that most people do not use. and everyone is a path in your system.  The less open ports, the better.  Do not remove everything you really need, but uncheck everything you don't need (you can always add it back later if the need ever happens).

    It's just a start on what to do to gather information.  I need the results and answers to give additional advice on what to do next - depending on what you have to say.

    Most likely, we will be able to best prevent access or possibly with the help of your ISP and the ISP of the hacker TCP/IP address (if we find the it), be able to identify who it is and stop it or help you gather enough information take legal or security action against the person or persons responsible.  Ago probably pirates out there that can do what you're tempted, but also provides methods of hacking (and that is basically what YOU want to do) is not something we support or help someone to do here.  To help you protect your system is one thing and we'll do what we can to help here - teach you how to hack the somone who is hacking you is quite another and we will not be involved in this.

    ***********************************************************

    In the meantime, in case there is an infection as opposed to a direct hacking, update and run a full scan with any security software you use.

    If you do not have because they can help, try the following programs. I recommend you download, install, update and run full scans with Malwarebytes:http://www.malwarebytes.org/ and SuperAntiSpyware:http://superantispyware.com/ and then run a full scan of Microsoft Security:http://www.microsoft.com/security/default.aspx.

    Check the following compliments from Stephen Boots - MVP:

    S ' ensure that the Windows Firewall is enabled.

    S ' ensure that all critical updates or important, including service packs for the operating system and programs are installed from Microsoft Update (Windows Update).

    -Make sure that Internet Explorer is version 8 or 9 and implemented to date with all patches.

    -In Internet Explorer 8 or 9, use the SmartScreen filter.

    -Make sure that the Internet IE security settings are at least put to fire medium-high (default).

    -Turn on the pop-up blocker in Internet Explorer.

    -On Vista and Windows 7 make sure that User Account Control (UAC) and doesn't work with elevated privileges.

    -Make sure that automatic updates of Windows are set to notify at least, but the preferred setting is to download and install automatically. If you update manually, be sure to update as soon as possible after being informed of updates available.

    -Make sure that installed applications, including Adobe Acrobat, Adobe Flash and Java are at their latest versions. Many vendors are regularly updated and fixes security vulnerabilities.

    -Never click through links from unknown sources and be careful, even if they are from a "reliable".

    -Do not open attachments in unsolicited e-mail.

    -Practice safe web surfing.

    To ensure that you are not infected (or remove the suspicion that you are infected which is often the case in such situations and is done either by hackers or may appear as the pirates are active when it is just a system infected - or if more than one, you have several computers connected), please follow these compliments of recommendations of JimR1 - MVP :

    You are running Microsoft Security Essentials?

    If Yes: start here - https://support.microsoftsecurityessentials.com/ and select the link that says - I think my computer is infected - and support and select the option for phone, chat or email (options vary depending on the region)

    If you are in North America, you can call 866-727-2338 for a free Microsoft Help for infections of virus and spyware.

    Otherwise:

    You can start here: https://consumersecuritysupport.Microsoft.com/ or here: http://support.Microsoft.com/contactus/cu_sc_virsec_master?WS=support#TAB0 for the help and support for malware infections.

    If this does not work, or that they can't help, try one of the compliments of forums-remove malware following PA Bear - MVP:

    I can recommend the assistance of experts available in these forums: http://spywarehammer.com/simplemachinesforum/index.php?Board=10.0 http://www.spywarewarrior.com/viewforum.php?f=5 http://www.dslreports.com/Forum/Cleanup http://www.Bluetack.co.uk/forums/index.php and http://Aumha.net/viewforum.php?f=30

    *************************************

    The first section will collect information about your situation so we can get an idea where to look and what to look for (and perhaps even determine if it occurs).

    The second section will verify that your computer or network is not infected (you should do this for all the computers on the network) or clean if they are and which remove the cause of the problem (of least temporarily).

    I hope this helps and await your response with responses, results and information.

    Thanks and good luck!

  • How can I save the Capture screen image to a file automatically when I press the screen Capture button?

    I want to know how can I do so when I press the button on my keyboard, to do a screen Capture, it automatically saves it in a file?

    I want to know how can I do so when I press the button on my keyboard, to do a screen Capture, it automatically saves it in a file?

    ==================================
    The free Gadwin Printscreen version could be
    what you are looking for:

    (FWIW... it's always a good idea to create a system)
    Restore point before installing software or updates)

    Gadwin PrintScreen download screen
    http://www.Gadwin.com/download/
    (scroll down to: Gadwin PrintScreen 4.3 freeware)

    Volunteer - MS - MVP - Digital Media Experience J - Notice_This is not tech support_I'm volunteer - Solutions that work for me may not work for you - * proceed at your own risk *.

  • How can I tell Siri on Mac who I am

    When you use Siri on my Mac, he thinks I'm my partner. How can I change the contact information so if Siri knows who I am?

    You must select the card that you want your card and use it card ➙ do this sheet my sheet menu option:

    Siri will use this card.

  • How can I get the messages appear when sent even if my phone is locked. I only get messages across when I activate the phone

    How can I get the messages appear when sent even if my phone is locked. I only get messages across when I activate the phone

    Settings > Notifications > Messages > display on the lock screen

  • How can I delay send SMS in IOS10.0.2?

    How can I delay the sending of SMS in IOS 10.0.2?

    Don't hit the Send button until you are ready to send it...

  • How can I change several download Sierra systems

    How can I change several download Sierra systems?  I have a Mac mini end of 2012 running El Capitan, over a mid-2010 Mac mini and MacBook Pro mid-2010 the two race Yosemite with limit of bandwidth on my internet connection and want to update all three systems in one download.  Is the process that apply with Yosemite and El Capitan (ie. Copy the Setup program to another location before you run it on the download system) still the way forward?  Thank you.

    You can do this or DiskMaker X allows to create a key to install it.

    (145170)

  • How can I move files/folders to iCloud back to their original finder folder

    I just updated to OS Sierra and noticed that my documents folder was empty. How can I move files/folders to iCloud back to their original finder folder?

    Thank you

    The Duke

    See it - Add your files, Desktop and Documents in iCloud Drive - Apple Support

  • How can I reinstall El Capitan?

    I'm really impressed by Sierra to date.  He made my Mac just as slow as a 2000 pre.  I want to reinstall El Capitan.  How can I do this? I have an iMac 21 inch end 2013 model.  Memory is 8 GB 1600 mHz.

    You will need to wipe your hard drive and can then restore your backup that you made before the upgrade. You use recovery to wipe and restore.

  • My preferences iCloud lost password! How can I retrieve or reset?

    My preferences iCloud password is lost! How can I retrieve or reset?

    It's the same as your password Apple ID.

  • How can I disable the voicemail transcription service?

    How can I disable the function of transcription of voice mail on my iPhone 7 more?

    Hello

    Go to settings-accessibility disable voice.

    See you soon

    Brian

  • How can I copy files/sub-sub-sub-folders in Icloud on MacBook? Since the upgrade to Sierra, I see all of my folders in icloud but not on my Mac.  Thanks - David

    How can I copy files/sub-sub-sub-folders in Icloud on MacBook? Since the upgrade to Sierra, I see all of my folders (with documentation) in icloud but not on my Mac.  Thanks - David

    Turn off the power of optimized storage and copy the files to your Mac.

    1. Click on the Apple icon in the upper left corner of your screen.
    2. Select has about this Mac from the menu drop down.

    3. click on the tab for storage in the system information window.

    4. click on manage the...

    5 disable the storage element optimize.

  • How can I update my iPhone more than 8.4 of iOS iOS 9.3.5 6?

    How can I update my iPhone more than 8.4 of iOS iOS 9.3.5 6?

    You do not have. You can only upgrade to the current version which is 10.0.2

  • How can I get rid of the widgets screen?

    Since the upgrade to iOS 10, a widget screen when I start my phone.  How can I get rid of this sort my identification of access/contact code screen appears when I turn on the phone?

    Thank you.

    With iOS 10, if you see the widget screen by sliding the lock screen is normal and how the new iOS.  It is more action 'slide to unlock' available in iOS 10.

    To operate the unit and go directly to the password entry screen (if you are using a fingerprint recognition), press the home button twice.

    In iOS 10 from the lock screen, are the only gestures by scanning

    1. slide from right to left to bring up the camera

    2. slide left to right to bring up the widgets screen (from the widget screen, swipe down to search for).

  • How can I change my Apple I cloud username when I changed my e-mail address?

    How can I change the user name of cloud i when I changed my i tunes e-mail address?

    This article explains how to change your Apple - ID change your Apple - Apple Support ID

Maybe you are looking for

  • Games does not open

    When I try to open the loner, who came on the computer, the computer behaves like it's going to open then it stops and nothing happens. There is no item in the taskbar. I did the updates of windows and it's worked very well, and then all of a sudden,

  • canceled or not installed updates

    I just installed vista service Pack 2 and the corresponding updates.almost all the previous updates are uninstalled State or cancelledIt seems not to be of any significant change in performance.However about 30 GB is sold out.any suggestions or expla

  • How can I fix Windows 7 "blue screen"?

    Hello, recently my computer has got these horrible accidents that have stopped my computing experience quite suddenly. So far, I did a lot of things to try to solve these problems, including: Reinstalling the video drivers. Update of the OS Run the w

  • Applications pre-loaded blackBerry Smartphones

    Hey people! I have a quick and a little ridiculous for you. Is there anyway I could get a list of applications preloaded on the 8220? I googled around but get only offers to download new content. Thanks in advance! Bmobile

  • Cannot cancel - very unhappy customer

    I have been a loyal user of Adobe Photoshop 4 back in the 1990s.I signed up for a creative cloud Abobe the first day he came available.Last month my Bill climbed from $ 39.99 to $69.99 with absolutely no notice or warning.(I understand that it was be