Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Deciphering Your Computer’s Power Options

Tip of the Week: Deciphering Your Computer’s Power Options

Granted, you’re probably most interested in your computer when you’re using it. However, it is very important to consider what you do when you walk away based on the list found in the Power section of the Start menu. Let’s go over what each of these options actually does.

Your Options

Opening the Start menu and clicking Power, you’ll most likely see the following options:

  • Sleep
  • Hibernate (subject to the hardware used or any group policies that may be in place)
  • Shut Down
  • Restart

Each option activates a different process that will best serve you in different situations. While Shut Down and Restart should be somewhat obvious—one turns off the system, and the other one completely shuts down all processes and brings them all back up to full power—the two remaining options may be less clear. Let’s review the times you should use these remaining options, Sleep and Hibernate.

Sleep

When your computer is in Sleep mode it is technically still on, just at an inactive state. This means that resuming work is a speedy and efficient process… once the monitor and peripherals wake up and full power is restored, you’re back in business.

This speed can be attributed to the use of your RAM to store all the data on your system while the computer sleeps. Unfortunately, this method also exposes your data to risk as a loss of power for any reason could wipe this data with no recourse on your part. Make sure you’re regularly saving your progress!

Hibernate

In between putting your computer to sleep and fully shutting it down, Hibernate basically enables you to turn off your computer while still retaining the fast pickup time that sleeping the system offers.

This is done in a similar method as Sleep would, with the exception that the actual drives are used to store your activity and processes instead of RAM. In doing so, your data is more protected, but could easily fill your hard drive with unneeded data.

To revive a device from hibernation, all you must do is press the power button again.

Your Needs Will Dictate What You Use

…or, your organization might. Your options could very well be limited by the hardware installed in the system you use or by your organization’s admin options. Therefore, Hibernate may or may not be an option for you to use.

Interested in learning more about your IT, or the solutions that could help make you business better? Reach out to Voyage Technology. Our team can give you the answers and support services you need. Call 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Information Artificial Intelligence Facebook Miscellaneous Cloud Computing Compliance Training Covid-19 Gadgets Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship Voice over Internet Protocol Computing Hacker Physical Security Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications Managed IT Services How To BDR Conferencing Operating System Computers Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Router Retail Storage Password Bring Your Own Device 2FA Big Data Help Desk Healthcare Customer Service Vendor Management Cybercrime Cooperation Free Resource Display Project Management Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Firewall Document Management Windows 11 The Internet of Things Scam Data loss Monitoring Social Excel Going Green Patch Management Managed IT Service Save Money Remote Workers Remote Monitoring Vulnerability End of Support Telephone iPhone Content Filtering Licensing Hacking IT Management Presentation VPN YouTube Meetings Vulnerabilities Entertainment Data Privacy Cryptocurrency Wireless Technology Computer Repair Images 101 Mobility Virtual Desktop Telephone System Multi-Factor Authentication Cost Management Data storage LiFi Word Outlook Machine Learning Money Employees Integration Humor User Tip Modem Mobile Security Safety Maintenance Processor Antivirus Sports Mouse Holidays Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Robot Customer Relationship Management Settings Downloads Printing Wireless Connectivity IT Break Fix Scams Unified Threat Management Hosted Solution Browsers Smartwatch Upload Procurement Azure Hybrid Work Typing Multi-Factor Security Tech Human Resources Network Congestion Social Network Telework Cyber security IoT Communitications Dark Web Cables Google Drive User Error User Knowledge CES Trends Supply Chain Management Google Calendar Term Google Apps Point of Sale 5G Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance IP Address Google Docs Unified Communications Experience Data Analysis Running Cable Tech Support Gamification Flexibility Staff Value Business Intelligence Bitcoin Network Management Legislation Shortcuts Google Wallet Monitors Organization Social Networking Smart Devices Ransmoware Recovery Fileless Malware Digital Security Cameras Laptop Websites Content Remote Working Wearable Technology Memory Vendors Hard Drives Windows 8 Comparison Google Play Be Proactive Domains Drones Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce SharePoint Electronic Medical Records Directions Videos Halloween Wasting Time Threats Refrigeration Specifications Security Cameras Workplace Strategies Public Speaking Lenovo Writing Trend Micro Internet Exlporer Software as a Service Fraud Meta Lithium-ion battery Virtual Reality Microchip Entrepreneur Scary Stories Private Cloud Username Managing Costs Amazon Hacks Server Management Black Friday SSID Superfish Identity Theft Fun eCommerce Database Surveillance Virtual Assistant Outsource IT Deep Learning Twitter Error IT Technicians Virtual Machine Environment Media Undo Cyber Monday Medical IT Education Social Engineering Proxy Server Reviews Cookies Remote Computing Tactics Development Hotspot Transportation Small Businesses Mobile Computing Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Tablet Search Shopping Alert Addiction Language Employer/Employee Relationships Outsourcing Application Best Practice Navigation Managed IT Buisness File Sharing Dark Data Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace IBM Legal IT solutions How To Gig Economy Notifications Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Business Growth Evernote Paperless Travel Regulations Compliance Identity Smart Tech Memes Co-managed IT Techology Google Maps Cortana Bookmark Download Net Neutrality Alerts SQL Server Technology Care Alt Codes Business Communications Competition Downtime Unified Threat Management Financial Data History

Blog Archive