Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: 5 Simple Browser Tricks

Tip of the Week: 5 Simple Browser Tricks

We all know how to use the Internet (you’re here now, after all), but there are a lot of hidden secrets to it that far fewer people know. Today, we’ll let you in on five of them to try and make some basics a little easier.

Close a Tab
We told you these were basics. Yes, you close a tab by clicking the little ‘x’ along the edge. However, you can also close a tab by middle-clicking on it with the mouse wheel. While this may not make much difference when you’re only contending with two or three tabs, this is a much faster method than trying to line up your cursor with that ‘x’ for fourteen tabs.

Quick Address Bar
When you want to go to a different website (or run something through a search engine), you have to type something in the address bar at the top of your browser window. Sure, you could click on the address bar, but you have other options as well. Try pressing F6, Alt+D, or Ctrl+L… any of them will bring you to the address bar and highlight its contents, leaving you in the position to just continue typing.

Viewing Slideshows or Multi-Page Articles
We’ve all been online, trying to read an article, only to find that it’s been split up across multiple pages or turned into a slideshow. Instead of fighting with the controls to view your content, there’s an easier way to read it all in one place. All you have to do is start to print it.

By clicking Print or pressing Ctrl+P, you’ll be given a print preview of the complete article. From there, you can read it without interruption. Alternatively, you could also print it out to read without interruption later, whichever you prefer. The important thing is that you are able to read the content you want to read, without jumping through hoops.

Highlighting More Accurately
Have you ever tried to highlight text online by clicking and dragging from the starting point to the end? If you’re like many, you’ll have found doing so with any accuracy to be challenging, frustrating, and ineffective. It’s just too easy to snag too much and/or too little, images and sentence fragments being highlighted instead of the content you were trying to select. Next time, instead of relying on click-and-drag, try clicking on the starting point of your selection, and shift-clicking the end point. This will select just what is included between these points.

Toggle Fullscreen
Sometimes, productivity requires blocking out any and all distractions, even including those on our workstation displays. Setting the window you are working in to fullscreen mode helps to do this, and is as easy as pressing F11 to toggle it on and off.

What are your favorite keyboard shortcuts to use in a browser? Share them in the comments!

How to Intelligently Approach Business Analytics
Getting Our Bearings: The State of Business Techno...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware IT Services Hosted Solutions Productivity Hackers Managed IT Services Internet IT Support Software Network Security Outsourced IT Data Mobile Devices Microsoft Business Ransomware Data Backup Tech Term Backup Computer Innovation Smartphone Data Recovery Google Internet of Things Hardware Cloud Computing Business Continuity Small Business Managed Service Provider Windows 10 Android Data Management Disaster Recovery Remote Monitoring Managed IT Social Media User Tips Communication VoIP Windows Artificial Intelligence Smartphones BYOD Facebook Browser Efficiency Encryption Productivity Paperless Office IT Support App Cybersecurity Workplace Tips Risk Management Save Money Unified Threat Management Upgrade Mobile Device Gmail Mobile Device Management Phishing Robot Firewall Applications Network Saving Money Recovery Business Management Document Management Apps Wi-Fi Passwords Content Filtering Compliance Server Telephone Systems SaaS BDR Big Data Tip of the week Money Chrome Data storage Bring Your Own Device Going Green Office 365 Bandwidth Virtualization Vendor Management Hosted Solution Infrastructure Website Holiday Password Government Managed Service Collaboration Analytics Remote Computing Work/Life Balance Virtual Reality Miscellaneous Windows 10 Apple Regulations IT Management IT Service Training Unified Communications Computers File Sharing Project Management Storage Computing Antivirus Employer-Employee Relationship Router Two-factor Authentication Automation Wireless Data Security Data loss Vulnerability Tech Support Assessment Business Technology Customer Service Internet Exlporer Google Drive How To IT solutions Blockchain Server Management IoT Information Politics HIPAA Digital Payment Upgrades Settings Websites Identity Theft Twitter Mobile Security Business Growth Uninterrupted Power Supply Sports Licensing Mobile Computing Social communications End of Support Health Hacker Word Office Managed IT Services Redundancy Monitors Wireless Technology Legal Mobility Microsoft Office Alert Quick Tips Scam Spam The Internet of Things Healthcare VPN WiFi Tablet YouTube Smart Technology How To Samsung Budget Patch Management Files Customer Relationship Management Information Technology Virtual Private Network Administration Flexibility Printing Chromebook Education Outlook Network Management LiFi Avoiding Downtime Help Desk Mouse Comparison Identity Black Market Windows 8 Save Time Cabling Disaster Trending Hard Drive Features Virtual Desktop Identities Mail Merge Geography Cookies Technology Laws Google Calendar Writing Emoji Mobile Managed IT Service San Diego Touchscreen Techology Fleet Tracking Access Control Point of Sale Network Congestion Cooperation VoIP Sponsor Specifications Consultation Lenovo Computer Repair Google Wallet Cache Electronic Health Records Cortana Hard Drives Google Docs Address High-Speed Internet Sync Permissions Physical Security Nanotechnology Statistics Star Wars Monitoring Telephony Legislation Retail IT Technicians Company Culture Marketing Public Cloud Break Fix 3D Printing Social Networking Humor Disaster Resistance Asset Tracking Law Enforcement SharePoint Display Staff Digital Obstacle Botnet Black Friday Roanoke — Central Technology Solutions Processors Backups Superfish MSP Buisness Unified Threat Management Travel Hotspot Drones Search Recycling Gadgets Mirgation Solid State Drive Development Mobile Device Managment Office Tips Fraud Software Tips Screen Reader Deep Learning Bluetooth Utility Computing Consulting Course Managing Stress Automobile Dark Web Computer Care Unsupported Software Motherboard Virus Current Events Proactive IT OneNote Gadget Downloads Augmented Reality Update Spyware Machine Learning Cyber Monday technology services provider Proactive User Error Language Electronic Medical Records Alt Codes Shortcut eWaste Users Software as a Service GPS Social Engineering Migration USB Cryptocurrency Firefox Cables Smart Tech Managed Services Provider Enterprise Content Management Data Warehousing Mobile Data Heating/Cooling IT Consulting Employee-Employer Relationship Operations Supercomputer Technology Assurance Group ’s 18 Hacks Time Management Networking Remote Monitoring and Management Downtime Crowdsourcing Maintenance Computing Infrastructure Typing WannaCry Management Technology Tips Tracking Safety Chatbots Bitcoin Wires G Suite Dark Data Net Neutrality History Personal Information Best Practice Hacking Cost Management E-Commerce Operating System Vulnerabilities Microsoft Excel Google Maps Modem Servers Data Breach Connectivity Remote Workers Multi-Factor Security Taxes Wearable Technology Private Cloud Distributed Denial of Service IT Budget Annual Convention Notifications WPA3 Printer Alerts Enterprise Resource Planning IT Consultant Error Regulation Cybercrime Web Server Cyberattacks Cameras Motion Sickness Hard Disk Drive Read Only Administrator CCTV Relocation Meetings Printers Emergency CrashOverride Webcam