Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: 5 Simple Browser Tricks

Tip of the Week: 5 Simple Browser Tricks

We all know how to use the Internet (you’re here now, after all), but there are a lot of hidden secrets to it that far fewer people know. Today, we’ll let you in on five of them to try and make some basics a little easier.

Close a Tab
We told you these were basics. Yes, you close a tab by clicking the little ‘x’ along the edge. However, you can also close a tab by middle-clicking on it with the mouse wheel. While this may not make much difference when you’re only contending with two or three tabs, this is a much faster method than trying to line up your cursor with that ‘x’ for fourteen tabs.

Quick Address Bar
When you want to go to a different website (or run something through a search engine), you have to type something in the address bar at the top of your browser window. Sure, you could click on the address bar, but you have other options as well. Try pressing F6, Alt+D, or Ctrl+L… any of them will bring you to the address bar and highlight its contents, leaving you in the position to just continue typing.

Viewing Slideshows or Multi-Page Articles
We’ve all been online, trying to read an article, only to find that it’s been split up across multiple pages or turned into a slideshow. Instead of fighting with the controls to view your content, there’s an easier way to read it all in one place. All you have to do is start to print it.

By clicking Print or pressing Ctrl+P, you’ll be given a print preview of the complete article. From there, you can read it without interruption. Alternatively, you could also print it out to read without interruption later, whichever you prefer. The important thing is that you are able to read the content you want to read, without jumping through hoops.

Highlighting More Accurately
Have you ever tried to highlight text online by clicking and dragging from the starting point to the end? If you’re like many, you’ll have found doing so with any accuracy to be challenging, frustrating, and ineffective. It’s just too easy to snag too much and/or too little, images and sentence fragments being highlighted instead of the content you were trying to select. Next time, instead of relying on click-and-drag, try clicking on the starting point of your selection, and shift-clicking the end point. This will select just what is included between these points.

Toggle Fullscreen
Sometimes, productivity requires blocking out any and all distractions, even including those on our workstation displays. Setting the window you are working in to fullscreen mode helps to do this, and is as easy as pressing F11 to toggle it on and off.

What are your favorite keyboard shortcuts to use in a browser? Share them in the comments!

How to Intelligently Approach Business Analytics
Protect Your Business From Phishing Attacks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Productivity Internet Network Security Productivity Data Data Backup Managed IT Services Outsourced IT Software IT Support Business Innovation Mobile Devices Data Recovery Computer Hardware Tech Term Microsoft Ransomware Google Backup Cloud Computing Small Business Efficiency Internet of Things Business Continuity IT Support Managed Service Provider Upgrade Smartphone Business Management User Tips Disaster Recovery Remote Monitoring Android Encryption Paperless Office Social Media Communication Windows 10 VoIP Phishing Data Management Smartphones Workplace Tips Browser Managed IT Artificial Intelligence Collaboration Windows Facebook Windows 10 Managed IT Services Risk Management Save Money BYOD Server Cybersecurity communications Saving Money Holiday Mobile Device Management Mobile Device Passwords App Network Vendor Management Office 365 Chrome Automation Recovery Analytics Bandwidth Government Unified Threat Management Document Management Firewall Apps Employer-Employee Relationship Wi-Fi Gmail Compliance Robot Applications BDR Bring Your Own Device Big Data Healthcare Microsoft Office Wireless Password IT Management Virtualization Hosted Solution Managed Service Tip of the week Website Information Quick Tips Scam Antivirus Project Management Infrastructure Content Filtering Vulnerability Money Data storage Telephone Systems Business Technology SaaS Going Green Office IT Service File Sharing Router Two-factor Authentication Unified Communications Printing Computers Tablet Storage Files Remote Computing Settings Blockchain Politics Help Desk Work/Life Balance VPN Customer Service Apple Social Customer Relationship Management Virtual Reality Data loss Miscellaneous Data Security Training Computing Regulations Software as a Service The Internet of Things Machine Learning Mobility Budget Uninterrupted Power Supply Information Technology Monitors Management Operating System Alert Smart Technology Remote Monitoring and Management Electronic Medical Records Maintenance Users Spam Outlook Net Neutrality Mouse WiFi Word YouTube Remote Workers Google Drive How To Samsung Downtime Redundancy Internet Exlporer Private Cloud HIPAA Administration Flexibility Tech Support Business Growth IoT Chromebook LiFi Avoiding Downtime Access Control Education Mobile Computing Mobile Security Digital Payment IT solutions Employees Patch Management Websites Identity Theft Hacker Networking Company Culture Upgrades Licensing Twitter Virtual Private Network Wireless Technology Legal Sports Network Management Assessment Server Management Proactive How To End of Support Health Migration Hacks Cables VoIP Backup and Disaster Recovery Sponsor Office Tips Smart Tech Typing Managed Services Provider Touchscreen Techology Bitcoin Enterprise Content Management Finance Windows 7 Unsupported Software Virus Data Warehousing GPS Best Practice Employee-Employer Relationship Consultation Lenovo Update Operations Statistics Professional Services Technology Assurance Group ’s 18 Theft Address Computing Infrastructure Social Engineering USB Technology Tips Crowdsourcing Chatbots Meetings Wires Digital Human Error Obstacle Supercomputer Cost Management E-Commerce Disaster Resistance Security Cameras Wearable Technology G Suite History Windows 8 Vulnerabilities Save Time Authentication Search Transportation Mobile Data Microsoft Excel Modem Tracking Connectivity Superfish Multi-Factor Security Identities Enterprise Resource Planning Bookmarks Bluetooth Virtual Assistant Distributed Denial of Service Annual Convention Taxes WPA3 Financial Printer Alerts Google Maps Safety Comparison Identity Spyware Permission Course Dark Data Personal Information IT Budget Hard Drive Features Proactive IT Remote Worker Google Calendar Cabling Geography Authorization Shortcut Cookies Google Wallet Hard Drives Mobile Google Docs Favorites Wasting Time Notifications Managed IT Service San Diego Fleet Tracking Firefox Procurement Cooperation Black Market Specifications Point of Sale Humor Test Virtual Desktop Cache Electronic Health Records Heating/Cooling IT Consulting ROI Legislation IT Technicians High-Speed Internet Backups WannaCry Permissions Nanotechnology Star Wars Drones Monitoring Time Management Writing Emoji Solid State Drive Conferencing Hacking Database Break Fix Telephony Social Networking Deep Learning Asset Tracking Network Congestion SharePoint Staff Sync Data Breach Notes Black Friday Law Enforcement Roanoke — Central Technology Solutions Current Events MSP RMM Computer Repair Unified Threat Management Hotspot Public Cloud Recycling Cyberattacks Servers Cortana Mirgation Travel Development Zero-Day Threat Physical Security Fraud Botnet Screen Reader Alt Codes Utility Computing Consulting Retail Marketing Cryptocurrency Managing Stress Disaster Instant Messaging Trending Voice over Internet Protocol 3D Printing Dark Web Motherboard OneNote Display Downloads Augmented Reality Mobile Device Managment Software Tips Read Only Technology Laws PowerPoint Processors Cyber Monday Gadget technology services provider Buisness Tech Terms Mail Merge User Error Language Automobile Computer Care Gadgets eWaste Motion Sickness Printers CCTV Administrator Relocation Webcam Hard Disk Drive Students IT Consultant Regulation Error Cybercrime Teamwork Emergency Web Server CrashOverride Shared resources Cameras