crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Simple Browser Tricks

We all know how to use the Internet (you’re here now, after all), but there are a lot of hidden secrets to it that far fewer people know. Today, we’ll let you in on five of them to try and make some basics a little easier.

Close a Tab
We told you these were basics. Yes, you close a tab by clicking the little ‘x’ along the edge. However, you can also close a tab by middle-clicking on it with the mouse wheel. While this may not make much difference when you’re only contending with two or three tabs, this is a much faster method than trying to line up your cursor with that ‘x’ for fourteen tabs.

Quick Address Bar
When you want to go to a different website (or run something through a search engine), you have to type something in the address bar at the top of your browser window. Sure, you could click on the address bar, but you have other options as well. Try pressing F6, Alt+D, or Ctrl+L… any of them will bring you to the address bar and highlight its contents, leaving you in the position to just continue typing.

Viewing Slideshows or Multi-Page Articles
We’ve all been online, trying to read an article, only to find that it’s been split up across multiple pages or turned into a slideshow. Instead of fighting with the controls to view your content, there’s an easier way to read it all in one place. All you have to do is start to print it.

By clicking Print or pressing Ctrl+P, you’ll be given a print preview of the complete article. From there, you can read it without interruption. Alternatively, you could also print it out to read without interruption later, whichever you prefer. The important thing is that you are able to read the content you want to read, without jumping through hoops.

Highlighting More Accurately
Have you ever tried to highlight text online by clicking and dragging from the starting point to the end? If you’re like many, you’ll have found doing so with any accuracy to be challenging, frustrating, and ineffective. It’s just too easy to snag too much and/or too little, images and sentence fragments being highlighted instead of the content you were trying to select. Next time, instead of relying on click-and-drag, try clicking on the starting point of your selection, and shift-clicking the end point. This will select just what is included between these points.

Toggle Fullscreen
Sometimes, productivity requires blocking out any and all distractions, even including those on our workstation displays. Setting the window you are working in to fullscreen mode helps to do this, and is as easy as pressing F11 to toggle it on and off.

What are your favorite keyboard shortcuts to use in a browser? Share them in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Business Malware Software Data Mobile Devices IT Support Network Hardware Small Business Server Communication Smartphones VoIP Computer Business Continuity Upgrade Efficiency Innovation Google Windows Data Backup Disaster Recovery Mobile Device Management Microsoft Office Virtualization Outsourced IT Tech Term Miscellaneous Mobile Office Vendor Management Social Media Holiday Network Security Gadgets Productivity User Tips Quick Tips Passwords BYOD Mobile Computing Browser Android Smartphone Internet of Things Data Recovery Managed IT services WiFi Bring Your Own Device Windows 10 Best Practice Users The Internet of Things Remote Monitoring Ransomware Spam Alert Data Management Collaboration Save Money Trending Wireless Technology Operating System Apple Remote Computing Artificial Intelligence Firewall Office Customer Relationship Management Unified Threat Management Encryption Content Filtering Going Green History Gmail Maintenance Big Data App Analytics IT Support IT Solutions Lithium-ion Battery Facebook IT Consultant Router Printer Tech Support Current Events Information Technology Cloud Computing Managed IT Website Customer Service Hard Drives Applications Two-factor Authentication Managed IT Services Windows 8 Antivirus Phishing Bandwidth Document Management Humor Mobile Device Paperless Office Saving Time Wi-Fi Avoiding Downtime Employer-Employee Relationship Hacking Computers Fax Server Phone System Outlook Health Government Compliance Marketing Automation Excel Office Tips Retail Project Management Cybersecurity IT service Digital Payment Chrome VPN Business Growth Risk Management Apps Application Virus Help Desk Office 365 iPhone User Error Password Healthcare Infrastructure Co-Managed IT Administration Augmented Reality Presentation Vulnerability Budget Managed Service Computer Repair BDR Proactive IT Point of Sale Regulations Files Recovery Inbound Marketing Mouse Money Running Cable Social Net Neutrality Licensing Wireless File Sharing PowerPoint Social Networking Unified Communications Training Tablet Data Security Computing Statistics Intranet Competition Business Intelligence Network Congestion Recycling eWaste Downtime Remote Workers Search Virtual Desktop USB Piracy Business Owner Information Data loss Blockchain Sports HIPAA Hacker User Programming Scam Redundancy Twitter Company Culture Analyitcs Education Machine Learning Safety Specifications Settings Flexibility Hosted Solution IBM Internet Exlporer Storage Cost Management Remote Monitoring and Management Mobility Smart Technology Data storage Cybercrime communications Save Time Mobile Security Wearable Technology Conferencing IoT Robot Hiring/Firing Windows 10 Alerts Printing Display End of Support LiFi Tip of the week Remote Support Identity Electronic Health Records Leadership Mobile Device Managment Google Calendar Asset Tracking Skype Streaming Media Utility Computing Backup and Disaster Recovery New Additions Break Fix Monitors SaaS Techology Deep Learning Print Server High-Speed Internet Gaming Console Text Messaging Server Management Computing Infrastructure Work Station Cyberattacks Legislation Domains Google Wallet OneNote LinkedIn Human Error Congratulations Dark Web Fun Writing Chromebook Disaster Resistance Word Law Firm IT Development Video Surveillance Cooperation Motherboard Read Only G Suite Public Speaking Drones Windows 8.1 Update Employee-Employer Relationship Best Available Buisness Hard Drive Permission Data Warehousing Cortana Social Engineering IT Consulting Identities Cables Patch Management Staff Modem Bookmarks Travel Software as a Service Backups Environment CIO Cache Test Adminstration Microsoft Excel Knowledge Politics Data Breach Solid State Drive Bluetooth Wires 3D Operations Samsung Cookies Favorites Meetings Technology Tips Legal Online Currency Troubleshooting Debate Management Experience Telephony Technology Laws Heating/Cooling Alt Codes Computer Accessories Virtual Private Network Monitoring Crowdfunding Nanotechnology Instant Messaging Comparison Consumers YouTube Enterprise Resource Planning How To Permissions IT Technicians Unified Threat Management Typing MSP Screen Reader Finance Scheduling Identity Theft Black Friday IP Address Google Drive Mobile Assessment Fraud How To Mirgation Consulting Access Control Refrigeration Cryptocurrency Disaster Proactive Touchscreen Smart Tech Authentication Cyber Monday Google Docs Managing Stress IT Management Business Technology Managed Services Provider Private Cloud SharePoint Bitcoin Digital Signature Memory Connectivity Authorization Laptop Enterprise Content Management Network Management Migration E-Commerce Public Cloud Downloads Hacks WPA3 Documents Employees Distributed Denial of Service Halloween Networking Entrepreneur Vulnerabilities Hotspot Chatbots Features Macro PC Care Sync Multi-Factor Security Undo Fleet Tracking PDF Value People Star Wars Zero-Day Threat Software Tips Managed IT Service 5G Scary Stories Virtual Reality Geography eBay Language

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...