crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Simple Browser Tricks

We all know how to use the Internet (you’re here now, after all), but there are a lot of hidden secrets to it that far fewer people know. Today, we’ll let you in on five of them to try and make some basics a little easier.

Close a Tab
We told you these were basics. Yes, you close a tab by clicking the little ‘x’ along the edge. However, you can also close a tab by middle-clicking on it with the mouse wheel. While this may not make much difference when you’re only contending with two or three tabs, this is a much faster method than trying to line up your cursor with that ‘x’ for fourteen tabs.

Quick Address Bar
When you want to go to a different website (or run something through a search engine), you have to type something in the address bar at the top of your browser window. Sure, you could click on the address bar, but you have other options as well. Try pressing F6, Alt+D, or Ctrl+L… any of them will bring you to the address bar and highlight its contents, leaving you in the position to just continue typing.

Viewing Slideshows or Multi-Page Articles
We’ve all been online, trying to read an article, only to find that it’s been split up across multiple pages or turned into a slideshow. Instead of fighting with the controls to view your content, there’s an easier way to read it all in one place. All you have to do is start to print it.

By clicking Print or pressing Ctrl+P, you’ll be given a print preview of the complete article. From there, you can read it without interruption. Alternatively, you could also print it out to read without interruption later, whichever you prefer. The important thing is that you are able to read the content you want to read, without jumping through hoops.

Highlighting More Accurately
Have you ever tried to highlight text online by clicking and dragging from the starting point to the end? If you’re like many, you’ll have found doing so with any accuracy to be challenging, frustrating, and ineffective. It’s just too easy to snag too much and/or too little, images and sentence fragments being highlighted instead of the content you were trying to select. Next time, instead of relying on click-and-drag, try clicking on the starting point of your selection, and shift-clicking the end point. This will select just what is included between these points.

Toggle Fullscreen
Sometimes, productivity requires blocking out any and all distractions, even including those on our workstation displays. Setting the window you are working in to fullscreen mode helps to do this, and is as easy as pressing F11 to toggle it on and off.

What are your favorite keyboard shortcuts to use in a browser? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 19 September 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Mobile Devices Business Software Data IT Support Hardware Small Business Network Communication Server Smartphones VoIP Computer Upgrade Google Windows Business Continuity Mobile Device Management Efficiency Innovation Virtualization Microsoft Office Disaster Recovery Miscellaneous Mobile Office Vendor Management Tech Term Gadgets Social Media Holiday Data Backup Outsourced IT User Tips Quick Tips Passwords BYOD Android Smartphone Mobile Computing Network Security Bring Your Own Device Windows 10 Internet of Things Managed IT services Browser WiFi Spam Best Practice The Internet of Things Remote Monitoring Ransomware Remote Computing Data Recovery Alert Users Data Management Save Money Trending Wireless Technology Operating System Apple Going Green Artificial Intelligence History Gmail Firewall Unified Threat Management Content Filtering Tech Support Cloud Computing Information Technology Current Events Managed IT Big Data App Office Analytics Customer Relationship Management IT Solutions Lithium-ion Battery Facebook IT Consultant Encryption Router Printer Document Management Humor Paperless Office Saving Time Avoiding Downtime Employer-Employee Relationship Productivity Applications Website IT Support Maintenance Hard Drives Collaboration Two-factor Authentication Windows 8 Antivirus IT service Digital Payment Mobile Device Chrome Business Growth VPN Wi-Fi Risk Management Apps Application Virus Customer Service Hacking Computers Fax Server Managed IT Services Phone System Outlook Health Compliance Marketing Automation Cybersecurity Excel Office Tips Retail Phishing Bandwidth Net Neutrality Running Cable Social Licensing Data Security File Sharing PowerPoint Social Networking Unified Communications Training Tablet Infrastructure Office 365 Password iPhone User Error Co-Managed IT Administration Government Managed Service Presentation Augmented Reality Budget Project Management Proactive IT Computer Repair Regulations Point of Sale Inbound Marketing Mouse Recovery Money Safety Specifications IoT IBM Settings Flexibility Hosted Solution Cost Management Wireless Data storage Tip of the week Cybercrime Save Time Wearable Technology Robot Hiring/Firing Display Alerts Printing End of Support Healthcare LiFi Computing Statistics Help Desk Intranet Competition Business Intelligence Vulnerability Network Congestion Information Recycling eWaste Downtime Data loss Blockchain HIPAA BDR Search Piracy Redundancy Virtual Desktop USB Business Owner Files Sports Hacker Internet Exlporer Scam User Programming Storage Company Culture Analyitcs Twitter Mobility Smart Technology Mobile Security Education Disaster WPA3 Touchscreen Networking Migration E-Commerce Private Cloud Downloads Refrigeration Cryptocurrency Google Docs Distributed Denial of Service Windows 10 Hotspot Vulnerabilities Digital Signature Fleet Tracking Chatbots Features Public Cloud Multi-Factor Security Bitcoin Memory Star Wars Software Tips Managed IT Service Language Laptop communications Geography Asset Tracking Identity Electronic Health Records Sync Google Calendar Hacks Documents Conferencing Utility Computing Break Fix Server Management Computing Infrastructure Halloween Techology Entrepreneur High-Speed Internet OneNote Macro PC Care Mobile Device Managment Legislation Undo 5G PDF Value People Dark Web eBay Cooperation Scary Stories Virtual Reality Disaster Resistance Development Employee-Employer Relationship Remote Support Motherboard Leadership Monitors Skype Streaming Media Hard Drive New Additions Data Warehousing Text Messaging Patch Management Staff SaaS IT Consulting Deep Learning Print Server Cables Gaming Console Remote Workers Work Station Modem G Suite Software as a Service Domains Google Wallet Fun Writing LinkedIn Cache Congratulations Microsoft Excel Video Surveillance Operations Chromebook Data Breach Word Law Firm IT Wires Windows 8.1 Update Cookies Travel Technology Tips Public Speaking Drones Cortana Social Engineering Best Available Buisness Management Virtual Private Network Technology Laws Identities Monitoring Nanotechnology Comparison Backups Knowledge Environment CIO Enterprise Resource Planning Adminstration How To Permissions MSP 3D IT Technicians Telephony Unified Threat Management Solid State Drive Bluetooth Online Currency Consulting Samsung Screen Reader Identity Theft Black Friday Legal Fraud Experience Troubleshooting Debate Mobile Assessment Proactive Computer Accessories Mirgation Access Control Heating/Cooling Alt Codes Consumers Managed Services Provider Crowdfunding Smart Tech Cyber Monday IT Management YouTube Managing Stress Remote Monitoring and Management Business Technology Machine Learning SharePoint Typing IP Address Google Drive Connectivity Scheduling Network Management How To Enterprise Content Management

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code