Computerware

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

You might think you know all of the tricks that a mouse is capable of, but you would be wrong. Here are some of the niftiest uses possible for your mouse.

Highlighting Text
You can highlight any text by clicking and dragging your mouse over it. However, if you don’t want to do this, you can just click on a word at the beginning of the text that you want to copy, hold down Shift, and click where you want the highlight to end. All of the text between the two points will be highlighted--just like it would be if you held your mouse button down and dragged it across the text.

Take Advantage of Your Scrolling Wheel
If you’ve ever tried to press down on the mouse wheel, you can close an open tab in your web browser. By holding down the Ctrl key and scrolling up or down with the wheel, you can zoom in or out of the screen. You can also hold down the Shift key and scroll down to open up a closed tab.

Use Double and Triple Clicks
If you want to select a specific word, you can double-click it with your mouse. You can also triple-click it to select the entire body of text in the paragraph. If you double-click and drag your mouse, it will highlight one word at a time so as best to cater to your specific needs.

Select Multiple Choices in Drop-down Menus
If you’re filling out a drop-down menu where multiple options are viable choices for you, you can select multiple options by holding down the Ctrl key and clicking each of them individually.

Use the Side Buttons
Some mouses come installed with buttons on the side. These can be used to go back and forth to previously visited pages on your web browser. Depending on the model, you can also program the buttons so that they can be customized.

What are some mouse tips that you can think of? Let us know in the comments.

Managed IT Services Bring Substantial Value
Holiday Shopping Just Got Easier--Check out These ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Hackers Business Computing Backup Productivity Managed Service Provider Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips User Tips Mobile Devices Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Innovation Android Microsoft Office Server Mobile Device Management VoIP Social Media Smartphone Ransomware Upgrade Windows 10 Miscellaneous Unified Threat Management Windows Operating System Remote Monitoring BYOD Holiday Remote Computing Managed IT services Mobile Computing Collaboration Communication Passwords Apps Cybersecurity WiFi Vendor Management Data Recovery IT Support Marketing Facebook The Internet of Things Data Backup Firewall History Apple Users communications Analytics Automation Internet of Things Alert Tech Term Productivity BDR Data Management Managed IT Services Artificial Intelligence App Save Money IT Consultant Phishing Outsourced IT Bandwidth Gmail Office Big data Content Filtering Going Green Spam Health Mobile Device Bring Your Own Device Antivirus Outlook Search Windows 8 Managed IT Browser Cybercrime Maintenance Printer Encryption Virus Tech Support Best Practice Information Technology Lithium-ion Battery Cost Management Hiring/Firing Hard Drives Budget Wireless Technology Computers Travel Recovery Employer-Employee Relationship Update Hacking IBM Money Office 365 Phone System Document Management Help Desk Administration Saving Time Customer Service Two-factor Authentication Hard Drive Law Enforcement VPN It Management Business Technology Intranet Website Education Government Compliance Data storage Cloud Computing Humor Risk Management Windows 10 Legal Save Time Networking Regulations Training Running Cable Proactive IT SaaS Robot File Sharing Wireless Data Security Securty DDoS Fax Server Twitter Patch Management Blockchain Solid State Drive Mobility Data Loss Social Engineering Avoiding Downtime Black Market Applications Flexibility Word iPhone Data Breach Laptop Password Cortana Business Growth Business Intelligence Project Management Excel Digital Payment Downtime Hacker Customer Relationship Management Augmented Reality Paperless Office Telephone Systems Comparison Tablet Company Culture PowerPoint Current Events Computer Repair Access Control Disaster User Hosted Solution End of Support Social Networking Bitcoin Programming Identity Theft Vulnerabilities Social Statistics IT service Network Congestion Healthcare Documents Data Protection Google Maps Lifestyle Heating/Cooling Virtual Reality Politics Storage Bluetooth Streaming Media Automobile Inbound Marketing Emails Scam Chromebook Retail Redundancy Cryptocurrency Computing Infrastructure Hack How To eWaste Google Docs Net Neutrality Pain Points Private Cloud Experience Chrome Download Value Cleaning Digital Monitors Websites Router Office Tips Telephony Machine Learning Processors Start Menu Tech Terms Computer Accessories Taxes Distributed Denial of Service USB Mobile Technology YouTube Software as a Service Unified Communications Settings Sports Trending Presentation Gaming Console Computing Public Cloud User Error Uninterrupted Power Supply Mouse Co-managed IT Specifications Safety Text Messaging Virtual Desktop Webcam Permissions Language Sync Network Management External Harddrive Electricity Printing Equifax Point of Contact Notifications CCTV Device security Digital Signature MSP Windows 7 Reliable Computing Nanotechnology Entertainment 3D Ebay Music Business Metrics Computer Malfunction Desktop Teamwork Finance Thin CLient cache Television switches Writing In Internet of Things Business Cards Service Level Agreement Smart Phones WannaCry Downloads Upgrades Startup Freedom of Information LiFi Analytic Unified Threat Management Backup and Disaster Recovery PDF Best Practives Corporate Profile Recycling Time Management Scalability Screen Reader Adminstration Pirating Information Motion Sickness Best Available Gamification Keyboard Leadership Assessment SharePoint Product Reviews Domains Microserver Tip of the week Work/Life Balance Read Piracy Upload Google Calendar Deep Learning Messenger Tracking Smart Tech Touchscreen News Visible Light Communication Memory Fiber-Optic Database VoIP Rental Service Meetings HTML Public Speaking Cabling Conferencing Get More Done Knowledge Device Management Web Server Mobile Security Shortcut Consultation Evernote IT consulting Workers Multi-Factor Security Troubleshooting Turn Key Virtual Assistant Content Management Wi-Fi Administrator Software License Trends Entrepreneur Printer Server Technology Tips Business Managemenet Books Fake News Advertising Flash Fraud Tactics Environment Trojan Audit CIO Supercomputer Devices HIPAA Upselling Worker Monitoring Electronic Payment Video Surveillance Staffing Google Wallet online Currency Microchip UTM Content Competition Organize Data Warehousing Windows XP Reading Samsung Legislation Business Owner Emergency Hard Drive Disposal Society IT Plan Enterprise Resource Planning Saving ZTime Access Displays Microsoft Excel G Suite email scam Addiction Computer Care Micrsooft LinkedIn Employer Employee Relationship Accountants IP Address Licensing Management Human Resources Debate Drones Hacks Physical Security Multi-factor Authentication Information Application Harddrive Google Drive Windows Server 2008 Relocation Tablets Wireless Headphones GPS Vulnerability Archive Banking Botnet Migration Connected Devices Webinar Spyware Mobile Payment Skype Username CrashOverride Managing Stress 3D Printing Capital Productuvuty

toner1.7