facebook linkedin twitter

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

You might think you know all of the tricks that a mouse is capable of, but you would be wrong. Here are some of the niftiest uses possible for your mouse.

Highlighting Text
You can highlight any text by clicking and dragging your mouse over it. However, if you don’t want to do this, you can just click on a word at the beginning of the text that you want to copy, hold down Shift, and click where you want the highlight to end. All of the text between the two points will be highlighted--just like it would be if you held your mouse button down and dragged it across the text.

Take Advantage of Your Scrolling Wheel
If you’ve ever tried to press down on the mouse wheel, you can close an open tab in your web browser. By holding down the Ctrl key and scrolling up or down with the wheel, you can zoom in or out of the screen. You can also hold down the Shift key and scroll down to open up a closed tab.

Use Double and Triple Clicks
If you want to select a specific word, you can double-click it with your mouse. You can also triple-click it to select the entire body of text in the paragraph. If you double-click and drag your mouse, it will highlight one word at a time so as best to cater to your specific needs.

Select Multiple Choices in Drop-down Menus
If you’re filling out a drop-down menu where multiple options are viable choices for you, you can select multiple options by holding down the Ctrl key and clicking each of them individually.

Use the Side Buttons
Some mouses come installed with buttons on the side. These can be used to go back and forth to previously visited pages on your web browser. Depending on the model, you can also program the buttons so that they can be customized.

What are some mouse tips that you can think of? Let us know in the comments.

Managed IT Services Bring Substantial Value
Holiday Shopping Just Got Easier--Check out These ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Gadgets Quick Tips Business Continuity Mobile Devices Disaster Recovery Innovation Mobile Office Virtualization Network Android Microsoft Office Social Media Server Mobile Device Management VoIP Smartphone Collaboration Communication Miscellaneous Ransomware Windows 10 Upgrade Unified Threat Management Data Backup Windows Data Recovery Passwords IT Support Operating System Tech Term Remote Monitoring BYOD Remote Computing Managed IT services Productivity Holiday Vendor Management Mobile Computing Cybersecurity Apps Facebook communications WiFi BDR The Internet of Things Marketing Analytics History Firewall Apple Users Automation Internet of Things Managed IT Services Data Management Phishing Mobile Device Alert Outsourced IT Browser Save Money App Artificial Intelligence IT Consultant Big data Bandwidth Spam Encryption Content Filtering Maintenance Going Green Office Health Bring Your Own Device Gmail Antivirus Search Cybercrime Windows 8 Managed IT Outlook Hiring/Firing Cost Management Hard Drives Best Practice Information Technology Lithium-ion Battery Printer Office 365 Tech Support Virus Budget Two-factor Authentication Help Desk Wireless Technology Recovery Employer-Employee Relationship Money Document Management Cloud Computing Hacking Saving Time Computers IBM VPN Travel Business Technology Update Training Phone System Law Enforcement Hard Drive Save Time Windows 10 Compliance Data storage Proactive IT Running Cable Humor Access Control Networking Legal Intranet Regulations It Management Education Customer Service Risk Management SaaS Administration Government Website Robot File Sharing Business Intelligence Securty Data Breach Digital Payment Word Downtime Mobility Solid State Drive Avoiding Downtime Project Management Password Cortana Social Engineering Comparison Tablet Fax Server Information Flexibility iPhone Company Culture Black Market Computer Repair Hacker Laptop Social Networking Excel Business Growth Twitter User Customer Relationship Management Augmented Reality Data Security Applications Machine Learning Telephone Systems PowerPoint Paperless Office Sports Wireless Patch Management Blockchain Disaster DDoS Data Loss Computing End of Support Current Events Hosted Solution Identity Theft Chrome Co-managed IT User Error Redundancy Monitoring IT service Router Google Maps Vendor Retail Virtual Reality Computer Accessories eWaste Inbound Marketing Digital Politics Management Emails Value Bluetooth Lifestyle Websites Automobile Start Menu Tech Terms Chromebook Trending Computing Infrastructure Mouse Hack Vulnerabilities Mobile Technology Cryptocurrency Pain Points How To Processors Google Docs Healthcare Software as a Service Uninterrupted Power Supply Download Statistics USB Private Cloud Programming Experience Monitors Network Congestion Presentation Cleaning Office Tips Telephony Bitcoin Safety Data Protection Taxes Virtual Desktop Specifications Gaming Console Distributed Denial of Service Social YouTube Streaming Media Documents Unified Communications Settings Managed Service Entertainment Conferencing Text Messaging Heating/Cooling Webcam Public Cloud Scam Net Neutrality Storage Device Management Sync PDF Fraud Tactics Google Calendar Permissions Language Devices Tip of the week Bookmark Webinar 3D VoIP Ebay Notifications CCTV Business Managemenet Best Available Keyboard UTM Content Thin CLient Touchscreen News Content Management Legislation Error Knowledge Business Metrics Computer Malfunction switches Writing IT Plan Enterprise Resource Planning Smart Phones Consultation Evernote Reliable Computing Domains Music In Internet of Things online Currency Upgrades email scam Addiction Technology Tips Public Speaking Accountants A.I. Virtual Assistant Browsers Adminstration Pirating Information Audit Shortcut LiFi Multi-factor Authentication Leadership Fake News Wireless Headphones Telephone Motion Sickness LinkedIn Entrepreneur Migration Connected Devices Data Warehousing Scalability User Tip Troubleshooting Hard Drive Disposal Environment Deep Learning Network Management Access Messenger Tracking HIPAA Work/Life Balance Best Practives Equifax Fleet Tracking Emergency Archive Data Analysis Electronic Payment Computer Care Rental Service Meetings Skype Competition Visible Light Communication Memory Device security MSP Microsoft Excel Nanotechnology Social Network Web Server IT consulting Microserver Desktop Finance Google Drive Windows Server 2008 Cabling Business Owner Vulnerability Wi-Fi Administrator Business Cards Service Level Agreement Spyware Mobile Payment Books Point of Contact Workers IP Address Startup Asset Tracking Upselling CIO Human Resources Unified Threat Management Backup and Disaster Recovery Electricity Video Surveillance Printing Supercomputer Application Advertising Flash Get More Done Username Google Wallet Printer Server Screen Reader Customer Resource management Microchip Windows XP Turn Key Gamification Saving ZTime Windows 7 Worker Proxy Server Staffing Recycling Displays Piracy Upload cache Television Reading Samsung Analytic Electronic Medical Records Society Trojan Smart Tech Distribution G Suite Micrsooft Organize Fiber-Optic Database WannaCry Debate Downloads Employer Employee Relationship Product Reviews Digital Signature HTML Harddrive Drones Telephone System GPS Corporate Profile Hacks Physical Security Teamwork Mobile Security Time Management Freedom of Information Licensing Read Dark Web Banking Botnet Software License Trends External Harddrive Assessment SharePoint Relocation Tablets Health IT Multi-Factor Security Cost CrashOverride Regulation Capital Productuvuty 3D Printing Printers Fileless Malware Managing Stress

toner1