Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

You might think you know all of the tricks that a mouse is capable of, but you would be wrong. Here are some of the niftiest uses possible for your mouse.

Highlighting Text
You can highlight any text by clicking and dragging your mouse over it. However, if you don’t want to do this, you can just click on a word at the beginning of the text that you want to copy, hold down Shift, and click where you want the highlight to end. All of the text between the two points will be highlighted--just like it would be if you held your mouse button down and dragged it across the text.

Take Advantage of Your Scrolling Wheel
If you’ve ever tried to press down on the mouse wheel, you can close an open tab in your web browser. By holding down the Ctrl key and scrolling up or down with the wheel, you can zoom in or out of the screen. You can also hold down the Shift key and scroll down to open up a closed tab.

Use Double and Triple Clicks
If you want to select a specific word, you can double-click it with your mouse. You can also triple-click it to select the entire body of text in the paragraph. If you double-click and drag your mouse, it will highlight one word at a time so as best to cater to your specific needs.

Select Multiple Choices in Drop-down Menus
If you’re filling out a drop-down menu where multiple options are viable choices for you, you can select multiple options by holding down the Ctrl key and clicking each of them individually.

Use the Side Buttons
Some mouses come installed with buttons on the side. These can be used to go back and forth to previously visited pages on your web browser. Depending on the model, you can also program the buttons so that they can be customized.

What are some mouse tips that you can think of? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 18 December 2017

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Cloud Hackers Privacy Best Practices Productivity Business Computing business Microsoft Malware Internet IT Services Backup IT Support Hosted Solutions Managed Service Provider Email Network Workplace Tips Mobile Devices Communication Hardware Computer Smartphones Microsoft Office Disaster Recovery Windows Miscellaneous Windows 10 Mobile Device Management Efficiency Data Business Continuity Server Smartphone Holiday network security Small Business Virtualization Software Alert Upgrade Saving Money Google Business Management WiFi User Tips Social Media BYOD Internet of Things Passwords Gmail Remote Computing Ransomware Operating System VoIP Big Data Browser Vendor Management Apple Remote Monitoring Spam Innovation Mobile Computing The Internet of Things App Office Android Budget Analytics Artificial Intelligence Collaboration Wireless Technology Apps Phishing Facebook Risk Management Hacker IT Solutions Information Technology Outsourced IT Retail Best Practice Office Tips Save Money Cybersecurity Tech Support Bring Your Own Device Going Green Data Management Customer Service Automation Gadgets Managed IT Services Business Growth Money Data storage Recovery Avoiding Downtime Presentation Hacking Content Filtering Firewall Hard Drives Lithium-ion Battery Running Cable Customer Relationship Management virus Employer-Employee Relationship Robot Cost Management IT Consultant Saving Time End of Support Computers Managed IT Health Document Management Hosted Solution Office 365 Outlook IT service Proactive IT Current Events Application Work/Life Balance Net Neutrality Hiring/Firing Tablet Social Update Law Enforcement Downtime LiFi Business Owner Competition Cortana Maintenance Search Marketing Humor Trending Education Network Congestion Analyitcs Safety Twitter Mouse Windows 8 Encryption Programming project management Specifications User Disaster Website Wireless Settings Laptop Phone System Chrome USB Quick Tips VPN Virtual Desktop PowerPoint Administration Mobile Device Samsung Cryptocurrency Social Engineering Statistics Antivirus Save Time Password iPhone Bitcoin Google Docs intranet communications Two-factor Authentication Cybercrime Hacks Sports Compliance Excel SharePoint Unified Communications Fun Travel cyberattacks Printing Storage Regulations Distributed Denial of Service Computer Repair Private Cloud Data loss Paperless Office Entrepreneur businesses Computing Dark Data Gadget Buisness Refrigeration Router Debate Evernote Skype IT Management Deep Learning Consumers IP Address eWaste Knowledge Memory Software as a Service Google Wallet Politics CIO Data Warehousing Touchscreen LinkedIn Public Cloud Google Calendar Mobile Office Environment Experience Technology Tips Drones Black Market Windows Server 2008 Telephony User Error Best Available Access Control Identities security breach Troubleshooting History People Mobile Technology Windows 7 Training Undo Video Surveillance Solid State Drive Modern technology Backups Processors Display Word Mobile Payment Mobility Freedom of Information File Sharing YouTube Licensing Data Breach Alt Codes business owners Legal Notifications Monitors Online Currency Managed Service Providers Patch Management Piracy News Files Bandwidth Flexibility Domains Wi-Fi Downloads Typing Telephone Systems bdr Writing Comparison Company Culture Fake News Websites IT Support Public Speaking Documents 5G Business Intelligence Windows 8.1 Update Productivity data breaches Printer Help Desk Google Drive Crowdsourcing Halloween Digital Signature Heating/Cooling Television Microsoft Excel Botnet today ’s world IBM PDF Crowdfunding risk Printer Server Government Scary Stories Cyber-attacks Blockchain Users experience downtime Co-managed IT Augmented Reality cyberattack Meetings Software Tips Tip of the week Relocation WannaCry Physical Security Webcam Motion Sickness Chromebook Data Backup How To GPS Error Personal Information Cleaning Emoji Cloud Computing Upgrades Tracking Electronic Medical Records Computer Care Identity Theft Cabling 3D Printing Automobile Staffing Infrastructure Unsupported Software Administrator test post Taxes Uninterrupted Power Supply Mobile Data Sync Web Server Supercomputer Hard Disk Drive Mobile Device Managment Cameras IT Budget CCTV Digital Payment Managed IT Services G Suite Virtual Reality Point of Sale Google Maps Machine Learning Corporate Profile Unified Threat Management SaaS