KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

You might think you know all of the tricks that a mouse is capable of, but you would be wrong. Here are some of the niftiest uses possible for your mouse.

Highlighting Text
You can highlight any text by clicking and dragging your mouse over it. However, if you don’t want to do this, you can just click on a word at the beginning of the text that you want to copy, hold down Shift, and click where you want the highlight to end. All of the text between the two points will be highlighted--just like it would be if you held your mouse button down and dragged it across the text.

Take Advantage of Your Scrolling Wheel
If you’ve ever tried to press down on the mouse wheel, you can close an open tab in your web browser. By holding down the Ctrl key and scrolling up or down with the wheel, you can zoom in or out of the screen. You can also hold down the Shift key and scroll down to open up a closed tab.

Use Double and Triple Clicks
If you want to select a specific word, you can double-click it with your mouse. You can also triple-click it to select the entire body of text in the paragraph. If you double-click and drag your mouse, it will highlight one word at a time so as best to cater to your specific needs.

Select Multiple Choices in Drop-down Menus
If you’re filling out a drop-down menu where multiple options are viable choices for you, you can select multiple options by holding down the Ctrl key and clicking each of them individually.

Use the Side Buttons
Some mouses come installed with buttons on the side. These can be used to go back and forth to previously visited pages on your web browser. Depending on the model, you can also program the buttons so that they can be customized.

What are some mouse tips that you can think of? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 16 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Privacy Technology Email Internet malware Business Computing Cloud Google Network Security software Efficiency User Tips Ransomware Business Backup Data Microsoft IT Support Computer Productivity Gmail IT Support Network Android Money Managed IT Services Facebook Hardware cybersecurity VoIP Smartphone Small Business Windows Hosted Solutions Mobile Device Management IT Management Microsoft Office Operating System Business Continuity Artificial Intelligence Mobile Devices Cloud Computing Phishing communications Data Management Unified Communications Social Media Smartphones Internet of Things Outlook Outsourced IT Passwords IT Services Communication Data storage Encryption Upgrade Nextiva Alert BDR security cameras Business Management Windows 10 Disaster Recovery Bandwidth Antivirus data breach End of Support Apple Windows 10 Update Local Buzz Managed IT Services Law Enforcement Robot YouTube Best Practice South Dakota Project Management Analytics Automation Spam Collaboration IoT Hard Drive Cost Management Server security solutions Browser Remote Monitoring Google Wallet Google Docs Firewall Save Money Legal Saving Money Document Management Customer Service SaaS Productivity Information Technology IBM Search Google Maps Scam Lunch and Learn Networking Data Recovery Big Data Drones Start Menu The Internet of Things History Apps Politics News BYOD Gadgets App Data Backup Events vulnerability Office 365 Access Control Innovation Word Patch Management WiFi Event Marketing LastPass Sports Microsoft Bookings Data Security Corporate Profile Programming Software as a Service Wireless Technology Phishing Scams Budget communication device Remote Computing Television Virtual Reality macbook Redundancy Black Market Worker Spyware botnet LiFi Rebrand Hack booking process Audit Cloud Backup Google Drive Mouse Rapid City Virus Society File Sharing IT Consultation Streaming Media business owner Retail Web Servers DDoS attacks Visible Light Communication Applications Telephony Local Technology Memory Event Maintenance Virtual Machines SharePoint IoT Devices Law IT Windows 8 Workers IT Assessment Solid State Drive Windows XP Physical Security communication solutions vulnerabilities DDoS Managed Service Provider Business Growth Internet 101 Cache Website Tips and Tricks Risk Creep VoIP Sales Tax Virtualization security precautions Compliance identity theft Mixer Fortinet Network Congestion IT Security Deep Learning Lawyers Tech Support Samsung IT Strategy Advertising Internet Connected Devices Dell ’s Sonicwall Global Management System Microsoft Office 365 Emergency IT for Oil Companies media experience Vendors Business Security Freedom of Information Office Laptop IT Solutions Printer Tablets Administration Virtual Desktop How To Password Social Engineering Microsoft Office 365 features Business Technology Communications Risk Management Time Management Mobility information Community Involvement Printing face Fake News Vendor Management Tablet Attorneys Disaster Phone System Kaseya Unified Threat Management Cryptocurrency Flash Download Downloads enterprise productivity software surveillance cameras Microsoft Excel Monitors SOX Managed Services Content Filtering Hosted Solution Hardware as a Service Kaseya Connect Cleaning Information Security Settings healthcare Google Calendar Trend Micro Displays Sarbanes-Oxley Act Hacking Computer Care Managed IT password manager LastPass AtomBombing Knowledge HaaS Workplace Tips Conference Business Comunications Distributed Denial of Service Email Security tool Business Communications Fast food Google Play Store End User Testing VPN Proactive IT Running Cable Press Release Chamber of Commerce Social user confidence Bluetooth appointment Tech Terms Quick Tips Uninterrupted Power Supply Vendor Mangement Office Tips Touchscreen Comparison Music Cabling Digital Education Experience Safety Data Protection Business Mangement Websites Webcam Penetration Testing Specifications Government camera Writing Access botnet attack In Internet of Things Books Motion Sickness Public Cloud Taxes Telephone Systems Reading Machine Learning Paperless Office Hiring/Firing Health Bring Your Own Device Administrator Banking Relocation Hacker 3D Printing base infrastructure CCTV Hacks Marketing Automobile Holiday Phone Systen security solution IT service Web Server Work/Life Balance Notifications Unified Threat Management Meetings Business Metrics end-of-support date Ordinary Computers CrashOverride holiday season Emails Wi-Fi Rental Service collaboration capabilities Chromebook UTM Tracking Flexibility quantum computers holidays Supercomputer Documents Cortana Threat management Reliable Computing Text Messaging scammers IT Consultant PDF Twitter Scalability network security professionals Computing scams G Suite Training Computer Malfunction Travel Playbook Language Processors Employer-Employee Relationship Sync Employer Employee Relationship Messenger Digital Payment Private Cloud breach methods Miscellaneous Microchip Users