(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: These Shortcuts Can Make You A Google Chrome Power User

Do you use Google Chrome? While it’s a great option in and of itself, you can make your experience with Chrome much better simply by using many of its keyboard shortcuts. Here are some of the best shortcuts that you can use to get more out of your Google Chrome web browser.

  • Alt+Tab: Move through your open tabs.
  • Alt+Home: Open your homepage.
  • Alt+Left Arrow: Move backward a page.
  • Alt+Right Arrow: Move forward a page.
  • F11: Show the current website in full screen mode.
  • Esc: Stop a page from loading or a file from downloading.
  • Ctrl+(+) or (-): Zoom in or out on the screen.
  • Ctrl+0: Reset the zoom to normal.
  • Ctrl+1 through 8: Jump to the corresponding tab in your web browser.
  • Ctrl+9: Jump to the last open tab.
  • Ctrl+Shift+B: Hide or show your bookmarks bar.
  • Ctrl+D: Make the currently opened tab a bookmark.
  • Ctrl+H: Show history in a new tab.
  • Ctrl+J: Show downloads in a new tab.
  • Ctrl+F: Find something on the page.
  • Ctrl+N: Open a new window.
  • Ctrl+Shift+N: Open a new window in incognito mode.
  • Ctrl+R or F5: Refresh the page.
  • Ctrl+T: Open a new tab.
  • Ctrl+W: Close the currently open window.
  • Ctrl+Shift+T: Open the most recently closed tab.
  • Spacebar: Move down a page at a time.
  • Shift+Spacebar: Move up a page at a time.

Will you use these shortcuts to get more productivity out of your workday? We hope so! To learn more about how you can take full advantage of your organization’s business technology, subscribe to NTConnections’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Productivity Business Computing Microsoft Backup Malware Hosted Solutions Internet Efficiency Mobile Devices IT Support Google Business IT Services Managed Service Provider Miscellaneous Server Workplace Tips VoIP Data Disaster Recovery Business Continuity Innovation Network Upgrade Hardware Email Windows Save Money Saving Money Business Management Computer Software Mobile Device Management Communication Virtualization Smartphones User Tips Windows 10 Browser Smartphone Microsoft Office Network Security Holiday BYOD Social Media Hacking WiFi Android Operating System Application Mobile Computing Managed IT Services IT Solutions communications Apple Computers Cybercrime Chrome Marketing Automation The Internet of Things Quick Tips Small Business Office Budget Outsourced IT Proactive IT Information Technology Big Data Passwords Employer-Employee Relationship spam Going Green Remote Computing Managed IT Services Alert Collaboration Health VPN Remote Monitoring Avoiding Downtime Managed IT Save Time Firewall Vendor Management iPhone Gadgets Ransomware Wireless Technology Recovery Mobility User Error Bring Your Own Device Social Engineering App Excel Phone System Downtime Private Cloud History IT Support Tablet Mouse Retail Memory Search Office 365 Bandwidth Compliance Data Backup Networking Antivirus Analytics Telephone Systems PowerPoint Gmail Lithium-ion battery Website How To Physical Security Outlook DDoS Robot BDR Flexibility Google Drive Content Filtering Environment Administration IT Consultant Cloud Computing Entertainment Safety Law Enforcement Running Cable Solid State Drive Value Unified Threat Management Redundancy Meetings Saving Time Skype Document Management HaaS Risk Management Fax Server Mobile Office Black Market Customer Relationship Management Online Currency Windows 10 Data Management Business Owner Data Storage Internet of Things Best Available Printer People Internet Exlporer Programming Data storage Network Congestion Biometrics Cybersecurity Current Events Maintenance Office Tips Router Humor Hard Drives Statistics Facebook Public Cloud Intranet Unsupported Software Sync Crowdfunding Hybrid Cloud Analyitcs Artificial Intelligence Laptop HIPAA Settings Software Tips Telephony Spam Blocking Distributed Denial of Service Money Virtual Desktop Vulnerability Data Security Windows Media Player Touchpad IT service Human Resources Start Menu Relocation SaaS Virtual Reality Apps Training Audit Uninterrupted Power Supply HBO Hiring/Firing Domains Mobile WIndows 7 Computer Fan Government IaaS Bloatware Cleaning Applications Customer Service Screen Mirroring Frequently Asked Questions Files Entrepreneur Professional Services Managing Stress FENG Company Culture Tech Support Windows 8.1 Update Cast Tip of the week Virus Workers LinkedIn Colocation Hacker Cost Management Tools Shadow IT Debate Two-factor Authentication Windows Server 2008 Computer Accessories Hosted Solution Wireless Computing Infrastructure Science Instant Messaging Word OneNote Streaming Media Shortcut Business Intelligence Windows 7 Cameras SharePoint Video Surveillance End of Support Windows 8 Print Server Botnet Consultant Encryption Trending Sports Education Bluetooth Data Warehousing Regulations Printer Server Monitor eWaste Internet exploMicrosoft Tablets Computer Repair Travel Root Cause Analysis Notifications Net Neutrality YouTube Piracy USB IT Management Worker Commute Servers Reputation Patch Management Wearable Technology Advertising Social User Data loss NarrowBand Licensing IT Plan Flash Customers Samsung Social Networking Twitter Best Practice Touchscreen Phishing Chromecast Transportation How to Computer Care webinar Benefits PDF Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Productivity Television Wi-Fi Troubleshooting Techology Electronic Medical Records Public Computer Legal Employer Employee Relationship Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Work/Life Balance Webinar Emergency Users Worker Supercomputer Content IT solutions Video Games Data Recovery Rootkit Knowledge Audiobook Netflix Scam Scalability Charger Politics