Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Handy Google Chrome Shortcuts

Tip of the Week: Handy Google Chrome Shortcuts

It’s no secret how useful the Google Chrome browser is to a user. What is a secret, however, is that Chrome has some added capabilities that make it even more useful than first impressions would suggest. For our Tip of the Week, we’ll review some of these capabilities so you can implement them into your daily workflows.

Quicker Google Searches
Naturally, as Chrome is a Google product, it only makes sense that the Chrome browser defaults to a Google search. Chrome goes one step further, however, and lets a user search for a word or phrase on a webpage by highlighting it and right-clicking.

The resulting menu gives the option to Search Google for [input], and clicking this option will open this search in a new tab. The same can be accomplished by dragging the highlighted text into Google Chrome’s address bar, known as the omnibox.

If you’re using Chrome on an Android device, highlighting your word or phrase by pressing on it creates a pull-up menu at the bottom of the screen that facilitates the search.

Start Chrome on Certain Pages
Many people in the workplace tend to open a certain set of webpages when they first access their workstations. Chrome allows you to access these pages immediately by setting them to open when it starts up.

Under your Chrome Settings, find the On Startup menu and check the box labeled Open a specific page or set of pages. You can then add a page to this menu. Doing so means that, each time Chrome opens, these websites will each open in its own tab.

Link to Desktop
Finally, if there are certain websites that you may not always need to access, but have to fairly frequently, Chrome allows you to create a direct shortcut to the page from your desktop. Simply access the page and click on the three-dot menu icon at the top-right of the browser window. From there, select More tools, which will provide Create shortcut as one of its options. Once clicked, this will display a pop-up window asking for the shortcut’s name. Once you provide one, click Create, and you’ll have a direct link to that particular webpage via your desktop.

There are so many hidden capabilities of the Chrome browser, it’s simply impractical to go over more than a few at a time. What other Chrome features do you know about? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 03 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Productivity Passwords Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones VoIP Business Management AI Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship IT Support Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Operating System Router Risk Management Virtual Private Network Computers 2FA Health Help Desk Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Solutions Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Free Resource Project Management Windows 7 The Internet of Things Cooperation Microsoft 365 Social Going Green Patch Management Save Money Settings Wireless Printing Content Filtering Employees Integration IT Management Customer Relationship Management YouTube Meetings VPN Cryptocurrency Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security Holidays Virtual Desktop Data Storage Data storage Supply Chain LiFi Wireless Technology Video Conferencing Smart Technology Managed Services Provider Outlook Professional Services Virtual Machines Machine Learning Money Saving Time Humor Word Managed IT Service iPhone Maintenance Downloads Antivirus Sports Mouse Vulnerabilities Licensing Data Privacy Safety Entertainment Administration Images 101 Mobility Multi-Factor Authentication Robot Telephone System Cost Management Electronic Health Records Workforce Alt Codes Content IBM Wearable Technology Videos Downtime Unified Threat Management Motherboard Comparison Wasting Time Threats Health IT Unified Threat Management Directions Security Cameras Workplace Strategies Hosted Solution Assessment Permissions Trend Micro Software as a Service Meta Typing Network Congestion Specifications Managing Costs Amazon Google Drive User Error Microchip SSID Internet Exlporer Competition Knowledge Fraud eCommerce Surveillance Virtual Assistant Outsource IT Username Point of Sale 5G Black Friday Virtual Machine Environment Media Google Docs Medical IT Unified Communications Database Experience Reviews Development Transportation Small Businesses Bitcoin Network Management Running Cable Tech Support IT Technicians User Cookies Monitors Cyber Monday Hypervisor Displays Google Wallet Proxy Server PowerPoint Tactics Hotspot Shopping Optimization Employer/Employee Relationships Outsourcing Windows 8 IP Address Laptop Websites Mirgation Nanotechnology PCI DSS Drones Navigation SharePoint Workplace Addiction Electronic Medical Records Language Gig Economy Recovery Internet Service Provider Teamwork Hiring/Firing Management Halloween Chatbots Screen Reader Hard Drives Writing Distributed Denial of Service Regulations Compliance Lenovo Evernote Paperless Co-managed IT Service Level Agreement Domains Virtual Reality Computing Infrastructure Memes Net Neutrality SQL Server Technology Care Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Refrigeration Fun Financial Data History Superfish Bookmark Business Communications IT Scams Deep Learning Download Public Speaking Twitter Alerts Smartwatch Procurement Azure Hybrid Work Lithium-ion battery Error Browsers Tech Human Resources Education Connectivity Social Engineering Break Fix Telework Entrepreneur Cyber security Communitications Cables Upload Remote Computing CES Multi-Factor Security Supply Chain Management Mobile Computing Social Network Term Google Apps Tablet IoT Undo Search Dark Web FinTech IT Assessment IT Maintenance Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Flexibility Value Business Intelligence Managed IT Customer Resource management Legal Data Analysis Shortcuts IT solutions Star Wars How To Microsoft Excel Organization Smart Devices Ransmoware Business Growth Gamification Notifications Staff Digital Security Cameras Travel Social Networking Application Legislation Remote Working Memory Vendors Techology Fileless Malware Google Play Be Proactive Google Maps Cortana Data Breach

Blog Archive