Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Handy Google Chrome Shortcuts

Tip of the Week: Handy Google Chrome Shortcuts

It’s no secret how useful the Google Chrome browser is to a user. What is a secret, however, is that Chrome has some added capabilities that make it even more useful than first impressions would suggest. For our Tip of the Week, we’ll review some of these capabilities so you can implement them into your daily workflows.

Quicker Google Searches
Naturally, as Chrome is a Google product, it only makes sense that the Chrome browser defaults to a Google search. Chrome goes one step further, however, and lets a user search for a word or phrase on a webpage by highlighting it and right-clicking.

The resulting menu gives the option to Search Google for [input], and clicking this option will open this search in a new tab. The same can be accomplished by dragging the highlighted text into Google Chrome’s address bar, known as the omnibox.

If you’re using Chrome on an Android device, highlighting your word or phrase by pressing on it creates a pull-up menu at the bottom of the screen that facilitates the search.

Start Chrome on Certain Pages
Many people in the workplace tend to open a certain set of webpages when they first access their workstations. Chrome allows you to access these pages immediately by setting them to open when it starts up.

Under your Chrome Settings, find the On Startup menu and check the box labeled Open a specific page or set of pages. You can then add a page to this menu. Doing so means that, each time Chrome opens, these websites will each open in its own tab.

Link to Desktop
Finally, if there are certain websites that you may not always need to access, but have to fairly frequently, Chrome allows you to create a direct shortcut to the page from your desktop. Simply access the page and click on the three-dot menu icon at the top-right of the browser window. From there, select More tools, which will provide Create shortcut as one of its options. Once clicked, this will display a pop-up window asking for the shortcut’s name. Once you provide one, click Create, and you’ll have a direct link to that particular webpage via your desktop.

There are so many hidden capabilities of the Chrome browser, it’s simply impractical to go over more than a few at a time. What other Chrome features do you know about? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Data Recovery Disaster Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Facebook Automation Miscellaneous Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Business Technology Virtualization Apps Data Security Two-factor Authentication Mobile Office Vendor App Employer-Employee Relationship Networking BYOD Mobile Device Management Managed Services Chrome Voice over Internet Protocol Gmail Budget WiFi Tip of the week Apple Conferencing How To Computing Hacker BDR Information Technology Avoiding Downtime Marketing Office 365 HIPAA Applications Access Control Retail Operating System Managed IT Services Computers Risk Management 2FA Website Analytics Office Tips Router Physical Security Augmented Reality Virtual Private Network Healthcare Storage Health Password Bring Your Own Device Help Desk Big Data Microsoft 365 Going Green Telephone Scam Solutions Data loss Customer Service Cybercrime Cooperation Patch Management Windows 11 Save Money Remote Monitoring Vulnerability End of Support Vendor Management Excel Firewall Display Remote Workers Printer Paperless Office Infrastructure Monitoring The Internet of Things Free Resource Project Management Social Windows 7 Document Management Multi-Factor Authentication Mobility Managed IT Service Maintenance Antivirus Customer Relationship Management Downloads Settings Licensing Printing Wireless Content Filtering Employees Hacking Entertainment Integration Presentation YouTube Cryptocurrency Wireless Technology Holidays Telephone System Robot Cost Management Data Storage Virtual Desktop LiFi Supply Chain Data storage Video Conferencing Managed Services Provider IT Management Word Virtual Machines VPN Professional Services Meetings Outlook Money User Tip Modem Humor Computer Repair Mobile Security Processor iPhone Safety Sports Mouse Smart Technology Vulnerabilities Data Privacy Machine Learning Administration Images 101 Saving Time Server Management Shortcuts Private Cloud Identity IBM Legal Organization IT solutions Digital Security Cameras Business Growth Smart Devices Superfish Bookmark Ransmoware Identity Theft Smart Tech Download Twitter Alerts Remote Working Memory Vendors Data Breach Cortana Google Play Be Proactive Error Social Engineering Break Fix Videos Alt Codes Electronic Health Records Browsers Workforce Connectivity Upload Remote Computing Competition Downtime Wasting Time Threats Hosted Solution Trend Micro Social Network Security Cameras Workplace Strategies Multi-Factor Security Dark Web Typing Software as a Service Meta Tablet IoT Trends Alert Managing Costs Amazon User eCommerce Knowledge Managed IT Customer Resource management SSID File Sharing Regulations Google Drive Dark Data Google Calendar How To Microsoft Excel Surveillance Data Analysis Virtual Assistant Outsource IT Star Wars Virtual Machine Environment 5G Gamification Media Notifications Staff Reviews Unified Communications Experience Medical IT Travel Social Networking IP Address Google Docs Legislation Bitcoin Development Running Cable Techology Fileless Malware Transportation Small Businesses Google Maps Hypervisor Displays Content Wearable Technology Google Wallet Recovery Shopping Optimization Health IT PowerPoint Unified Threat Management Motherboard Comparison Assessment Permissions Hard Drives Windows 8 Laptop Unified Threat Management Directions Employer/Employee Relationships Outsourcing Navigation Domains Drones PCI DSS Network Congestion Specifications Gig Economy Workplace Internet Exlporer Fraud Refrigeration Internet Service Provider Halloween User Error Microchip Teamwork Hiring/Firing Username Evernote Paperless Public Speaking Regulations Compliance Black Friday Memes Co-managed IT Point of Sale Lithium-ion battery Database Hacks Entrepreneur Net Neutrality Scary Stories SQL Server Technology Care History Fun Network Management Business Communications Tech Support IT Technicians Financial Data Monitors Cyber Monday Smartwatch Deep Learning IT Proxy Server Scams Cookies Tactics Hotspot Undo Procurement Azure Hybrid Work Cyber security Tech Human Resources Websites Mirgation Telework Education CES Communitications Cables Nanotechnology Addiction Electronic Medical Records Language Mobile Computing Supply Chain Management SharePoint Search Management Term Google Apps Chatbots FinTech Writing Distributed Denial of Service Application Best Practice IT Assessment Lenovo IT Maintenance Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Flexibility Buisness Value Business Intelligence

Blog Archive