Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Reopening Tabs and Windows in Chrome

Tip of the Week: Reopening Tabs and Windows in Chrome

How often do you find yourself closing tabs or windows, then immediately regretting it? This can get in the way of productivity, and while it might not be downtime, it is certainly an annoyance having to relocate whatever it is you just closed. Web browsers thankfully have functionality that allows you to completely eliminate this inconvenience.

Reopen a Closed Tab in Chrome

We’re using Chrome for these examples, but the principle works largely the same for the other web browsers, practically right down to the keyboard shortcuts.

Close out of one of your tabs on your web browser. It doesn’t really matter what it is—we’ll help you get back to it (just make sure you weren’t working on a form or something that wouldn’t save). After you have closed the tab or window, you can right-click the Plus icon as if you were opening a new tab. Then you can use the Reopen Closed Tab option to reopen the last closed tab. This works multiple times.

The keyboard shortcut for this little trick is Ctrl + Shift + T.

Reopen a Closed Window in Chrome

It’s also easy to reopen a closed window in Chrome. All you need to do is open a new window for this test, then close it by clicking on the X button. To get back to browsing in this window, you right-click the tab bar at the top of the screen. If the last thing you closed was a window, you’ll see Reopen Closed Window in the place of the Reopen Closed Tab option. If you click it, you’ll see the window reappear.

The keyboard shortcut for this trick is also easy: Ctrl + Shift + W.

Hopefully you can use these little tricks to be a bit more productive with your workday!

For more great tips, be sure to contact us and ask our technicians.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Blockchain Windows 10 Bandwidth Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Avoiding Downtime Marketing Access Control Office 365 HIPAA Applications How To BDR Conferencing Computing Hacker Information Technology Website Health Office Tips Analytics Augmented Reality Retail Router Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Operating System Computers Healthcare Virtual Private Network Risk Management Printer Cooperation Free Resource Paperless Office Project Management Infrastructure Windows 7 Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Social Windows 11 Monitoring Going Green Patch Management Excel Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Remote Workers Physical Security Telephone Display Computer Repair Vulnerabilities Entertainment Data Privacy Virtual Desktop Data storage LiFi Images 101 Word Mobility Telephone System Outlook Multi-Factor Authentication Cost Management Machine Learning Money Humor Maintenance Safety Employees Antivirus Integration Sports Mouse Modem User Tip Processor Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Robot Customer Relationship Management Managed Services Provider Virtual Machines Professional Services Settings Saving Time Printing Wireless Content Filtering Hacking IT Management Managed IT Service Presentation VPN YouTube Meetings Downloads Cryptocurrency iPhone Wireless Technology Licensing Multi-Factor Security Tech Human Resources Experience IP Address Social Network Telework Google Docs Cyber security Unified Communications IoT Communitications Bitcoin Network Management Dark Web Cables Running Cable Tech Support CES Trends Supply Chain Management Google Wallet Monitors Google Calendar Term Google Apps Customer Resource management FinTech Recovery Regulations Hard Drives Star Wars IT Assessment Windows 8 Microsoft Excel IT Maintenance Laptop Websites Data Analysis Domains Gamification Flexibility Drones Staff Value Business Intelligence Legislation Shortcuts Electronic Medical Records Organization SharePoint Social Networking Refrigeration Smart Devices Ransmoware Halloween Fileless Malware Digital Security Cameras Public Speaking Content Remote Working Lenovo Wearable Technology Memory Vendors Writing Comparison Google Play Be Proactive Virtual Reality Lithium-ion battery Health IT Motherboard Data Breach Directions Videos Assessment Electronic Health Records Hacks Server Management Entrepreneur Permissions Workforce Scary Stories Private Cloud Fun Superfish Wasting Time Threats Identity Theft Trend Micro Deep Learning Specifications Security Cameras Workplace Strategies Twitter Microchip Undo Internet Exlporer Software as a Service Fraud Meta Error Social Engineering Username Managing Costs Amazon Education eCommerce Black Friday SSID Remote Computing Database Surveillance Mobile Computing Virtual Assistant Outsource IT Media Search IT Technicians Virtual Machine Environment Tablet Application Cookies Best Practice Cyber Monday Medical IT Alert Proxy Server Reviews Tactics Development Managed IT Hotspot Transportation Small Businesses Buisness File Sharing Dark Data How To IBM Legal Mirgation Hypervisor Displays IT solutions Nanotechnology Optimization Business Growth PowerPoint Notifications Shopping Addiction Language Employer/Employee Relationships Outsourcing Travel Navigation Cortana Management PCI DSS Techology Chatbots Google Maps Screen Reader Alt Codes Distributed Denial of Service Workplace Gig Economy Competition Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Evernote Paperless Regulations Compliance Unified Threat Management Identity Hosted Solution Smart Tech Memes Typing Co-managed IT Bookmark Download Net Neutrality Alerts SQL Server Technology Care Network Congestion Business Communications Knowledge Financial Data Google Drive User Error User History Connectivity IT Break Fix Scams Browsers Smartwatch Upload Procurement Azure Hybrid Work Point of Sale 5G

Blog Archive