Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Reopening Tabs and Windows in Chrome

Tip of the Week: Reopening Tabs and Windows in Chrome

How often do you find yourself closing tabs or windows, then immediately regretting it? This can get in the way of productivity, and while it might not be downtime, it is certainly an annoyance having to relocate whatever it is you just closed. Web browsers thankfully have functionality that allows you to completely eliminate this inconvenience.

Reopen a Closed Tab in Chrome

We’re using Chrome for these examples, but the principle works largely the same for the other web browsers, practically right down to the keyboard shortcuts.

Close out of one of your tabs on your web browser. It doesn’t really matter what it is—we’ll help you get back to it (just make sure you weren’t working on a form or something that wouldn’t save). After you have closed the tab or window, you can right-click the Plus icon as if you were opening a new tab. Then you can use the Reopen Closed Tab option to reopen the last closed tab. This works multiple times.

The keyboard shortcut for this little trick is Ctrl + Shift + T.

Reopen a Closed Window in Chrome

It’s also easy to reopen a closed window in Chrome. All you need to do is open a new window for this test, then close it by clicking on the X button. To get back to browsing in this window, you right-click the tab bar at the top of the screen. If the last thing you closed was a window, you’ll see Reopen Closed Window in the place of the Reopen Closed Tab option. If you click it, you’ll see the window reappear.

The keyboard shortcut for this trick is also easy: Ctrl + Shift + W.

Hopefully you can use these little tricks to be a bit more productive with your workday!

For more great tips, be sure to contact us and ask our technicians.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Holiday Facebook Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Virtualization Apps Data Security Mobile Office Vendor Two-factor Authentication Tip of the week Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Apple Networking App Mobile Device Management BYOD Gmail WiFi Office 365 Conferencing Hacker How To Avoiding Downtime BDR Marketing HIPAA Computing Applications Information Technology Access Control Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Computers Bring Your Own Device Managed IT Services Website Operating System Router 2FA Virtual Private Network Risk Management Big Data Health Social Monitoring Document Management Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Cybercrime Windows 11 Physical Security Display The Internet of Things Printer Excel Paperless Office Infrastructure Data Storage Smart Technology Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Customer Relationship Management Humor Managed IT Service Maintenance Data Privacy Antivirus Sports Hacking Downloads Presentation iPhone Mouse Licensing Administration Wireless Technology Vulnerabilities Entertainment Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Word Settings Wireless Printing Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency Safety Supply Chain User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Data storage Paperless Windows 8 Laptop Websites Mirgation Hypervisor Application PowerPoint Co-managed IT Drones Shopping Nanotechnology Optimization Addiction IBM Electronic Medical Records Language Employer/Employee Relationships Technology Care SharePoint Business Communications Management PCI DSS Halloween Chatbots Navigation Writing Distributed Denial of Service Scams Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hybrid Work Human Resources Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Competition Fun Cables Superfish Bookmark Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Twitter Alerts SQL Server Google Apps Financial Data Error History Social Engineering Break Fix IT Maintenance Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Business Intelligence User Shortcuts Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Tablet IoT Communitications Search Dark Web Ransmoware CES Best Practice Trends Supply Chain Management IP Address Alert Vendors Dark Data Google Calendar Term Be Proactive Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel Workforce Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Threats Recovery Hard Drives Legislation Workplace Strategies Organization Travel Social Networking Google Maps Smart Devices Domains Cortana Meta Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working Wearable Technology Memory Amazon Refrigeration Comparison Google Play Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Public Speaking Permissions Outsource IT Unified Threat Management Directions Videos Media Typing Lithium-ion battery Wasting Time Environment Network Congestion Specifications Security Cameras Entrepreneur Trend Micro Internet Exlporer Software as a Service Knowledge Fraud Small Businesses Google Drive User Error Microchip Username Managing Costs Displays Undo 5G Black Friday SSID Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant Outsourcing Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Workplace Google Wallet Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Hiring/Firing

Blog Archive