What mouse and keyboard shortcuts can I use when working with tabs?
The following table describes the mouse and keyboard shortcuts that are available when working with tabs.
The following table describes the mouse and keyboard shortcuts that are available when working with tabs.
| To do this | Press this |
|---|---|
| Open links in a new tab in the background | CTRL+click |
| Open links in a new tab in the foreground | CTRL+SHIFT+click |
| Open a new tab in the foreground | CTRL+T or double-click an empty space in the tab row |
| Switch between tabs | CTRL+TAB or CTRL+SHIFT+TAB |
| Close current tab (or current window when there are no open tabs) | CTRL+W or ALT+F4 |
| Open a new tab in the foreground from the Address bar | ALT+ENTER |
| Switch to a specific tab number | CTRL+n (where n is a number between 1 and 8) |
| Switch to the last tab | CTRL+9 |
| Close other tabs | CTRL+ALT+F4 |
| Open Quick Tabs (thumbnail view) | CTRL+Q |
| Open a link in a tab with a wheel mouse | Click the link with the mouse wheel |
| Close a tab with a wheel mouse | Click the tab with the mouse wheel |
The following table describes the mouse and keyboard shortcuts that are available when working with tabs.
| To do this | Press this |
|---|---|
| Open links in a new tab in the background | CTRL+click |
| Open links in a new tab in the foreground | CTRL+SHIFT+click |
| Open a new tab in the foreground | CTRL+T or double-click an empty space in the tab row |
| Switch between tabs | CTRL+TAB or CTRL+SHIFT+TAB |
| Close current tab (or current window when there are no open tabs) | CTRL+W or ALT+F4 |
| Open a new tab in the foreground from the Address bar | ALT+ENTER |
| Switch to a specific tab number | CTRL+n (where n is a number between 1 and 8) |
| Switch to the last tab | CTRL+9 |
| Close other tabs | CTRL+ALT+F4 |
| Open Quick Tabs (thumbnail view) | CTRL+Q |
| Open a link in a tab with a wheel mouse | Click the link with the mouse wheel |
| Close a tab with a wheel mouse | Click the tab with the mouse wheel |
Among many new value added features of the Microsoft Office 2007, restriction the permission to use of many types of office documents is a notable one. You can restrict permission to content in documents, workbooks, and presentations by using Information Rights Management (IRM). For information on how you can restrict permission to content in e-mail messages, see Restrict permission to confidential information in e-mail messages in the help of your MS Office System. Most of the contents of this article is adapted from Microsoft Office Word 2007. For detail visit the help and support in the program.
For information on how to set a password to open or modify a file, see Set a password to open or modify a document, workbook, or presentation. There are other articles that describe using passwords to protect formatting in documents and protect worksheet or workbook elements.
IRM helps individuals enforce their personal preferences concerning the transmission of personal or private information. IRM also helps organizations enforce corporate policy governing the control and dissemination of confidential or proprietary information.
Prevent an authorized recipient of restricted content from forwarding, copying, modifying, printing, faxing, or pasting the content for unauthorized use
Prevent restricted content from being copied by using the Print Screen feature in Microsoft Windows
Restrict content wherever it is sent
Support file expiration so that content in documents can no longer be viewed after a specified period of time
Enforce corporate policies that govern the use and dissemination of content within the company
Content from being erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain types of spyware
Content from being lost or corrupted because of the actions of computer viruses
Restricted content from being hand-copied or retyped from a display on a recipient's screen
A recipient from taking a digital photograph of the restricted content displayed on a screen
Restricted content from being copied by using third-party screen-capture programs
To use IRM in the 2007 Office release, the minimum required software is Windows Rights Management Services (RMS) Client Service Pack 1 (SP1), which can be installed on your computer either by you or your RMS administrator. The RMS administrator can configure company-specific IRM policies that define who can access content and what level of editing is permitted for a document, workbook, or presentation. For example, a company administrator might define a rights template called "Company Confidential," which specifies that documents, workbooks, or presentations that use that policy can be opened only by people inside the company domain.
In Microsoft Windows, click the Start button, and then click Control Panel.
Do one of the following:
Microsoft Windows Vista : Click Programs, and then under Installed Programs, click Install a program from the network. In the list of programs, click Windows Rights Management Services Client, and then click Add.
Microsoft Windows XP : Click Add or Remove Programs, and then click Add or Remove Programs. In the left pane, click Add New Programs. From the list of programs, click Windows Rights Management Services Client, and then click Add.
Alternatively, when you first try to open files that have been rights-managed by using IRM, the 2007 Office release prompts you to download the Windows Rights Management Services Client. For more information about the Windows Rights Management Services Client, visit the Windows Rights Management Services Web site or search Google for more results.
The first time that you attempt to open a document, workbook, or presentation with restricted permission, you must connect to a licensing server to verify your credentials and to download a use license. The use license defines the level of access that you have to a file. This process is required for each file with restricted permission. In other words, content with restricted permission cannot be opened without a use license. Downloading permissions requires that Microsoft Office send your credentials (which includes your e-mail address) and information about your permission rights to the licensing server. Information contained in the document is not sent to the licensing server. For more information, read the Privacy Statement.
Authors can restrict permission for documents, workbooks, and presentations on a per-user, per-document, or per-group basis (group-based permissions require Microsoft Active Directory directory service for group expansion). Authors use the Permission dialog box to give users Read and Change access, as well as to set expiration dates for content.
Most of the contents of this article is adapted from Microsoft Office Word 2007. For detail visit the help and support in the program.
With Remote Desktop on
When you connect to your computer at work, Remote Desktop automatically locks that computer so no one else can access your applications and files while you are gone. When you come back to your computer at work, you can unlock it by typing CTRL+ALT+DEL.
Remote Desktop also allows more than one user to have active sessions on a single computer. This means that multiple users can leave their applications running and preserve the state of their Windows session even while others are logged on.
With Fast User Switching, you can easily switch from one user to another on the same computer. For example, suppose you are working at home and have logged on to the computer at your office to update an expense report. While you are working, a family member needs to use your home computer to check for an important email message. You can disconnect Remote Desktop, allow the other user to log on and check mail, and then reconnect to the computer at your office, where you see the expense report exactly as you left it. Fast User Switching works on standalone computers and computers that are members of workgroups.
Remote Desktop enables a variety of scenarios, including:
To use Remote Desktop, you need the following:
When you open a document in Microsoft Office Word 2007 that was created in Microsoft Office Word 2003, Word 2002, or Word 2000, Compatibility Mode is turned on, and you see Compatibility Mode in the title bar of the document window. Compatibility Mode ensures that no new or enhanced features in Office Word 2007 are available while you are working with a document, so that people who are using previous versions of Word will have full editing capabilities. Find this yourself at help center of MS Word 2007.
You can work in Compatibility Mode or you can convert your document to the Office Word 2007 file format. Converting your document allows you to access the new and enhanced features in Office Word 2007. However, people who are using previous versions of Word may be prevented from or have difficulty editing certain portions of the document that were created by using new or enhanced features in Office Word 2007.
Work in Compatibility Mode
When you open a Word 972003 document in Office Word 2007, Compatibility Mode is turned on, and you see Compatibility Mode in the title bar of the document window. In Compatibility Mode, you can open, edit, and save Word 972003 documents but you won't be able to use any of the new Office Word 2007 features.
Document elements that behave differently in Compatibility Mode
The following elements will be permanently changed when you are working in Compatibility Mode, and you cannot convert them to Office Word 2007 elements even if you convert your document later.
| Office Word 2007 element | Behavior in Compatibility Mode |
| Heading and body fonts | Converted to static formatting. |
| Relative text boxes | Converted to absolute positions. |
| Margins | Converted to absolute tabs. |
| Bibliography | Converted to static text. |
| Citations | Converted to static text. |
| Placeholder text in citations | Converted to static text. |
| Placeholder text in content controls | Converted to static text. |
| Themes | Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using themes. |
| Theme colors | Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using theme colors. |
| Theme fonts | Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using theme fonts. |
| Theme effects | Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using theme effects. |
| Content controls | Permanently converted to static text. |
The following document elements will be changed when you are working in Compatibility Mode, but you can convert them to Office Word 2007 elements if you convert your document later.
| Office Word 2007 element | Behavior in Compatibility Mode |
| Office Art | Only a limited set of diagram types is available.. |
| Diagrams | Converted to images that cannot be edited. |
| Equations | Become graphics and cannot be changed. |
Convert a document to Office Word 2007
1. Click the Microsoft Office Button, and then click Convert.
2. In the Microsoft Office Word dialog box, click OK.
3. Do one of the following:
§ To replace the original file with a file in the Office Word 2007 file format, click the Microsoft Office Button, and then click Save.
§ To save the original document in its original file format and create another document in the Office Word 2007 file format, click the Microsoft Office Button, click Save As, and then type a new name for the file.
| Typical Main Menu Settings* | ||
| Feature | Options | Description |
| BIOS Version | No options | Displays the version of the BIOS |
| Processor Type | No options | Displays the processor type |
| Processor Speed | No options | Displays the processor speed |
| System Bus | No options | Displays the system bus frequency |
| Frequency | ||
| Cache RAM | No options | Displays the size of second-level (L2) cache and whether it is ECC capable |
| Total Memory | No options | Displays the total amount of RAM on the motherboard |
| Memory Bank 0 | No options | Displays size and type of DIMM installed in each memory |
| Memory Bank 1 | bank | |
| Memory Bank 2 | ||
| Language | English (default) Deutch | Selects the default language used by the BIOS |
| Espanol | ||
| Processor Serial | Disabled (default), | Enables/disables processor serial number (present only when |
| Number | enabled | a Pentium III CPU is installed) |
| System Time | Hour, minute, second | Specifies the current time |
| System Date | Month, day, year | Specifies the current date |
| Typical Advanced Menu Settings* | ||
| Feature | Options | Description |
| Extended Configuration | No options | If Used is displayed, User-defined has been selected in the Extended Configuration under the Maintenance menu. |
| PCI Configuration | No options | Configures the IRQ priority of individual PCI slots. When selected, displays the PCI Configuration submenu. |
| Boot Settings Configuration | No options | Configures Numlock and Plug and Play, and resets configura-tion data. When selected, displays the Boot Configuration sub- |
| menu. | ||
| Peripheral Configuration | No options | Configures peripheral ports and devices. When selected, displays the Peripheral Configuration submenu. |
| IDE Configuration | No options | Specifies type of connected IDE device. |
| Diskette Configuration | No options | When selected, displays the Diskette Configuration submenu. |
| Event Log | No options | Configures Event Logging. When selected, displays the Event Log Configuration submenu. |
| Video Configuration | No options | Configures video features. When selected, displays the Video Configuration submenu. |
| Additional Advanced Menu Settings* | ||
| Feature | Options | Description |
| Plug and Play O/S | No (default), | Specifies whether a Plug and Play operating system is being |
| Yes | used. Nolets the BIOS configure all devices. Yeslets the operating system configure Plug and Play devices. Not required with a Plug and Play operating system. | |
| Reset Configuration Data | No (default), | Clears the Plug and Play BIOS configuration data on the next |
| Yes | boot. | |
| Numlock | Auto (default), | Specifies the power-on state of the Num Lock feature on the |
| On, Off | numeric keypad of the keyboard. | |
| Resource Configuration | No options | Configures memory blocks and IRQs for legacy ISA devices. |
| When selected, displays the Resource Configuration submenu. | ||
| Additional Advanced Features Settings | |
| Setting | Description |
| Auto Configuration* | Selects predetermined optimal values of chipset parameters. When Disabled, chipset parameters revert to setup information stored in CMOS. Many fields in this screen are not available when Auto Configuration is Enabled. |
| EDO DRAM Speed Selection | The value in this field must correspond to the speed of the EDO DRAM installed in your system. This value is access speed, so a lower value means a faster |
| system. | |
| SDRAM RAS-to-CAS Delay* | This field lets you control the number of cycles between a row activate com-mand and a read or write command. |
| SDRAM RAS Precharge Time* | The precharge time is the number of cycles it takes for the RAS to accumulate its charge before DRAM refresh. If insufficient time is allowed, refresh might be incomplete, and the DRAM might fail to retain data. |
| SDRAM CAS Latency Time* | When synchronous DRAM is installed, you can control the number of cycles between when the SDRAMs sample a read command and when the controller samples read data from the SDRAMs. |
| SDRAM Precharge Control | When Enabled, all CPU cycles to SDRAM result in an All Banks Precharge command on the SDRAM interface. |
| DRAM Data Integrity Mode | Select Non-ECC or ECC (error correcting code) according to the type of installed DRAM. ECC allows for single-bit error correction and multibit error detection at a slight speed penalty to the system. |
| System BIOS Cacheable | Allows caching of the system BIOS ROM at F0000hFFFFFh, resulting in better system performance. If any program writes to this memory area, a system error can result. |
| Video BIOS Cacheable | Allows caching of the video BIOS ROM at C0000hC7FFFh, resulting in better video performance. If any program writes to this memory area, a system error can result. |
| Video RAM Cacheable* | Selecting Enabled allows caching of the video memory (RAM) at |
| (Video Memory Cache Mode) | A0000hAFFFFh, resulting in better video performance. If any program writes to this memory area, a memory access error can result. Uncacheable Speculative Write-Combining (USWC) mode is the same as Enabled on some |
| systems. | |
| 8/16 Bit I/O Recovery Time | The I/O recovery mechanism adds bus clock cycles between PCI-originated I/O cycles to the ISA bus. This delay takes place because the PCI bus is so much faster than the ISA bus. |
| Memory Hole at 15M16M | Places a 1MB empty RAM area between 15MB and 16MB. Older software sometimes would not run with 16MB or more memory in the system; enabling this provides a workaround. This is normally not used. |
| Passive Release | When Enabled, CPU-to-PCI bus accesses are allowed during passive release. Otherwise, the arbiter accepts only another PCI master access to local DRAM. |
| Delayed Transaction | The chipset has an embedded 32-bit posted write buffer to support delay transactions cycles. Select Enabled to support compliance with PCI specification version 2.1. |
| AGP Aperture Size (MB) | Select the size of the accelerated graphics port (AGP) aperture. The aperture is a portion of the PCI memory address range dedicated for graphics memory address space. Host cycles that hit the aperture range are forwarded to the AGP without any translation. |
| CPU Warning Temperature | Select the combination of lower and upper limits for the CPU temperature if |
| your computer contains an environmental monitoring system. If the CPU | |
| temperature extends beyond either limit, any warning mechanism programmed | |
| into your system is activated. | |
| Current CPU Temperature | This field displays the current CPU temperature if your computer contains an |
| environmental monitoring system. | |
| Shutdown Temperature | Select the combination of lower and upper limits for the system shutdown |
| temperature if your computer contains an environmental monitoring system. If | |
| the temperature extends beyond either limit, the system shuts down. | |
| CPUFAN Turn On IN Win98 | If you are running Windows 98, which supports ACPI, selecting Enabled gives |
| the user a cooling choice at runtime. The user can run with the CPU fan turned | |
| on or off, depending on deciding factors such as CPU activity, battery power | |
| consumption, and noise tolerance. | |
| Current System Temperature | This field displays the current system temperature if your computer contains a |
| monitoring system. | |
| Current CPUFAN 1/2/3 Speed | These fields display the current speed of up to three CPU fans if your computer |
| contains a monitoring system. | |
| IN0-IN6(V) | These fields display the current voltage of up to seven voltage input lines if your |
| computer contains a monitoring system. | |
| Spread Spectrum | When the system clock generator pulses, the extreme values of the pulse gener- |
| ate excess EMI. Enabling pulse spectrum spread modulation changes the | |
| extreme values from spikes to flat curves, thus reducing EMI. This benefit in | |
| some cases might be outweighed by problems with timing-critical devices, such | |
| as a clock-sensitive SCSI device. |
| Table 5.26 | Typical Security Settings* | |||
| Feature | Options | Description | ||
| User Password Is | No options. | Reports whether a user password is set. | ||
| Supervisor | No options. | Reports whether a supervisor password is set. | ||
| Password Is | ||||
| Set User | Password can be up to seven | Specifies the user password. | ||
| Password | alphanumeric characters. | |||
| Set Supervisor | Password can be up to seven | Specifies the supervisor password. | ||
| Password | alphanumeric characters. | |||
| Clear User | No options. | Clears the user password. | ||
| Password | ||||
| User Setup | None | Controls the user's capability to run the BIOS Setup | ||
| Access | View Only Limited Access | program. | ||
| Full Access (default). | ||||
| Unattended Start | Disabled (default) | Enables the unattended start feature. When enabled, | ||
| Enabled. | the computer boots, but the keyboard is locked. The user | |||
| must enter a password to unlock the computer or boot | ||||
| from a disk. | ||||
| *Based on the BIOS used by the Intel DB815EEA motherboard. Used by permission of Intel Corporation. | ||||
With Remote Desktop on Windows XP Professional, you can have access to a Windows session that is running on your computer when you are at another computer. This means, for example, that you can connect to your work computer from home and have access to all of your applications, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you can see your desktop at work displayed on your home computer, with the same programs running.
When you connect to your computer at work, Remote Desktop automatically locks that computer so no one else can access your applications and files while you are gone. When you come back to your computer at work, you can unlock it by typing CTRL+ALT+DEL.
Remote Desktop also allows more than one user to have active sessions on a single computer. This means that multiple users can leave their applications running and preserve the state of their Windows session even while others are logged on.
With Fast User Switching, you can easily switch from one user to another on the same computer. For example, suppose you are working at home and have logged on to the computer at your office to update an expense report. While you are working, a family member needs to use your home computer to check for an important email message. You can disconnect Remote Desktop, allow the other user to log on and check mail, and then reconnect to the computer at your office, where you see the expense report exactly as you left it. Fast User Switching works on standalone computers and computers that are members of workgroups.
Remote Desktop enables a variety of scenarios, including:
Copyright © 2008 gearShifts. This blog might contain information crucial to your system, please be aware before using any resources. Exclusive Portion of the contents may be reproduced with permission while rest others free. All Brands/Trademarks/Logos are registered by the respective companies. Should any right be infringed, it is totally unintentional. Send an e-mail or comment on any post and we shall promptly and gladly rectify it. All external sites open in a new browser. We don't endorse external sites and not responsible for their content. For broken links, site problems - please send Feedback.
Design by Free blogger template