ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Activating Clicklock on a Laptop

Tip of the Week: Activating Clicklock on a Laptop

Laptops are pretty great. They’re powerful, yet portable computers that can be brought effectively anywhere work needs to be done. That being said, there are a few drawbacks that can irritate many users to some extent. For instance: trying to click-and-drag your cursor as you are using the trackpad. For this week’s tip, let’s go into a feature that you can use to make this process a lot simpler.

Fair warning, this will require you to play around in your Settings, so make sure you refer to your IT provider for confirmation that these changes are okay to make before pulling the trigger.

ClickLock Can Make Your Trackpad Cooperate

ClickLock is a feature that, instead of requiring the “drag” component of click-and-drag, allows you to start and stop your drag option on your laptop by simply holding your click a little longer.

Using it breaks down like this:

  • Hover your cursor over the window or item you are trying to move and press and hold the (left) touchpad button for a few seconds. This activates ClickLock.
  • Once ClickLock is active, simply release the mouse button and move the cursor freely to where you want your window or item to go.
  • Once it is positioned, press the (left) touchpad once again to confirm your drag selection.

This makes it significantly simpler to use click-and-drag on a trackpad… but first, you need to activate it.

Activating ClickLock

To use ClickLock, you need to first fiddle in your Control Panel:

  • In the Control Panel, navigate to Hardware and Sound.
  • There, find the Devices and Printers section and click the link to the Mouse section.
  • In the Buttons tab, check the box labelled Turn on ClickLock, click Apply, and then Ok.

Hopefully, this will help make using a laptop that much simpler. For more tips and best practices, keep checking back to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Communication Data Recovery Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 Windows 10 IT Support Browser Apps Managed Service Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Workplace Strategy Artificial Intelligence Managed IT services Gadgets Networking Windows Spam WiFi Business Technology Blockchain Bandwidth Encryption Mobile Device Management Server Information Remote App Virtualization Information Technology Office 365 Budget History Gmail Office Employee/Employer Relationship Apple Two-factor Authentication BDR Cybercrime Wi-Fi Conferencing Access Control Health Data Security Big Data Analytics Remote Monitoring Document Management Voice over Internet Protocol Hacker Save Money IT Management Training Compliance Employer-Employee Relationship Help Desk Patch Management Hacking Cost Management Vendor Remote Computing Password Project Management Vulnerabilities Legal Data storage Mobile Office Money Customer Service Unified Threat Management Managed Services Firewall Data loss Augmented Reality Search... Word Best Practice BYOD IBM Website Computing Retail Vendor Management Alert Hard Drive Hiring/Firing Applications Outlook Law Enforcement End of Support Laptop Printer Monitoring Chrome Healthcare Websites Remote Workers Mobility Meetings Windows 11 Windows 7 Social Free Resource Mobile Computing Sports Travel SaaS DDoS Virtual Reality Google Maps Social Engineering Scam Cryptocurrency Marketing Black Market How To Running Cable iPhone Cleaning Education Cortana VPN Robot Content Filtering Storage Update Router Data Breach Paperless Office The Internet of Things YouTube Antivirus User Twitter Maintenance Virtual Machines Wireless Technology Microchip eWaste Computer Repair Flexibility Multi-factor Authentication Start Menu Professional Services Downloads Computer Care Downtime Hack Safety Identity Theft Notifications Vulnerability Saving Time Unified Communications PowerPoint Virtual Desktop Software as a Service Administration Managed Services Provider Data Protection Computers Bitcoin Experience Google Docs Bluetooth Virtual Private Network Presentation Distributed Denial of Service Telephone Specifications IT Consultant Office Tips Memory Current Events Private Cloud Customer Relationship Management Excel Solutions Disaster Co-Managed IT Entertainment Tech Terms Images 101 Integration Politics Machine Learning Settings Lithium-ion battery Display Managed IT Digital Virtual Assistant Solid State Drive Processors Employees Taxes Avoiding Downtime Holidays Chromebook Drones Processor HIPAA Automobile Cooperation Video Conferencing Physical Security How To Legislation News Medical IT Keyboard User Tip Shopping Hard Drives Printing Evernote Paperless Network Management CCTV SQL Server In Internet of Things intranet Touchscreen PCI DSS Licensing Emails Humor Computer Malfunction Fake News Wireless Hacks Shortcut Network Congestion Emergency Proxy Server Gig Economy Heating/Cooling Writing Business Communications Environment Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Reliable Computing Smart Technology Windows XP Social Networking Management Regulations Compliance Inbound Marketing Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Tech Human Resources Business Mangement Going Green Net Neutrality Business Cards Scalability Administrator Text Messaging Proactive IT Error Financial Data Tablets Electronic Payment IT Bring Your Own Device Bookmark Risk Management Google Calendar Term Google Apps Download Supercomputer Piracy Supply Chain Music Virus Telework HTML Nanotechnology Communitications Phone System Motion Sickness Microsoft 365 Staffing Browsers Smartwatch IP Address Comparison Google Play Google Drive Upload Procurement Software License Workplace Botnet Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Rental Service Micrsooft Flash Television Security Cameras Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Cabling Devices Cyber security Computer Accessories Scams Telephone Systems Business Growth Customer Resource management Organization Fileless Malware Tablet Smart Devices G Suite Tip of the week Recovery Competition Mouse VoIP Gamification Remote Working Tracking Company Culture Regulations Trend Micro Cables LiFi Banking Entrepreneur Google Wallet Telephone System AI Application Deep Learning Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Documents Messenger SharePoint Business Intelligence Content Digital Payment Desktop Wasting Time Worker Accountants eCommerce Point of Sale Modem Business Metrics Hosted Solution Electronic Medical Records Videos Access Database Surveillance Securty Books Domains Language Society Time Management Troubleshooting Public Cloud Managing Costs Shortcuts Equifax SSID Health IT Monitors Audit Media Visible Light Communication Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Reading Windows 8 Username File Sharing Virtual Machine Be Proactive Startup Optimization Freedom of Information Redundancy Reviews Public Speaking Displays Navigation 2FA Advertising Cache Addiction email scam Teamwork Relocation Workplace Strategies Streaming Media Work/Life Balance Tech Support Unified Threat Management Data Storage Business Owner Workers Mobile Security Hypervisor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?