ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Activating Clicklock on a Laptop

Tip of the Week: Activating Clicklock on a Laptop

Laptops are pretty great. They’re powerful, yet portable computers that can be brought effectively anywhere work needs to be done. That being said, there are a few drawbacks that can irritate many users to some extent. For instance: trying to click-and-drag your cursor as you are using the trackpad. For this week’s tip, let’s go into a feature that you can use to make this process a lot simpler.

Fair warning, this will require you to play around in your Settings, so make sure you refer to your IT provider for confirmation that these changes are okay to make before pulling the trigger.

ClickLock Can Make Your Trackpad Cooperate

ClickLock is a feature that, instead of requiring the “drag” component of click-and-drag, allows you to start and stop your drag option on your laptop by simply holding your click a little longer.

Using it breaks down like this:

  • Hover your cursor over the window or item you are trying to move and press and hold the (left) touchpad button for a few seconds. This activates ClickLock.
  • Once ClickLock is active, simply release the mouse button and move the cursor freely to where you want your window or item to go.
  • Once it is positioned, press the (left) touchpad once again to confirm your drag selection.

This makes it significantly simpler to use click-and-drag on a trackpad… but first, you need to activate it.

Activating ClickLock

To use ClickLock, you need to first fiddle in your Control Panel:

  • In the Control Panel, navigate to Hardware and Sound.
  • There, find the Devices and Printers section and click the link to the Mouse section.
  • In the Buttons tab, check the box labelled Turn on ClickLock, click Apply, and then Ok.

Hopefully, this will help make using a laptop that much simpler. For more tips and best practices, keep checking back to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Windows 10 IT Support Apps Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Artificial Intelligence Workplace Strategy Managed IT services Networking Windows App Virtualization Spam Mobile Device Management Blockchain Business Technology Bandwidth WiFi Encryption Information Remote Server Office Budget Two-factor Authentication History Office 365 Apple Information Technology Employee/Employer Relationship Gmail Wi-Fi BDR Health Analytics Conferencing Cybercrime Access Control Data Security Big Data Patch Management Help Desk Hacking Employer-Employee Relationship Voice over Internet Protocol Remote Monitoring Hacker Cost Management IT Management Remote Computing Training Compliance Document Management Vendor Save Money Vulnerabilities Search... Best Practice Project Management Mobile Office BYOD Retail Alert Computing Managed Services Vendor Management Money Hard Drive Hiring/Firing Data loss Outlook Customer Service Unified Threat Management Firewall Password Augmented Reality Legal Word Data storage IBM Applications Website Social Engineering Windows 11 The Internet of Things Running Cable Cryptocurrency Paperless Office Monitoring Black Market YouTube Antivirus Maintenance Healthcare Cleaning Storage Remote Workers Robot Laptop Windows 7 Free Resource Websites Mobility Meetings How To User Sports Social Google Maps SaaS DDoS Twitter Scam Law Enforcement End of Support Chrome iPhone Printer VPN Education Cortana Data Breach Content Filtering Update Mobile Computing Router Travel Marketing Virtual Reality Office Tips Virtual Machines Customer Relationship Management Private Cloud Memory Computer Repair Multi-factor Authentication Co-Managed IT Entertainment Professional Services Physical Security Politics Saving Time Wireless Technology Machine Learning eWaste Settings Managed Services Provider Start Menu Computers Bitcoin Downtime Solid State Drive Downloads Virtual Private Network Computer Care Telephone Safety Vulnerability HIPAA Current Events Drones Virtual Desktop Chromebook Software as a Service Data Protection Experience Excel Solutions Automobile Images 101 Integration Display How To Microchip Flexibility Disaster Virtual Assistant Employees Tech Terms Avoiding Downtime PowerPoint Hack Lithium-ion battery Identity Theft Notifications Managed IT Administration Holidays Processor Digital Unified Communications Presentation Google Docs Specifications Processors Cooperation Bluetooth IT Consultant Video Conferencing Taxes Distributed Denial of Service User Tip Shopping Legislation News Medical IT SQL Server Audit Evernote Paperless Spyware Network Management PCI DSS File Sharing Licensing Botnet Rental Service Redundancy Proxy Server Gig Economy Micrsooft Emails Humor Computer Accessories Fake News Supply Chain Computing Infrastructure Azure Public Speaking Business Communications Flash Cache Service Level Agreement Internet Service Provider Management Regulations Compliance Business Growth Workers Streaming Media Device security Managed IT Service Telephone Systems Unified Threat Management Keyboard Wireless Headphones Memes Microsoft Excel Workplace Business Cards Hard Drives Printing Tech Human Resources Going Green Net Neutrality CCTV Error Financial Data Google Wallet intranet Banking Touchscreen Shortcut Messenger Emergency Bookmark Risk Management Deep Learning IT Computer Malfunction Wireless Scams Piracy Heating/Cooling Environment Term Google Apps Vendor Mangement Download Telework Hosted Solution Samsung Troubleshooting Windows XP HTML Social Networking Business Metrics Books Browsers Smartwatch Uninterrupted Power Supply Nanotechnology Communitications Webcam Microsoft 365 Cables Software License Google Play Language Business Mangement Upload Procurement Society Social Network FinTech Tablets Reading Data Analysis CES Monitors Screen Reader IT Assessment Visible Light Communication Point of Sale Mobile Technology Value Google Calendar Security Cameras Trends Supply Chain Management Windows 8 Supercomputer Customer Resource management Organization Business Owner Devices Cyber security Shortcuts Virus Relocation Fileless Malware Displays Smart Devices Advertising Motion Sickness Staffing Tip of the week Company Culture IP Address Comparison Work/Life Balance Google Drive Gamification Remote Working Tech Support Telephone System AI Regulations Trend Micro Be Proactive Knowledge Directions Digital Security Cameras Corporate Profile Backup and Disaster Recovery Electronic Health Records Transportation Desktop Wasting Time In Internet of Things Television Telephony Content Employer Employee Relationship Hacks Electronic Medical Records Network Congestion Cabling Inbound Marketing Accountants eCommerce Modem Workplace Strategies Competition Reliable Computing Videos Writing Tablet Database Surveillance G Suite Recovery Tracking Managing Costs Mouse VoIP Health IT LiFi Equifax SSID Entrepreneur Application Scalability Media Electronic Payment Tactics Development Web Server Documents Hard Drive Disposal Employer/Employee Relationships Username Proactive IT Digital Payment Virtual Machine Administrator SharePoint Business Intelligence Text Messaging Bring Your Own Device Reviews Worker Startup Optimization Freedom of Information Smart Technology email scam Teamwork Navigation 2FA Access Addiction Phone System Securty Data Storage Music Public Cloud Mobile Security Hypervisor Domains Time Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?