Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Useful Microsoft Word Features

Tip of the Week: 3 Useful Microsoft Word Features

Microsoft Office’s Word is undoubtedly one of the most popular word processing software in the world, perhaps even the most popular. Still, there are many people who use Word on a regular basis without putting the majority of its features to use. Here’s three more Word capabilities that you’ll find very handy.

Change the Case of your Text
HAVE YOU EVER ACCIDENTALLY WRITTEN SOMETHING ENTIRELY IN CAPS? It happens to everyone. However, many people don’t realize that you don’t have to delete everything and rewrite it. Microsoft Word has a handy feature that allows users to change the case of your text. You can choose from: Sentence case. Lowercase. UPPERCASE. Capitalize Each Word. and tOGGLE cASE.

word ib 1

Auto-Update Date & Time
Even though the majority of business correspondences are done digitally, there are still some times when you need to write a good ol’ fashioned direct mail letter. For example, many businesses like to send a welcome message/onboarding letter to new clients. These letters will probably be uniform, with some personalization for each client. Word offers some assistance in making sure the information is updated in the letter. One very handy one when working with templates is the auto-update Date & Time feature.

Under the Insert tab, click the Date & Time button and a pop-up window will appear. Click the date format you want and then be sure to click the "update automatically" box in the bottom right corner. Now the date will automatically be updated every time you open (or print) the document.

word ib 2

Get Rid of Unwanted Formatting
Most people who use Microsoft Word on a regular basis have had to deal with accidentally pasting text that held the formatting of the document you copied it from. This contagious font will even take over the rest of the document, following the formatting of what was pasted rather than your desired format.

Word has a command that you can use to Clear All Formatting. It can be found in the menu and its icon looks like the letter ‘A’ with a pink eraser. You can also use the keyboard shortcut: Ctrl+Space

word ib 3

For more great information about the software you use every day, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Saving Money Tech Term Holiday Chrome Gadgets Virtualization Social Media Managed IT Services Microsoft Office Automation Managed Service Operating System Facebook Artificial Intelligence Computers Cybercrime BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Health Covid-19 Spam Managed Service Provider Office 365 Telephone Systems Alert Remote Information Technology Information Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Encryption Application Applications Remote Monitoring Law Enforcement Big Data Data Breach App History Password Mobile Computing Money Human Resources Remote Computing Mobile Office Data Storage Patch Management Government Private Cloud Office Tips Blockchain Managed IT Training Paperless Office VPN Apps How To Voice over Internet Protocol Two-factor Authentication Google Drive Mouse HaaS Avoiding Downtime Vulnerability Windows 7 Word Servers Wireless Flexibility Bring Your Own Device Data Management Gmail Marketing Work/Life Balance Data Security WiFi Settings IT solutions Entertainment Website Infrastructure Budget Education USB Physical Security Virtual Reality Apple Safety Sports HIPAA Employee/Employer Relationship Redundancy Social Keyboard RMM User Error Data Protection Conferencing Meetings Scam Risk Management Hacker Save Time Vendor Management The Internet of Things Lithium-ion battery Telephone System Staff Software as a Service Cleaning Machine Learning Connectivity Remote Work Vendor Firewall Managed Services End of Support Display SaaS Spam Blocking Internet Exlporer Electronic Medical Records Processor Augmented Reality IT Consultant PDF Network Congestion Hiring/Firing Hard Drive Fraud eWaste Remote Worker Humor Proactive IT Computing Cryptocurrency Best Practice YouTube Wearable Technology Business Intelligence Black Market Hard Drives Comparison Retail Audit Instant Messaging Worker CES Digital Signage IT Management Robot Excel Document Management Solid State Drive Wireless Technology Biometrics Botnet Business Technology Content Management How to IT Plan Downtime Virtual Desktop Access Control Virus Procurement Workplace Strategy Virtual Assistant Net Neutrality DDoS Unsupported Software Data storage Unified Threat Management Authentication Automobile Help Desk SharePoint Charger Computer Accessories Printing Compliance Computing Infrastructure OneNote Going Green Computer Care Update Customer Service Current Events Environment Managed Services Provider Telephony Samsung Printer Battery Database Google Docs Bluetooth Fax Server Shadow IT Identity Theft Remote Workers Legal Value Tablet Troubleshooting Email Best Practices MSP IT Assessment Accountants Manufacturing Outlook Leadership Domains Microchip Thought Leadership Politics Start Menu Credit Cards Advertising Managed IT Service Password Manager Security Cameras Screen Mirroring Loyalty Computer Tips Password Management Books Virtual CIO OneDrive Biometric Security IaaS Frequently Asked Questions Multi-Factor Security Maintenance Notifications Windows 10s Bloatware Search Engine Peripheral Twitter Mobile Using Data Business Mangement Cast Digital Security Cameras NIST Tablets Emergency Copiers Smart Tech 5G Tip of the week Trending Relocation webinar Public Cloud Entrepreneur Employer Employee Relationship Quick Tip Addiction Professional Services Amazon Recycling Video Games Smartwatch Assessment Ergonomics Wiring Development Practices Worker Commute OLED Windows Server 2008 Shortcut Consultant Cost Management PCI DSS Cache Experience Virtual Machine Tools Amazon Web Services Safe Mode Fiber Optics Criminal Scalability Employee Social Networking Television Analytics 2FA GDPR Messaging Hosted Computing Business Owner Cabling Online Shopping Best Available NarrowBand Policy Wireless Internet Hypervisor File Sharing Trend Micro Search Running Cable WIndows 7 Public Computer Dark mode Memory Transportation Camera SMS Inventory Default App Regulations Specifications iPhone Evernote Computer Fan Rootkit Procedure Wire Saving Time Shopping Google Search Travel dark theme Benefits Printers AI IT Infrastructure Millennials Files Workers Wireless Charging Bing FENG Chromecast FinTech Smart Office Windows Media Player Social Network User IBM PowerPoint Science Uninterrupted Power Supply Smart Technology Virtual Private Network Investment Flash Workforce Colocation Employee/Employer Relationships Cables Employees Windows 365 ISP Distributed Denial of Service Software Tips Managing Stress Monitor Customer Relationship Management Supercomputer Emails Analyitcs Project Management Video Conferencing Nanotechnology ROI Sync Telecommuting Bitcoin Cortana Shortcuts Programming Cameras Sales Point of Sale Personal Digital Signature Cryptomining Reputation Streaming Media Netflix Tech Support Two Factor Authentication Warranty Supply Chain Management Content Batteries Google Apps Techology Antivirus Root Cause Analysis Laptop Monitoring HVAC Windows 8 Music Windows 8.1 Digitize Analysis HBO Customers Knowledge IT service Administrator Devices Audiobook Windows Server 2008 R2 Skype Data loss Touchpad Printer Server Customer relationships Enterprise Content Management

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code