Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Useful Microsoft Word Features

Tip of the Week: 3 Useful Microsoft Word Features

Microsoft Office’s Word is undoubtedly one of the most popular word processing software in the world, perhaps even the most popular. Still, there are many people who use Word on a regular basis without putting the majority of its features to use. Here’s three more Word capabilities that you’ll find very handy.

Change the Case of your Text
HAVE YOU EVER ACCIDENTALLY WRITTEN SOMETHING ENTIRELY IN CAPS? It happens to everyone. However, many people don’t realize that you don’t have to delete everything and rewrite it. Microsoft Word has a handy feature that allows users to change the case of your text. You can choose from: Sentence case. Lowercase. UPPERCASE. Capitalize Each Word. and tOGGLE cASE.

word ib 1

Auto-Update Date & Time
Even though the majority of business correspondences are done digitally, there are still some times when you need to write a good ol’ fashioned direct mail letter. For example, many businesses like to send a welcome message/onboarding letter to new clients. These letters will probably be uniform, with some personalization for each client. Word offers some assistance in making sure the information is updated in the letter. One very handy one when working with templates is the auto-update Date & Time feature.

Under the Insert tab, click the Date & Time button and a pop-up window will appear. Click the date format you want and then be sure to click the "update automatically" box in the bottom right corner. Now the date will automatically be updated every time you open (or print) the document.

word ib 2

Get Rid of Unwanted Formatting
Most people who use Microsoft Word on a regular basis have had to deal with accidentally pasting text that held the formatting of the document you copied it from. This contagious font will even take over the rest of the document, following the formatting of what was pasted rather than your desired format.

Word has a command that you can use to Clear All Formatting. It can be found in the menu and its icon looks like the letter ‘A’ with a pink eraser. You can also use the keyboard shortcut: Ctrl+Space

word ib 3

For more great information about the software you use every day, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Social Media Saving Money Holiday Gadgets Chrome Tech Term Virtualization Managed IT Services Managed Service Microsoft Office Automation Cybercrime Operating System Artificial Intelligence Computers Facebook BYOD Mobile Device Management Health Networking Internet of Things IT Support Hacking Wi-Fi Covid-19 Managed Service Provider Alert Information Spam Office 365 Telephone Systems Remote Information Technology Router Employer-Employee Relationship Recovery Bandwidth BDR Social Engineering Mobility Data Breach Application Human Resources Law Enforcement Remote Monitoring Big Data Password Money App History Encryption Mobile Computing Applications VPN Government Blockchain Remote Computing Private Cloud Paperless Office How To Mobile Office Managed IT Apps Data Storage Patch Management Office Tips Training Website Gmail Budget Servers Settings Avoiding Downtime Two-factor Authentication Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Flexibility Vulnerability Marketing Wireless WiFi Windows 7 Word IT solutions Google Drive Entertainment HIPAA Sports Redundancy USB Keyboard Vendor Management Vendor Firewall Managed Services Display Virtual Reality Apple Staff Software as a Service Telephone System Employee/Employer Relationship Social Save Time RMM Machine Learning User Error Connectivity Remote Work Meetings Cleaning Risk Management Conferencing Hacker End of Support Physical Security Scam Education The Internet of Things Lithium-ion battery Safety Data Protection Botnet PDF IT Plan Customer Service Comparison Managed Services Provider Environment Proactive IT Unsupported Software CES Database Fax Server Best Practice IT Consultant YouTube Charger Remote Workers Business Technology Black Market Content Management Humor Access Control Compliance SaaS Processor OneNote Computer Care Current Events Virtual Assistant Document Management Telephony Authentication Hard Drive Network Congestion Solid State Drive Wireless Technology Samsung Downtime eWaste How to Value Data storage Update Computing Automobile Spam Blocking Electronic Medical Records Google Docs Wearable Technology Retail Computing Infrastructure Hard Drives Hiring/Firing Identity Theft Virus Instant Messaging Going Green Digital Signage Robot Excel Unified Threat Management Computer Accessories Biometrics Virtual Desktop Battery Augmented Reality Shadow IT Fraud Procurement Legal Business Intelligence Net Neutrality Workplace Strategy DDoS Remote Worker Audit Internet Exlporer Worker SharePoint IT Management Cryptocurrency Help Desk Printer Printing Bluetooth Video Conferencing ROI Computer Fan Cache Analyitcs Rootkit Amazon Web Services Sales Bitcoin Safe Mode Shortcuts Printer Server Programming Criminal Cryptomining Relocation Workers Hosted Computing Benefits Point of Sale Personal GDPR Supply Chain Management FENG Wireless Internet Online Shopping Monitoring Batteries Antivirus Video Games File Sharing IBM Inventory Windows 8 Smart Technology Specifications Windows 8.1 Digitize Worker Commute Flash Camera Experience Windows Server 2008 R2 IT service Wire Evernote Travel Customer relationships Scalability Software Tips Supercomputer Business Owner Sync Printers Manufacturing Emails Tablet Millennials Email Best Practices IT Assessment Domains Smart Office NarrowBand Wireless Charging Computer Tips Managed IT Service Search Security Cameras Virtual Private Network Biometric Security Maintenance iPhone Netflix Two Factor Authentication Workforce Virtual CIO OneDrive IaaS Peripheral Consultant Root Cause Analysis Bloatware Cables Knowledge Music Digital Security Cameras Using Data HBO Analytics Skype Project Management 5G Files Nanotechnology Tablets Telecommuting Copiers Quick Tip Best Available Data loss Entrepreneur Chromecast Cortana Leadership Digital Signature Troubleshooting Ergonomics WIndows 7 Outlook Smartwatch Start Menu Warranty OLED Shortcut Colocation Uninterrupted Power Supply Development PCI DSS Virtual Machine Screen Mirroring HVAC Cost Management Loyalty Google Apps Social Networking Monitor Analysis Books 2FA Fiber Optics Frequently Asked Questions Employee Messaging Mobile Administrator Cabling Windows 10s Devices Policy Hypervisor Cast Enterprise Content Management PowerPoint Reputation webinar Accountants Windows Media Player Streaming Media Emergency Dark mode Trend Micro User Running Cable Tip of the week MSP SMS Content Professional Services Microchip Default App Public Cloud Thought Leadership Memory Tech Support Employer Employee Relationship Credit Cards Procedure Saving Time Techology Password Management Laptop Assessment Password Manager Google Search Customers Multi-Factor Security dark theme Shopping Managing Stress Windows Server 2008 AI Audiobook Tools Search Engine IT Infrastructure Twitter FinTech NIST Bing Cameras Touchpad Television Business Mangement Smart Tech Science Trending Social Network Politics Investment Advertising Addiction Amazon Employees Employee/Employer Relationships Public Computer Recycling ISP Customer Relationship Management Practices Notifications Transportation Windows 365 Distributed Denial of Service Regulations Wiring

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code