Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Bookmarking Your Google Documents

Tip of the Week: Bookmarking Your Google Documents

Productivity is always an important consideration when it comes to your business’ processes. That’s why, for this week’s tip, we’re going over how to boost your productivity by adding some of your G Suite documents into your bookmarks bar.

If you use the selection of tools that Google offers as a part of its G Suite offering, you’ve probably found a few documents that you find yourself repeatedly returning to on a regular basis. Rather than navigating to them via the appropriate folder hierarchy in Google Drive, there is a simple shortcut that you can take advantage of in Google Chrome: creating a bookmark that navigates directly to the appropriate page.

This is a very simple process:

  • Access your Google Drive and open the document you want to save to your bookmarks.
  • In the Address Bar, you’ll see a star icon at the right side. Click it.
  • A small drop-down menu will appear where you can change the name of your shortcuts, and select the “Folder” that it will appear in. Select Bookmarks bar.
  • Click Done, and then the document will appear in the bookmarks bar.

There you have it, you now have a quick shortcut to one of your most-used documents. For more handy shortcuts and tips (along with some other topics), subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Tech Term Virtualization Social Media Saving Money Holiday Gadgets Chrome Automation Managed IT Services Managed Service Microsoft Office Facebook Computers Cybercrime Operating System Artificial Intelligence BYOD Health Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Information Technology Remote Spam Managed Service Provider Information Office 365 Alert Covid-19 Telephone Systems Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility App History Password Money Mobile Computing Encryption Applications Application Human Resources Law Enforcement Data Breach Remote Monitoring Big Data Office Tips How To Training Apps VPN Data Storage Patch Management Remote Computing Government Blockchain Paperless Office Mobile Office Private Cloud Managed IT Work/Life Balance Wireless Flexibility Marketing WiFi Gmail IT solutions Entertainment Settings Website Google Drive Budget Vulnerability Two-factor Authentication Windows 7 Word Avoiding Downtime Mouse HaaS Servers Infrastructure Data Security Bring Your Own Device Voice over Internet Protocol Data Management Cleaning Employee/Employer Relationship The Internet of Things RMM Lithium-ion battery End of Support Data Protection Physical Security Education Safety Firewall HIPAA Sports USB Redundancy Conferencing Keyboard Virtual Reality Scam Apple Social Telephone System Staff Software as a Service User Error Machine Learning Vendor Management Vendor Meetings Remote Work Connectivity Managed Services Save Time Display Risk Management Hacker Computing Infrastructure Hard Drive Samsung Unified Threat Management Augmented Reality Going Green Fraud DDoS Computer Accessories Value SharePoint Remote Worker Computing Spam Blocking Electronic Medical Records Battery Cryptocurrency Shadow IT Legal Hiring/Firing Customer Service Printer Environment Internet Exlporer Bluetooth Digital Signage Comparison Fax Server PDF CES SaaS Business Technology Business Intelligence Procurement Content Management Proactive IT IT Consultant Workplace Strategy Access Control Net Neutrality Audit Best Practice Worker Humor Virtual Assistant IT Management YouTube Help Desk Network Congestion eWaste Printing Authentication Black Market Botnet IT Plan Managed Services Provider Document Management Solid State Drive Unsupported Software Wireless Technology Update Database Wearable Technology How to Downtime Charger Retail Hard Drives Instant Messaging Remote Workers Google Docs Identity Theft Compliance Robot Excel Data storage OneNote Processor Computer Care Automobile Biometrics Current Events Virtual Desktop Virus Telephony Peripheral Windows Media Player Password Management Root Cause Analysis Password Manager User PowerPoint Music Digital Security Cameras HBO Using Data Knowledge Multi-Factor Security Reputation 5G Streaming Media Search Engine Science Skype Copiers Twitter Content Quick Tip NIST Data loss Business Mangement Tech Support Managing Stress Troubleshooting Ergonomics Techology Outlook Smart Tech Laptop Leadership Smartwatch Trending Customers OLED Amazon Distributed Denial of Service Customer Relationship Management Cameras Start Menu Development Addiction Audiobook Analyitcs PCI DSS Screen Mirroring Virtual Machine Recycling Loyalty Books Programming 2FA Wiring Frequently Asked Questions Fiber Optics Practices Touchpad Employee Windows 10s Cabling Amazon Web Services Mobile Messaging Cache Politics Policy Safe Mode Advertising Cast Hypervisor Criminal Emergency Antivirus Dark mode GDPR Tip of the week Trend Micro Hosted Computing webinar Public Cloud Default App Online Shopping Notifications Employer Employee Relationship Printer Server Windows 8 Professional Services SMS Wireless Internet Procedure File Sharing Saving Time Assessment IT service dark theme Camera Windows Server 2008 Shopping Inventory Google Search Specifications Wire Relocation IT Infrastructure Evernote Tablet Tools AI FinTech Television Bing Travel Domains Millennials Printers Video Games Social Network Smart Office Investment Wireless Charging IaaS Maintenance Worker Commute Experience Bloatware Employees Employee/Employer Relationships Public Computer Workforce Transportation Windows 365 Virtual Private Network Scalability Regulations ISP Video Conferencing Computer Fan ROI Cables Rootkit Business Owner Tablets Entrepreneur Sales Bitcoin NarrowBand Shortcuts Cryptomining Telecommuting Benefits Consultant Point of Sale Project Management Search Personal Nanotechnology Workers Supply Chain Management iPhone FENG Cortana Shortcut Analytics Cost Management Monitoring Batteries Digital Signature IBM Smart Technology Best Available Social Networking Windows 8.1 Warranty Flash Digitize HVAC Files Windows Server 2008 R2 Google Apps WIndows 7 Customer relationships Software Tips Analysis Chromecast Supercomputer Manufacturing Running Cable Email Best Practices Administrator Sync IT Assessment Devices Emails Memory Enterprise Content Management Colocation Uninterrupted Power Supply Computer Tips MSP Managed IT Service Accountants Security Cameras Netflix Biometric Security Credit Cards Two Factor Authentication Virtual CIO Microchip OneDrive Thought Leadership Monitor

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code