Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Bookmarking Your Google Documents

Tip of the Week: Bookmarking Your Google Documents

Productivity is always an important consideration when it comes to your business’ processes. That’s why, for this week’s tip, we’re going over how to boost your productivity by adding some of your G Suite documents into your bookmarks bar.

If you use the selection of tools that Google offers as a part of its G Suite offering, you’ve probably found a few documents that you find yourself repeatedly returning to on a regular basis. Rather than navigating to them via the appropriate folder hierarchy in Google Drive, there is a simple shortcut that you can take advantage of in Google Chrome: creating a bookmark that navigates directly to the appropriate page.

This is a very simple process:

  • Access your Google Drive and open the document you want to save to your bookmarks.
  • In the Address Bar, you’ll see a star icon at the right side. Click it.
  • A small drop-down menu will appear where you can change the name of your shortcuts, and select the “Folder” that it will appear in. Select Bookmarks bar.
  • Click Done, and then the document will appear in the bookmarks bar.

There you have it, you now have a quick shortcut to one of your most-used documents. For more handy shortcuts and tips (along with some other topics), subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Quick Tips Cybersecurity Business Management Users Phishing Upgrade Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Social Media Saving Money Holiday Chrome Virtualization Gadgets Tech Term Microsoft Office Managed IT Services Managed Service Automation Cybercrime Operating System Computers Facebook Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Hacking Internet of Things Wi-Fi Managed Service Provider Spam Remote Information Office 365 Telephone Systems Alert Information Technology Covid-19 Recovery Employer-Employee Relationship Bandwidth Social Engineering Router Mobility BDR Password Application Money Human Resources Encryption Applications Big Data Remote Monitoring Law Enforcement Data Breach App History Mobile Computing VPN Apps How To Remote Computing Data Storage Patch Management Blockchain Mobile Office Paperless Office Government Private Cloud Office Tips Managed IT Training Work/Life Balance Gmail Settings Two-factor Authentication Google Drive Mouse HaaS Vulnerability Windows 7 Word Avoiding Downtime Servers Flexibility Marketing Infrastructure Voice over Internet Protocol WiFi Wireless IT solutions Entertainment Data Security Bring Your Own Device Website Data Management Budget Cleaning USB Data Protection Employee/Employer Relationship RMM Firewall End of Support Education Physical Security Virtual Reality Apple Safety Sports HIPAA Social Redundancy Conferencing Keyboard User Error Scam Staff Software as a Service Telephone System Meetings Machine Learning Connectivity Remote Work Vendor Management Risk Management Hacker Vendor Save Time Managed Services Display The Internet of Things Lithium-ion battery Remote Worker Samsung Computing Infrastructure Going Green Hard Drive Customer Service Cryptocurrency Environment IT Consultant Value Battery Fax Server Spam Blocking Electronic Medical Records Shadow IT Humor Computing Comparison Legal CES SaaS Hiring/Firing Internet Exlporer Content Management Business Technology Access Control Digital Signage Network Congestion PDF eWaste Virtual Assistant Business Intelligence Proactive IT Authentication Worker Procurement Audit Best Practice IT Management YouTube Workplace Strategy Net Neutrality Wearable Technology Black Market Virus Update Help Desk Botnet Retail Hard Drives IT Plan Instant Messaging Printing Unified Threat Management Robot Excel Computer Accessories Google Docs Document Management Unsupported Software Biometrics Wireless Technology Identity Theft Solid State Drive How to Virtual Desktop Downtime Managed Services Provider Charger Database DDoS Data storage Compliance Printer Augmented Reality Bluetooth Computer Care Remote Workers Automobile OneNote SharePoint Current Events Fraud Processor Telephony Analyitcs Computer Tips Smart Tech Managed IT Service Trending Security Cameras Root Cause Analysis HBO Programming Virtual CIO Knowledge Addiction OneDrive Music Amazon Biometric Security Recycling Skype Reputation Streaming Media Peripheral Tech Support Wiring Digital Security Cameras Practices Using Data Content Data loss Antivirus Techology Outlook Laptop Leadership Cache Copiers Troubleshooting Amazon Web Services 5G Criminal Start Menu Customers Windows 8 Safe Mode Quick Tip GDPR Ergonomics Loyalty Hosted Computing Smartwatch Audiobook IT service Screen Mirroring Frequently Asked Questions Touchpad Wireless Internet Development Books Online Shopping OLED Virtual Machine Mobile Windows 10s Tablet File Sharing PCI DSS Camera 2FA Inventory Fiber Optics Specifications Employee Politics Domains Advertising Cast Tip of the week webinar Wire Consultant Messaging Emergency Evernote Cabling Analytics Hypervisor Travel IaaS Professional Services Maintenance Public Cloud Notifications Policy Employer Employee Relationship Bloatware Printers Dark mode Assessment Trend Micro Millennials Windows Server 2008 Smart Office Best Available SMS Wireless Charging Default App Saving Time Tools Relocation Tablets WIndows 7 Procedure Entrepreneur Virtual Private Network dark theme Television Shopping Workforce Google Search Video Games AI Cables IT Infrastructure Bing Worker Commute Shortcut FinTech Cost Management Project Management Public Computer Nanotechnology Social Network Telecommuting Experience Scalability Regulations Social Networking Transportation Cortana Investment Rootkit Digital Signature PowerPoint Employee/Employer Relationships Windows Media Player Business Owner Computer Fan User Employees NarrowBand Warranty Windows 365 ISP Running Cable Search Workers HVAC Video Conferencing Benefits Google Apps ROI Analysis Bitcoin Shortcuts iPhone FENG Memory Managing Stress Sales Administrator Point of Sale IBM Devices Personal Cryptomining Flash Enterprise Content Management Supply Chain Management Smart Technology Cameras Monitoring Accountants Batteries Files MSP Software Tips Chromecast Microchip Windows 8.1 Supercomputer Thought Leadership Digitize Credit Cards Windows Server 2008 R2 Sync Emails Science Password Management Password Manager Uninterrupted Power Supply Customer relationships Multi-Factor Security Colocation Search Engine Email Best Practices Twitter IT Assessment Manufacturing Business Mangement Printer Server Distributed Denial of Service Customer Relationship Management Monitor Netflix NIST Two Factor Authentication

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code