Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Google Doc Tables to Organize Your Writing

Tip of the Week: Use Google Doc Tables to Organize Your Writing

Do you use Google Docs for your business’ word processor? It functions in largely the same way as Microsoft Word, and as such, there are various features that carry over between programs. One of these features is the table of contents, which can help you organize and sort your documents into consumable sections.

To use the table of contents, you’ll need to use the preset heading and formatting options that are located in the toolbar next to the font options. Take note that anything formatted as the title won’t be included in the table of contents.

Title Heading

You can use Heading 1 for major divisions of subject matter, including phases, chapters, and sections.

They are set to use a predetermined heading size and font, but you can change that yourself by clicking on the arrow next to the selection in the table of contents dropdown. You just have to select Update Heading to Match.

Heading 1

Once you’ve updated the heading information, you’ll see that the drop-down menu has also updated the heading options for your selection.

 Heading 1 Update 2

Just repeat the two previous steps for your other subheadings.

Header 2

Once you’ve finished changing your settings, you can tell Docs to create a table of contents. You can use Insert > Table of Contents to select a table that fits your specific needs. You can pick an option with page numbers:

Page Numbers

Page Populated

And one with hyperlinks:

Anchor Links

Anchor Links Populated

Once you’ve selected the formatting, you’ll have a simple and easy table of contents in your document.

For more great tips and tricks, subscribe to Total Tech Care’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Upgrade Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Gadgets Chrome Tech Term Social Media Virtualization Managed IT Services Managed Service Microsoft Office Automation Operating System Facebook Artificial Intelligence Computers Cybercrime BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Health Spam Information Office 365 Covid-19 Managed Service Provider Telephone Systems Alert Information Technology Remote Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Applications Application Remote Monitoring Law Enforcement Big Data App History Password Money Mobile Computing Data Breach Human Resources Encryption Remote Computing Blockchain Mobile Office Paperless Office Government How To Private Cloud Office Tips Training Managed IT Data Storage Patch Management VPN Apps Google Drive Mouse HaaS Data Security Avoiding Downtime Infrastructure Voice over Internet Protocol Wireless Bring Your Own Device Vulnerability Data Management Gmail Work/Life Balance Flexibility Windows 7 Word Marketing Settings WiFi IT solutions Servers Entertainment Two-factor Authentication Website Budget Safety Apple USB Sports HIPAA Social Redundancy Keyboard Vendor User Error Staff Software as a Service Telephone System Meetings Managed Services Machine Learning Display Connectivity Remote Work Risk Management Hacker Employee/Employer Relationship Save Time RMM Conferencing The Internet of Things Lithium-ion battery Cleaning Scam Data Protection Firewall End of Support Vendor Management Education Physical Security Virtual Reality Help Desk Charger Printing Business Technology Content Management Access Control Compliance Network Congestion PDF OneNote Computer Care eWaste IT Consultant Current Events Virtual Assistant Telephony Managed Services Provider Proactive IT Authentication Humor Samsung Database Best Practice YouTube Remote Workers Black Market Value Wearable Technology Update Retail Hard Drives Processor Spam Blocking Electronic Medical Records Instant Messaging Robot Excel Google Docs Document Management Hard Drive Wireless Technology Hiring/Firing Identity Theft Biometrics Solid State Drive Virtual Desktop How to Downtime Computing Data storage DDoS Automobile Virus Augmented Reality Fraud SharePoint Unified Threat Management Business Intelligence Computing Infrastructure Computer Accessories Remote Worker Going Green Audit Worker Customer Service IT Management Cryptocurrency Digital Signage Environment Botnet Fax Server Battery IT Plan Shadow IT Comparison Printer Legal Procurement Bluetooth SaaS Workplace Strategy Unsupported Software Net Neutrality CES Internet Exlporer Employees Employee/Employer Relationships Wire Evernote IaaS Travel Maintenance Windows 365 Software Tips ISP Notifications Supercomputer Sync Printers ROI Emails Millennials Bloatware Video Conferencing Sales Bitcoin Smart Office Shortcuts Wireless Charging Point of Sale Tablets Personal Relocation Cryptomining Virtual Private Network Netflix Two Factor Authentication Workforce Entrepreneur Supply Chain Management Monitoring Video Games Batteries Root Cause Analysis Cables Knowledge Music Shortcut Windows 8.1 Worker Commute Digitize HBO Skype Project Management Windows Server 2008 R2 Nanotechnology Telecommuting Experience Cost Management Social Networking Customer relationships Scalability Data loss Cortana Leadership Digital Signature Troubleshooting Email Best Practices Business Owner Consultant IT Assessment Outlook Manufacturing Start Menu Warranty NarrowBand Analytics Computer Tips Search Managed IT Service Screen Mirroring HVAC Security Cameras Loyalty Google Apps Running Cable Analysis Books Virtual CIO Best Available Memory OneDrive iPhone Frequently Asked Questions Biometric Security Mobile Administrator Windows 10s Devices WIndows 7 Peripheral Digital Security Cameras Using Data Cast Enterprise Content Management webinar Accountants Emergency Copiers Files Tip of the week MSP 5G Professional Services Microchip Chromecast Public Cloud Thought Leadership Employer Employee Relationship Credit Cards Quick Tip Ergonomics Science Password Management Smartwatch Assessment Password Manager Multi-Factor Security Development Colocation Windows Server 2008 OLED Uninterrupted Power Supply PowerPoint Tools Search Engine Virtual Machine Windows Media Player Twitter User PCI DSS Customer Relationship Management 2FA Fiber Optics Monitor NIST Employee Television Business Mangement Distributed Denial of Service Smart Tech Trending Analyitcs Messaging Cabling Hypervisor Addiction Amazon Managing Stress Programming Policy Dark mode Trend Micro Reputation Streaming Media Public Computer Recycling Tech Support Practices Transportation Content SMS Cameras Regulations Wiring Default App Procedure Techology Saving Time Laptop Computer Fan Cache Rootkit Amazon Web Services Antivirus dark theme Windows 8 Shopping Customers Safe Mode Google Search Criminal IT Infrastructure Workers Hosted Computing Benefits IT service Audiobook AI GDPR FinTech Touchpad FENG Wireless Internet Bing Online Shopping Tablet Social Network File Sharing IBM Investment Inventory Smart Technology Specifications Domains Politics Advertising Printer Server Flash Camera

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code