Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Google Doc Tables to Organize Your Writing

Tip of the Week: Use Google Doc Tables to Organize Your Writing

Do you use Google Docs for your business’ word processor? It functions in largely the same way as Microsoft Word, and as such, there are various features that carry over between programs. One of these features is the table of contents, which can help you organize and sort your documents into consumable sections.

To use the table of contents, you’ll need to use the preset heading and formatting options that are located in the toolbar next to the font options. Take note that anything formatted as the title won’t be included in the table of contents.

Title Heading

You can use Heading 1 for major divisions of subject matter, including phases, chapters, and sections.

They are set to use a predetermined heading size and font, but you can change that yourself by clicking on the arrow next to the selection in the table of contents dropdown. You just have to select Update Heading to Match.

Heading 1

Once you’ve updated the heading information, you’ll see that the drop-down menu has also updated the heading options for your selection.

 Heading 1 Update 2

Just repeat the two previous steps for your other subheadings.

Header 2

Once you’ve finished changing your settings, you can tell Docs to create a table of contents. You can use Insert > Table of Contents to select a table that fits your specific needs. You can pick an option with page numbers:

Page Numbers

Page Populated

And one with hyperlinks:

Anchor Links

Anchor Links Populated

Once you’ve selected the formatting, you’ll have a simple and easy table of contents in your document.

For more great tips and tricks, subscribe to Total Tech Care’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Quick Tips Cybersecurity Business Management Users Phishing Upgrade Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Social Media Saving Money Holiday Chrome Virtualization Gadgets Tech Term Microsoft Office Managed IT Services Managed Service Automation Cybercrime Operating System Computers Facebook Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Hacking Internet of Things Wi-Fi Covid-19 Managed Service Provider Spam Information Remote Office 365 Telephone Systems Alert Information Technology Recovery Employer-Employee Relationship Bandwidth Social Engineering Router Mobility BDR Password Application Money Human Resources Encryption Applications Big Data Remote Monitoring Law Enforcement Data Breach App History Mobile Computing VPN Apps How To Remote Computing Data Storage Patch Management Blockchain Mobile Office Paperless Office Government Private Cloud Office Tips Managed IT Training Work/Life Balance Gmail Settings Two-factor Authentication Google Drive Mouse HaaS Vulnerability Windows 7 Word Avoiding Downtime Servers Flexibility Marketing Infrastructure Voice over Internet Protocol WiFi Wireless IT solutions Entertainment Data Security Bring Your Own Device Website Data Management Budget Cleaning USB Data Protection Employee/Employer Relationship Firewall End of Support RMM Education Physical Security Virtual Reality Apple Safety Sports HIPAA Social Redundancy Conferencing Keyboard User Error Scam Staff Software as a Service Telephone System Meetings Machine Learning Connectivity Remote Work Vendor Management Risk Management Hacker Save Time Vendor The Internet of Things Managed Services Lithium-ion battery Display Remote Worker Samsung Computing Infrastructure Going Green Processor Customer Service Cryptocurrency Environment IT Consultant Value Hard Drive Battery Fax Server Spam Blocking Electronic Medical Records Shadow IT Humor Comparison Legal CES SaaS Hiring/Firing Computing Internet Exlporer Content Management Business Technology Access Control Network Congestion PDF eWaste Digital Signage Virtual Assistant Business Intelligence Proactive IT Authentication Worker Audit Best Practice IT Management YouTube Wearable Technology Black Market Procurement Virus Net Neutrality Update Botnet Retail Workplace Strategy Hard Drives IT Plan Instant Messaging Unified Threat Management Help Desk Robot Excel Computer Accessories Printing Google Docs Document Management Unsupported Software Biometrics Wireless Technology Identity Theft Solid State Drive How to Virtual Desktop Downtime Charger Managed Services Provider DDoS Data storage Compliance Printer Augmented Reality Bluetooth Computer Care Database Automobile OneNote SharePoint Current Events Fraud Telephony Remote Workers Analyitcs IT Assessment Smart Tech Manufacturing Trending Root Cause Analysis Email Best Practices HBO Programming Knowledge Addiction Music Amazon Recycling Security Cameras Skype Reputation Computer Tips Streaming Media Managed IT Service Tech Support Wiring OneDrive Practices Biometric Security Content Data loss Virtual CIO Antivirus Techology Outlook Laptop Leadership Peripheral Cache Troubleshooting Amazon Web Services Criminal Start Menu Customers Digital Security Cameras Windows 8 Safe Mode Using Data GDPR Loyalty Copiers Hosted Computing 5G Audiobook IT service Screen Mirroring Frequently Asked Questions Touchpad Quick Tip Wireless Internet Books Online Shopping Smartwatch Mobile Windows 10s Ergonomics Tablet File Sharing Camera Development Inventory OLED Specifications Politics Domains Advertising Cast Tip of the week webinar PCI DSS Wire Consultant Emergency Virtual Machine Evernote Fiber Optics Analytics Employee Travel IaaS Professional Services Maintenance Public Cloud 2FA Notifications Employer Employee Relationship Bloatware Printers Assessment Messaging Cabling Millennials Windows Server 2008 Policy Smart Office Best Available Hypervisor Wireless Charging Trend Micro Tools Relocation Dark mode Tablets WIndows 7 Entrepreneur Virtual Private Network Television SMS Default App Workforce Video Games Procedure Saving Time Cables Shopping Google Search Worker Commute Shortcut dark theme Cost Management Project Management Public Computer AI Nanotechnology IT Infrastructure Telecommuting Experience Bing Scalability Regulations Social Networking FinTech Transportation Cortana Rootkit Social Network Digital Signature PowerPoint Windows Media Player Business Owner Computer Fan User NarrowBand Warranty Investment Running Cable Search Workers Employees HVAC Benefits Employee/Employer Relationships Google Apps Analysis ISP iPhone FENG Windows 365 Memory Managing Stress Administrator IBM Video Conferencing Devices ROI Shortcuts Flash Sales Enterprise Content Management Smart Technology Bitcoin Cameras Personal Accountants Cryptomining Files Point of Sale MSP Software Tips Chromecast Microchip Supercomputer Supply Chain Management Thought Leadership Credit Cards Sync Emails Monitoring Science Password Management Batteries Password Manager Uninterrupted Power Supply Digitize Multi-Factor Security Colocation Windows 8.1 Search Engine Twitter Windows Server 2008 R2 Business Mangement Printer Server Distributed Denial of Service Customer Relationship Management Monitor Netflix Customer relationships NIST Two Factor Authentication

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code