(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Useful Microsoft Word Features

Tip of the Week: 3 Useful Microsoft Word Features

Microsoft Office’s Word is undoubtedly one of the most popular word processing software in the world, perhaps even the most popular. Still, there are many people who use Word on a regular basis without putting the majority of its features to use. Here’s three more Word capabilities that you’ll find very handy.

Change the Case of your Text
HAVE YOU EVER ACCIDENTALLY WRITTEN SOMETHING ENTIRELY IN CAPS? It happens to everyone. However, many people don’t realize that you don’t have to delete everything and rewrite it. Microsoft Word has a handy feature that allows users to change the case of your text. You can choose from: Sentence case. Lowercase. UPPERCASE. Capitalize Each Word. and tOGGLE cASE.

word ib 1

Auto-Update Date & Time
Even though the majority of business correspondences are done digitally, there are still some times when you need to write a good ol’ fashioned direct mail letter. For example, many businesses like to send a welcome message/onboarding letter to new clients. These letters will probably be uniform, with some personalization for each client. Word offers some assistance in making sure the information is updated in the letter. One very handy one when working with templates is the auto-update Date & Time feature.

Under the Insert tab, click the Date & Time button and a pop-up window will appear. Click the date format you want and then be sure to click the "update automatically" box in the bottom right corner. Now the date will automatically be updated every time you open (or print) the document.

word ib 2

Get Rid of Unwanted Formatting
Most people who use Microsoft Word on a regular basis have had to deal with accidentally pasting text that held the formatting of the document you copied it from. This contagious font will even take over the rest of the document, following the formatting of what was pasted rather than your desired format.

Word has a command that you can use to Clear All Formatting. It can be found in the menu and its icon looks like the letter ‘A’ with a pink eraser. You can also use the keyboard shortcut: Ctrl+Space

word ib 3

For more great information about the software you use every day, visit our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Backup Internet Malware Google Mobile Devices Efficiency VoIP IT Support Business Email Network Security IT Services Managed Service Provider Miscellaneous Workplace Tips Innovation Server Data Upgrade Disaster Recovery Business Continuity Network Business Management Software Windows Managed IT Services Saving Money Hardware Communication Computer Save Money Android Mobile Device Management Virtualization Browser Smartphone User Tips Data Backup Smartphones communications Holiday Cybercrime Microsoft Office Outsourced IT Internet of Things BYOD Windows 10 WiFi Computers Cloud Computing Hacking Chrome Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Collaboration IT Solutions VPN Managed IT Services Alert Application Apple Automation Proactive IT Avoiding Downtime Budget The Internet of Things Quick Tips Tech Term Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Remote Computing Mobility Health Bring Your Own Device Recovery spam Cybersecurity Gadgets Telephone Systems Bandwidth Artificial Intelligence Managed IT Going Green Wireless Technology Office 365 User Error IT Support Two-factor Authentication Data Protection Document Management Vendor Management Business Intelligence Website iPhone Money Save Time Firewall App Gmail Router Private Cloud Vulnerability Compliance How To Data Security Redundancy Apps Law Enforcement Data Management Productivity Risk Management Word Windows 10 PowerPoint Connectivity Excel Phone System Antivirus Content Filtering Office Tips Downtime Facebook History Tablet Entertainment Lithium-ion battery Analytics Value Retail Memory Search Phishing Identity Theft Networking Mouse HaaS Education IT Consultant Fax Server Black Market Solid State Drive Applications Humor Infrastructure Saving Time Statistics Data Storage Streaming Media Analysis Internet Exlporer Online Currency Workers Data storage Comparison Encryption Biometrics Outlook Windows 7 Sports Business Owner eWaste Printer OneNote USB YouTube Flexibility Hard Drives IT Management Mobile Device Current Events Administration Servers Work/Life Balance Maintenance IT Plan Smart Tech Running Cable Physical Security DDoS CES Data loss Skype Unsupported Software Unified Threat Management Robot Google Drive Public Cloud Mobile Office Environment Content Management Update Customer Relationship Management Intranet Human Resources SaaS Best Available Training People Safety HIPAA Government Programming Network Congestion Credit Cards Cleaning Meetings Trending Screen Mirroring Entrepreneur Digital Signature Multi-Factor Security Fraud Wireless Internet Frequently Asked Questions Tech Support Printer Server Access Control Hacker Google Apps Professional Services Cast Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Authentication Amazon Wire Tip of the week Shadow IT User Wireless Files Science Tools Password Instant Messaging Company Culture Licensing FENG Nanotechnology Amazon Web Services Smart Office Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut SharePoint Colocation Twitter Windows 8 Password Manager Electronic Medical Records Accountants Bluetooth Online Shopping Paperless Office Crowdfunding Hosted Solution Computing Infrastructure Tablets Business Mangement Botnet Monitor Specifications Data Warehousing Notifications Legal Devices Evernote Students Regulations Reputation Wearable Technology End of Support Recycling Travel Print Server Millennials Windows Media Player Social IoT Wireless Charging Healthcare NarrowBand Customers Internet exploMicrosoft Criminal Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Best Practice Social Networking WIndows 7 Fiber-Optic Electronic Health Records Flash Chromecast Patch Management Advertising Analyitcs Software as a Service Telecommuting Content Filter Insurance Managing Stress Settings Cables Machine Learning Sync Laptop Scam Distributed Denial of Service Touchscreen Remote Work Storage LinkedIn Charger Software Tips Virus Virtual Desktop Practices IT service Unified Communications HVAC Telephony Touchpad Relocation Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Addiction Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Domains Theft Start Menu Audit IaaS PDF Bloatware Staff Spam Blocking Voice over Internet Protocol Cache Video Surveillance HBO Cameras Customer Service Inventory Consultant Cortana Mobile Keyboard Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Books Emails CrashOverride IBM Emergency Webinar Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing