(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Google Doc Tables to Organize Your Writing

Do you use Google Docs for your business’ word processor? It functions in largely the same way as Microsoft Word, and as such, there are various features that carry over between programs. One of these features is the table of contents, which can help you organize and sort your documents into consumable sections.

To use the table of contents, you’ll need to use the preset heading and formatting options that are located in the toolbar next to the font options. Take note that anything formatted as the title won’t be included in the table of contents.

Title Heading

You can use Heading 1 for major divisions of subject matter, including phases, chapters, and sections.

They are set to use a predetermined heading size and font, but you can change that yourself by clicking on the arrow next to the selection in the table of contents dropdown. You just have to select Update Heading to Match.

Heading 1

Once you’ve updated the heading information, you’ll see that the drop-down menu has also updated the heading options for your selection.

 Heading 1 Update 2

Just repeat the two previous steps for your other subheadings.

Header 2

Once you’ve finished changing your settings, you can tell Docs to create a table of contents. You can use Insert > Table of Contents to select a table that fits your specific needs. You can pick an option with page numbers:

Page Numbers

Page Populated

And one with hyperlinks:

Anchor Links

Anchor Links Populated

Once you’ve selected the formatting, you’ll have a simple and easy table of contents in your document.

For more great tips and tricks, subscribe to NTConnections’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Business Continuity Workplace Tips Network Innovation Data Upgrade Disaster Recovery Software Hardware Email Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management Smartphones Browser User Tips Microsoft Office Network Security Virtualization WiFi Smartphone Managed IT Services Holiday Android Windows 10 Operating System Mobile Computing communications Hacking BYOD Social Media Remote Monitoring Avoiding Downtime Computers IT Solutions Cybercrime Chrome Small Business Apple Application Proactive IT Outsourced IT Passwords Marketing Office Budget Collaboration The Internet of Things Alert Big Data Quick Tips Ransomware Data Backup Information Technology Automation Employer-Employee Relationship Going Green Remote Computing Mobility Health Bring Your Own Device VPN Managed IT Services Recovery spam Social Engineering Managed IT Wireless Technology User Error Vendor Management iPhone Gadgets Save Time Cybersecurity Firewall Telephone Systems App Retail Memory Search Private Cloud Bandwidth Compliance Networking Mouse Redundancy Office 365 IT Support PowerPoint Website Antivirus Excel Phone System Office Tips Content Filtering Downtime Router History Analytics Tablet Gmail Lithium-ion battery Physical Security DDoS Value Unified Threat Management Robot Skype Unsupported Software BDR Intranet Google Drive Public Cloud Mobile Office Environment Customer Relationship Management Artificial Intelligence Phishing How To Vulnerability SaaS Best Available Data Security Safety People Programming Government Network Congestion Meetings Apps IT Consultant Trending HaaS Fax Server Cloud Computing Black Market Law Enforcement Saving Time Data Management Solid State Drive Humor Two-factor Authentication Document Management Internet of Things Risk Management Statistics Online Currency Data Storage Internet Exlporer Word Data storage Windows 10 Printer Biometrics Outlook Business Owner Flexibility Current Events Money Hard Drives Maintenance Facebook Administration Data Recovery Entertainment Running Cable Software as a Service Patch Management Advertising Analyitcs Data loss Laptop Managing Stress Settings Touchscreen Sync Update Scam Distributed Denial of Service Virus Virtual Desktop LinkedIn Software Tips Touchpad IT service Human Resources Telephony Debate Google Docs Relocation Hybrid Cloud Virtual Reality Computer Accessories Training Computer Care Uninterrupted Power Supply HIPAA Domains Start Menu Spam Blocking Voice over Internet Protocol Audit IaaS Bloatware Cameras Customer Service Video Surveillance HBO Cleaning Consultant Mobile Education Multi-Factor Security Screen Mirroring Entrepreneur Printer Server Frequently Asked Questions Tech Support Hacker Professional Services Piracy Computer Fan Lifestyle Cast Worker Commute Cost Management Company Culture Tip of the week Shadow IT Applications User Wireless Files Science Windows 8.1 Update Tools Licensing FENG Data Protection Productivity Streaming Media Instant Messaging Shortcut Samsung Windows Server 2008 Wi-Fi SharePoint Colocation Twitter Windows 8 Workers Business Intelligence Encryption Bluetooth Crowdfunding Windows 7 Sports Botnet Monitor Hosted Solution eWaste Computing Infrastructure Tablets OneNote Print Server Data Warehousing Notifications USB Regulations YouTube Travel Reputation Wearable Technology End of Support IT Management Windows Media Player Social NarrowBand Work/Life Balance Net Neutrality Computer Repair Servers Customers Internet exploMicrosoft Social Networking Hiring/Firing Root Cause Analysis IT Plan Best Practice Chromecast WIndows 7 Flash IT solutions Rootkit Video Games Audiobook Knowledge Netflix Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Keyboard Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Comparison Electronic Medical Records Techology Public Computer Specifications Employer Employee Relationship Legal Automobile Data Breach Emails Books CrashOverride Mobile Device IBM Users Webinar Emergency Worker Content Supercomputer