(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Google Doc Tables to Organize Your Writing

Tip of the Week: Use Google Doc Tables to Organize Your Writing

Do you use Google Docs for your business’ word processor? It functions in largely the same way as Microsoft Word, and as such, there are various features that carry over between programs. One of these features is the table of contents, which can help you organize and sort your documents into consumable sections.

To use the table of contents, you’ll need to use the preset heading and formatting options that are located in the toolbar next to the font options. Take note that anything formatted as the title won’t be included in the table of contents.

Title Heading

You can use Heading 1 for major divisions of subject matter, including phases, chapters, and sections.

They are set to use a predetermined heading size and font, but you can change that yourself by clicking on the arrow next to the selection in the table of contents dropdown. You just have to select Update Heading to Match.

Heading 1

Once you’ve updated the heading information, you’ll see that the drop-down menu has also updated the heading options for your selection.

 Heading 1 Update 2

Just repeat the two previous steps for your other subheadings.

Header 2

Once you’ve finished changing your settings, you can tell Docs to create a table of contents. You can use Insert > Table of Contents to select a table that fits your specific needs. You can pick an option with page numbers:

Page Numbers

Page Populated

And one with hyperlinks:

Anchor Links

Anchor Links Populated

Once you’ve selected the formatting, you’ll have a simple and easy table of contents in your document.

For more great tips and tricks, subscribe to NTConnections’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 24 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP Business IT Support IT Services Email Managed Service Provider Network Security Miscellaneous Innovation Server Disaster Recovery Workplace Tips Business Continuity Network Data Software Windows Upgrade Hardware Business Management Saving Money Mobile Device Management Browser Smartphone Communication Computer Virtualization Android Save Money Managed IT Services Smartphones User Tips Microsoft Office Data Backup communications Holiday Windows 10 Outsourced IT BYOD Computers WiFi Cybercrime Small Business Ransomware Social Media Remote Monitoring Cloud Computing Operating System Hacking Chrome Big Data Mobile Computing IT Solutions Data Recovery Alert Apple Proactive IT Avoiding Downtime VPN Managed IT Services Application The Internet of Things Automation Internet of Things Quick Tips Office Information Technology Social Engineering Budget Collaboration Employer-Employee Relationship Passwords Marketing spam Cybersecurity Gadgets Recovery Telephone Systems Mobility Health BDR Bring Your Own Device Going Green Remote Computing Save Time Firewall Two-factor Authentication Vendor Management iPhone Vulnerability Bandwidth Data Security How To Compliance Managed IT App Wireless Technology Gmail IT Support User Error Data Protection Private Cloud Business Intelligence Redundancy Downtime Office 365 Document Management Data Management History Risk Management Tablet Value Retail Memory Antivirus Search Phishing Identity Theft Office Tips Networking Analytics Router Lithium-ion battery Artificial Intelligence PowerPoint Windows 10 Website Mouse Tech Term Excel Apps Phone System Content Filtering Money HaaS Mobile Device Saving Time Fax Server Administration Work/Life Balance Black Market IT Plan CES Online Currency Entertainment Running Cable Unsupported Software Skype Update Internet Exlporer Printer Data loss Unified Threat Management Data storage Public Cloud Encryption Biometrics Mobile Office Customer Relationship Management Current Events eWaste Best Available Maintenance Hard Drives HIPAA People Credit Cards Programming Network Congestion Facebook Trending DDoS Intranet Physical Security Law Enforcement Solid State Drive Robot Humor Data Storage Environment Statistics Google Drive Word Productivity Human Resources Comparison SaaS Workers Training Outlook Business Owner Safety IT Consultant Government Cleaning OneNote Flexibility IT Management Meetings Servers Entrepreneur Wireless Charging End of Support Criminal Tech Support Windows Media Player Hacker Smart Tech Workforce Company Culture Flash Windows 8.1 Update Cost Management Fiber-Optic Internet exploMicrosoft Hiring/Firing Software as a Service Shadow IT Root Cause Analysis WIndows 7 Science Insurance Telecommuting Wireless Advertising Sync Streaming Media Instant Messaging Patch Management Cables Content Management Shortcut Managing Stress Windows 8 Practices Remote Work Software Tips SharePoint Telephony Scam Unified Communications Charger Blockchain LinkedIn Google Docs Sports Print Server Virus Bluetooth Tablets Hosted Computing Monitor Hybrid Cloud Start Menu Notifications Debate Theft Computer Care Staff Voice over Internet Protocol YouTube Audit Computer Accessories USB Computer Repair Inventory Reputation Net Neutrality HBO Wearable Technology PDF Mobile Social Spam Blocking Cortana Digital Signature Video Surveillance Multi-Factor Security NarrowBand Screen Mirroring Cameras Consultant Access Control Keyboard Fraud Customers Frequently Asked Questions Google Apps Professional Services Best Practice Social Networking Education Printer Server Strategy Lifestyle Chromecast Cast Tip of the week Analyitcs Authentication Amazon Touchscreen Piracy Infrastructure Tools Computer Fan Worker Commute Analysis Applications Laptop Settings Windows Server 2008 Distributed Denial of Service User Amazon Web Services Files Licensing Password Manager Password Virtual Desktop FENG Accountants Wi-Fi Samsung Touchpad IT service Windows 7 Virtual Reality Twitter Online Shopping Relocation Colocation Business Mangement Botnet Uninterrupted Power Supply Electronic Medical Records Crowdfunding Specifications Data Warehousing Domains Regulations IaaS Bloatware Hosted Solution Evernote Computing Infrastructure Recycling Legal Travel Customer Service IoT Millennials Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to Users webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Nanotechnology Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile