crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 More Useful Microsoft Word Features

Microsoft Word has long since established itself as the primary word processing software in the business world, but even some power users don’t necessarily know about all of the hidden features that exist in it. Here are three of the best Word capabilities that you’ll be sure to use next time you’re in a pinch.

Changing the Case of Your Text
Sometimes you might be typing something and accidentally hit the Caps Lock key instead of Shift. Instead of deleting everything and retyping it, you can simply use a new Microsoft Word feature that lets you choose the case of your new text. You can select Sentence case, Lower-case, and Uppercase, as well as Capitalize Each Word and tOGGLE cASE.

word ib 1

Automatically Update the Date and Time
Most businesses will use digital correspondence, but there are times when you’ll have to use direct mail. Most organizations will send out a welcome letter to new clients via traditional postage, with some personalization to match the client. Word can be used to make sure that the information offered in the latter is updated automatically. You can set your templates to auto-update with the current date and time.

In the Insert tab, click on the Date & Time button. This will open up a pop-up window. Next, just click on the date format and select the Update Automatically box in the bottom-right corner. Your date will automatically be updated every time you open or try to print the document.

word ib 2

Eliminate Unwanted Formatting
When you copy and paste text from a source, it retains the formatting of the original document. If you’re not careful, this text could persist throughout the remainder of your document edits. Thankfully, there is a very simple fix to this issue. Microsoft Word has a keyboard command that you can use to eliminate formatting, and it’s Ctrl + Space. Better yet, you can just use the little eraser button in Word’s settings to eliminate formatting.

word ib 3

Want even more great tips and tricks? Visit our blog regularly for more technology-related tips.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 18 December 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips Hosted Solutions IT Services Hackers Backup Email Malware Business Software Data Mobile Devices Hardware IT Support Small Business Network Communication Server Smartphones Upgrade VoIP Computer Business Continuity Mobile Device Management Innovation Google Windows Efficiency Data Backup Disaster Recovery Virtualization Microsoft Office Outsourced IT Tech Term Miscellaneous Mobile Office Holiday Network Security Vendor Management Social Media Productivity Gadgets BYOD User Tips Quick Tips Passwords Mobile Computing Android Smartphone Browser Internet of Things Data Recovery Managed IT services WiFi Bring Your Own Device Windows 10 Remote Monitoring The Internet of Things Operating System Best Practice Ransomware Users Spam Data Management Collaboration Save Money Trending Apple Remote Computing Artificial Intelligence Wireless Technology Alert Office Going Green Encryption Firewall Content Filtering Customer Relationship Management History Gmail Unified Threat Management Big Data Printer Tech Support Analytics IT Solutions Lithium-ion Battery Facebook IT Support Information Technology Current Events IT Consultant Managed IT Services Antivirus Maintenance App Cloud Computing Managed IT Router Humor Applications Two-factor Authentication Saving Time Avoiding Downtime Phishing Bandwidth Document Management Hard Drives Mobile Device Paperless Office Wi-Fi Employer-Employee Relationship Windows 8 Website Customer Service Phone System Healthcare Government Apps Compliance Automation Application Virus Office Tips Retail Fax Server IT service Digital Payment Project Management Cybersecurity Outlook Chrome Health Business Growth VPN Risk Management Marketing Excel Hacking Computers Downtime Infrastructure Administration Augmented Reality Presentation Budget Vulnerability Training Computer Repair Proactive IT Information Point of Sale Blockchain Regulations Recovery Managed Service Mouse Money BDR Help Desk Files Running Cable Social User Error Net Neutrality Licensing Co-Managed IT Wireless File Sharing PowerPoint Social Networking Unified Communications Tablet Windows 10 Office 365 Data Security Scam iPhone Password Inbound Marketing Business Intelligence Competition Network Congestion Recycling eWaste Search Virtual Desktop USB Piracy Business Owner Remote Workers Sports Hacker User Programming Data loss HIPAA Twitter Company Culture Analyitcs Education Redundancy Safety Specifications Hosted Solution IBM Settings Flexibility Machine Learning Cost Management Data storage Cybercrime communications Save Time IT Management Internet Exlporer Wearable Technology Remote Monitoring and Management Storage Conferencing Mobility Smart Technology Robot Hiring/Firing Mobile Security Printing Display Alerts IoT End of Support LiFi Computing Statistics Tip of the week Intranet Utility Computing Backup and Disaster Recovery Scheduling Congratulations Break Fix Fun Writing LinkedIn SaaS Techology Word Law Firm IT High-Speed Internet Video Surveillance Server Management Computing Infrastructure Cyberattacks Legislation Public Speaking Drones Windows 8.1 Update OneNote Best Available Buisness Human Error Dark Web Cortana Social Engineering Chromebook Disaster Resistance Identities Development Cooperation Motherboard Read Only G Suite Backups Employee-Employer Relationship Environment CIO Hard Drive Permission Data Warehousing Knowledge IT Consulting Solid State Drive Bluetooth Cables Patch Management Staff Samsung Modem Bookmarks Travel Software as a Service Legal Online Currency Troubleshooting Debate Cache Test Microsoft Excel Experience Politics Data Breach Heating/Cooling Alt Codes Wires Computer Accessories Operations Crowdfunding Cookies Favorites Macro Meetings Technology Tips Consumers YouTube Management RMM Telephony Technology Laws Typing Virtual Private Network Nanotechnology Instant Messaging Comparison IP Address Google Drive Enterprise Resource Planning Tech Terms How To Permissions How To Unified Threat Management Refrigeration Cryptocurrency Disaster MSP Gaming Console Touchscreen IT Technicians Monitoring Screen Reader Finance Identity Theft Black Friday Google Docs Mobile Theft Assessment Fraud Access Control Bitcoin Digital Signature Proactive Mirgation Consulting Memory Smart Tech Authentication Cyber Monday Managing Stress Financial Laptop Private Cloud SharePoint Hacks Managed Services Provider Connectivity Authorization Documents Entrepreneur Enterprise Content Management Adminstration Network Management Halloween Electronic Medical Records Business Technology E-Commerce PC Care Public Cloud Downloads Undo WPA3 3D Migration Value People Employees Distributed Denial of Service 5G PDF Vulnerabilities eBay Hotspot Scary Stories Networking Chatbots Features Leadership Sync Multi-Factor Security Fleet Tracking Remote Support Streaming Media Star Wars Zero-Day Threat New Additions Software Tips Managed IT Service Monitors Skype Virtual Reality Deep Learning Print Server Geography Text Messaging Language Identity Electronic Health Records Mobile Device Managment Google Calendar Domains Google Wallet Asset Tracking Work Station

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code