Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Useful Microsoft Word Features

Tip of the Week: 3 Useful Microsoft Word Features

Microsoft Office’s Word is undoubtedly one of the most popular word processing software in the world, perhaps even the most popular. Still, there are many people who use Word on a regular basis without putting the majority of its features to use. Here’s three more Word capabilities that you’ll find very handy.

Change the Case of your Text
HAVE YOU EVER ACCIDENTALLY WRITTEN SOMETHING ENTIRELY IN CAPS? It happens to everyone. However, many people don’t realize that you don’t have to delete everything and rewrite it. Microsoft Word has a handy feature that allows users to change the case of your text. You can choose from: Sentence case. Lowercase. UPPERCASE. Capitalize Each Word. and tOGGLE cASE.

word ib 1

Auto-Update Date & Time
Even though the majority of business correspondences are done digitally, there are still some times when you need to write a good ol’ fashioned direct mail letter. For example, many businesses like to send a welcome message/onboarding letter to new clients. These letters will probably be uniform, with some personalization for each client. Word offers some assistance in making sure the information is updated in the letter. One very handy one when working with templates is the auto-update Date & Time feature.

Under the Insert tab, click the Date & Time button and a pop-up window will appear. Click the date format you want and then be sure to click the "update automatically" box in the bottom right corner. Now the date will automatically be updated every time you open (or print) the document.

word ib 2

Get Rid of Unwanted Formatting
Most people who use Microsoft Word on a regular basis have had to deal with accidentally pasting text that held the formatting of the document you copied it from. This contagious font will even take over the rest of the document, following the formatting of what was pasted rather than your desired format.

Word has a command that you can use to Clear All Formatting. It can be found in the menu and its icon looks like the letter ‘A’ with a pink eraser. You can also use the keyboard shortcut: Ctrl+Space

word ib 3

For more great information about the software you use every day, visit our blog regularly.

Do You Have a Data Backup In Place?
How Remote Monitoring and Management Can Help Your...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Mobile Devices Disaster Recovery Microsoft Productivity Software Email Business Continuity Business Internet Innovation Outsourced IT Data Data Backup Cybercrime Efficiency communications Smartphones Ransomware Windows 10 IT Support Computer IT Services Browser Hardware Cloud Computing Data Recovery Android BDR Internet of Things Office Telephone Systems Computers Tech Term Server Windows Alert Business Management Saving Money Upgrade User Tips Mobile Device Management Small Business Smartphone Virtualization Cybersecurity Network Quick Tips BYOD Microsoft Office Social Engineering Collaboration Save Money Managed IT Chrome Workplace Tips Law Enforcement Work/Life Balance Router Recovery Avoiding Downtime Bandwidth Private Cloud Productivity Facebook Hacking Office Tips Managed Service Provider Artificial Intelligence Holiday Communication Office 365 Password Money Social Media Miscellaneous How To Passwords App Mobility Firewall Health VPN Information Technology Redundancy Applications Business Intelligence Data Management Remote Monitoring Operating System Bring Your Own Device Gmail Two-factor Authentication Budget Proactive IT Data Protection Phishing Flexibility Data Security HaaS Wi-Fi Automation Safety Compliance Risk Management Vulnerability Mobile Device Managed IT Services Employer-Employee Relationship Data Breach Connectivity Gadgets Big Data Identity Theft Black Market Windows 10 Google Drive Word Cleaning Value User Error Marketing SaaS Blockchain Document Management Entertainment Spam Apps Access Control Sports Legal Infrastructure Update IT Support Battery Public Cloud Training Remote Computing Wireless Technology Education Analysis DDoS Content Filtering Website Data Storage Workers Charger PDF Networking Paperless Office Computing Infrastructure Meetings Electronic Medical Records Solid State Drive Wireless Mobile Computing Physical Security Apple Credit Cards Windows 7 Hiring/Firing Computer Care HIPAA eWaste IT Management CES Smart Tech Samsung Downtime OneNote IT Plan Settings Patch Management Content Management Business Owner History Keyboard Streaming Media Unsupported Software Scam Servers Best Practice Data storage Shadow IT Encryption Comparison Government Save Time End of Support Internet Exlporer Wearable Technology YouTube Automobile Spam Blocking Worker USB Data loss The Internet of Things Advertising Telephony IT solutions Windows 10s Rootkit Television Troubleshooting Wireless Internet Monitor Screen Mirroring Frequently Asked Questions NarrowBand Enterprise Content Management Strategy Workforce Content Authentication Skype Public Computer Hosted Solution Wire Password Manager Google Docs Reputation Cast Files Antivirus Excel Two Factor Authentication Password Management Telecommuting Audiobook Nanotechnology Hybrid Cloud Start Menu Audit Vendor Management Smart Office Business Mangement Customer Accountants Remote Work Colocation Tip of the week Chromecast NIST Politics Distributed Denial of Service Hard Drives Mobile WiFi Computer Fan Knowledge Video Games Recycling Voice over Internet Protocol Users Windows Server 2008 Cryptocurrency Unified Threat Management Devices Wireless Charging Professional Services FENG Uninterrupted Power Supply Data Warehousing Network Congestion IBM Books Students Scalability Criminal Multi-Factor Security Virtual Reality IoT hacker Emails Safe Mode Thought Leadership Mouse Fiber-Optic Tools Supercomputer Emergency Healthcare Instant Messaging Trending Worker Commute Fraud Regulations Employer Employee Relationship File Sharing Content Filter Cables Environment IT Consultant Current Events Electronic Health Records Lithium-ion battery Search Lifestyle Insurance Amazon Running Cable Going Green Computer Accessories Business Technology Storage Unified Communications Botnet Robot Tech Support Leadership Machine Learning How to Relocation Practices Amazon Web Services Laptop Netflix Bluetooth Virtual Assistant Loyalty Experience Techology Theft Travel SharePoint Root Cause Analysis Software Tips IaaS Transportation Human Resources Hosted Computing Online Shopping Flash Touchpad Telephone System Music Addiction Cortana Outlook People webinar Benefits Notifications Staff Specifications Inventory Evernote Internet exploMicrosoft Sync Fax Server Assessment Cache Google Apps Software as a Service Humor iPhone HBO Mobile Office Conferencing Smart Technology HVAC Digital Signature Millennials Thank You Congratulations Administration Webinar IT solutions CrashOverride Twitter Company Culture Managing Stress

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!