Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Useful Microsoft Word Features

Tip of the Week: 3 Useful Microsoft Word Features

Microsoft Office’s Word is undoubtedly one of the most popular word processing software in the world, perhaps even the most popular. Still, there are many people who use Word on a regular basis without putting the majority of its features to use. Here’s three more Word capabilities that you’ll find very handy.

Change the Case of your Text
HAVE YOU EVER ACCIDENTALLY WRITTEN SOMETHING ENTIRELY IN CAPS? It happens to everyone. However, many people don’t realize that you don’t have to delete everything and rewrite it. Microsoft Word has a handy feature that allows users to change the case of your text. You can choose from: Sentence case. Lowercase. UPPERCASE. Capitalize Each Word. and tOGGLE cASE.

word ib 1

Auto-Update Date & Time
Even though the majority of business correspondences are done digitally, there are still some times when you need to write a good ol’ fashioned direct mail letter. For example, many businesses like to send a welcome message/onboarding letter to new clients. These letters will probably be uniform, with some personalization for each client. Word offers some assistance in making sure the information is updated in the letter. One very handy one when working with templates is the auto-update Date & Time feature.

Under the Insert tab, click the Date & Time button and a pop-up window will appear. Click the date format you want and then be sure to click the "update automatically" box in the bottom right corner. Now the date will automatically be updated every time you open (or print) the document.

word ib 2

Get Rid of Unwanted Formatting
Most people who use Microsoft Word on a regular basis have had to deal with accidentally pasting text that held the formatting of the document you copied it from. This contagious font will even take over the rest of the document, following the formatting of what was pasted rather than your desired format.

Word has a command that you can use to Clear All Formatting. It can be found in the menu and its icon looks like the letter ‘A’ with a pink eraser. You can also use the keyboard shortcut: Ctrl+Space

word ib 3

For more great information about the software you use every day, visit our blog regularly.

Do You Have a Data Backup In Place?
How Remote Monitoring and Management Can Help Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Hosted Solutions Managed IT Services Malware Disaster Recovery Google Microsoft Software VoIP Business Continuity Business Mobile Devices Email Internet Productivity Outsourced IT Data Innovation Ransomware Smartphones Cybercrime Efficiency IT Support Windows 10 Android communications Computer Hardware Data Backup Browser Cloud Computing IT Services Office Computers Server Telephone Systems Alert Saving Money Data Recovery Smartphone Business Management User Tips Mobile Device Management Windows Small Business Virtualization Cybersecurity Network Chrome BDR Quick Tips BYOD Upgrade Social Engineering Internet of Things How To Law Enforcement Managed IT Social Media Recovery Miscellaneous Mobility Workplace Tips Passwords Work/Life Balance App Private Cloud Firewall Avoiding Downtime Hacking Productivity Office Tips Microsoft Office Save Money Collaboration Holiday HaaS Office 365 Data Security Flexibility Wi-Fi Information Technology Health Redundancy VPN Data Management Bandwidth Business Intelligence Bring Your Own Device Remote Monitoring Managed Service Provider Two-factor Authentication Facebook Operating System Communication Budget Proactive IT Money Gmail Data Protection Password Phishing Automation Spam User Error Marketing Safety Apps Router Vulnerability Compliance Tech Term Managed IT Services Gadgets Data Breach Risk Management Black Market Identity Theft Big Data Employer-Employee Relationship Google Drive Windows 10 Cleaning SaaS Artificial Intelligence Value Save Time The Internet of Things Spam Blocking Entertainment Data loss Encryption Automobile Worker Public Cloud Update Wearable Technology Remote Computing Wireless Technology Legal Battery Training Mobile Device PDF Data Storage Workers Content Filtering Computing Infrastructure CES Applications Charger Physical Security Mobile Computing DDoS Electronic Medical Records Solid State Drive Credit Cards Downtime Hiring/Firing IT Management Computer Care HIPAA Meetings Word OneNote Wireless History Apple IT Plan Samsung Best Practice Patch Management Business Owner eWaste Data storage Shadow IT Unsupported Software Keyboard Government End of Support Scam Document Management Settings Internet Exlporer Comparison YouTube Online Shopping Loyalty Flash Experience Running Cable Techology Internet exploMicrosoft Transportation Infrastructure Streaming Media webinar Humor Specifications Strategy Evernote Sync Music iPhone SharePoint Advertising Software as a Service Benefits Password Manager HBO Conferencing Monitor Sports Millennials Analysis NarrowBand Assessment Telephony USB Windows 10s Smart Technology Business Mangement Screen Mirroring Accountants Notifications Frequently Asked Questions IT Support People Reputation Workforce Rootkit Television Skype Troubleshooting Fax Server Files Hybrid Cloud Google Docs Recycling Cast Excel Content Mobile Office Customer Telecommuting Chromecast Public Computer Start Menu Hosted Solution Wireless Charging Audit IT solutions Colocation Website Two Factor Authentication Criminal Education IoT Tip of the week Audiobook Remote Work Vendor Management Mobile Fiber-Optic Computer Fan Knowledge Uninterrupted Power Supply Voice over Internet Protocol Smart Tech Windows Server 2008 Politics Antivirus Hard Drives Networking Professional Services Cables FENG Video Games hacker Users Network Congestion Multi-Factor Security Content Management Data Warehousing Unified Threat Management Insurance Windows 7 Emails IBM Tools Books Unified Communications Distributed Denial of Service Scalability WiFi Virtual Reality Trending Blockchain Practices Regulations Fraud Going Green Supercomputer Emergency Theft Instant Messaging Worker Commute IT Consultant Robot Tech Support Lifestyle Employer Employee Relationship Human Resources Hosted Computing Relocation Amazon Laptop Current Events Botnet Cortana Mouse Search Leadership Computer Accessories Staff Amazon Web Services Inventory IaaS Servers Netflix Touchpad Travel Google Apps Root Cause Analysis How to Lithium-ion battery Software Tips Environment Outlook Bluetooth Digital Signature Access Control Authentication Administration Webinar Thank You IT solutions Congratulations CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!