Tip of the Week: 3 More Useful Microsoft Word Features

Tip of the Week: 3 More Useful Microsoft Word Features

Microsoft Word has long since established itself as the primary word processing software in the business world, but even some power users don’t necessarily know about all of the hidden features that exist in it. Here are three of the best Word capabilities that you’ll be sure to use next time you’re in a pinch.

Changing the Case of Your Text
Sometimes you might be typing something and accidentally hit the Caps Lock key instead of Shift. Instead of deleting everything and retyping it, you can simply use a new Microsoft Word feature that lets you choose the case of your new text. You can select Sentence case, Lower-case, and Uppercase, as well as Capitalize Each Word and tOGGLE cASE.

word ib 1

Automatically Update the Date and Time
Most businesses will use digital correspondence, but there are times when you’ll have to use direct mail. Most organizations will send out a welcome letter to new clients via traditional postage, with some personalization to match the client. Word can be used to make sure that the information offered in the latter is updated automatically. You can set your templates to auto-update with the current date and time.

In the Insert tab, click on the Date & Time button. This will open up a pop-up window. Next, just click on the date format and select the Update Automatically box in the bottom-right corner. Your date will automatically be updated every time you open or try to print the document.

word ib 2

Eliminate Unwanted Formatting
When you copy and paste text from a source, it retains the formatting of the original document. If you’re not careful, this text could persist throughout the remainder of your document edits. Thankfully, there is a very simple fix to this issue. Microsoft Word has a keyboard command that you can use to eliminate formatting, and it’s Ctrl + Space. Better yet, you can just use the little eraser button in Word’s settings to eliminate formatting.

word ib 3

Want even more great tips and tricks? Visit our blog regularly for more technology-related tips.


Comments 1

Nora Cain on Wednesday, 12 September 2018 03:47

The item has been shared and occupied for the individuals. The range of the books and is ultimately followed for the consumption at the highest order for the individuals.

The item has been shared and occupied for the individuals. The range of the books and is ultimately followed for the consumption at the highest order for the individuals.
Already Registered? Login Here
Thursday, October 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Software Computer Network Security Internet Microsoft IT Services Hosted Solutions Business Tech Term Google Ransomware Mobile Devices User Tips Android Productivity Backup Efficiency Smartphone Managed IT Services Small Business Data Management Internet of Things Cloud Computing Saving Money Data Recovery Business Continuity IT Support Browser Innovation Hardware Windows Data Backup Cybersecurity Data App Windows 10 Managed IT Services Communication Microsoft Office Facebook Server Remote Monitoring Gmail Artificial Intelligence Business Management Windows 10 Encryption Passwords Outsourced IT Word Chrome Upgrade Managed Service Provider Vulnerability Analytics Phishing Workplace Tips Employer-Employee Relationship communications Network Applications Website Money IT Support Infrastructure Disaster Recovery Office 365 Smartphones Productivity Tip of the week Bandwidth Content Filtering Settings Antivirus Miscellaneous BYOD YouTube Save Money IT Management Robot Risk Management Social Media Data storage Office Tips Big Data Government Maintenance Google Drive Holiday Avoiding Downtime Mouse Managing Stress Scam Information Alert Wireless Apple Display Storage HIPAA Users VPN Vendor Management Mobile Device Monitors Mobile Security Data Security Paperless Office Business Technology Server Management Virtual Private Network Touchscreen Automation End of Support Business Intelligence Data loss Spam Computing Virtual Reality Unified Threat Management Outlook WiFi Laptop Telephone Systems Operating System The Internet of Things LiFi Company Culture desktop Hosted Solution SaaS VoIP Administration Firewall Two-factor Authentication Patch Management Managed IT Service Computing Infrastructure Professional Services Cybercrime User Error Computers LED Social Networking Downtime Star Wars Document Management Spyware Customer Relationship Management Apps Dark Data Update PowerPoint Chatbots eWaste Marketing Uninterrupted Power Supply Specifications Cryptocurrency Nanotechnology Development Computer Care IBM IT solutions Going Green Wearable Technology Network upgrade Gadgets File Sharing Heating/Cooling Multi-Factor Security Google Docs Retail Solid State Drive Education Break Fix Hacks Politics Alerts USB Time Management Printer Co-Managed IT Motherboard Cables Fraud Cost Management Identity Theft Networking Google Wallet Customer Service Onboarding Identity Continuity Search Black Friday Bitcoin Screen Reader Charging Training Corporate Profile Emergency Printing Slack Smart Office Halloween Servers Google Calendar Business Growth Office Samsung Hard Disk Drive Dark Web Password Tech Support Licensing Dongle Automobile Network Management Access Control Legal Content Wires Assessment Unified Communications Drones Chromebook Digital Signage Solar Dell Cyber Monday Windows 8 Smart Tech WannaCry Monitoring Work Scary Stories Cabling Legislation Hacker Social Engineering Microsoft Excel Websites Cooperation Service Level Agreement Running Cable Google Maps SharePoint Deep Learning Streaming Router Voice over Internet Protocol Hotspot Internet Exlporer Quick Tips Techology Troubleshooting Compliance Buisness Managed IT Smart Technology Connectivity Virtual Desktop How To Lenovo Spying IT Technicians Optimization Sports Statistics Tablet Alt Codes Safety Mail Merge Blockchain Analysis Staff Leominster Downloads Bring Your Own Device Remote Computing Modem FinTech Distributed Denial of Service Social Language Value Digital Payment VoIP Unified Threat Management Budget Network Congestion Regulations Shortcut IoT Digital Firefox Superfish Information Technology Employee-Employer Relationship Mirgation Recycling Disaster Bluetooth Comparison Typing Humor Address Permissions Current Events Wi-Fi Managed Service Augmented Reality K-12 Schools Collaboration Best Practice Writing Cookies MSP Unsupported Software Virtualization CCTV Webcam Computer Repair Relocation Mobile Data Error Work/Life Balance Recovery Point of Sale Ben McDonald shares How To Health Private Cloud Travel G Suite Black Market BDR Law Enforcement Supercomputer CrashOverride Regulation Staffing Electronic Medical Records Motion Sickness Notifications Taxes Mobile Device Management Physical Security Administrator Twitter Upgrades Gadget IT Budget Emoji Web Server what was your? GPS Crowdsourcing IT Consultant Mobile Computing Personal Information Botnet 3D Printing Cortana Printers Cameras Tracking Meetings Cleaning Machine Learning Processors

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3