Tip of the Week: Common PDF Tricks You Need to Know

Tip of the Week: Common PDF Tricks You Need to Know

In business, Portable Document Format (PDF) documents are encountered constantly. The benefit is that they are a great way to share and receive documents on any device. One main problem many people run into is that they think that it’s a read-only format. Today, we turn this common misconception on its head by providing some tips on how to better manipulate the PDFs you receive. 

Rotating Pages

You’ve probably encountered this: You get a PDF and open it only to find that the document is upside down. It might not be a huge issue, but you’d really prefer that it was right-side-up. To fix this, many PDF viewing programs like Adobe Acrobat Pro offer options to rotate the document. If you’re using Acrobat Pro, the Rotate Pages option can be found under the Document menu. Once opened, you can select the pages that you want to be rotated, and how they should be rotated. 

Some of the other PDF readers offer a quick button in the toolbar that allows you to rotate each page individually. Regardless of how you choose to get it done, rotating pages just makes reading them simpler.

Signing PDFs

These days, PDFs are routinely sent that need signatures, whether it’s to view the document, or because it is a contract of some type. For years, people would print out the document, sign it, and scan it back over to complete this task. Today, there is a solution that lets the recipient avoid the printer altogether. 

It’s as simple as downloading some free software, such as Adobe Reader. Once you download it, signing documents is relatively simple. With the PDF open, click on the Fill & Sign button, then Sign, and finally, Add Signature. At this point, you’ll have three options:

  • Type - You type your name to indicate that you have seen the document, and an electronic signature is rendered (which almost certainly will not resemble your actual signature).
  • Draw - Using your mouse as you would a pen, you draw your signature in the space provided.
  • Image - You use a scanned image of your actual signature that is then saved for future use.

At that point, just make sure your signature is positioned where it needs to be, click apply, and save.

These days, many line-of-business applications produce signable PDFs to make contracts move faster.

Password Protection

There are times when you want to control who can (and more aptly who can’t) see a particular PDF. Make sure that any password you set up for PDFs are distributed through secure channels to avoid the document from being breached.

Microsoft Word allows you to turn a file into a PDF by using the “Save as” function. All you have to do is select “PDF” as the file type. Before you click Save, you will be able to find a More options button, which will open another window, where encrypt document with a password can be found under Options. Selecting this gives you the ability to set a password that anyone viewing your PDF after that point will have to provide in order to open it.

Merging Files

Once you distribute a PDF, it is easy to lose track of all the different versions. PDFs allow you to consolidate versions to keep track of all the information in one place. You can accomplish this with various paid or free software titles. Pass it by your IT department first, so it doesn’t cause any problems.

Assuming you choose Adobe Acrobat, this process is exceedingly simple. All you have to do is access the Tools menu and click on Combine files. Then, after you have used Add Files… to assemble all the PDFs that you need to merge, just click Combine to generate your new PDF, and Save as to store it in the proper place.

Remember to check with your IT department before you download any software that isn’t already rolled out for you. For more great tips, subscribe to our blog. 



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 31 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Productivity Privacy Cloud User Tips Email Microsoft Network Security Software Computer Hackers Malware Hosted Solutions Google Data Communication Business Small Business Workplace Tips IT Services Mobile Devices Efficiency Hardware IT Support Tech Term Internet Data Recovery Managed IT Services Innovation Cloud Computing Backup Ransomware Smartphone Outsourced IT Windows Upgrade Smartphones Android Saving Money Data Backup Miscellaneous Mobile Device Users Business Continuity Information Windows 10 Facebook Phishing Microsoft Office Social Media Cybersecurity Server Office 365 Managed IT Services Business Management Network Browser Disaster Recovery Windows 10 Data Management Passwords Internet of Things communications App Word Vulnerability Remote Monitoring Productivity VoIP Gadgets Gmail Managed Service Encryption Apps Quick Tips Chrome Artificial Intelligence Infrastructure Money IT Support BYOD Applications Router Website VPN Company Culture Employer-Employee Relationship Access Control Save Money Analytics Virtual Reality Settings Managed Service Provider Tip of the week Maintenance Collaboration Firewall Antivirus Risk Management Display Employee-Employer Relationship Networking Office Tips Information Technology Google Drive Content Filtering Robot IT Management Data Security Bandwidth Remote Workers Big Data Virtual Private Network Automation Paperless Office Apple Education Development Storage Unified Threat Management Government HIPAA BDR Hacker Data storage Computers Avoiding Downtime YouTube Customer Relationship Management Scam IT Retail Outlook Alert Spam Computing Break Fix Business Intelligence Social Network Bring Your Own Device Operating System Document Management WiFi LiFi Social Search Solid State Drive Humor Wireless Hosted Solution Laptop Best Practice Monitors Administration Vendor Management The Internet of Things Mouse Chromebook OneNote Hard Disk Drive Data Breach Business Technology MSP Server Management Augmented Reality Windows 7 Managing Stress Touchscreen End of Support Downtime Software as a Service Managed IT Marketing Tablet Remote Computing Printing Data loss Password SaaS Telephone Systems Two-factor Authentication Wi-Fi desktop Managed IT Service Virtualization Mobile Security Holiday iOS Dark Data Update Spying National Security Smart Tech Gamification Security Cameras Profiles Specifications Work Analysis Students Voice over Internet Protocol Scary Stories Alt Codes Human Error Memory Heating/Cooling Cooperation Multi-Factor Security Service Level Agreement Scalability Conferencing Compliance Running Cable Spyware Virus Time Management Hotspot Printer Internet Exlporer Politics Uninterrupted Power Supply Customer Service Budget Computer Care IBM Updates Connectivity Buisness COVID-19 Work/Life Balance File Sharing Managed Services Utility Computing IT Technicians Black Friday Optimization Mixed Reality Emergency Modem FinTech Sports Holidays Typing Office Samsung Device Reducing Cost Servers Staff Google Calendar Leominster Virtual Desktop Private Cloud Migration Consulting Regulations Dark Web Distribution Identity Theft LED Threats Network Management Language Value Current Events Tech Support Training Corporate Profile PowerPoint IoT Laptops Mirgation Cyber Monday Recycling G Suite Cookies Payment Card Cryptocurrency Social Engineering Automobile Mobility Batteries Legislation K-12 Schools Social Networking Microsoft Excel Logistics Google Docs Co-Managed IT Computing Infrastructure SharePoint Professional Services IT solutions Going Green Websites Dell Cybercrime WannaCry Onboarding GDPR Techology Star Wars Hacks Cabling Managed Services Provider Chatbots Smart Technology eWaste Google Wallet Slack Hard Disk Drives How To Lenovo Nanotechnology Inventory Bitcoin Safety Google Maps Print Toner Myths Statistics Wearable Technology Network upgrade Messaging Mail Merge Motherboard Blockchain Cables Asset Management Business Growth Content Huawei Alerts Downloads USB Distributed Denial of Service Continuity Network Congestion Legal Digital Signage Data Warehouse VoIP Fraud Unified Threat Management Cost Management Entertainment Vendor Shortcut Identity Unified Communications Drones Monitoring Solid State Drives Firefox Superfish Screen Reader Charging Shadow IT Windows 8 Shortcuts Mobile Management Bluetooth Comparison Smart Office Employee-Employer Relationships Address Permissions Wires Halloween Memes Writing Digital Payment Streaming Processor Licensing Dongle Hybrid Cloud Patch Management Solar Deep Learning Digital Troubleshooting Business Analysis User Error Assessment Mobile Device Management Disaster Cleaning Regulation Computer Repair Relocation CCTV Printers Mobile Computing Mobile Data Webcam Recovery How To Error Health Black Market Point of Sale Ben McDonald shares Remote Work Law Enforcement Travel Notifications Electronic Medical Records Twitter Supercomputer CrashOverride Financial Physical Security Emoji Staffing Upgrades Gadget Motion Sickness Taxes Crowdsourcing Administrator IT Budget Personal Information Botnet Web Server what was your? Cortana GPS 3D Printing IT Consultant Processors Machine Learning Cameras Tracking Unsupported Software Meetings

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3