Tip of the Week: Common PDF Tricks You Need to Know

Tip of the Week: Common PDF Tricks You Need to Know

In business, Portable Document Format (PDF) documents are encountered constantly. The benefit is that they are a great way to share and receive documents on any device. One main problem many people run into is that they think that it’s a read-only format. Today, we turn this common misconception on its head by providing some tips on how to better manipulate the PDFs you receive. 

Rotating Pages

You’ve probably encountered this: You get a PDF and open it only to find that the document is upside down. It might not be a huge issue, but you’d really prefer that it was right-side-up. To fix this, many PDF viewing programs like Adobe Acrobat Pro offer options to rotate the document. If you’re using Acrobat Pro, the Rotate Pages option can be found under the Document menu. Once opened, you can select the pages that you want to be rotated, and how they should be rotated. 

Some of the other PDF readers offer a quick button in the toolbar that allows you to rotate each page individually. Regardless of how you choose to get it done, rotating pages just makes reading them simpler.

Signing PDFs

These days, PDFs are routinely sent that need signatures, whether it’s to view the document, or because it is a contract of some type. For years, people would print out the document, sign it, and scan it back over to complete this task. Today, there is a solution that lets the recipient avoid the printer altogether. 

It’s as simple as downloading some free software, such as Adobe Reader. Once you download it, signing documents is relatively simple. With the PDF open, click on the Fill & Sign button, then Sign, and finally, Add Signature. At this point, you’ll have three options:

  • Type - You type your name to indicate that you have seen the document, and an electronic signature is rendered (which almost certainly will not resemble your actual signature).
  • Draw - Using your mouse as you would a pen, you draw your signature in the space provided.
  • Image - You use a scanned image of your actual signature that is then saved for future use.

At that point, just make sure your signature is positioned where it needs to be, click apply, and save.

These days, many line-of-business applications produce signable PDFs to make contracts move faster.

Password Protection

There are times when you want to control who can (and more aptly who can’t) see a particular PDF. Make sure that any password you set up for PDFs are distributed through secure channels to avoid the document from being breached.

Microsoft Word allows you to turn a file into a PDF by using the “Save as” function. All you have to do is select “PDF” as the file type. Before you click Save, you will be able to find a More options button, which will open another window, where encrypt document with a password can be found under Options. Selecting this gives you the ability to set a password that anyone viewing your PDF after that point will have to provide in order to open it.

Merging Files

Once you distribute a PDF, it is easy to lose track of all the different versions. PDFs allow you to consolidate versions to keep track of all the information in one place. You can accomplish this with various paid or free software titles. Pass it by your IT department first, so it doesn’t cause any problems.

Assuming you choose Adobe Acrobat, this process is exceedingly simple. All you have to do is access the Tools menu and click on Combine files. Then, after you have used Add Files… to assemble all the PDFs that you need to merge, just click Combine to generate your new PDF, and Save as to store it in the proper place.

Remember to check with your IT department before you download any software that isn’t already rolled out for you. For more great tips, subscribe to our blog. 



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 19 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy User Tips Productivity Email Hackers Computer Network Security Microsoft Software Hosted Solutions Malware Google Business Data Communication Tech Term IT Services Efficiency Mobile Devices Hardware Small Business Workplace Tips IT Support Internet Cloud Computing Ransomware Innovation Managed IT Services Upgrade Backup Data Recovery Smartphone Outsourced IT Android Saving Money Facebook Data Backup Users Mobile Device Windows Information Smartphones Server Phishing Miscellaneous Microsoft Office Cybersecurity Social Media Business Continuity Browser Business Management Windows 10 Office 365 Managed IT Services Data Management communications Windows 10 Internet of Things Gadgets Vulnerability Remote Monitoring App Gmail Network Passwords Productivity Word Apps Artificial Intelligence Managed Service Disaster Recovery Infrastructure Encryption VoIP Chrome Managed Service Provider Router Tip of the week BYOD Employer-Employee Relationship Analytics Website VPN Save Money Money IT Support Quick Tips Virtual Reality Settings Applications Content Filtering Bandwidth Computers Avoiding Downtime Antivirus Apple Education YouTube Company Culture Display Storage Networking Risk Management Paperless Office Access Control Employee-Employer Relationship Robot Office Tips IT Management Data Security Hacker Data storage Development Virtual Private Network Automation Unified Threat Management Big Data Maintenance Collaboration Google Drive Government Document Management Mouse Two-factor Authentication Managed IT Service Business Intelligence Virtualization Holiday Customer Relationship Management Scam Wireless Solid State Drive Retail Alert Hard Disk Drive Printing Search MSP Augmented Reality Password Vendor Management Managing Stress Monitors Chromebook Business Technology Server Management Data loss Laptop Touchscreen OneNote Spam Computing End of Support The Internet of Things Telephone Systems Remote Workers Outlook Data Breach WiFi Bring Your Own Device Operating System Tablet desktop HIPAA BDR LiFi Windows 7 Social Downtime Hosted Solution Information Technology Firewall Mobile Security Humor IT Administration SaaS Social Network Wi-Fi Address Permissions Spyware Voice over Internet Protocol Content Huawei Writing Uninterrupted Power Supply Cooperation Service Level Agreement Messaging Patch Management Computer Care IBM Compliance Digital Signage Data Warehouse User Error File Sharing Hotspot Internet Exlporer Entertainment Vendor Cryptocurrency Holidays IT Technicians Optimization Monitoring Solid State Drives IT solutions Going Green Dark Data Update Connectivity Shortcuts Mobile Management Google Docs Distribution Specifications Identity Theft Modem FinTech Streaming Processor Halloween Heating/Cooling Multi-Factor Security Staff Leominster Employee-Employer Relationships Hacks Politics Payment Card Break Fix Training Corporate Profile Regulations Troubleshooting Business Analysis Google Wallet Time Management Printer Language Value iOS Hybrid Cloud Bitcoin Mirgation Recycling Spying National Security Customer Service Automobile IoT Security Cameras Profiles Business Growth Logistics Black Friday G Suite Private Cloud Emergency Cookies Human Error Memory Legal Office Samsung Scary Stories Servers Google Calendar Dell K-12 Schools Analysis Students Tech Support Dark Web WannaCry Social Networking Virus Unified Communications Drones Running Cable Network Management Cabling Computing Infrastructure Professional Services Scalability Conferencing Windows 8 Chatbots eWaste Updates Google Maps Star Wars Managed Services Utility Computing Asset Management Buisness Cyber Monday Mobile Device Management Virtual Desktop Nanotechnology Device Reducing Cost Deep Learning Social Engineering Sports Legislation Wearable Technology Network upgrade Mixed Reality Websites Microsoft Excel Motherboard Cables LED Threats SharePoint Alerts USB Migration Consulting Smart Technology Identity Continuity PowerPoint Techology Fraud Cost Management Laptops Alt Codes Memes Managed IT How To Lenovo Digital Payment Screen Reader Charging Mobility Batteries Safety Statistics Smart Office Mail Merge Blockchain Digital Wires Co-Managed IT Budget Remote Computing Downloads Disaster Licensing Dongle Shortcut Distributed Denial of Service Solar Onboarding GDPR Network Congestion Cybercrime VoIP Unified Threat Management Assessment Software as a Service Managed Services Provider Typing Slack Hard Disk Drives Current Events Firefox Superfish Smart Tech Print Toner Myths Best Practice Marketing Bluetooth Comparison Work Machine Learning Processors Webcam Unsupported Software Error Computer Repair Relocation Point of Sale Ben McDonald shares Travel Mobile Data Recovery How To Work/Life Balance Health Supercomputer CrashOverride Inventory Staffing Printers Black Market Motion Sickness Taxes Administrator Law Enforcement Electronic Medical Records IT Budget Notifications Web Server what was your? Physical Security Shadow IT GPS Twitter IT Consultant Emoji Upgrades Gadget Mobile Computing Crowdsourcing Cameras Personal Information Botnet Tracking Financial Meetings Cleaning Cortana 3D Printing Regulation CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3