Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Microsoft Word is more or less synonymous with word processing, but with the right tricks, you can do so much more. For this week’s tip, we’ll go over four neat and useful capabilities that Microsoft Word has.

Generate Dummy Text
For those responsible for making sure a document will look the way it’s supposed to, some basic dummy text can be a very useful thing. Rather than forcing you to search online for some to copy and paste in, Microsoft Word allows you to generate some as needed. All you have to do is type =rand(#) (replace # with the number of paragraphs you want) and press Enter, and your document is suddenly filled with text for you to experiment with. This is useful for creating formatted documents and testing the appearance of fonts.

Quick Bullets
If you need to add a bulleted list to your document, you don’t need to scan the toolbar for the button to do so. Instead, by just typing in an asterisk (*) followed by a space, and then the text you want bulleted, Microsoft Word will add the bulleted formatting in for you. By replacing the asterisk with a hyphen, you can make a quick dashed list as well, or use numbers for a numbered list.

Selecting a Single Sentence
Anyone who has used a mouse to select a sentence by clicking and dragging over their selection has likely found it to be inaccurate at best. However, Microsoft Word provides a shortcut that makes this process much faster, and again, more accurate. Press the Ctrl key and click a word in the sentence you’re selecting. This will select that sentence and that sentence alone, letting you move it, delete it, or do as you like. You can even quick copy the sentence if you click and drag it before releasing Ctrl. Want to select a whole paragraph? Just click on a word in that paragraph 3 times in a row.

Quick Tables
Sometimes you need a table in your Word document, but don’t have the time to access Excel and build one out there. However, Microsoft Word provides a quick and easy way to create a table. Pressing +, followed by a quick press of the Tab button, followed by another + and another Tab, and so on, will create an empty table when you press Enter after inputting a final + sign.

What are your favorite tips for Microsoft Word? Share some of your tricks in the comments, and be sure to subscribe for more handy IT timesavers!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Data Recovery VoIP Business Management Smartphones communications Mobile Devices Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Covid-19 Cloud Computing Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Gmail Apple Networking App BYOD Computing Applications Information Technology Hacker Access Control Office 365 Avoiding Downtime Marketing Conferencing How To BDR WiFi HIPAA Router Virtual Private Network Risk Management Healthcare Computers Health Help Desk Analytics Office Tips Augmented Reality Website Retail Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Operating System Physical Security Remote Workers Display Customer Service Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Document Management Windows 7 Microsoft 365 Telephone Scam Firewall Solutions Data loss Cooperation The Internet of Things Going Green Patch Management Windows 11 Save Money Remote Monitoring Social Vulnerability End of Support Vendor Management Cybercrime Excel VPN YouTube Meetings Virtual Machines Professional Services Customer Relationship Management Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Hacking Virtual Desktop iPhone Presentation Data storage LiFi Smart Technology Vulnerabilities Wireless Technology Outlook Data Privacy Machine Learning Money Saving Time Images 101 Humor Multi-Factor Authentication Mobility Word Managed IT Service Maintenance Sports Downloads Antivirus Mouse Licensing Employees Entertainment Administration Integration Safety Telephone System Holidays Robot Cost Management Settings Data Storage Printing Wireless Supply Chain Video Conferencing Content Filtering Managed Services Provider IT Management Gig Economy Network Congestion Specifications Workplace Google Drive User Error Microchip Internet Exlporer Internet Service Provider Knowledge Fraud Teamwork Hiring/Firing Evernote Paperless Username Regulations Compliance Point of Sale Memes 5G Black Friday Co-managed IT Competition Google Docs Unified Communications Database Net Neutrality Experience SQL Server Technology Care Running Cable Tech Support IT Technicians History Business Communications Bitcoin Network Management Financial Data Google Wallet Proxy Server Smartwatch Cookies IT Monitors Cyber Monday Scams User Tactics Procurement Hotspot Azure Hybrid Work Laptop Websites Mirgation Cyber security Tech Human Resources Windows 8 Telework Drones CES Nanotechnology Communitications Cables IP Address SharePoint Addiction Supply Chain Management Electronic Medical Records Language Halloween Chatbots Term Google Apps Management FinTech Lenovo Screen Reader IT Assessment Writing Distributed Denial of Service IT Maintenance Recovery Service Level Agreement Flexibility Virtual Reality Computing Infrastructure Value Business Intelligence Organization Scary Stories Private Cloud Identity Shortcuts Hard Drives Hacks Server Management Superfish Bookmark Digital Security Cameras Identity Theft Smart Tech Smart Devices Fun Ransmoware Domains Memory Vendors Deep Learning Download Remote Working Twitter Alerts Error Data Breach Google Play Be Proactive Refrigeration Public Speaking Browsers Videos Education Connectivity Electronic Health Records Social Engineering Break Fix Workforce Wasting Time Threats Lithium-ion battery Upload Remote Computing Mobile Computing Social Network Entrepreneur Trend Micro Multi-Factor Security Security Cameras Workplace Strategies Tablet IoT Software as a Service Search Dark Web Meta Alert Managing Costs Amazon Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations eCommerce Dark Data Google Calendar SSID Undo Legal Data Analysis IT solutions Star Wars Surveillance How To Microsoft Excel Virtual Assistant Outsource IT Notifications Staff Virtual Machine Environment Media Business Growth Gamification Reviews Travel Social Networking Legislation Medical IT Techology Fileless Malware Google Maps Development Cortana Transportation Small Businesses Wearable Technology Hypervisor Displays Application Alt Codes Content Health IT Shopping Downtime Unified Threat Management Motherboard Optimization Comparison PowerPoint IBM Unified Threat Management Directions Hosted Solution Assessment Permissions Employer/Employee Relationships Outsourcing Navigation Typing PCI DSS

Blog Archive