Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

The new voice feature in Google Docs allows for a variety of commands that help you compose documents and edit them in real time, using only your voice. By using specific commands, you can write, format, and edit your Google Docs files. Just think; now you can finally give your hands the rest they deserve, and let your voice do the typing for a change. All you need is a microphone or a headset to get started.

To use your voice with Google Docs, you need to navigate to the Tools menu item. You should then see Voice Typing near the middle of the column. Select it, and a box should open in the left-hand sidebar of your window. It will be a picture of a microphone, and all you need to do is click it to start using your voice for writing. Once it is ready to start recording, the microphone will turn red and you can speak into it. Watch in amazement as the document writes itself, all by listening to your voice through the microphone. Just make sure that you’re speaking in a clear manner.

Of course, you can’t expect Google Docs’ articulation of your voice to be 100 percent accurate. Thus, you need to make an effort to go back through your work and ensure top quality. ZDNet suggests that those who want to use Google Docs’ voice features keep the following in mind:

  • Voice commands are only available in English. The account and document language must be English.
  • To select text, there are a variety of commands such as "select next character," "select next line," "deselect" and "unselect."
  • Alignment terms are straightforward with left, right, center and justified.
  • Text formatting has the basic commands such as bold, strikethrough and underline. Highlighting has multiple colors, but the default is yellow.
  • Table additions also look simple.
  • But moving around documents may be better suited for the mouse.

Would you be willing to use your voice for Google Docs, or would you rather just stick to writing the old fashioned way? Let us know in the comments, and be sure to subscribe to Voyage Technology’s blog for more great tips.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 25 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Phishing Email Efficiency Computer Privacy Google Workplace Tips Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Microsoft Data Backup Communication Small Business Mobile Device Smartphones Mobile Devices communications Android Workplace Strategy Saving Money Smartphone Business Management VoIP Managed IT Services Microsoft Office Data Recovery Managed Service Browser Social Media Passwords Upgrade Network Backup Disaster Recovery Tech Term Internet of Things Automation Artificial Intelligence Cloud Computing Covid-19 Remote Remote Work Server Managed Service Provider Windows Facebook Miscellaneous Gadgets Encryption Spam Outsourced IT Information Holiday Employee/Employer Relationship Windows 10 Government Data Management Business Continuity Blockchain Productivity Wi-Fi Business Technology Windows 10 Current Events Data Security Apps Two-factor Authentication Bandwidth Compliance Virtualization App Employer-Employee Relationship Vendor Office Mobile Device Management Chrome Managed Services Gmail Budget Voice over Internet Protocol Apple Networking BDR Computing Hacker Applications Information Technology Avoiding Downtime Mobile Office Access Control Office 365 Conferencing How To AI Operating System BYOD HIPAA Computers Router Virtual Private Network Risk Management Training Website Marketing Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password WiFi Bring Your Own Device Big Data Managed IT Services Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Solutions Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel IT Support Tip of the week Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Images 101 Multi-Factor Authentication Robot Mobility Telephone System Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN Employees YouTube Meetings Integration Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi 2FA Data Storage Word Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy IBM Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware Alt Codes Content Remote Working Wearable Technology Memory Vendors Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Competition Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Typing Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip User Internet Exlporer Software as a Service Knowledge Physical Security Fraud Meta Managing Costs Amazon Username Point of Sale eCommerce 5G Black Friday SSID IP Address Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Running Cable Tech Support IT Technicians Virtual Machine Environment Media Bitcoin Network Management Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Recovery Tactics Development Hotspot Transportation Small Businesses Laptop Websites Mirgation Hypervisor Displays Hard Drives Windows 8 Domains Drones Shopping Nanotechnology Optimization PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Halloween Chatbots Navigation Refrigeration Management PCI DSS Public Speaking Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Lithium-ion battery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Entrepreneur Scary Stories Private Cloud Identity Evernote Paperless Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Fun Co-managed IT Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Undo Financial Data Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework CES Tablet IoT Communitications Search Dark Web Cables Application Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech

Blog Archive