Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Google Drive comes with a pre-built feature allowing users to scan a picture or document, and save it as a PDF—at least for Android smartphones. The trick can be pulled off with just a couple of taps, making it easier than ever to import documents to your Drive. Here’s how it’s done.

Scan Your Documents to Save Them as PDFs In Drive

Smartphones are a must-have technology in the office, so you don’t need to use the bulky scanner to transport copies of your documents to a cloud service like Google Drive. All you need is your camera and your Google Drive account.

First, go to your Google Drive on your phone. You must then tap the plus sign button to start adding new files to your Drive. There will be a list of options that appears; select Scan to proceed.

This should tell your device to open up the Camera app. You’ll have to provide permissions for it to access Google Drive if you haven’t already done so. Once you’re ready, frame the document with your camera and take the picture. Just confirm that the picture is the one you wish to proceed with, then tap OK.

Google Drive will make some changes to the picture, but you can adjust these yourself by making manual edits. You can add multiple pages to your new PDF as well by using the Add Page button. Once you’re done, tap Save.

Once you are done, name your file and determine which folder you want it to go to. Now you can add any documents you want to your Google Drive without using a scanner.

What kinds of tips would you like to see us cover in the future? Be sure to contact us at 800.618.9844 and let us know.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 04 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Quick Tips Passwords Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Information Artificial Intelligence Automation Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office App Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Tip of the week Gmail Managed Services Voice over Internet Protocol Apple WiFi How To BDR Computing Information Technology HIPAA Hacker Applications Office 365 Avoiding Downtime Marketing Access Control Conferencing Managed IT Services Big Data Operating System Risk Management Router Computers Virtual Private Network Office Tips Analytics Website Augmented Reality Health 2FA Help Desk Storage Password Bring Your Own Device Retail Healthcare Scam The Internet of Things Data loss Going Green Cooperation Free Resource Social Project Management Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone iPhone Licensing Vulnerabilities Entertainment Data Privacy Settings Printing Wireless Content Filtering Images 101 Telephone System Multi-Factor Authentication YouTube Robot Mobility Customer Relationship Management Cost Management Cryptocurrency IT Management Hacking VPN Employees Presentation Meetings Virtual Desktop Integration Data storage LiFi User Tip Wireless Technology Modem Computer Repair Mobile Security Processor Outlook Money Holidays Humor Data Storage Word Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Sports Professional Services Saving Time Mouse Virtual Machines Managed IT Service Administration Safety Maintenance Antivirus Downloads Social Engineering Break Fix Scams Browsers Smartwatch Legal Connectivity IT IT solutions Upload Procurement Business Growth Remote Computing Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Cortana CES Tablet IoT Communitications Trends Supply Chain Management Alt Codes Application Alert Managed IT Customer Resource management FinTech File Sharing Regulations Downtime Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis IBM Star Wars IT Assessment Hosted Solution Gamification Flexibility Typing Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Ransmoware Knowledge Techology Fileless Malware Digital Security Cameras Google Drive Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Health IT Competition Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive 5G Permissions Workforce Experience Unified Threat Management Directions Videos Google Docs Assessment Electronic Health Records Unified Communications Bitcoin Wasting Time Threats Running Cable Google Wallet Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Fraud Meta User Error Microchip Internet Exlporer Software as a Service Username Windows 8 Managing Costs Amazon Laptop Drones Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT IP Address Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Halloween Media Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Recovery Hotspot Transportation Small Businesses Tactics Development Hacks Hard Drives Websites Mirgation Hypervisor Displays Scary Stories Shopping Domains Nanotechnology Optimization PowerPoint Fun Addiction Deep Learning Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Refrigeration Chatbots Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Public Speaking Screen Reader Education Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Server Management Regulations Compliance Mobile Computing Private Cloud Identity Entrepreneur Evernote Paperless Co-managed IT Search Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Best Practice Twitter Alerts SQL Server Technology Care Financial Data Undo Error History Buisness Business Communications

Blog Archive