Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Stop Word from Editorializing

Tip of the Week: Stop Word from Editorializing

At the time of this writing, Microsoft Word has a market share just shy of 37 percent, making it a pretty safe bet that you’ve used it at some point. As a result, you’re probably familiar with Word’s insistence of changing how certain things are formatted, which can become irritating - especially if you had it formatted how you wanted it the first time. This week, our tip will cover how you can stop Word from editorializing.

However, before we go any further, it is important that we say something here:

The tip we are about to go over will require you to make some changes to settings, which you should first run by your organization’s IT advisor for them to sign off on. Don’t be afraid to ask for help in implementing these changes, either.

The crux of this issue is that Word is inclined to reformat what you have typed to the “correct” formatting, such as adding hyperlinks to websites and adjusting how the list you typed up appears as soon as it is clear what you are doing.

There is a particular setting directly responsible for this happening: AutoFormat As You Type. Admittedly, it can be useful at times, but many find it to be more of a distracting frustration. If you’d prefer Word not to do this, you can turn off the features you don’t want pretty simply:

  • Under File, choose Options
  • Find the category for Proofing, and from there, AutoCorrect Options
  • Navigate to the AutoFormat As You Type tab.

This tab enables you to deselect which options you no longer want AutoFormat to pay attention to, keeping the ones you’ve found useful - the best of both worlds.

Furthermore, Microsoft Word will wrap text, or in other words, move down to the next line when space has run out on the one in progress. Under normal circumstances, this is a great feature, but there are a few times that you want a certain phrase to all be on one line. A few common examples of this are for things like names, dates, telephone numbers, and distinctive hyphenated phrases, like “up-to-date”, that should be treated as a single word.

The easiest way to deal with this is to use non-breaking spaces and hyphens, instead of your average spaces and hyphens. What’s the difference? Not much at all - just the fact that non-breaking ones will connect the text to be seen as a single word, moving the entire phrase to the next line if there isn’t enough space.

  • Non-breaking space: Ctrl+Shift+Spacebar
  • Non-breaking hyphen: Ctrl+Shift+Hyphen

With any luck, you’ll be able to format your Word documents with less frustration from here on out. 

Subscribe to our blog to find out when we have new content up for you to read!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 07 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Windows 10 Wi-Fi Virtualization Blockchain Business Technology Bandwidth Mobile Office Data Security Two-factor Authentication Apps Vendor Apple Networking Mobile Device Management Managed Services App Voice over Internet Protocol Gmail WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Budget Avoiding Downtime Marketing How To Conferencing BDR Computing Information Technology Access Control HIPAA Office 365 Applications Hacker Storage Password 2FA Website Help Desk Bring Your Own Device Managed IT Services Healthcare Operating System Big Data Risk Management Virtual Private Network Health Analytics Router Office Tips Augmented Reality Computers Retail Windows 11 Scam Monitoring Data loss Excel Firewall Remote Workers Going Green Patch Management Telephone Save Money Remote Monitoring End of Support Vulnerability Vendor Management The Internet of Things Cybercrime Cooperation Free Resource Project Management Physical Security Social Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Customer Service Document Management Maintenance Holidays Antivirus Sports Mouse Data Storage Smart Technology Supply Chain Video Conferencing Administration Managed Services Provider Word Saving Time Virtual Machines Professional Services Managed IT Service Robot Downloads Safety Settings iPhone Licensing Wireless Printing Content Filtering Entertainment IT Management Vulnerabilities YouTube Meetings Data Privacy VPN Images 101 Cryptocurrency Telephone System Multi-Factor Authentication Computer Repair Mobility Cost Management Virtual Desktop Data storage LiFi Customer Relationship Management Outlook Employees Hacking Machine Learning Integration Presentation Money Humor User Tip Modem Processor Mobile Security Wireless Technology Proxy Server Reviews Deep Learning Cookies Twitter Cyber Monday Medical IT IP Address Tactics Development Error Hotspot Transportation Small Businesses Education Mirgation Hypervisor Displays Social Engineering Recovery Shopping Nanotechnology Optimization Remote Computing PowerPoint Hard Drives Mobile Computing Addiction Language Employer/Employee Relationships Outsourcing Tablet Chatbots Search Navigation Domains Management PCI DSS Gig Economy Best Practice Screen Reader Alert Distributed Denial of Service Workplace Dark Data Refrigeration Managed IT Service Level Agreement Internet Service Provider Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Legal Regulations Compliance IT solutions Identity How To Evernote Paperless Public Speaking Bookmark Business Growth Smart Tech Memes Notifications Co-managed IT Lithium-ion battery Travel Alerts SQL Server Technology Care Entrepreneur Download Net Neutrality Techology Financial Data Google Maps History Cortana Business Communications Browsers Smartwatch Alt Codes Connectivity IT Break Fix Scams Downtime Unified Threat Management Azure Hybrid Work Undo Upload Procurement Unified Threat Management Social Network Telework Hosted Solution Cyber security Multi-Factor Security Tech Human Resources CES Typing IoT Communitications Dark Web Cables Network Congestion Trends Supply Chain Management Google Drive User Error Customer Resource management FinTech Regulations Knowledge Google Calendar Term Google Apps Application Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Point of Sale Staff Value Business Intelligence 5G Gamification Flexibility Google Docs Organization Unified Communications Social Networking Experience Legislation Shortcuts IBM Fileless Malware Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support Ransmoware Wearable Technology Memory Vendors Monitors Google Wallet Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Directions Videos Windows 8 Assessment Electronic Health Records Laptop Websites Permissions Workforce Wasting Time Threats Competition Drones SharePoint Trend Micro Electronic Medical Records Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Halloween Fraud Meta Managing Costs Amazon Writing Lenovo Username User eCommerce Virtual Reality Black Friday SSID Hacks Server Management Database Surveillance Scary Stories Private Cloud Virtual Assistant Outsource IT Identity Theft IT Technicians Virtual Machine Environment Fun Media Superfish

Blog Archive