MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How To Put A Table Of Contents In A Google Doc

Tip of the Week: How To Put A Table Of Contents In A Google Doc

If you author a long document, having a table of contents can help your readers get the information they need fast. Here is how to insert a table of contents into a Google Doc.

In order to use the Table of Contents feature, you need utilize the preset heading and title formatting option. This can be found next to the font on the dashboard. Note: Anything formatted as ‘Title’ will not be included in your table of contents.

Title Heading

Heading 1 is used for major topic changes or phases, like chapters and sections.

Heading 1

Even though they are set to be a commonly used heading size and font, you have the opportunity to update the size and header to whatever you want to use for your document by selecting to update heading.

After updating the heading information, you’ll notice that the drop down menu has also updated the heading options to your selected format.

A look at heading options

You’ll want to repeat the two previous steps for the other subheadings.

Header 2

When you’ve finished setting your headers, you can now tell Google Docs to generate a table of contents. Select Insert > Table of contents then select the table style you like the best. You can select from a table with page numbers:

Page NumbersPage Populated

Or one with hyperlinks:

Anchor Links
Anchor Links Populated

Whichever option you choose, you will now have a tiered, easy-to-navigate table of contents in your document.

For more great tips and tricks that you can use to gain productivity, visit MERIT Solutions’s blog regularly.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Managed IT Services Computer Outsourced IT Microsoft Mobile Devices Disaster Recovery Business communications VoIP Business Continuity Windows 10 IT Support Hardware Cybersecurity Innovation Email User Tips IT Services Data Backup Cybercrime Efficiency Saving Money Mobile Device Management Windows Managed IT Data Recovery Mobility Small Business Server Apps Ransomware Tech Term browser Data Productivity Law Enforcement Smartphone Internet of Things Operating System Telephone Systems Android Virtualization Office 365 BDR Save Money Smartphones Cloud Computing Hosted Solution Quick Tips Passwords Phishing Money Data Security Recovery VPN Microsoft Office BYOD Password Automation Holiday Managed Service Provider Chrome Information Technology Communication Data Management Facebook Government Collaboration Network IT Support Work/Life Balance Cost Management Wi-Fi Update Gadgets Google Drive Application Hacking Avoiding Downtime Vulnerability Alert Health Miscellaneous Computers upgrade Social Data Breach Two-factor Authentication Wireless Social Media Best Practice App Risk Management Budget Unsupported Software Employer-Employee Relationship Identity Theft User Error Data Protection Artificial Intelligence Flexibility Shortcut Tech Support Gmail Wireless Technology Firewall Workplace Tips Antivirus Current Events Audit Telephony Spam Compliance Personal Information Social Engineering Managed IT Services Office tips Applications Streaming Media Private Cloud History Politics Remote Computing Proactive IT Cleaning USB search Save Time The Internet of Things Users Encryption Sports Big Data Project Management Redundancy Hacker Commerce Solid State Drive Education Internet Exlporer Router Vendor Management Cortana SaaS Patch Management Windows 10 IT solutions Samsung iPhone Content Filtering DDoS Battery Mobile Computing HaaS Management Transportation Blockchain Excel Television Wireless Charging Robot Data Storage Automobile Apple Mobile Security Devices Value OneNote End of Support WiFi Google Assistant Saving Time Going Green Office Bandwidth Fraud Data Loss Computer Care Phone System Marketing eWaste Humor Disaster Legal Google Docs HBO Webinar Data storage Ali Rowghani Virus Conferencing Chromebook Microsoft Word Mobile Employer Employee Relationship Trending Analytics Chromecast Wireless Internet Ciminal Microsoft Excel Remote Monitoring Administration Keyboard IT solutions Instant Messaging Proactive Gifts Smart Tech Professional Services Computer Accessories Worker Commute Colocation Gamification server installation dvd "cannot install required files" File Sharing Mobile Device IT Management Hard Drives Windows 10s Managing Stress stock Websites Files Connectivity Travel Nanotechnology Books Administrator Scalability Memory Lithium-ion battery MSP Storage WIndows Server 2008 Hiring/Firing Hard Disk Drive tweet Data Theft Credit Cards Content Filter Tablets Root Cause Analysis Relocation Access How To Students calculator intranet Benefits Twitter Computing FAQ Monitoring control NFL Augmented Reality Touchscreen Unified Communications IT budget Lifestyle Unified Threat Management Business Intelligence Outlook PDF WSJ Analysis Charger Exchange Maintenance Word Training Entertainment Electronic Medical Records Distributed Denial of Service Financial altivista Legislation Upgrades Managed IT Service Text Messaging iOS Point of Sale App store Financial Technology SBS Device Security Windows Ink Company Culture HIPAA Safety Black Market compaq Identities Comparison Consultant Regulation Smart Technology Computer Fan Evernote Avoid Downtime Wearable Technology Printing Google Maps Shadow IT hp IoT Specifications Screen Mirroring Sync Dark Web Laptop Document Management Uninterrupted Power Supply Identity Networking domain Spyware Software as a Service Meetings Experience Emails Language Sales Cast Adobe Touchpad Data Privacy Workers Video Games Computer Forensics remote Settings Reputation Advertising Virtual Reality Yahoo Retail Updates Licensing Scam WannaCry Hard Drive Running Cable PowerPoint Server 2008 Edge Music Monitors Thank You Congratulations CrashOverride Emergency Worker Cache

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...