Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Bookmarking Your Google Documents

Tip of the Week: Bookmarking Your Google Documents

Productivity is always an important consideration when it comes to your business’ processes. That’s why, for this week’s tip, we’re going over how to boost your productivity by adding some of your G Suite documents into your bookmarks bar.

If you use the selection of tools that Google offers as a part of its G Suite offering, you’ve probably found a few documents that you find yourself repeatedly returning to on a regular basis. Rather than navigating to them via the appropriate folder hierarchy in Google Drive, there is a simple shortcut that you can take advantage of in Google Chrome: creating a bookmark that navigates directly to the appropriate page.

This is a very simple process:

  • Access your Google Drive and open the document you want to save to your bookmarks.
  • In the Address Bar, you’ll see a star icon at the right side. Click it.
  • A small drop-down menu will appear where you can change the name of your shortcuts, and select the “Folder” that it will appear in. Select Bookmarks bar.
  • Click Done, and then the document will appear in the bookmarks bar.

There you have it, you now have a quick shortcut to one of your most-used documents. For more handy shortcuts and tips (along with some other topics), subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Passwords Windows 10 Tech Term Chrome Virtualization Gadgets Social Media Saving Money Holiday Microsoft Office Managed IT Services Automation Managed Service Operating System Facebook Computers Artificial Intelligence Cybercrime IT Support Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking Remote Managed Service Provider Spam Office 365 Covid-19 Telephone Systems Information Technology Alert Information Router Social Engineering Mobility BDR Employer-Employee Relationship Recovery Bandwidth Encryption Applications Remote Monitoring Big Data Law Enforcement App History Mobile Computing Data Breach Application Password Human Resources Money Mobile Office How To Government Office Tips Private Cloud Training Data Storage Patch Management Blockchain Paperless Office Managed IT VPN Apps Remote Computing Mouse HaaS Data Security Google Drive Avoiding Downtime Flexibility Wireless Marketing Vulnerability WiFi Windows 7 Gmail IT solutions Entertainment Word Website Bring Your Own Device Settings Data Management Budget Work/Life Balance Servers Two-factor Authentication Infrastructure Voice over Internet Protocol Education Physical Security Social Safety HIPAA User Error Sports Redundancy Meetings Keyboard Data Protection Vendor Managed Services Display Risk Management Hacker Conferencing The Internet of Things Employee/Employer Relationship Lithium-ion battery Save Time RMM Scam Staff Software as a Service Telephone System Machine Learning Cleaning USB Connectivity Remote Work Firewall Vendor Management Virtual Reality End of Support Apple Network Congestion Workplace Strategy Compliance Net Neutrality Augmented Reality eWaste OneNote Internet Exlporer Computer Care Current Events Help Desk Fraud Telephony Printing Remote Worker PDF Samsung Cryptocurrency Managed Services Provider Wearable Technology Proactive IT Value Retail Hard Drives Spam Blocking Best Practice Instant Messaging Electronic Medical Records Database Excel Comparison YouTube Robot Black Market Remote Workers Virus CES Biometrics Hiring/Firing Virtual Desktop Processor Unified Threat Management Computer Accessories Document Management Content Management Business Technology Hard Drive Access Control Solid State Drive DDoS Wireless Technology Downtime How to SharePoint Virtual Assistant Authentication Business Intelligence Data storage Computing Printer Automobile Audit Bluetooth Worker Customer Service IT Management Environment Botnet Computing Infrastructure Update Fax Server IT Plan Going Green Digital Signage Google Docs IT Consultant Identity Theft SaaS Unsupported Software Battery Humor Shadow IT Charger Procurement Legal Password Manager Sync Emails Bloatware Social Network Password Management Investment Politics Advertising Multi-Factor Security Employees Consultant Search Engine Tablets Employee/Employer Relationships Twitter Business Mangement Windows 365 Netflix Notifications Entrepreneur Two Factor Authentication Analytics NIST ISP ROI Smart Tech Trending Root Cause Analysis Video Conferencing Shortcut Sales Knowledge Best Available Bitcoin Music Addiction Shortcuts Amazon HBO Recycling Skype Relocation Point of Sale WIndows 7 Cost Management Personal Cryptomining Wiring Practices Data loss Social Networking Supply Chain Management Outlook Monitoring Leadership Batteries Troubleshooting Cache Video Games Amazon Web Services Worker Commute Criminal Start Menu Windows 8.1 Digitize Safe Mode Loyalty GDPR Windows Server 2008 R2 Experience Hosted Computing Running Cable Screen Mirroring Frequently Asked Questions Customer relationships Memory Books Wireless Internet Scalability Online Shopping Windows Media Player Business Owner Mobile Email Best Practices Windows 10s User IT Assessment PowerPoint File Sharing Manufacturing Camera Inventory Specifications Cast NarrowBand Tip of the week Computer Tips webinar Managed IT Service Emergency Wire Security Cameras Search Evernote Biometric Security Professional Services iPhone Travel Virtual CIO Public Cloud Managing Stress OneDrive Employer Employee Relationship Peripheral Assessment Printers Science Millennials Windows Server 2008 Digital Security Cameras Using Data Cameras Smart Office Wireless Charging 5G Tools Files Copiers Customer Relationship Management Quick Tip Television Virtual Private Network Workforce Distributed Denial of Service Chromecast Ergonomics Analyitcs Smartwatch Cables OLED Colocation Uninterrupted Power Supply Programming Development PCI DSS Public Computer Project Management Virtual Machine Nanotechnology Telecommuting Regulations Monitor 2FA Fiber Optics Transportation Printer Server Employee Cortana Cabling Digital Signature Antivirus Computer Fan Messaging Rootkit Policy Warranty Windows 8 Hypervisor Google Apps Reputation IT service Dark mode Workers Streaming Media Trend Micro Benefits HVAC Default App Content Analysis FENG Tech Support SMS Procedure IBM Administrator Tablet Saving Time Devices Techology Laptop Flash Customers Domains dark theme Shopping Smart Technology Enterprise Content Management Google Search MSP IT Infrastructure Audiobook Accountants AI Touchpad Maintenance FinTech Supercomputer Microchip Thought Leadership Bing Credit Cards IaaS Software Tips

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code