Contact us today!

Network Solutions Unlimited Blog

Tip of the Week: How to Dominate OneNote

Tip of the Week: How to Dominate OneNote

Microsoft’s OneNote application is great for taking notes, but its functionality is much more than just that. We’ll be sharing some of our favorite tips and tricks to help you make the most of your OneNote.

Of course, you might just think you can do the exact same thing with a simple pen and pad of paper, and if you prefer to do it that way, that’s totally fine. But you’re going to be missing out on several great features that will help you keep track of your notes in the near future. We all know that notebooks disappear when we least expect them to, so it’s no surprise that OneNote helps users by keeping their notes in one single location on your desktop.

That’s not all, though; there are countless other ways that the desktop version of OneNote can benefit your employees. Here’s how:

  • It’s quite easy to review the notebooks that a user has access to. You can do this if you’re logged in to OneNote. On the home screen, you’ll see whoever is currently logged in to the application in the top-left part of the screen, right under the menu. If you click it, you’ll be shown all the notebooks that the user has access to. This makes it easy to shift from one to another. You can also create another notebook if it’s needed.
  • Once you’ve created a notebook, you can add tabs to it, then group them together. These tabs can also be password-protected, but you’ll need to remember the password in order to access them. Microsoft cannot unlock these sections, and there is no option to recover the password, so make sure you want to do it before applying this measure. Each of these sections can have their own sub-pages, which can be added by using the Add Page button.
  • You can merge your notebook sections by right-clicking on a tab and then selecting Merge into Another Section.
  • The option to add formatting is also available. First, click on the View tab. Then, add Page Color and Ruled Lines. You can then save this as a template if you’d like to use it again in the future. Under the Insert Tab, you can access the menu under the Page Templates button. This gives you the option to apply different templates. You can also click on Save current page as a template to use it for later as a notebook’s default formatting.
  • Once you have your formatting squared away, you can either use the traditional typing method to take notes or use your touchscreen and stylus instead. There is also the option for inserting pictures. You can also record audio that is linked to the note that was written as the audio is recorded, providing the opportunity to listen back and improve the notes at a later time.
  • Add Tags to sort out your notes. You can then search for notes based on the tags.
  • In the View tab, you can select Dock to Desktop. This basically enables you to take notes while something else is happening, like a presentation or a meeting. This splits the screen between your notes and whatever else you’re doing at that moment. To undock, just click on the arrow on the right-hand side of the screen.

OneNote even offers solutions for collaboration, but there are far too many features to include here. Maybe we’ll cover them in a tip of the week in the future, so stay tuned to our blog!

3 Backup Nightmares You Don’t Want to Happen to Yo...
Those Irritating Spam Calls May Not Last Much Long...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Printing Language Spam Blocking Files Dark Web Government Patch Management Wi-Fi Content Filtering IT budget Advertising Keyboard Shortcuts Black Market Holiday How To Projects Cybercrime Remote Monitoring Mobile Device Testing Artificial Intelligence Financial Technology Google Assistant Server How to Monitoring Passwords Value Education Innovation Security Television Twitter Managed IT Services Virtual Reality Phone System Smart Tech Public Computer Ciminal PDF Chrome Reputation Entertainment Lifestyle FAQ Save Money Touchscreen Loyalty Emergency Chromebook Firewall Telephone Systems Miscellaneous Quick Tips Big Data Proactive Personal Information Virtual Assistant Video Games Managed IT Service Saving Time History Hackers Wireless Technology Tech Support Root Cause Analysis Internet of Things Printers Apps Office Google Docs Bring Your Own Device Data Vendor Management Financial Remote Workers Utility Computing Browser IT Support Data Recovery Thank You Collaboration Identity Solid State Drive Hard Disk Drive Benefits Alert Wireless Charging hacker Tip of the Week App intranet Techology Content Filter Hiring/Firing Workers Smartphone Alexa for Business Google Drive Hard Drive Evernote Travel Excel Specifications Save Time IT Services Students Cloud Compliance Worker Samsung Ransomware eWaste Wireless Websites Money HaaS Applications Google Maps Office 365 Congratulations Identities Mobile Device Management Mobility Office Tips Emails The Internet of Things Tech Term IT Solutions Consultant Proactive IT Cast Amazon Peripheral Data storage Risk Management User Error Data Protection Credit Cards Instant Messaging Project Management Encryption Robot Efficiency Physical Security Flexibility IT Service Co-Managed Services Data Management Business Technology Meetings Bandwidth Hacking Windows 10 Devices Word BYOD Wasting Time Touchpad SaaS Politics Monitors Hard Drives Camera Health Best Practices Troubleshooting Managed Service Provider Computers Streaming Media Microsoft Productivity User Tips Going Green Virtualization Mobile Devices Virus Data Security Microsoft Excel Hybrid Cloud Telephone Apple Privacy Internet OneNote Information Gifts Business Sports VoIP Fraud Hosted Solution CrashOverride Colocation Display Internet exploMicrosoft Charger Computing IT Management Employee-Employer Relationship Data Loss Wireless Internet Edge Backup Microsoft Word Bluetooth Business Computing Storage Computer Fan Chromecast Application Upgrade Webinar IT solutions MSP Vulnerability Computing Infrastructure Document Management Workplace Tips Device Security Professional Services Vendor Company Culture SMB Audit Data Breach Managed IT Services Technology Gamification Law Enforcement Android Upgrades Managed IT IT Support Spyware Monitor Unified Threat Management Maintenance Training Accessory Outsourced IT Sales Business Management Information Technology Software as a Service Computer Forensics Data Privacy Keyboard Identity Theft Router Human Resources Windows Blockchain Humor Smartphones PowerPoint Hardware Search Public Cloud Safety Conferencing Network Security Sync Mobile Security USB Spam Legislation End of Support Adobe Hosted Solutions Relocation Social Media VPN Budget Retail Management Internet Exlporer Facebook Unsupported Software Legal Downtime Analysis Experience Comparison Mobile Smart Technology HIPAA Gmail Managed Service Electronic Medical Records Best Practice Scalability Audiobook Shadow IT NFL Windows 10s Licensing Nanotechnology Phishing Windows 10 Computer Care Microsoft Office Remote Computing Password Redundancy Update Connectivity Employer Employee Relationship Augmented Reality Cloud Computing Cleaning Cost Management Networking Cache Windows Ink Business Owner Business Intelligence Saving Money Laptop IoT BDR Scam Transportation Updates Cybersecurity Two Factor Authentication Private Cloud Employer-Employee Relationship File Storage Worker Commute Communications Productivity Gadgets iOS Small Business Admin Regulation Business Continuity Assessment Software WPA3 Two-factor Authentication Screen Mirroring Settings Rootkit Payroll Work/Life Balance Access Control Tablets Google HBO Customer Shortcut Malware Social Engineering WannaCry Marketing Data Theft Operating System Computer Accessories Outlook Data Storage App store WIndows Server 2008 Unified Communications Avoiding Downtime Wasting Money Battery Books Cortana Users Memory Communication Data Backup Network iPhone WiFi Automation Windows 7 Commerce Hyperlink Content Recovery Automobile Disaster Recovery File Sharing Antivirus Computer Administration Managing Stress Email