Contact us today!

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How To Put A Table Of Contents In A Google Doc

Tip of the Week: How To Put A Table Of Contents In A Google Doc

If you author a long document, having a table of contents can help your readers get the information they need fast. Here is how to insert a table of contents into a Google Doc.

In order to use the Table of Contents feature, you need utilize the preset heading and title formatting option. This can be found next to the font on the dashboard. Note: Anything formatted as ‘Title’ will not be included in your table of contents.

Title Heading

Heading 1 is used for major topic changes or phases, like chapters and sections.

Heading 1

Even though they are set to be a commonly used heading size and font, you have the opportunity to update the size and header to whatever you want to use for your document by selecting to update heading.

After updating the heading information, you’ll notice that the drop down menu has also updated the heading options to your selected format.

A look at heading options

You’ll want to repeat the two previous steps for the other subheadings.

Header 2

When you’ve finished setting your headers, you can now tell Google Docs to generate a table of contents. Select Insert > Table of contents then select the table style you like the best. You can select from a table with page numbers:

Page NumbersPage Populated

Or one with hyperlinks:

Anchor Links
Anchor Links Populated

Whichever option you choose, you will now have a tiered, easy-to-navigate table of contents in your document.

For more great tips and tricks that you can use to gain productivity, visit Network Solutions Unlimited’s blog regularly.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Network Security Business Work/Life Balance Content Filtering Scalability Rootkit Mobile Device Shortcut Windows 10 Touchpad Phishing Touchscreen Device Security Productivity Emergency IT Solutions Mobile Device Management Unsupported Software Advertising Malware Wireless Data storage Relocation PDF BYOD Retail Bring Your Own Device Google Drive Productivity Software Cost Management HaaS Miscellaneous Cast Managed IT Service iPhone VoIP HIPAA VPN Professional Services Money The Internet of Things Scam MSP Spam Blocking Hosted Solutions Microsoft Office Remote Monitoring Fraud Managed IT Services IT budget App Network Dark Web Meetings Data Loss Virtual Reality Value Smartphone Thank You Legal Efficiency Reputation Ciminal Emails Managed Service Provider Hardware Files Chrome Ransomware Government Disaster Recovery IT Services Encryption Facebook CrashOverride Phone System Sync Adobe Politics Physical Security Monitor Worker Commute Benefits Congratulations Excel Vendor Management Maintenance Outlook Budget Audit How to intranet Charger How To Content Evernote USB Office Tips Monitors Cloud Computing Black Market Backup Robot Automation Bandwidth Search Upgrades Tech Support OneNote hacker Regulation Social Media Document Management Internet of Things Devices Data Protection IT Support Communications Outsourced IT Avoiding Downtime Computer Big Data Safety Identity Theft Administration Bluetooth Root Cause Analysis Business Management Electronic Medical Records Applications Gmail Comparison Windows 10 Managed IT Workers Assessment Public Cloud Microsoft Excel Private Cloud Law Enforcement Cleaning Passwords Sports Mobility Alert Data Recovery Risk Management Business Owner Innovation Smartphones Flexibility Humor Video Games Apps Email Internet exploMicrosoft Operating System Identities Data Storage File Sharing Wi-Fi Server Hard Drives Hybrid Cloud Two Factor Authentication Health Data Breach Commerce Instant Messaging Legislation Proactive IT Mobile Devices Wireless Charging Two-factor Authentication Google Blockchain WIndows Server 2008 Apple Quick Tips Hacking Computer Fan Spam Public Computer Project Management Automobile Business Computing Customer Employer Employee Relationship Employer-Employee Relationship Managed IT Services Consultant Recovery Business Intelligence Office Entertainment Networking Firewall HBO Education Data Security Cybercrime Privacy Cloud Data Backup Nanotechnology BDR NFL Upgrade Tablets Redundancy IT Management Travel Information Technology Word Hackers Marketing Hiring/Firing User Error Windows eWaste Virtualization Experience Vulnerability Transportation Workplace Tips Hosted Solution Techology Smart Technology Laptop Gifts User Tips Data Management Hard Disk Drive Telephone Systems WannaCry Security Save Time FAQ Password Internet Exlporer Small Business Data Battery Updates Compliance Unified Threat Management Chromecast Artificial Intelligence Gadgets Browser IT Support Application Sales Webinar Internet Lifestyle Edge Solid State Drive Augmented Reality Patch Management Going Green Specifications Saving Money SaaS Books Collaboration Computers Cache Holiday Credit Cards Computer Care WiFi Downtime Microsoft Technology Best Practices Mobile Licensing Office 365 Shadow IT Windows Ink Cortana Users Business Continuity Google Docs Best Practice Remote Computing IT solutions Screen Mirroring Samsung End of Support Television Wireless Technology Audiobook Android Social Engineering Software as a Service Personal Information Windows 10s Training Storage Microsoft Word Keyboard Colocation Troubleshooting History Computing Infrastructure Worker Cybersecurity Tip of the Week Save Money iOS Computer Accessories Conferencing Router Google Maps Loyalty Spyware Settings

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *