Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Tip of the Week: Mastering Page Orientation in Microsoft Word

Tip of the Week: Mastering Page Orientation in Microsoft Word

There are times when using Microsoft Word that will require the addition of an outside element, usually something like an Excel sheet, PowerPoint slide or other visual aid. A common issue faced by users is having to significantly alter the size of the external element to fit between the margins of the portrait orientation, ultimately detracting from its impact.

Here is a quick example of an occasion where changing the orientation for a single page in a document might be of value.

Portrait to Landcape

Begin by navigating to the page inside your Microsoft Word document that you would like to change the orientation of. Once there, make sure that your cursor is on the page.

Open the Layout menu and click the button to expand the Page Setup submenu, as seen below.

Open Page Setup Menu

Next select the orientation you desire and select what you’d like it applied to using the drop down menu, as demonstrated. In this case, you’ll select ‘This section’. Click OK.

Switching Menu Orientation

Looking for more tips, tricks and hints that will improve the way you and your employees make use of technology? Make sure you check back to Network Solutions Unlimited’s blog every week for the latest and greatest IT how-tos!

You Can’t Ignore the Elephant in the Server Room
Is Your Cybersecurity Prepared for 2018?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Laptop Email Update Video Games Proactive IT Memory Loyalty Transportation Fraud Data Breach WPA3 Business Management Virtual Reality Smartphone Upgrades App Information Technology iPhone Ciminal Hybrid Cloud Excel Device Security Vendor Management Compliance Hardware WIndows Server 2008 Cybersecurity Saving Money VoIP SaaS Augmented Reality Operating System Bandwidth Customer Hiring/Firing Passwords Sync Gamification Streaming Media Value Data Theft Business Technology Professional Services Entertainment Connectivity Cortana Productivity Cloud Computing Storage Applications Microsoft History Smart Technology IT Services Peripheral IoT Internet Exlporer Office 365 Information Analysis How To Microsoft Excel MSP Managed IT Services Hosted Solution Cleaning Conferencing Tip of the Week Audit Automation Lifestyle Virtualization Phone System Websites Webinar Monitor Two-factor Authentication Avoiding Downtime IT Support End of Support Monitoring Reputation Licensing Spam Blocking Mobile Devices Identity Theft Retail Tablets Network Settings Cost Management Networking USB Risk Management Dark Web Marketing Network Security Budget App store Chromecast Apps Windows 10 Humor Two Factor Authentication Privacy Worker Computing Black Market Law Enforcement Windows Ink Redundancy Project Management Social Media Files Cloud Computer Care eWaste Firewall Mobility Printing Data Backup Safety Relocation Holiday hacker How to Vendor Business Computing User Error Scalability Public Cloud Root Cause Analysis Microsoft Office Computer Fan Touchpad Credit Cards Gadgets Hacking Antivirus Robot Workplace Tips Microsoft Word Company Culture Outlook Thank You Managed IT Services Management The Internet of Things Google Maps Samsung Downtime Bring Your Own Device Wireless Charging intranet Cybercrime Printers Miscellaneous Small Business Benefits Automobile Travel Tech Term Quick Tips FAQ Remote Monitoring Projects Blockchain BDR Work/Life Balance Managing Stress Encryption Router Health HBO Windows Malware Browser Hosted Solutions Nanotechnology Collaboration Unsupported Software Amazon Financial Technology Legal Unified Threat Management Education Monitors Ransomware Students IT Management Application Saving Time Gmail Colocation Legislation Hard Disk Drive Users Software as a Service Office Business Owner Recovery HIPAA Evernote WiFi Managed IT Service PowerPoint Congratulations Identities Mobile Device Cast Proactive Personal Information Identity Shadow IT Chrome CrashOverride Save Money Content Filter Shortcut Remote Computing HaaS Sports Language Adobe Private Cloud Hackers Phishing WannaCry Data Management Techology Solid State Drive Advertising PDF Politics Emergency Keyboard Shortcuts Social Engineering File Storage Telephone Wireless Technology Google Drive Android Backup Telephone Systems Efficiency Worker Commute Communication Wasting Money Software Password Alexa for Business Unified Communications Computer Forensics Internet Wasting Time Audiobook Financial Wireless Internet Managed Service Tech Support Data Rootkit Data Privacy Business Continuity Employer-Employee Relationship Edge Computer Regulation Google Docs iOS Money Display Consultant Facebook Outsourced IT Internet of Things Computers Bluetooth IT Support Alert Business Windows 7 IT Solutions Going Green Utility Computing Spyware Devices Managed IT Specifications Technology Hard Drives Disaster Recovery Spam Document Management Computing Infrastructure Windows 10 Keyboard Hyperlink File Sharing Meetings Mobile Security Co-Managed Services Twitter Security Smart Tech Accessory Charger Mobile Device Management Apple Virus Best Practice Data Security Touchscreen Artificial Intelligence Troubleshooting User Tips NFL Experience Data Protection Mobile Windows 10s Updates Server Administration Hard Drive Assessment Scam Employer Employee Relationship Productivity IT solutions Save Time Commerce Office Tips Battery Smartphones Admin Television Government Emails Managed Service Provider Communications Instant Messaging Wireless OneNote Chromebook Cache Gifts Public Computer Internet exploMicrosoft Training Electronic Medical Records IT budget Search Testing Data storage Content Filtering Data Storage Virtual Assistant Business Intelligence Maintenance Books Google Word Content Data Loss Comparison Flexibility Innovation BYOD Big Data Access Control Sales Google Assistant Vulnerability Camera Workers Screen Mirroring Physical Security Data Recovery Computer Accessories Best Practices Upgrade VPN Patch Management Wi-Fi Employee-Employer Relationship