Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Google Drive comes with a pre-built feature allowing users to scan a picture or document, and save it as a PDF—at least for Android smartphones. The trick can be pulled off with just a couple of taps, making it easier than ever to import documents to your Drive. Here’s how it’s done.

Scan Your Documents to Save Them as PDFs In Drive

Smartphones are a must-have technology in the office, so you don’t need to use the bulky scanner to transport copies of your documents to a cloud service like Google Drive. All you need is your camera and your Google Drive account.

First, go to your Google Drive on your phone. You must then tap the plus sign button to start adding new files to your Drive. There will be a list of options that appears; select Scan to proceed.

This should tell your device to open up the Camera app. You’ll have to provide permissions for it to access Google Drive if you haven’t already done so. Once you’re ready, frame the document with your camera and take the picture. Just confirm that the picture is the one you wish to proceed with, then tap OK.

Google Drive will make some changes to the picture, but you can adjust these yourself by making manual edits. You can add multiple pages to your new PDF as well by using the Add Page button. Once you’re done, tap Save.

Once you are done, name your file and determine which folder you want it to go to. Now you can add any documents you want to your Google Drive without using a scanner.

What kinds of tips would you like to see us cover in the future? Be sure to contact us at 800.618.9844 and let us know.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 January 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Email Privacy Phishing Workplace Tips Google Computer Users Collaboration IT Services Hosted Solutions Mobile Device Quick Tips Ransomware Small Business Cybersecurity Workplace Strategy Microsoft Data Backup Communication Smartphone Android Business Management Smartphones VoIP Saving Money Mobile Devices communications Backup Data Recovery Passwords Managed Service Managed IT Services Upgrade Browser Social Media Disaster Recovery Microsoft Office Tech Term Network Internet of Things Remote Facebook Automation Artificial Intelligence Covid-19 Cloud Computing Windows Miscellaneous Gadgets Remote Work Current Events Server Managed Service Provider Holiday Outsourced IT Productivity Information Spam Employee/Employer Relationship Encryption Windows 10 AI Data Management Training Business Continuity Compliance Office Government Virtualization Business Technology Bandwidth Blockchain Wi-Fi Windows 10 Two-factor Authentication Apps Data Security Mobile Office Managed Services Gmail Voice over Internet Protocol Chrome Employer-Employee Relationship Budget Apple Networking App Mobile Device Management Vendor Applications Information Technology Access Control WiFi Office 365 Tip of the week Conferencing Hacker How To BDR Avoiding Downtime Marketing BYOD Computing Virtual Private Network Risk Management Healthcare Health Help Desk Big Data Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Computers Managed IT Services Website Operating System HIPAA Router Remote Workers Display Printer The Internet of Things Paperless Office Infrastructure Monitoring Free Resource Social Project Management IT Support Document Management Windows 7 Microsoft 365 Telephone Scam Customer Service Solutions Data loss Cooperation Going Green Patch Management Windows 11 Save Money 2FA Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Excel Firewall Cryptocurrency User Tip Modem Processor Safety Computer Repair Mobile Security Virtual Desktop iPhone Data storage LiFi Smart Technology Vulnerabilities Outlook Data Privacy Machine Learning Money Saving Time Images 101 Humor Multi-Factor Authentication Mobility Customer Relationship Management Managed IT Service Maintenance Sports Downloads Antivirus Mouse Hacking Licensing Employees Presentation Entertainment Administration Integration Wireless Technology Telephone System Holidays Robot Cost Management Settings Data Storage Printing Word Wireless Supply Chain Video Conferencing Content Filtering Managed Services Provider IT Management VPN YouTube Meetings Virtual Machines Professional Services Physical Security Entrepreneur Evernote Paperless Username Regulations Compliance Point of Sale Memes 5G Black Friday Co-managed IT Google Docs Unified Communications Database Net Neutrality Experience SQL Server Technology Care Running Cable Tech Support IT Technicians History Business Communications Bitcoin Network Management Financial Data Undo Google Wallet Proxy Server Smartwatch Cookies IT Monitors Cyber Monday Scams Tactics Procurement Hotspot Azure Hybrid Work Laptop Websites Mirgation Cyber security Tech Human Resources Windows 8 Telework Drones CES Nanotechnology Communitications Cables SharePoint Addiction Supply Chain Management Application Electronic Medical Records Language Halloween Chatbots Term Google Apps Management FinTech Lenovo IBM Screen Reader IT Assessment Writing Distributed Denial of Service IT Maintenance Service Level Agreement Flexibility Virtual Reality Computing Infrastructure Value Business Intelligence Scary Stories Private Cloud Identity Shortcuts Hacks Server Management Organization Superfish Bookmark Digital Security Cameras Identity Theft Smart Tech Smart Devices Fun Ransmoware Deep Learning Download Remote Working Twitter Alerts Memory Vendors Competition Error Data Breach Google Play Be Proactive Browsers Videos Education Connectivity Electronic Health Records Social Engineering Break Fix Workforce Wasting Time Threats Upload Remote Computing Trend Micro Multi-Factor Security Security Cameras Workplace Strategies Mobile Computing Social Network Tablet IoT Software as a Service User Search Dark Web Meta Managing Costs Amazon Best Practice Trends Alert Managed IT Customer Resource management Buisness File Sharing Regulations eCommerce Dark Data Google Calendar SSID Legal Data Analysis IP Address IT solutions Star Wars Surveillance How To Microsoft Excel Virtual Assistant Outsource IT Notifications Staff Virtual Machine Environment Media Business Growth Gamification Reviews Travel Social Networking Legislation Medical IT Techology Fileless Malware Google Maps Development Recovery Cortana Transportation Small Businesses Wearable Technology Hypervisor Displays Alt Codes Content Hard Drives Health IT Shopping Domains Downtime Unified Threat Management Motherboard Optimization Comparison PowerPoint Unified Threat Management Directions Hosted Solution Assessment Permissions Employer/Employee Relationships Outsourcing Navigation Typing PCI DSS Refrigeration Gig Economy Public Speaking Network Congestion Specifications Workplace Google Drive User Error Microchip Lithium-ion battery Internet Exlporer Internet Service Provider Knowledge Fraud Teamwork Hiring/Firing

Blog Archive