Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Google Drive comes with a pre-built feature allowing users to scan a picture or document, and save it as a PDF—at least for Android smartphones. The trick can be pulled off with just a couple of taps, making it easier than ever to import documents to your Drive. Here’s how it’s done.

Scan Your Documents to Save Them as PDFs In Drive

Smartphones are a must-have technology in the office, so you don’t need to use the bulky scanner to transport copies of your documents to a cloud service like Google Drive. All you need is your camera and your Google Drive account.

First, go to your Google Drive on your phone. You must then tap the plus sign button to start adding new files to your Drive. There will be a list of options that appears; select Scan to proceed.

This should tell your device to open up the Camera app. You’ll have to provide permissions for it to access Google Drive if you haven’t already done so. Once you’re ready, frame the document with your camera and take the picture. Just confirm that the picture is the one you wish to proceed with, then tap OK.

Google Drive will make some changes to the picture, but you can adjust these yourself by making manual edits. You can add multiple pages to your new PDF as well by using the Add Page button. Once you’re done, tap Save.

Once you are done, name your file and determine which folder you want it to go to. Now you can add any documents you want to your Google Drive without using a scanner.

What kinds of tips would you like to see us cover in the future? Be sure to contact us at 800.618.9844 and let us know.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Microsoft Cybersecurity Backup Passwords Communication Data Backup Saving Money Smartphone Android Managed Service Business Management Smartphones VoIP Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Productivity Microsoft Office Windows Managed IT Services Current Events AI Tech Term Network Remote Internet of Things Facebook Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Holiday Miscellaneous Remote Work Information Server Managed Service Provider Training Outsourced IT Compliance Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Virtualization Blockchain Wi-Fi Windows 10 Business Technology IT Support Apps Data Security Vendor Mobile Office Two-factor Authentication Budget Apple Networking Employer-Employee Relationship App BYOD Mobile Device Management Managed Services Gmail Voice over Internet Protocol Chrome Conferencing WiFi How To BDR Hacker HIPAA Avoiding Downtime Computing Applications Marketing Information Technology Access Control Office 365 Tip of the week Retail Storage Big Data Password Bring Your Own Device Managed IT Services Computers Operating System Router Website Risk Management Virtual Private Network Health Help Desk Analytics Office Tips Augmented Reality Healthcare The Internet of Things Telephone Free Resource Social Scam Data loss Project Management Windows 7 Cooperation Microsoft 365 Customer Service Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Display Printer 2FA Paperless Office Infrastructure Excel Firewall Monitoring Remote Workers Document Management iPhone Managed IT Service Maintenance Downloads Vulnerabilities Antivirus Sports Data Privacy Mouse Licensing Images 101 Entertainment Administration Mobility Multi-Factor Authentication Customer Relationship Management Robot Telephone System Cost Management Hacking Employees Settings Presentation Wireless Integration Printing Content Filtering IT Management Wireless Technology YouTube Meetings VPN Cryptocurrency Holidays Modem User Tip Processor Data Storage Computer Repair Mobile Security Supply Chain Word Virtual Desktop Video Conferencing Data storage LiFi Managed Services Provider Virtual Machines Professional Services Smart Technology Outlook Machine Learning Safety Money Saving Time Humor IT Scams Hacks Server Management Smartwatch Scary Stories Private Cloud Identity Identity Theft Smart Tech Procurement Fun Azure Hybrid Work Superfish Bookmark Tech Human Resources Deep Learning Download Telework Twitter Alerts Cyber security Communitications Cables CES Error Education Connectivity Supply Chain Management Social Engineering Break Fix Application Browsers Term Google Apps Upload FinTech Remote Computing IT Assessment IBM Multi-Factor Security IT Maintenance Mobile Computing Social Network Tablet IoT Flexibility Search Dark Web Value Business Intelligence Shortcuts Best Practice Trends Organization Alert Buisness File Sharing Regulations Smart Devices Dark Data Google Calendar Ransmoware Managed IT Customer Resource management Digital Security Cameras Legal Data Analysis IT solutions Star Wars Remote Working How To Microsoft Excel Memory Vendors Google Play Be Proactive Business Growth Gamification Notifications Staff Data Breach Competition Travel Social Networking Electronic Health Records Legislation Workforce Videos Techology Fileless Malware Google Maps Cortana Wasting Time Threats Security Cameras Workplace Strategies Alt Codes Content Wearable Technology Trend Micro Downtime Unified Threat Management Motherboard Software as a Service Comparison Meta User Health IT Unified Threat Management Directions Hosted Solution Assessment Permissions Managing Costs Amazon SSID Typing eCommerce Surveillance IP Address Network Congestion Specifications Virtual Assistant Outsource IT Google Drive User Error Microchip Internet Exlporer Knowledge Fraud Virtual Machine Environment Media Medical IT Username Reviews Point of Sale Development 5G Black Friday Transportation Small Businesses Recovery Google Docs Unified Communications Database Experience Hypervisor Displays Hard Drives Domains PowerPoint Bitcoin Network Management Shopping Running Cable Tech Support IT Technicians Optimization Cookies Monitors Cyber Monday Employer/Employee Relationships Outsourcing Google Wallet Proxy Server Tactics PCI DSS Hotspot Refrigeration Navigation Public Speaking Workplace Windows 8 Gig Economy Laptop Websites Mirgation Nanotechnology Internet Service Provider Lithium-ion battery Teamwork Hiring/Firing Drones Evernote Paperless Entrepreneur SharePoint Addiction Regulations Compliance Electronic Medical Records Language Memes Co-managed IT Management Halloween Chatbots Screen Reader Net Neutrality Writing Distributed Denial of Service SQL Server Technology Care Lenovo Business Communications Service Level Agreement Financial Data Virtual Reality Computing Infrastructure History Undo

Blog Archive