Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Tip of the Week: How to Capture an Image or Document as a PDF in Android

Google Drive comes with a pre-built feature allowing users to scan a picture or document, and save it as a PDF—at least for Android smartphones. The trick can be pulled off with just a couple of taps, making it easier than ever to import documents to your Drive. Here’s how it’s done.

Scan Your Documents to Save Them as PDFs In Drive

Smartphones are a must-have technology in the office, so you don’t need to use the bulky scanner to transport copies of your documents to a cloud service like Google Drive. All you need is your camera and your Google Drive account.

First, go to your Google Drive on your phone. You must then tap the plus sign button to start adding new files to your Drive. There will be a list of options that appears; select Scan to proceed.

This should tell your device to open up the Camera app. You’ll have to provide permissions for it to access Google Drive if you haven’t already done so. Once you’re ready, frame the document with your camera and take the picture. Just confirm that the picture is the one you wish to proceed with, then tap OK.

Google Drive will make some changes to the picture, but you can adjust these yourself by making manual edits. You can add multiple pages to your new PDF as well by using the Add Page button. Once you’re done, tap Save.

Once you are done, name your file and determine which folder you want it to go to. Now you can add any documents you want to your Google Drive without using a scanner.

What kinds of tips would you like to see us cover in the future? Be sure to contact us at 800.618.9844 and let us know.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Cloud Computing Covid-19 Gadgets Training Server Outsourced IT Managed Service Provider Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Bandwidth Blockchain Virtualization Business Technology Managed Services Two-factor Authentication Mobile Office Data Security Vendor Apps Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget WiFi BYOD Apple App Employer-Employee Relationship Tip of the week Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Managed IT Services Office 365 How To BDR HIPAA Physical Security Applications Access Control 2FA Computers Risk Management Retail Website Healthcare Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health Help Desk Operating System Document Management Excel Managed IT Service Telephone Scam Data loss Remote Workers Cooperation Firewall Patch Management Free Resource Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management The Internet of Things Microsoft 365 Social Solutions Display Printer Going Green Paperless Office Infrastructure Monitoring Windows 11 Customer Service Cybercrime Saving Time Presentation Data Storage YouTube Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Wireless Technology Maintenance Virtual Machines Professional Services Antivirus Downloads Virtual Desktop LiFi Licensing Data storage Entertainment Word Outlook iPhone Money Humor Vulnerabilities Telephone System Robot Data Privacy Cost Management Safety Images 101 Sports Multi-Factor Authentication Mobility Mouse IT Management VPN Meetings Administration User Tip Modem Employees Computer Repair Mobile Security Processor Integration Customer Relationship Management Settings Wireless Printing Smart Technology Holidays Content Filtering Hacking Machine Learning Hypervisor Displays Lenovo Screen Reader Writing Distributed Denial of Service Shopping User Virtual Reality Computing Infrastructure Optimization Knowledge PowerPoint Google Drive Service Level Agreement Server Management Private Cloud Identity Employer/Employee Relationships Outsourcing 5G Navigation Superfish Bookmark Identity Theft Smart Tech PCI DSS Download Gig Economy Unified Communications Twitter Alerts Experience Workplace IP Address Google Docs Bitcoin Error Internet Service Provider Running Cable Teamwork Hiring/Firing Social Engineering Break Fix Evernote Paperless Browsers Google Wallet Connectivity Regulations Compliance Upload Recovery Remote Computing Memes Co-managed IT Social Network Hard Drives Windows 8 Net Neutrality Laptop Multi-Factor Security SQL Server Technology Care Dark Web History Business Communications Domains Drones Tablet IoT Financial Data Trends Smartwatch Alert IT Scams Managed IT Customer Resource management Refrigeration File Sharing Regulations Procurement Halloween Dark Data Google Calendar Azure Hybrid Work How To Microsoft Excel Cyber security Tech Human Resources Data Analysis Public Speaking Star Wars Telework Lithium-ion battery Gamification CES Notifications Staff Communitications Cables Hacks Travel Social Networking Supply Chain Management Entrepreneur Scary Stories Legislation Fun Term Google Apps Techology Fileless Malware Google Maps FinTech Content Deep Learning Wearable Technology IT Assessment IT Maintenance Health IT Undo Unified Threat Management Motherboard Flexibility Comparison Value Business Intelligence Organization Education Permissions Shortcuts Unified Threat Management Directions Assessment Digital Security Cameras Smart Devices Ransmoware Memory Vendors Mobile Computing Remote Working Network Congestion Specifications Fraud Data Breach Search Google Play Be Proactive User Error Microchip Internet Exlporer Username Videos Application Best Practice Electronic Health Records Workforce Wasting Time Threats Point of Sale Buisness Black Friday IT solutions Trend Micro Security Cameras Workplace Strategies IBM Legal Database Network Management Business Growth Tech Support IT Technicians Software as a Service Meta Managing Costs Amazon Proxy Server Cookies Monitors Cyber Monday Hotspot eCommerce Cortana SSID Tactics Alt Codes Websites Mirgation Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Media Competition Nanotechnology Downtime Reviews Hosted Solution Electronic Medical Records Language Medical IT SharePoint Addiction Management Typing Chatbots Development Transportation Small Businesses

Blog Archive