Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Useful Excel Shortcuts

Tip of the Week: Useful Excel Shortcuts

When most people think “spreadsheet,” they’re thinking about Microsoft Excel. Yet, for how well-known it is, many people are unaware of many of its capabilities. This is particularly true of the shortcuts available to properly format these spreadsheets. For this week’s tip, we’re sharing a few of these formatting tips.

Quick and Easy Tables

Let’s face it—a spreadsheet full of points and figures isn’t the most comprehensive way to view your data. It is far better to instead format that data into a table, as you can then reorganize it and filter it as needed. Once your data is in a spreadsheet, creating a table is as simple as selecting one of your cells, pressing Ctrl + T, and then hitting Enter.

Handy Formatting Shortcuts

Formatting a spreadsheet is a matter of balance. While it isn’t something you want to spend a ton of time and effort doing, it can add a significant amount of comprehension for the person reviewing it. Shortcuts can help make this formatting less intrusive, and more efficient for you, the person creating the spreadsheet in the first place.

Here are a few select shortcuts that you will likely find useful:

  1. Ctrl + B – Bold
  2. Ctrl + I – Italics
  3. Ctrl + U – Underline
  4. Ctrl + 5 – Strikethrough selected text
  5. Ctrl + 1 – Format box for selection
  6. F4 – repeats the last action

Icon Sets

On the topic of visibility, some trends can be challenging to spot without this kind of added context as well. Excel has icons that can automatically put in a bit of visual context. With the cells you want to add the icons to highlighted, click on Conditional Formatting under the Home tab of the menu. There, the Icon Sets option should appear, where you can select the set of your choosing.

These icons are particularly handy because they are automatically configured to adjust to your data. Let’s assume that you pick the icon set with three arrows. Based on the range your data covers, the lowest third is automatically assigned the downward arrow, the middlemost third has the sideways arrow, and the highest third gets the ascending arrow. With five icons, your range is split into fifths, as your range is automatically divided amongst the icons.

What are some of your favorite formatting tricks for Excel? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 18 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Virtualization Social Media Saving Money Holiday Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Networking Health IT Support Internet of Things Hacking Wi-Fi Telephone Systems Information Technology Remote Information Managed Service Provider Covid-19 Spam Alert Office 365 Bandwidth Recovery Employer-Employee Relationship Router BDR Social Engineering Mobility Password Money App History Mobile Computing Encryption Application Applications Human Resources Law Enforcement Data Breach Big Data Remote Monitoring Apps How To Office Tips Training Blockchain Paperless Office VPN Data Storage Patch Management Government Remote Computing Private Cloud Mobile Office Managed IT Flexibility Work/Life Balance Data Security Marketing WiFi Wireless IT solutions Entertainment Website Budget Gmail Google Drive Settings Vulnerability Infrastructure Two-factor Authentication Avoiding Downtime Windows 7 Voice over Internet Protocol Word Mouse HaaS Servers Bring Your Own Device Data Management Cleaning Risk Management Hacker End of Support The Internet of Things Education Physical Security Lithium-ion battery Telephone System Staff Software as a Service Safety USB Machine Learning Sports HIPAA Remote Work Redundancy Connectivity Conferencing Firewall Keyboard Scam Vendor Virtual Reality Managed Services Apple Display Social Vendor Management User Error Save Time Data Protection Employee/Employer Relationship Meetings RMM Current Events Robot CES Computer Accessories Computing Infrastructure Excel Telephony Going Green Biometrics Samsung Business Technology Virtual Desktop Content Management Digital Signage Access Control Battery Value DDoS Virtual Assistant Printer Shadow IT Legal Spam Blocking Electronic Medical Records Bluetooth Authentication SharePoint Internet Exlporer Procurement Net Neutrality Workplace Strategy Hiring/Firing Customer Service PDF Help Desk Update Environment IT Consultant Printing Proactive IT Fax Server Google Docs Humor Identity Theft Managed Services Provider Business Intelligence Best Practice YouTube SaaS Database Black Market Audit Worker IT Management Augmented Reality Remote Workers Botnet Fraud Network Congestion eWaste Document Management Processor IT Plan Wireless Technology Remote Worker Solid State Drive How to Downtime Cryptocurrency Hard Drive Unsupported Software Data storage Charger Wearable Technology Automobile Virus Comparison Compliance Computing Retail Hard Drives Instant Messaging Unified Threat Management OneNote Computer Care PCI DSS Running Cable File Sharing Virtual Machine Specifications Netflix 2FA Two Factor Authentication Camera Managing Stress Fiber Optics Inventory Employee Memory Messaging Wire Cabling Evernote Reputation Root Cause Analysis Streaming Media Knowledge Policy Music Content Hypervisor Cameras HBO Travel Tech Support Skype Millennials Laptop Dark mode Printers Trend Micro Techology SMS Smart Office Default App Wireless Charging Customers Data loss Leadership Procedure Troubleshooting Audiobook Saving Time Science Outlook Google Search Start Menu Workforce Touchpad dark theme Virtual Private Network Shopping AI IT Infrastructure Cables Screen Mirroring Loyalty FinTech Books Distributed Denial of Service Politics Customer Relationship Management Printer Server Advertising Bing Frequently Asked Questions Analyitcs Mobile Telecommuting Windows 10s Project Management Social Network Nanotechnology Investment Programming Cortana Cast Notifications webinar Employees Emergency Employee/Employer Relationships Digital Signature Tip of the week ISP Professional Services Public Cloud Windows 365 Employer Employee Relationship Warranty Video Conferencing Antivirus HVAC ROI Google Apps Relocation Assessment Sales Bitcoin Analysis Shortcuts Windows 8 Windows Server 2008 Video Games Cryptomining Tools Point of Sale Administrator Personal IT service Devices Supply Chain Management Enterprise Content Management Worker Commute Television Monitoring MSP Experience Batteries Accountants Tablet Scalability Credit Cards Windows 8.1 Microchip Digitize Domains Thought Leadership Password Management Consultant Business Owner Windows Server 2008 R2 Password Manager Public Computer NarrowBand Customer relationships Transportation IaaS Maintenance Analytics Regulations Multi-Factor Security Twitter Search Manufacturing Bloatware Computer Fan Email Best Practices Rootkit Search Engine IT Assessment NIST Best Available Business Mangement iPhone Trending Workers Computer Tips Benefits WIndows 7 Managed IT Service Smart Tech Security Cameras Tablets Addiction Biometric Security Entrepreneur Amazon FENG Virtual CIO OneDrive Peripheral Recycling Files IBM Chromecast Digital Security Cameras Smart Technology Wiring Using Data Shortcut Practices Flash Cache 5G Cost Management Amazon Web Services Copiers Quick Tip Safe Mode Social Networking Criminal Colocation Software Tips Uninterrupted Power Supply Supercomputer Sync Windows Media Player Emails Ergonomics GDPR User Hosted Computing PowerPoint Smartwatch Wireless Internet OLED Online Shopping Monitor Development

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code