Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Useful Excel Shortcuts

Tip of the Week: Useful Excel Shortcuts

When most people think “spreadsheet,” they’re thinking about Microsoft Excel. Yet, for how well-known it is, many people are unaware of many of its capabilities. This is particularly true of the shortcuts available to properly format these spreadsheets. For this week’s tip, we’re sharing a few of these formatting tips.

Quick and Easy Tables

Let’s face it—a spreadsheet full of points and figures isn’t the most comprehensive way to view your data. It is far better to instead format that data into a table, as you can then reorganize it and filter it as needed. Once your data is in a spreadsheet, creating a table is as simple as selecting one of your cells, pressing Ctrl + T, and then hitting Enter.

Handy Formatting Shortcuts

Formatting a spreadsheet is a matter of balance. While it isn’t something you want to spend a ton of time and effort doing, it can add a significant amount of comprehension for the person reviewing it. Shortcuts can help make this formatting less intrusive, and more efficient for you, the person creating the spreadsheet in the first place.

Here are a few select shortcuts that you will likely find useful:

  1. Ctrl + B – Bold
  2. Ctrl + I – Italics
  3. Ctrl + U – Underline
  4. Ctrl + 5 – Strikethrough selected text
  5. Ctrl + 1 – Format box for selection
  6. F4 – repeats the last action

Icon Sets

On the topic of visibility, some trends can be challenging to spot without this kind of added context as well. Excel has icons that can automatically put in a bit of visual context. With the cells you want to add the icons to highlighted, click on Conditional Formatting under the Home tab of the menu. There, the Icon Sets option should appear, where you can select the set of your choosing.

These icons are particularly handy because they are automatically configured to adjust to your data. Let’s assume that you pick the icon set with three arrows. Based on the range your data covers, the lowest third is automatically assigned the downward arrow, the middlemost third has the sideways arrow, and the highest third gets the ascending arrow. With five icons, your range is split into fifths, as your range is automatically divided amongst the icons.

What are some of your favorite formatting tricks for Excel? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Upgrade Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Office Cloud Computing Data Recovery Server Save Money Windows 10 Passwords Gadgets Tech Term Virtualization Saving Money Holiday Social Media Chrome Automation Managed IT Services Microsoft Office Managed Service Artificial Intelligence Computers Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Networking IT Support Health Hacking Internet of Things Spam Alert Office 365 Remote Telephone Systems Information Technology Covid-19 Managed Service Provider Information Bandwidth Recovery Employer-Employee Relationship Router BDR Social Engineering Mobility Remote Monitoring Mobile Computing Password Money App History Application Encryption Applications Human Resources Big Data Law Enforcement Data Breach Managed IT Apps How To Office Tips Training VPN Data Storage Blockchain Patch Management Paperless Office Government Remote Computing Private Cloud Mobile Office Voice over Internet Protocol Flexibility Marketing Bring Your Own Device Data Management WiFi Work/Life Balance Data Security IT solutions Entertainment Website Budget Wireless Gmail Google Drive Settings Vulnerability Windows 7 Two-factor Authentication Avoiding Downtime Word Mouse Servers HaaS Infrastructure Save Time User Error Meetings Cleaning Risk Management Data Protection Hacker USB End of Support The Internet of Things Education Lithium-ion battery Physical Security Safety Vendor HIPAA Managed Services Sports Redundancy Display Firewall Conferencing Keyboard Software as a Service Telephone System Staff Scam Machine Learning Employee/Employer Relationship Virtual Reality Apple RMM Connectivity Remote Work Social Vendor Management Unsupported Software Unified Threat Management Computer Accessories Data storage Digital Signage Charger Automobile Augmented Reality Wearable Technology Retail Fraud Compliance Hard Drives OneNote Computer Care Instant Messaging Current Events Robot Excel Computing Infrastructure Remote Worker Going Green Telephony Procurement Workplace Strategy Printer Cryptocurrency Net Neutrality Samsung Biometrics Virtual Desktop Bluetooth Help Desk Battery Printing Value Comparison Shadow IT DDoS Spam Blocking Electronic Medical Records Legal SharePoint CES Managed Services Provider IT Consultant Internet Exlporer Hiring/Firing Business Technology Database Content Management Access Control Customer Service Humor PDF Remote Workers Environment Virtual Assistant Processor Authentication Fax Server Proactive IT Best Practice Business Intelligence YouTube SaaS Hard Drive Black Market Audit Worker Update IT Management Botnet Computing Network Congestion Google Docs Document Management IT Plan eWaste Wireless Technology Identity Theft Solid State Drive How to Virus Downtime Accountants IBM User PowerPoint Files Messaging MSP Windows Media Player Cabling Policy Microchip Chromecast Flash Hypervisor Thought Leadership Shortcut Credit Cards Smart Technology Dark mode Trend Micro Password Management Password Manager Cost Management Default App Supercomputer Social Networking Multi-Factor Security Managing Stress Colocation SMS Uninterrupted Power Supply Software Tips Procedure Search Engine Sync Saving Time Twitter Emails dark theme Cameras Monitor Shopping NIST Google Search Business Mangement IT Infrastructure Smart Tech Trending AI Running Cable FinTech Addiction Netflix Bing Amazon Two Factor Authentication Memory Reputation Social Network Streaming Media Root Cause Analysis Recycling Investment Practices Knowledge Music Content Wiring Tech Support HBO Employees Laptop Skype Employee/Employer Relationships Cache Amazon Web Services Techology Windows 365 Printer Server Customers Safe Mode Data loss ISP Criminal ROI Hosted Computing Leadership Troubleshooting Audiobook Science Video Conferencing GDPR Outlook Sales Touchpad Start Menu Bitcoin Wireless Internet Shortcuts Online Shopping Point of Sale Personal File Sharing Screen Mirroring Cryptomining Loyalty Distributed Denial of Service Inventory Customer Relationship Management Specifications Books Politics Advertising Supply Chain Management Camera Frequently Asked Questions Monitoring Mobile Batteries Wire Windows 10s Evernote Analyitcs Programming Travel Windows 8.1 Digitize Notifications Cast Tip of the week Windows Server 2008 R2 webinar Millennials Emergency Printers Customer relationships Professional Services Smart Office Public Cloud Wireless Charging Employer Employee Relationship Assessment Email Best Practices Relocation IT Assessment Antivirus Manufacturing Windows Server 2008 Workforce Windows 8 Virtual Private Network Video Games Computer Tips Tools Managed IT Service IT service Security Cameras Cables Consultant Television Worker Commute Virtual CIO Analytics OneDrive Biometric Security Nanotechnology Telecommuting Experience Tablet Peripheral Project Management Scalability Digital Security Cameras Using Data Domains Cortana Best Available Public Computer WIndows 7 Business Owner Copiers 5G Digital Signature NarrowBand Regulations IaaS Maintenance Transportation Quick Tip Warranty Search Ergonomics HVAC Computer Fan Smartwatch Google Apps Rootkit Bloatware iPhone Development OLED Analysis Administrator Virtual Machine Devices Workers Benefits Tablets PCI DSS 2FA Fiber Optics Enterprise Content Management FENG Employee Entrepreneur

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code