Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Handy Tricks to Formatting Excel Spreadsheets

Tip of the Week: Handy Tricks to Formatting Excel Spreadsheets

Microsoft Excel is, for many, the de facto spreadsheet-creation software. However, fewer know about its useful formatting capabilities and shortcuts. To help you make your own Excel sheets more comprehensible, we’re sharing some tips to help you format your documents.

Fast Table Format

When you have a data set that outlines different related data points, using a table is one of the best ways to review it, as the table allows you to reorganize and filter the data it includes. If your data is already in a spreadsheet, you can quickly create a table by selecting a cell and pressing Ctrl + T, and then pressing Enter.

Excel Formatting Shortcuts

Of course, when you’re hard at work on a spreadsheet, you don’t want to spend too much time playing with a whole lot of nitty-gritty formatting but this kind of formatting could potentially make your spreadsheet that much more easy to understand.

In addition to the familiar Ctrl + B for bold, Ctrl + I for italics, and Ctrl + U for underline, Excel offers plenty of other shortcuts to help you format your sheets. For instance, pressing Ctrl + 5 when text is selected will mark that text with a strike through, while pressing Ctrl + 1 with anything highlighted will bring up a format dialog box for that selection. Pressing F4 will repeat the last action, which is handy if you want to apply specific formatting to certain cells.

Icon Sets

Adding icons to your cells can help provide some context at a glance, and it is simple to do. With the cells you intend to accentuate highlighted, click on Conditional Formatting (which can be found under the Home tab. You will see an option for Icon Sets, where you can select the icon set that best suits your needs.

In fact, these icons are preconfigured to differentiate between certain data ranges. For instance, if you were to pick the option with three arrows, the downward arrow represents when your data is in the lower 33 percent, the sideways arrow the middle 33 percent, and the upward arrow the top 33 percent. These numbers shift with the number of icons you have available, divvying up evenly.

What Excel formatting tricks do you know? Share them with us in the comments!

4 Tools that Every Small Business Should Use
Remote Monitoring and Managed IT, and the Impact i...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Hosted Solutions Network Security Privacy IT Services Email Data Backup Internet Malware Hackers Software IT Support Business Efficiency Outsourced IT Microsoft Innovation Mobile Devices Productivity Data Recovery Computer Hardware Managed IT Services Small Business Google Upgrade Business Continuity IT Support Cloud Computing Cybersecurity Backup Collaboration Ransomware Phishing Smartphone User Tips Communication Tech Term Managed IT Services Managed Service Provider Workplace Tips Disaster Recovery Business Management VoIP Windows 10 Managed Service Mobile Device Smartphones Internet of Things Android Data Management Quick Tips Remote Monitoring Social Media Paperless Office Managed IT communications Network Facebook Browser Encryption Saving Money Windows 10 Save Money Windows Server Office 365 Artificial Intelligence Virtualization BDR Miscellaneous Business Technology BYOD Covid-19 Passwords Help Desk Wi-Fi Compliance Risk Management Holiday Government Document Management Apps Remote Work Vendor Management App Training Password Users Windows 7 Health Office Healthcare Mobile Device Management Microsoft Office Automation Unified Threat Management Gmail Content Filtering Bring Your Own Device Avoiding Downtime Going Green Employer-Employee Relationship Robot Big Data Data Security Applications Chrome Analytics Bandwidth Laptops Firewall Recovery IT Management Redundancy Money Tip of the week Information Scam Blockchain Data storage Computing Antivirus Project Management Information Technology Wireless Infrastructure SaaS Telephone Systems Data loss Vulnerability Processor Mobility Regulations File Sharing Two-factor Authentication Computers Apple Hosted Solution Storage Website Hard Drive IoT Flexibility Politics Work/Life Balance Access Control Customer Service Budget VPN Company Culture Virtual Reality RMM Gadgets Operating System Printing Customer Relationship Management Virtual Private Network OneDrive Proactive Machine Learning Unified Communications Remote Computing Settings IT Service Employee-Employer Relationship Tablet Software as a Service Router Downtime Meetings Files Maintenance Social Education Private Cloud Solid State Drive How To Samsung Word Search LiFi Tech Support Wireless Technology Legal Current Events Chromebook IT solutions Internet Exlporer Digital Payment HIPAA Social Network Websites Identity Theft Electronic Health Records Cooperation Monitoring Sports Mobile Security File Management Licensing Mobile Office Employees Time Management Networking Bitcoin Upgrades Patch Management Twitter Recycling Payment Cards Mouse Data Breach Utility Computing Consulting Outlook Network Management Co-Managed IT Display Dark Web Google Drive Augmented Reality End of Support Data Storage Assessment Server Management Managed Services Provider Spam Professional Services Managed Services How To Monitors WiFi The Internet of Things YouTube Business Growth Remote Monitoring and Management Alert Uninterrupted Power Supply Management Electronic Medical Records Consultation Mobile Computing Smart Technology Remote Workers Administration Net Neutrality Remote Worker Hacker Superfish WPA3 Financial Microsoft Excel Modem Projects Gamification IT Budget Enterprise Resource Planning Bookmarks Multi-Factor Security Wearable Technology Cyber security Deep Learning Virtual Desktop Distributed Denial of Service Annual Convention Proactive Maintenance Digitize Safety Bluetooth Features Printer Alerts Wasting Time Smart Devices Cabling Dark Data Personal Information Permission Alt Codes Proactive IT ROI Spyware Course Geography Authorization Comparison Identity Solid State Drives Credit Cards Fleet Tracking Procurement Cookies Return on Investment Cryptocurrency Notifications Shortcut Mobile Favorites Google Calendar Teamwork Point of Sale Managed IT Service San Diego Database Management Shadow IT Black Market Cache Database Sensors Cybercrime Peripheral Firefox Test Telephony Holidays Typing Writing Emoji Heating/Cooling IT Consulting Star Wars Notes Sync Hacks High-Speed Internet Specifications Options Asset Tracking Marketing Permissions Nanotechnology Active Directory Public Cloud WannaCry Conferencing Legislation IT Technicians Shared resources Law Enforcement Windows Server 2008 Best Practice Network Congestion MSP Break Fix Social Networking GDPR Botnet Outsourcing Hacking Cyberattacks Buisness SharePoint Staff Voice over Internet Protocol Travel PCI DSS Computer Repair 5G IT Retail Cortana Servers Unified Threat Management Hotspot PowerPoint Value of Managed Services Mobile Device Managment Software Tips Outsource IT Physical Security Development Zero-Day Threat Black Friday Roanoke — Central Technology Solutions OneNote Fraud Screen Reader Windows Server Automobile Computer Care Windows 8 Save Time 3D Printing Managing Stress Instant Messaging Mirgation Gadget Tech Terms Motherboard Video Conferencing Identities Processors Disaster Trending eWaste Read Only Downloads Telephone Wireless Internet Business Telephone GPS Technology Laws User Error Language Office Tips Laptop Mail Merge Cables Backup and Disaster Recovery Cyber Monday technology services provider Update Touchscreen Techology Smart Tech Security Cameras User Management Unsupported Software Virus VoIP Sponsor Enterprise Content Management Finance Migration Manufacturing Optimization Google Wallet Lenovo Theft Data Warehousing Biometric Supercomputer Hard Drives Google Docs Operations Transportation Crowdsourcing Mobile VoIP CRM Technology Assurance Group ’s 18 Employer/Employee Relationships IT Assessment Tracking Social Engineering USB Statistics Cost Management E-Commerce Computing Infrastructure Virtual Assistant Vendor G Suite History Humor Remote Working Address Wires Human Error Drones Disaster Resistance Connectivity Batteries Google Maps Backups Mobile Data Digital Obstacle Vulnerabilities Authentication Technology Tips Chatbots Hard Disk Drives Virtual Machines Taxes Students Webcam IT Consultant Error Hard Disk Drive Regulation Web Server Emergency CrashOverride Cameras Motion Sickness Administrator CCTV Relocation Printers