facebook linkedin twitter

Computerware Blog

Tip of the Week: Setting Up Excel to Track Changes

Tip of the Week: Setting Up Excel to Track Changes

Today’s software solutions are hugely benefited by the collaborative capabilities that are now included in them, but this is not to say that there isn’t the potential for confusion as people make changes to documents. Some software lets you track these changes, which is particularly useful in particularly dense applications like Microsoft Excel.

For this week’s tip, we’ll show you how you can easily set Excel up to keep track of any changes that your collaborators have made. Fair warning, this will involve a little bit of meddling in your menu options, so don’t hesitate to ask someone for help if it would make you feel more comfortable.

It is also important to take note that the Track Changes function will not work in a spreadsheet that contains tables, unless the table is converted to a range. To do so, simply select the table, and in the Design tab, click Convert to Range.

Furthermore, other users can only collaborate on Excel workbooks that have been saved to a shared location, so make sure that your files are saved in the right spots so that others are able to access them.

Adding the Buttons to Track Changes

First, you need to have an easy way to access these options, so it makes sense to add them to your Ribbon menu if need be. Some versions include these options by default, but some don’t. If it isn’t already there, make sure you add the button to the menu like so:

  • Right-click on the Ribbon menu and select the Customize the Ribbon option.
  • On the dialog screen that appears, locate the Choose commands from: drop-down menu, and select All Commands. The other menu should be set to Main Tabs, which means you’ll be able to find Review in the list. Click on the + next to Review, and then click the New Group button.
  • Right click on your New Group and rename it to “Track Changes.”
  • With “Track Changes” selected, find Highlight Changes and Accept/Reject Changes in the left-hand list and click the Add button to add them to your “Track Changes” group.

Once it has been added to the Ribbon menu under the Review category, you’ll need to configure your Highlight Changes button. Click on it, and in the box that appears, select both Track changes while editing… and Highlight changes on screen. Click Okay.

All the changes made on the spreadsheet by anyone will be annotated with a small triangle in the corner of the cell, displaying the most recent change.

Reviewing Changes

Once everyone has had their say and the time comes to pass or veto the changes made, click the Accept/Reject Changes button. You’ll be prompted to Save the Workbook, and once you do that, the spreadsheet will display with the first edited cell highlighted and another dialog box labeled Select Changes to Accept or Reject.

All changes made will be listed, allowing you to pick the best option and click Accept, or Reject if none of the options improve anything. The cursor will move to the next cell to review, and you can repeat the process. If multiple cells were changed in the same way (as when all uses of “&” needed to be changed to “and” or percentages needed to be written out as such), the Accept All button will make the needed changes.

Hopefully, this will help make collaboration a simpler process for you and your team. For more tips and best practices, make sure you subscribe to our blog, or give our team a call at (703) 821-8200 for in-depth IT assistance.

Do You Need to Extend Your Wireless Network?
IT Help Desk and Its Business Benefits


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 31, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Backup Productivity Business Hosted Solutions Managed Service Provider Email Productivity Malware IT Services Saving Money Google Efficiency Innovation Small Business User Tips Collaboration Computer IT Support VoIP Quick Tips Data Backup IT Support Network Smartphones Data Recovery Business Continuity Mobile Devices communications Disaster Recovery Microsoft Office Gadgets Android Social Media Cybersecurity Smartphone Upgrade Mobile Office Phishing Communication Server Virtualization Miscellaneous Mobile Device Management Ransomware Passwords Mobile Device Operating System Holiday Vendor Management Windows Users Tech Term Managed IT Services Windows 10 BDR Apps Outsourced IT Internet of Things Unified Threat Management Remote Monitoring Facebook BYOD Automation WiFi Remote Computing Managed IT services Apple Mobile Computing Data Management Analytics Windows 10 History Artificial Intelligence Browser Cloud Computing The Internet of Things Marketing Training Covid-19 Business Technology Save Money Firewall Help Desk Alert Health App Encryption Big data Spam Bandwidth Office IT Consultant Managed Service Information Technology Office 365 Budget Two-factor Authentication Access Control VPN Gmail Managed IT Government Windows 7 Cybercrime Blockchain Content Filtering Going Green Hard Drives Information Bring Your Own Device Maintenance Antivirus Printer Tech Support Search Remote Work Virus Recovery Employer-Employee Relationship Retail Best Practice Lithium-ion Battery Wi-Fi Cost Management Networking Windows 8 Outlook Document Management Hiring/Firing Wireless Technology Computers Healthcare Saving Time Travel Education Storage Data Security It Management Update Phone System iPhone Conferencing Data Loss Hacking IBM Money Augmented Reality Project Management Computing Humor Customer Service Hard Drive Wireless Vendor Law Enforcement Intranet Twitter Solid State Drive Compliance Mobility Website Data storage Applications Avoiding Downtime Flexibility Patch Management Risk Management Current Events Laptop Password Value Voice over Internet Protocol Legal Save Time Downtime Data Breach Hacker Customer Relationship Management Regulations PowerPoint Computer Repair Running Cable Proactive IT SaaS Administration File Sharing Securty Google Maps DDoS Social Engineering Black Market Cryptocurrency Word Net Neutrality Meetings Private Cloud Cortana Scam Business Growth Chrome Business Intelligence Excel Digital Payment Router Monitoring Telephony Machine Learning Paperless Office Telephone Systems Fax Server Digital Comparison Tablet Websites Company Culture Management Sports Employee/Employer Relationship Disaster User Hosted Solution Vulnerabilities Virtual Desktop End of Support Social Networking Software as a Service Social Robot Cooperation Network Congestion Documents Uninterrupted Power Supply Notifications IT service Entertainment Vulnerability Teamwork Heating/Cooling Processor Bitcoin Virtual Reality Politics Bluetooth Streaming Media Automobile Inbound Marketing Data Protection Emails Distribution Solutions Chromebook Professional Services Computing Infrastructure Hack Employees Downloads Memory How To eWaste Google Docs Pain Points Cost Co-managed IT Integration Experience User Error Download Redundancy Cleaning Smart Devices Monitors Office Tips Processors Video Conferencing Computer Accessories Microchip Taxes Managed Services Provider Evernote Virtual Assistant Lifestyle Distributed Denial of Service USB YouTube Unified Communications Settings Trending Multi-factor Authentication Presentation How To Gaming Console Telephone Public Cloud Licensing Start Menu Tech Terms Mouse Managed Services Specifications Safety Text Messaging Managed IT Service Webcam Mobile Technology Programming Identity Theft Statistics Supply Chains Point of Contact Nanotechnology Social Network Employer/Employee Relationships Desktop Finance CCTV Digital Signature Google Play Telephone Service Google Drive Windows Server 2008 Reliable Computing Microsoft 365 3D Ebay Music Electronic Health Records Business Cards Service Level Agreement Get More Done Business Metrics Computer Malfunction Managing Costs Thin CLient Spyware Mobile Payment switches Writing Financial Data Startup Asset Tracking Medical IT Trend Micro Memes Unified Threat Management Backup and Disaster Recovery Turn Key In Internet of Things Browsers Smart Phones Electricity Printing Upgrades Username Printer Server 2FA Analytic Screen Reader Customer Resource management PDF User Tip Proactive Maintenance Managing IT Services Recycling Gamification Trojan Security Cameras Threats LiFi Organize Scalability Adminstration Pirating Information Surveillance Piracy Upload Motion Sickness Best Available Keyboard Navigation Virtual Machine Leadership cache Television Telework Product Reviews Smart Tech Domains eCommerce Work/Life Balance IT Read Fiber-Optic Database Data Analysis WannaCry Deep Learning Remote Workers HTML Messenger Tracking Freedom of Information Visible Light Communication Remote Telephone System Printers SQL Server Corporate Profile Virtual Private Network Mobile Security Rental Service Public Speaking GDPR Managing Risk Time Management Multi-Factor Security Cabling Development Device Management Software License Trends Web Server Shortcut Tech Hypervisor Assessment SharePoint IT consulting FinTech Troubleshooting Holidays Tip of the week Content Management Fraud Tactics Administrator Entrepreneur Fileless Malware Hybrid Cloud Google Calendar Data Storage Business Managemenet Devices Webinar Books Workers Touchscreen News Advertising Flash Environment Proxy Server Azure VoIP CIO Procurement UTM Content Supercomputer HIPAA Modem Strategy Upselling Legislation Error Worker Electronic Payment Electronic Medical Records Transportation Video Surveillance Knowledge Staffing Google Wallet online Currency IT Plan Enterprise Resource Planning Competition Term Consultation Windows XP Organization Business Owner Recording Optimization Society Communitications email scam Addiction Directions Display Saving ZTime Technology Tips Displays PCI DSS Accountants A.I. Reading Samsung Fake News G Suite Dark Web Free Resource Audit Micrsooft Supply Chain Management LinkedIn Employer Employee Relationship IP Address SSID Wireless Headphones Human Resources Health IT Debate Drones Internet Service Provider Migration Connected Devices Best Practives Hacks Physical Security Application Processing Harddrive Data Warehousing AI Logistics Virtual Machines GPS Emergency Hard Drive Disposal IT Assessment Archive Network Management Banking Botnet Wasting Time Access Regulations Compliance Skype Equifax Fleet Tracking Relocation Tablets Microsoft Excel Permissions Language Microserver Sync Bookmark External Harddrive Computer Care Remote Working Device security MSP Cyber security Financial Managing Stress 3D Printing CrashOverride Regulation Reviews Capital Personal Information Productuvuty