ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel Tips That Work

Tip of the Week: Excel Tips That Work

Microsoft Excel has a ton of functionality, but how much of it are you actually utilizing? This week’s tip will help you take full advantage of keyboard shortcuts, so you can leverage the solution to the best of your ability.

Align
The most basic Excel formatting you can take advantage of is aligning the values in the cells to the left, right, or center. Here are the keyboard shortcuts for each:

  • To center the value within the cell, press Alt+H+A+C.
  • To align the value within the cell to the left, press Alt+H+A+L.
  • To align the value within the cell to the right, press Alt+H+A+R.

Specific Formatting
Your spreadsheet contents might require specific formatting so their meaning can be effectively conveyed. To assign this formatting, try out the following keyboard shortcuts:

  • To return your value to general formatting, press Ctrl+Shift+~.
  • To indicate that a value refers to currency, press Ctrl+Shift+$.
  • To format a value as a percentage, press Ctrl+Shift+%.
  • To properly format a date, press Ctrl+Shift+#.
  • To format a value in scientific terms, press Ctrl+Shift+^.
  • To ensure that a number is properly formatted, press Ctrl+Shift+!.
  • To properly format time, press Ctrl+Shift+@.

Applying Borders
Borders are practically necessary when you’re using a spreadsheet, as they can mean more distinction between values. Here are some shortcuts to try for your cell borders:

  • To cut to the chase and apply a border to all of a cell’s edges, press Ctrl+Shift+A.
  • To only add a borderline to the right edge of a cell, press Alt+R.
  • To add a border to the left edge of a cell, press Alt+L.
  • To put a border on the top edge of a cell, press Alt+T.
  • To apply a border to the bottom edge of a cell, press Alt+B.
  • To easily remove the borders from a cell, press Ctrl+Shift+_.

Appearance
If you thought the previous shortcuts were basic, get a load of these ones. They are the same shortcuts you know and love from various other Microsoft applications.

  • To have your data appear in a bold font, press Ctrl+B.
  • To type in italics, press Ctrl+I.
  • To underline the contents of a cell, press Ctrl+U.
  • To strikethrough the contents of a cell, press Ctrl+S.

We hope that you’ll put this list to good use. You could even print it out so that it’s more accessible. Why not distribute it to the employees in your office while you’re at it?

Do you have any suggestions for tips you want to see covered in future articles? Leave them in the comments below and be sure to subscribe so you don’t miss a beat.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware Smartphone communications Small Business Smartphones Microsoft Office Upgrade Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Passwords Holiday Disaster Recovery Apps Managed Service IT Support Windows 10 Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Business Technology Bandwidth Blockchain Encryption Mobile Device Management Server App Information Virtualization Remote Spam WiFi Budget History Gmail Office Apple Two-factor Authentication Employee/Employer Relationship Information Technology Office 365 Cybercrime Wi-Fi Conferencing Health Big Data Access Control Data Security Analytics BDR IT Management Compliance Training Employer-Employee Relationship Help Desk Hacking Cost Management Patch Management Vendor Remote Computing Remote Monitoring Document Management Hacker Voice over Internet Protocol Save Money Firewall Managed Services Augmented Reality Word Search... Data loss BYOD Best Practice IBM Website Computing Retail Vendor Management Hard Drive Alert Hiring/Firing Outlook Applications Password Legal Project Management Vulnerabilities Data storage Money Customer Service Mobile Office Unified Threat Management Social Engineering Mobile Computing Windows 7 Cryptocurrency Free Resource Black Market Marketing Google Maps iPhone Cleaning Scam Running Cable Education Cortana How To Robot Content Filtering VPN Storage Router Update The Internet of Things YouTube Twitter Data Breach User Paperless Office Antivirus Law Enforcement End of Support Laptop Printer Maintenance Windows 11 Chrome Monitoring Healthcare Websites Social Remote Workers Sports Travel SaaS DDoS Virtual Reality Meetings Mobility Software as a Service Presentation Managed Services Provider Office Tips Memory Bitcoin Specifications Private Cloud Data Protection Computers IT Consultant Virtual Private Network Telephone Disaster Customer Relationship Management Current Events Politics Co-Managed IT Settings Excel Solutions Lithium-ion battery Entertainment Machine Learning Integration Tech Terms Images 101 Solid State Drive Processors Display Managed IT Virtual Assistant Digital Chromebook Drones Employees Taxes Avoiding Downtime Automobile HIPAA Holidays How To Processor Wireless Technology Microchip Cooperation eWaste Flexibility Video Conferencing Physical Security Downtime Virtual Machines Hack Computer Repair Safety Identity Theft Notifications Multi-factor Authentication Professional Services Unified Communications Start Menu Virtual Desktop Computer Care Downloads PowerPoint Experience Google Docs Bluetooth Vulnerability Saving Time Administration Distributed Denial of Service Error Financial Data Staffing Tablets IP Address Scams Bookmark Risk Management IT Botnet Download Phone System Supercomputer Piracy Google Calendar Term Google Apps Virus Telework Rental Service HTML Micrsooft Flash Motion Sickness Microsoft 365 Cables Browsers Smartwatch Nanotechnology Communitications Google Drive Upload Procurement Telephone Systems Software License Business Growth Comparison Google Play Social Network FinTech Recovery Competition Computer Accessories Point of Sale Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment LiFi Telephony Trends Supply Chain Management Banking Employer Employee Relationship Mobile Technology Value Entrepreneur Google Wallet Television Security Cameras Customer Resource management Organization Documents Messenger Cabling Devices Cyber security Application Deep Learning Shortcuts G Suite Tip of the week Business Intelligence Fileless Malware Tablet Smart Devices VoIP Gamification Remote Working Business Metrics Tracking Company Culture Hosted Solution Mouse Telephone System AI Securty Books Regulations Trend Micro Be Proactive Domains Language Web Server Transportation Society Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records SharePoint Content Digital Payment Desktop Wasting Time Visible Light Communication Electronic Medical Records Troubleshooting Reading Worker Accountants eCommerce Monitors Modem Workplace Strategies Access Database Surveillance Windows 8 Videos Time Management Public Cloud Managing Costs SSID Advertising Health IT Relocation Equifax Public Speaking Displays Streaming Media Spyware Tactics Development Work/Life Balance Hard Drive Disposal Employer/Employee Relationships Tech Support Audit Media Username File Sharing Virtual Machine Keyboard Hard Drives Freedom of Information Smart Technology Redundancy Reviews Business Owner Startup Optimization In Internet of Things Cache Addiction email scam Teamwork intranet Navigation 2FA Unified Threat Management Data Storage Wireless Hacks Workers Mobile Security Hypervisor Shortcut Network Congestion Heating/Cooling Writing News Medical IT Environment User Tip Shopping Reliable Computing Legislation Windows XP Network Management CCTV SQL Server Social Networking Printing Evernote Paperless Touchscreen PCI DSS Licensing Computer Malfunction Fake News Supply Chain Emergency Proxy Server Gig Economy Inbound Marketing Scalability Emails Humor Administrator Vendor Mangement Service Level Agreement Internet Service Provider Text Messaging Computing Infrastructure Azure Proactive IT Business Communications Management Regulations Compliance Bring Your Own Device Samsung Device security Managed IT Service Webcam Microsoft Excel Workplace Uninterrupted Power Supply Wireless Headphones Memes Electronic Payment Business Mangement Going Green Net Neutrality Business Cards Music Tech Human Resources

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?