Complete Guide to Excel 365: Linking, Printing, & Protecting Workbooks - discover the key concepts covered in this course
- use the Excel Options menu to customize how workbooks are saved, configure AutoSave and AutoRecover behavior and the default save location, and use the Manage Workbook functionality to recover or delete unsaved workbooks
- use built-in templates, save a commonly-used workbook as an Excel Template (.xltx) file, and recognize the purpose of the Custom Office Templates folder, the names "Book" and "Sheet" for .xltx files, and the XLSTART sub-folder
- use the Data Outline menu item to logically group data based on rows and columns, the Ungroup option to undo grouped data, and list the capabilities and limitations of the Auto Outline feature
- create links to external workbooks, use the Paste Link option from the Paste menu, parse the syntax of external link addresses, and recognize the dynamic nature of data linked from external workbooks
- edit external links using the Data menu, use the Open Source, Check Status, Change Source, and Break Link options, and customize the startup prompt when a workbook with external links is opened
- combine the Print and Page Layout menu features to control how workbooks are printed and use Page Break Preview to control pagination, specify collation, scaling, paper type, and orientation
- customize headers and footers, display and hide hidden columns, insert images into workbooks, control whether images are printed and whether they appear within the data or in the header/footer, and set and customize a workbook's background image and transparency
- use the Protect Sheet feature from the Review menu to control how a sheet can be edited, customize which operations are possible without a password, and use the Allow Edit Ranges feature to override protection for specific areas on a worksheet
- control cell-level protection and understand the semantics of the locked and hidden checkboxes, apply workbook-level protection options, such as open in read-only mode, use password encryption, add a digital signature, mark as final, and outline the semantics and limitations of opening in read-only mode
- summarize the key concepts covered in this course
|