Moving Excel Sheets – Very Easy !!

Moving Right Next Door

As I’m sure we all know, you can rearrange worksheets in an MS Excel file with a simple click-hold-and-drag of the sheet tab.

But, did you know that you can also move worksheets from one workbook to another using the same method?
No?
Well, good news, you can, and it’s really as easy as it sounds.
First, open both workbooks. (The one with the worksheet and the one to which the worksheet needs to be relocated).
Next, arrange your workbooks side by side using the Window menu, Arrange choice and then making a choice from the Arrange window. Click OK.
Next, you need to click and hold the sheet tab to be moved.
Now, still holding down the left mouse button, drag the sheet tab into the other file.
You’ll see the small triangle that appears when a sheet is moved, so you can tell where it will be located.
When it’s where you need it to be, simply release the mouse button.
Voila!
The sheet is moved from one workbook to another. No fuss, no muss!

Advertisements

Disconnect from internet when not in use

To Connect or Disconnect When Not in Use?

This choice relates to so many friends’ questions. Should you leave your computer connected to the internet when you aren’t working online? “It takes so long to re-dial,” or “I can’t reach the connection cord, but I’ve heard (fill in your own favorite rumor here).”

Personally, I choose to only stay connected when I’m working at my computer, online or off. When I’m not physically sitting at my computer, I disconnect the cable line manually since it’s easy to reach on my system. I think of it as raising the drawbridge against the bad guys. When your computer is not online, there’s no route for remote unauthorized access. Of course, many PCs have their connection cables in the back where they can be hard to reach.

Other folks in the office like to use an option in their firewall Shut off Net Connection to disconnect from the web without reaching for the cords. This will look different in every firewall program, and it may not be available in all of them.

In XP, you also have the ability to disable net connections through My Network Places, typically found as an icon in the upper left corner. Click on that and the Network Connections window will appear. Right-click on your connection and choose Disable.

To get your connection back, repeat the above instructions, only choose Enable or Connect instead of Disable. There may be a brief delay and icon change while your PC gets a fresh IP address from your service provider.

In fact, it’s a good idea to run your antivirus and antispyware programs while your PC is offline every once in awhile. Some spyware can alert an offsite user (you know, the bad guy) that your scan has started so he can put the malware back onto your machine as soon as the scan has completed. Obviously, you’ll want to update your definition files online before you go offline to scan your system, but scanning while offline prevents outside interference with your security measures.

Tip – Google Search

We all use Google to search for various things online. Did you know that if you open up your fridge and type what you have inside your fridge, into a Google Search Box, you can actually get a recipe to make something out of the ingredients you have ? Try it – you will be surprised !

For the more business minded, if you want a quick conversion of currency, type “USD to GBP” and presto ! You have the conversion rate right on your desktop !

Googling is one of the most used methods of searching the net. However, it often happens that when we search for something, it floods us with a zillion results. So now, our focus has to shift from “where to search” to “how to search”. http://www.googleguide.com offers a complete guide to search for both beginners and advanced users.

World Time Clock

Dear Friends,

Many people want a good and quick world time clock (including adjustments for Summer & Winter – which I personally find most confusing) on their Browser.
I like to use the clock available at this location : http://www.timeanddate.com/worldclock/personal.html

Click on the first link for configuration, add the cities which you need to have, and bookmark the link. Any time you want to look up the time in those cities, you just have to click on the bookmark and the current time in those cities is available right on your browser.

Browse around the site and you will get very interesting information like :

* Search for city – and include it in your Personal World Clock
* The World Clock Meeting Planner
* Time Zone Converter – If it’s 3 pm in New York, what time is it in Sydney?
* Fixed Time Calculator – If it’s 3 pm in New York, what time is it in the rest of the world?

Good, fast and easy !

Tip – MS Word

Hello Friends,
This is a MS Word tip which many will find useful.

In our day to day work, we often use the same documents over and over again. You can keep frequently used documents readily available on Word’s menu bar so you don’t have to use the File menu and search through files and folders to find them. You do this by adding a Work menu to Word’s menu bar. Simply go to View | Toolbars | Customize, choose the Commands tab, and select Built-in Menus from the list of categories. Then choose Work from the list of commands and drag it to where you want it on the top-line menu. From your new menu, choose Add to work menu to attach a filename to the menu. To remove a filename, press Ctrl-Alt-Minus and click on the item you want to remove.

More next time……

What is a VIRUS

I found this very fine introductory note on the net, courtesy www.answers.com.

A Virus is a Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.

The effect of the virus may be a simple prank that pops up a message on screen out of the blue, or it may destroy programs and data right away or on a certain date. It can lay dormant and do its damage once a year. For example, the Michelangelo virus contaminates the machine on Michelangelo’s birthday.<!– D(["mb","

\n\n

Viruses Must Be Run to Do Damage
\nA virus is not inserted into data. It is a self-contained program or code that\nattaches itself to an existing application in a manner that causes it to be\nexecuted when the application is run. Macro viruses, although hidden within\ndocuments (data), are similar. It is in the execution of the macro that the\ndamage is done.

\n\n

E-Mail Attachments Are Suspect
\n
\nFile attachments in e-mail messages are a common way of infecting a computer,\nproviding the user clicks on the attachment. If the attachment is an executable\nfile, it can do anything when run. Examples of executables are files with\nextensions such as .BAT, .COM, .EXE, .SCR, and .SHS

\n\n

Viruses Are Relatively Recent
\n
\nThe term virus was coined in the early 1980s, supposedly after a graduate\nstudent presented the concept of a program that could “infect” other\nprograms. Since then, more than 80,000 viruses have been defined. However, 99%\nof the infections are from only a few hundred variants found “in the\nwild.”

\n\n

Be Careful Out There!
\nIf you use the Internet for any purpose, be sure you have an antivirus program\nrunning at all times.

\n\n

\n\n

\n\n

\n\n

\n\n\n\n\n
\n\n


\nNo virus found in this outgoing message.
\nChecked by AVG Free Edition.
\nVersion: 7.1.385 / Virus Database: “,1] ); //–>

Viruses Must Be Run to Do Damage
A virus is not inserted into data. It is a self-contained program or code that attaches itself to an existing application in a manner that causes it to be executed when the application is run. Macro viruses, although hidden within documents (data), are similar. It is in the execution of the macro that the damage is done.

E-Mail Attachments Are Suspect

File attachments in e-mail messages are a common way of infecting a computer, providing the user clicks on the attachment. If the attachment is an executable file, it can do anything when run. Examples of executables are files with extensions such as .BAT, .COM, .EXE, .SCR, and .SHS

Viruses Are Relatively Recent

The term virus was coined in the early 1980s, supposedly after a graduate student presented the concept of a program that could “infect” other programs. Since then, more than 80,000 viruses have been defined. However, 99% of the infections are from only a few hundred variants found “in the wild.”

Be Careful Out There!
If you use the Internet for any purpose, be sure you have an antivirus program running at all times.