Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Show Changes in Excel

Tip of the Week: Show Changes in Excel

Collaboration is a crucial part of the workplace, and with the advent of cloud-based solutions and the collaboration functionality they provide, more developers are striving to include such features in their desktop versions as well. Microsoft Excel allows you to see certain changes made to a spreadsheet over a period of time.

What Edits Can You See?

Excel gives you the ability to see changes made to cells and formulas for up to 60 days, including the moving, sorting, inserting, and deleting of cells or data. Unfortunately, you cannot see changes made to things like formatting, hidden cells, filtering, deleted locations, objects, charts, shapes, and pivot table operations.

How Can You See the Edits?

The functionality we’ll be using today is the Show Changes feature. To get started, open up your Excel document and navigate to the Review tab, where you will see the Changes section of the ribbon. Click on the Show Changes button to see a pane open on the right side of the screen showcasing all of the changes made to this document.

In the change section, you will see the sheet, item, and cell that was edited. From here, you just click on the cell number to see what specifically was changed. These appear as highlighted sections on your spreadsheet.

Pretty handy stuff, right? With this tip, you’ll always be able to check which parts of your spreadsheet were edited… so long as it has been within 60 days, anyway.

What are your thoughts on this feature? Be sure to get a hold of us at 800.618.9844 if you ever have any questions about your technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Managed Services Data Security Apps Vendor Tip of the week Mobile Device Management Voice over Internet Protocol Chrome Gmail Budget Networking WiFi Apple App Employer-Employee Relationship BYOD Access Control Information Technology Avoiding Downtime Marketing Office 365 Conferencing Managed IT Services How To BDR HIPAA Physical Security Applications Computing Hacker Health Risk Management 2FA Help Desk Website Analytics Office Tips Retail Augmented Reality Healthcare Storage Password Bring Your Own Device Big Data Router Operating System Virtual Private Network Computers Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Managed IT Service Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Going Green Customer Service Display Cybercrime Printer Holidays Cryptocurrency Wireless Technology Data Storage Smart Technology Supply Chain Virtual Desktop Video Conferencing Machine Learning Managed Services Provider Data storage LiFi Saving Time Virtual Machines Professional Services Word Outlook Maintenance Money Humor Downloads Antivirus iPhone Licensing Safety Entertainment Vulnerabilities Sports Data Privacy Mouse Images 101 Administration Multi-Factor Authentication Robot Mobility Telephone System Cost Management IT Management Customer Relationship Management Meetings Settings VPN Employees Wireless Integration Printing Content Filtering Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security YouTube Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT 5G Tactics Development Hotspot Transportation Small Businesses IP Address Websites Mirgation Hypervisor Displays Google Docs Unified Communications Experience Shopping Nanotechnology Optimization PowerPoint Bitcoin Running Cable SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Wallet Chatbots Recovery Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Hard Drives Writing Distributed Denial of Service Workplace Windows 8 Laptop Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Drones Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Co-managed IT Halloween Download Net Neutrality Public Speaking Twitter Alerts SQL Server Technology Care Lithium-ion battery Error History Business Communications Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Hacks Entrepreneur Scary Stories Fun Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Deep Learning Social Network Telework CES Tablet IoT Communitications Undo Dark Web Cables Education Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Mobile Computing Search Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Application Legislation Shortcuts Best Practice Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Buisness IT solutions Content Remote Working IBM Wearable Technology Memory Vendors Legal Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Business Growth Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Cortana Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Alt Codes User Error Microchip Internet Exlporer Software as a Service Competition Fraud Meta Downtime Hosted Solution Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Typing Database Surveillance Virtual Assistant Outsource IT User Media Knowledge Network Management Tech Support IT Technicians Virtual Machine Environment Google Drive

Blog Archive