Office
 

Microsoft Excel 2010 : Analyzing Worksheet Data - Adding Data Validation to a Worksheet

11/26/2011 3:37:08 PM
Worksheet cells can be adjusted so that only certain values can be entered. Controlling how data is entered decreases errors and makes a worksheet more reliable. You might, for example, want it to be possible to enter only specific dates in a range of cells. You can use logical operators (such as equal to, not equal to, less than, or greater than) to set validation rules. When invalid entries are made, a message—developed and written by you—appears indicating that the entry is in violation of the validation rules. The rule set will not allow data to flow into the cell.

Create Validation Rules

Select the range you want covered in the validation rules.

Click the Data tab.

Click the Data Validation button.

Click the Settings tab.

Click the Allow list arrow, and then select a value type.

Options vary depending on the Allow value type you select.

Click the Data list arrow, and then select a logical operator.

Enter values or use the Collapse Dialog button to select a range for the minimum and maximum criteria.

Click the Input Message tab, and then type a title and the input message that should be displayed when invalid entries are made.

Click the Error Alert tab, and then select an alert style, type a title, and error message.

Click OK.

To view invalid data, click the Data Validation button arrow, and then click Circle Invalid Data. To clear the circles, click the Data Validation button arrow, and then click Clear Validation Circles.

 
Others
 
- Microsoft Outlook 2010 : Inserting Items, Objects, and Files in a Calendar Item
- Microsoft Outlook 2010 : Updating Calendar Information
- Microsoft OneNote 2010 : Adjusting OneNote Performance Settings
- Microsoft OneNote 2010 : Enabling or Disabling Automatic Wiki Link Creation
- Microsoft Project 2010 : Exchanging Data Between Programs - Copying Information
- Microsoft Project 2010 : Sharing Resources Among Projects
- Microsoft Access 2010 : DATA ACCESS WITH ADO (part 4) - Working with Data in Recordsets
- Microsoft Access 2010 : DATA ACCESS WITH ADO (part 3) - Navigating Recordsets
- Microsoft Access 2010 : DATA ACCESS WITH ADO (part 2) - Creating Recordsets
- Microsoft Access 2010 : DATA ACCESS WITH ADO (part 1) - Using the Execute Method
- Microsoft Word 2010 : Adding Supplementary Elements - Creating a Bibliography
- Microsoft Word 2010 : Adding Supplementary Elements - Figure Captions & Adding a Table of Figures
- Microsoft Visio 2010 : Tips for Creating Organizational Charts
- Microsoft Visio 2010 : Tips for Creating Timelines
- Microsoft PowerPoint 2010 : Prepare for Delivery - Rehearsing Presentations
- Microsoft PowerPoint 2010 : Prepare for Delivery - Adapting Presentations for Different Audiences
- Microsoft Excel 2010 : Analyzing Worksheet Data - Creating Groups and Outlines, Converting Text to Columns
- Microsoft Excel 2010 : Analyzing Worksheet Data - Charting a PivotTable
- Microsoft Outlook 2010 : Managing a Calendar - Setting Up a Meeting
- Microsoft Outlook 2010 : Managing a Calendar - Adding an Event
 
 
Most View
 
- Microsoft Lync Server 2010 : Installing Mediation Server (part 1) - Hardware Recommendations
- SQL Server 2012 : Query Plans (part 1)
- Windows 7 : Working with Files - View Your Files
- Microsoft OneNote 2010 : Inserting Documents and Files (part 2) - Inserting a File Printout on a Page
- Business Cases for Lync Server 2013 : Return on Investment (part 1)
- Windows Small Business Server 2011 : Group Policy Preferences (part 1)
- Microsoft Project 2010 : Project on the Internet (part 3) - Integrating Project and Outlook - Importing Tasks from Outlook, Copying Tasks from an Email
- Microsoft Project 2010 : Viewing Baselines (part 2) - Formatting the Gantt Chart to Display the Baseline
- Exchange Server 2013 : Exchange Clients - Why Does Client Choice Matter?
- Windows Phone 8 : Groups (part 3) - Removing a Group Member
 
 
Top 10
 
- Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 1) - Protecting Against Web Beaconing
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 2) - Encrypting Communications Between Outlook and Exchange , Blocking Attachments
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 1) - Outlook Anywhere
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 3) - Keeping Up with Security Patches and Updates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 2) - Utilizing Security Templates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 1) - Windows Server 2003 Security Improvements , Windows Vista Security Improvements
- Securing an Exchange Server 2007 Environment : Client-Level Secured Messaging - Exchange Server 2007 Client-Level Security Enhancements