Office
 

Microsoft Word 2010 : Customizing Word - Linking and Embedding Files

10/10/2011 8:57:30 AM
Embedding inserts a copy of one document into another. When data is embedded, you can edit it using the menus and toolbars of the program in which it was created (that is, the source program). Linking displays information stored in one document (the source file) into another (the destination file). You can edit the linked object from either file, although changes are stored in the source file. For example, you might link an Excel chart or a PowerPoint slide to a Word document so you can update the chart or slide from any of the files. If you break the link between a linked object and its source file, the object becomes embedded. You can use the Object button on the Insert tab to modify a link.

Create a Link to Another File Using Paste Special

Open the source file and any files containing information you want to link.


Select the information in the source file.

Click the Home tab.

Click the Copy button.

Click the insertion point in the file containing the link.

Click the Paste button arrow, and then click Paste Special.

Click the Paste Link option, and then select the object format you want to use.


Click OK.

You can edit an embedded object. Edit an embedded object only if the program that created it is installed.

You can manually update or break an object link.
Right-click the linked object, and then click Update Link or point to Linked <Item> Object, click Links, click the link you want to update, and then click Manual Update. To break a link, click Break Link.

Embed a New Object

Click the Insert tab.

Click the Insert Object button.

Click the Create New tab.

Click the object type you want to insert.

Click OK.

Follow the necessary steps to insert the object.

The steps will vary depending on the object type.

Embed or Link to an Existing Object

Click the Insert tab.

Click the Insert Object button.

Click the Create from File tab.

Click Browse, locate and select the file that you want to link, and then click Open.

To create a link to the object, select the Link to file check box.

Click OK.

You can update links each time you open a linked document. When you open a document that contains links, a warning dialog box opens asking you if you want to update all linked information (click Yes) or to keep the existing information (click No).
 
Others
 
- Microsoft PowerPoint 2010 : Saving a Presentation as a Slide Show & Saving a Presentation as a Video
- Microsoft PowerPoint 2010 : Delivering a Show on Multiple Monitors
- Getting Started with Microsoft Excel 2010 : Arranging Windows
- Getting Started with Microsoft Excel 2010 : Moving Around the Workbook
- Microsoft Outlook 2010 : Working with the Ribbon and the Backstage View
- Microsoft Outlook 2010 : Working in the Outlook Program Window
- Microsoft OneOnte 2010 : Creating Pages - Choose the Default Page Template for Section Pages
- Microsoft OneOnte 2010 : Creating Sections & Creating Section Groups
- Facilitating Your Plan with Microsoft Project 2010
- Microsoft Project 2010 : Understanding Project Management Basics
- Microsoft Access 2010 : Working with Table Data
- Microsoft Access 2010 : Working with an Existing Database
- Microsoft Visio 2010 : Sharing and Publishing Diagrams - Saving in Other File Formats
- Microsoft Visio 2010 : Sharing and Publishing Diagrams - Creating Graphics
- Microsoft Word 2010 : Customizing Word - Setting Editing Options
- Microsoft Word 2010 : Customizing Word - Setting Print Options
- Microsoft PowerPoint 2010 : Presenting a Slide Show - Annotating a Slide Show
- Microsoft PowerPoint 2010 : Presenting a Slide Show - Navigating a Slide Show
- Getting Started with Microsoft Excel 2010 : Converting an Existing Workbook & Using Task and Window Panes
- Getting Started with Microsoft Excel 2010 : Creating a Workbook Using a Template & Opening an Existing Workbook
 
 
Most View
 
- Windows 8 : Using the Control Panel Items (part 14) - User Accounts - Configuring an Account, Recovering Lost Passwords, Creating a User Account Password Reset Disk
- Windows Phone 7 to Windows Phone 8 : App publication (part 2) - The publication process
- Windows Server 2012 : Deploying Dynamic Access Control (part 1) - Preparing Claims
- Microsoft Exchange Server 2013 : Creating special-purpose mailboxes (part 9) - Creating shared mailboxes
- Windows Server 2012 Technology Primer : Windows Server 2012 Defined - Windows Server 2012 as an Application Server
- Windows 8 : Creating a Windows Network - Additional Networking Functions
- Installing Exchange 2013 : Versions, cumulative updates, and service packs (part 1) - Cumulative updates, Version numbers
- Lync Server 2013 Clients : Mac Client - Navigation and Layout (part 2)
- Microsoft Excel 2010 : Working with Graphics - Inserting WordArt, Using Smart Art in Excel
- Windows 8 : Cloud Connections - Windows Live
 
 
Top 10
 
- Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 1) - Protecting Against Web Beaconing
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 2) - Encrypting Communications Between Outlook and Exchange , Blocking Attachments
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 1) - Outlook Anywhere
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 3) - Keeping Up with Security Patches and Updates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 2) - Utilizing Security Templates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 1) - Windows Server 2003 Security Improvements , Windows Vista Security Improvements
- Securing an Exchange Server 2007 Environment : Client-Level Secured Messaging - Exchange Server 2007 Client-Level Security Enhancements