1. I'm not exactly sure what you mean by "a header row of placement spacing, B2:I12."B2:I12 is not a "header row" it's a range of rows and columns. If you are trying to return a value found at the intersection of a value from Column A and a value from Row 2, try using INDEX and MATCH. Here's just one oRead more

    I’m not exactly sure what you mean by “a header row of placement spacing, B2:I12.”

    B2:I12 is not a “header row” it’s a range of rows and columns.

    If you are trying to return a value found at the intersection of a value from Column A and a value from Row 2, try using INDEX and MATCH.

    Here’s just one of many sites that explains how it works…

    http://www.mbaexcel.com/excel/how-t…

    Click Here Before Posting Data or VBA Code —> How To Post Data or Code.

    See less
    • 0
  2. Try this,In the upper left corner of your worksheet,click just above the row # 1 and next to column letter Athat selects the entire worksheet.Now set your Font and Font SizeOnce finished with your selection, just click on any cell and your whole sheet should havethe same Font & Size. MIKEhttp://www.Read more

    Try this,

    In the upper left corner of your worksheet,
    click just above the row # 1 and next to column letter A
    that selects the entire worksheet.
    Now set your Font and Font Size
    Once finished with your selection, just click
    on any cell and your whole sheet should have
    the same Font & Size.

    MIKE

    http://www.skeptic.com/

    See less
    • 0
  3. '@caruso7r,Just curious, when's the last time you used an XP computer with just 512MB RAM? @padmakarsawant, Have you ever run XP on the system before? Is the HDD blank or is there an OS currently installed? If there is an OS installed, what is it? Did you test the memory with memtest86 to confirm itRead more

    ‘@caruso7r,

    Just curious, when’s the last time you used an XP computer with just 512MB RAM?

    @padmakarsawant,

    Have you ever run XP on the system before? Is the HDD blank or is there an OS currently installed? If there is an OS installed, what is it? Did you test the memory with memtest86 to confirm it’s not defective & that the full 512MB is detected? Do you have a graphics card or integrated graphics? If integrated, how much memory is allocated to graphics? Is this a custom built PC? If so, please list the make/model of the motherboard along with the rest of the specs. If it’s an OEM system (Dell, HP, Gateway, etc), please list the make/model.

    Are you using a pirated copy of XP?

    See less
    • 0
  4. Address / Contactshttp://explore.live.com/windows-liv...Unknown/unwanted entries, go into the subsection > View Invitations.

    Address / Contacts
    http://explore.live.com/windows-liv…
    Unknown/unwanted entries, go into the subsection > View Invitations.

    See less
    • 0
  5. Have a look at Acronis Business backup software. It can image your computers while Windows is still running and it can do automatic backups and storage management.http://www.acronis.com/en-us/busine... message edited by THX 1138

    Have a look at Acronis Business backup software. It can image your computers while Windows is still running and it can do automatic backups and storage management.

    http://www.acronis.com/en-us/busine…

    message edited by THX 1138

    See less
    • 0
  6. Please see this MS Article about networking computers with diff versions of Windows.You may take W7 as W8 as they are about the same as regards networking. CoolGuy

    Please see this MS Article about networking computers with diff versions of Windows.

    You may take W7 as W8 as they are about the same as regards networking.

    CoolGuy

    See less
    • 0
  7. https://www.dropbox.com/privacy#acc... probe, scan, or test the vulnerability of any system or network, unless done in compliance with our Bug Bounty Program; breach or otherwise circumvent any security or authentication measures; access, tamper with, or use non-public areas or parts of the ServicesRead more

    https://www.dropbox.com/privacy#acc…

    probe, scan, or test the vulnerability of any system or network, unless done in compliance with our Bug Bounty Program;

    breach or otherwise circumvent any security or authentication measures;

    access, tamper with, or use non-public areas or parts of the Services, or shared areas of the Services you haven’t been invited to;

    interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services;

    access, search, or create accounts for the Services by any means other than our publicly supported interfaces (for example, “scraping” or creating accounts in bulk);

    send unsolicited communications, promotions or advertisements, or spam;

    send altered, deceptive or false source-identifying information, including “spoofing” or “phishing”;

    promote or advertise products or services other than your own without appropriate authorization;

    abuse referrals or promotions to get more storage space than deserved;

    circumvent storage space limits;

    sell the Services unless specifically authorized to do so;

    publish or share materials that are unlawfully pornographic or indecent, or that contain extreme acts of violence or terrorist activity, including terror propaganda;

    advocate bigotry or hatred against any person or group of people based on their race, religion, ethnicity, sex, gender identity, sexual orientation, disability, or impairment;

    harass or abuse Dropbox personnel or representatives or agents performing services on behalf of Dropbox;

    violate the law in any way, including storing, publishing or sharing material that’s fraudulent, defamatory, or misleading; or

    violate the privacy or infringe the rights of others.

    *************************************
    Dell Optiplex 780/intel Core2 Quad 3.0ghz/16gb Crucial DDR3L-1600/MSI GT-710 1gb PCIe/SB Audigy FX 5.1 PCIe/CM RS500/R3205-D/Win10 Pro 64bit

    See less
    • 0