Tải bản đầy đủ (.pdf) (64 trang)

Microsoft Office 2003 Super Bible phần 7 potx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.13 MB, 64 trang )

361Chapter 15 ✦ Exchanging Access Data with Office Applications
Just as in Access, Word is implicitly using its Application object; the command
ChangeFileOpenDirectory is really a method of the Application object. Using
the following code, you create an instance of Word’s Application object and call the
method of the object:
Dim WordObj As New Word.Application
WordObj.ChangeFileOpenDirectory “C:\My Documents\”
When using Automation, you should avoid setting properties or calling methods that cause the
Automation Server to ask for input from the user via a dialog box. When a dialog box is dis-
played, the Automation code stops executing until the dialog box is closed. If the server applica-
tion is minimized or behind other windows, the user may not even be aware that he or she
needs to provide input, and therefore may assume that the application is locked up.
Closing an instance of an Automation object
Automation objects are closed when the Automation object variable goes out of scope. Such a
closing, however, doesn’t necessarily free up all resources that are used by the object, so you
should explicitly close the instance of the Automation object. You can close an Automation
object by doing either of the following:
• Using the Close or Quit method of the object (consult the specific Automation
Server’s documentation for information on which method it supports)
• Setting the object variable to nothing, as follows:
Set WordObj = Nothing
The best way to close an instance of an Automation object is to combine the two techniques,
like this:
WordObj.Quit
Set WordObj = Nothing
An Automation Example Using Word
Perhaps the most common Office application that is used for Automation from a database
application like Access is Word. Using Automation with Word, you can create letters that
are tailored with information from databases. The following section demonstrates an
example of merging information from an Access database to a letter in Word by using
Automation and Word’s Bookmarks. Ordinarily, you create a merge document in Word and


bring field contents in from the records of an Access database. This method relies on using
Word’s MergeField, which is replaced by the contents of the Database field. It normally
requires that you perform this action in Word—thus limiting the scope and capability of the
function. For example, you will merge all records from the table that is being used rather
than a single record.
Tip
362 Part II ✦ Collaborating and Integrating with Office 2003
The following example uses the Orders form, which calls a module named WordIntegration.
The WordIntegration module contains a function named MergetoWord() that uses the Word
Thanks.dot template file.
When you attempt to run this example, you must make sure that the path for the template in the
Visual Basic code is the actual path in which the Thanks.dot template file resides. This path
may vary from computer to computer.
The items that are discussed in this Word Automation example include the following:
✦ Creating an instance of a Word object
✦ Making the instance of Word visible
✦ Creating a new document based on an existing template
✦ Using bookmarks to insert data
✦ Activating the instance of Word
✦ Moving the cursor in Word
✦ Closing the instance of the Word object without closing Word
This example prints a thank-you letter for an order based on bookmarks in the thank you
letter template (Thanks.dot). Figure 15-5 shows the data for customers; Figure 15-6 shows the
data entry form for orders; Figure 15-7 shows the Thanks.dot template; and Figure 15-8
shows a completed merge letter.
The bookmarks in Figure 15-7 are shown as grayed large I-beams (text insert). The
bookmarks are normally not visible, but you can make them visible by selecting
Tools_Options, selecting the View tab and going to the top section titled Show and then
turning on the Bookmarks option by checking the option (third choice in the first column).
The names won’t be visible—only the bookmark holders (locations) will be visible, as shown

in Figure 15-7. The names and arrows in Figure 15-7 were placed using text boxes to show
where the bookmark names are assigned.
Note
Figure 15-5: Customer data used in the following Automation example is entered on the
Customers form.
363Chapter 15 ✦ Exchanging Access Data with Office Applications
Figure 15-6: Each customer can have an unlimited number of orders. Thank-you letters
are printed from the Orders form.
Figure 15-7: The Thanks.dot template contains bookmarks where the merged data is to
be inserted.
Figure 15-8: After a successful merge, all the bookmarks have been replaced with their
respective data.
364 Part II ✦ Collaborating and Integrating with Office 2003
If you click the Print Thank You Letter button in Access while Word is open with an existing
document—which lacks the bookmark names specified in the code—the fields will simply be
added to the text inside Word at the point where the cursor is currently sitting.
When the user clicks the Print Thank You Letter button on the Orders form, Word generates a
thank-you letter with all the pertinent information. The following code shows the
MergetoWord function in its entirety so you can see in-depth how it works.
Public Function MergetoWord()
‘ This method creates a new document in MS Word
‘ using Automation.
On Error Resume Next
Dim rsCust As Recordset, iTemp As Integer
Dim WordObj As Word.Application
Set rsCust = DBEngine(0).Databases(0).OpenRecordset(“Customers”, _
dbOpenTable)
rsCust.Index = “PrimaryKey”
rsCust.Seek “=”, Forms!Orders![CustomerNumber]
If rsCust.NoMatch Then

MsgBox “Invalid customer”, vbOKOnly
Exit Function
End If
DoCmd.Hourglass True
Set WordObj = GetObject(, “Word.Application”)
If Err.Number <> 0 Then
Set WordObj = CreateObject(“Word.Application”)
End If
WordObj.Visible = True
WordObj.Documents.Add
‘ WARNING:
‘ Specify the correct drive and path to the
‘ file named thanks.dot in the line below.
Template:=”G:\Access 11 Book\thanks.dot”,
‘ The above path and drive must be fixed
NewTemplate:=False
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”FullName”
WordObj.Selection.TypeText rsCust![ContactName]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”CompanyName”
WordObj.Selection.TypeText rsCust![CompanyName]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”Address1"
WordObj.Selection.TypeText rsCust![Address1]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”Address2"
Caution
365Chapter 15 ✦ Exchanging Access Data with Office Applications
If IsNull(rsCust![Address2]) Then
WordObj.Selection.TypeText “”
Else
WordObj.Selection.TypeText rsCust![Address2]
End If

WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”City”
WordObj.Selection.TypeText rsCust![City]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”State”
WordObj.Selection.TypeText rsCust![State]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”Zipcode”
WordObj.Selection.TypeText rsCust![Zipcode]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”PhoneNumber”
WordObj.Selection.TypeText rsCust![PhoneNumber]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”NumOrdered”
WordObj.Selection.TypeText Forms!Orders![Quantity]
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”ProductOrdered”
If Forms!Orders![Quantity] > 1 Then
WordObj.Selection.TypeText Forms!Orders![Item] & “s”
Else
WordObj.Selection.TypeText Forms!Orders![Item]
End If
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”FName”
iTemp = InStr(rsCust![ContactName], “ “)
If iTemp > 0 Then
WordObj.Selection.TypeText Left$(rsCust![ContactName],
iTemp _ - 1)
End If
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”LetterName”
WordObj.Selection.TypeText rsCust![ContactName]
DoEvents
WordObj.Activate
WordObj.Selection.MoveUp wdLine, 6
‘ Set the Word Object to nothing to free resources
Set WordObj = Nothing
DoCmd.Hourglass False

Exit Function
TemplateError:
Set WordObj = Nothing
Exit Function
End Function
Creating an instance of a Word object
The first step in using Automation is to create an instance of an object. The sample creates an
object instance with the following code:
366 Part II ✦ Collaborating and Integrating with Office 2003
On Error Resume Next

Set WordObj = GetObject(, “Word.Application”)
If Err.Number <> 0 Then
Set WordObj = CreateObject(“Word.Application”)
End If
Obviously, you don’t want a new instance of Word created every time a thank-you letter is
generated, so some special coding is required. This code snippet first attempts to create an
instance by using an active instance (a running copy) of Word. If Word is not a running
application, an error is generated. Because this function has On Error Resume Next for
error trapping, the code doesn’t fail, but instead proceeds to the next statement. If an error is
detected (the Err.Number is not equal to 0), an instance is created by using
CreateObject.
Making the instance of Word visible
When you first create a new instance of Word, it runs invisibly. This approach enables your
application to exploit features of Word without the user even realizing that Word is running.
In this case, however, it is desirable to let the user edit the merged letter, so Word needs to be
made visible by setting the object’s Visible property to True by using this line of code:
WordObj.Visible = True
If you don’t set the object instance’s
Visible

property to True, you may create hidden cop-
ies of Word that use system resources and never shut down. A hidden copy of Word doesn’t
show up in the Task tray or in the Task Switcher.
Creating a new document based on an existing template
After Word is running, a blank document needs to be created. The following code creates a
new document by using the Thanks.dot template:
WordObj.Documents.Add Template:=”G:\Access 11 Book\thanks.dot”, _
NewTemplate:=False
The path must be corrected in order to point to the Thanks.dot template on your computer.
The Thanks.dot template contains bookmarks (as shown in Figure 15-7) that tell this function
where to insert data. You create bookmarks in Word by highlighting the text that you want to
make a bookmark, selecting Insert_Bookmark, and then entering the bookmark name and
clicking Add.
Caution
Note
367Chapter 15 ✦ Exchanging Access Data with Office Applications
Using Bookmarks to insert data
Using Automation, you can locate bookmarks in a Word document and replace them with the
text of your choosing. To locate a bookmark, use the Goto method of the Selection
object. After you have located the bookmark, the text comprising the bookmark is selected.
By inserting text (which you can do by using Automation or simply by typing directly into
the document), you replace the bookmark text. To insert text, use the TypeText method of
the Selection object, as shown here:
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”FullName”
WordObj.Selection.TypeText rsCust![ContactName]
You can’t pass a null to the
TypeText
method. If the value may possibly be
Null
, you need

to check ahead and make allowances. The preceding sample code checks the Address2 field
for a
Null
value and acts accordingly. If you don’t pass text to replace the bookmark—even
just a zero length string (“ ”)—the bookmark text remains in the document.
Activating the instance of Word
To enable the user to enter data in the new document, you must make Word the active
application. If you don’t make Word the active application, the user has to switch to Word
from Access. You make Word the active application by using the Activate method of the
Word object, as follows:
WordObj.Activate
Depending on the processing that is occurring at the time, Access may take the focus back from
Word. You can help to eliminate this annoyance by preceding the
Activate
method with a
DoEvents
statement. Note, however, that this doesn’t always work.
Moving the cursor in Word
You can move the cursor in Word by using the MoveUp method of the Selection object.
The following example moves the cursor up six lines in the document. The cursor is at the
location of the last bookmark when this code is executed:
WordObj.Selection.MoveUp wdLine, 6
Closing the instance of the Word object
To free up resources that are taken by an instance of an Automation object, you should always
close the instance. In this example, the following code is used to close the object instance:
Set WordObj = Nothing
Note
Tip
368 Part II ✦ Collaborating and Integrating with Office 2003
This code closes the object instance, but not the instance of Word as a running application. In

this example, the user needs access to the new document, so closing Word would defeat the
purpose of this function. You can, however, automatically print the document and then close
Word. If you do this, you may even choose to not make Word visible during this process. To
close Word, use the Quit method of the Application object, as follows:
WordObj.Quit
Inserting pictures by using Bookmarks
It is possible to perform other unique operations by using Bookmarks. Basically, anything
that you can do within Word, you can do by using Automation. The following code locates a
bookmark that marks where a picture is to be placed and then inserts a .BMP file from disk.
You can use the following code to insert scanned signatures into letters:
WordObj.Selection.Goto what:=wdGoToBookmark, Name:=”Picture”
WordObj.ChangeFileOpenDirectory “D:\GRAPHICS\”
WordObj. ActiveDocument.Shapes.AddPicture Anchor:=Selection.Range,
_ FileName:= _
“D:\GRAPHICS\PICTURE.BMP”, LinkToFile:=False,
SaveWithDocument _
:=True
Using Office’s Macro Recorder
Using Automation is not a difficult process when you understand the fundamentals. Often,
the toughest part of using Automation is knowing the proper objects, properties, and methods
to use. Although the development help system of the Automation Server is a requirement for
fully understanding the language, the easiest way to quickly create Automation for Office
applications like Word is the Macro Recorder.
Most versions of Office applications have a Macro Recorder located on the Tools menu (see
Figure 15-9). When activated, the Macro Recorder records all events, such as menu selections
and button clicks, and creates Visual Basic code from them.
369Chapter 15 ✦ Exchanging Access Data with Office Applications
Figure 15-9: The Macro Recorder in Word is a powerful tool to help you create Automa-
tion code.
After selecting Tools_Macro_Record New Macro, you must give your new macro a name

(see Figure 15-10). In addition to a name, you can assign the macro to a toolbar or keyboard
combination and select the template in which to store the macro. If you are creating the macro
simply to create the Visual Basic code, the only thing that you need to be concerned with is
the macro name.
Figure 15-10: Enter a macro name and click OK to begin recording the macro. In this
example, the macro is named “MyMacro.”
After you enter a macro name and click OK, the Macro Recorder begins recording events
and displays a Stop Recording window, and the arrow changes to an open pointer attached to
a cassette, as shown in Figure 15-11. You can stop recording events by clicking the Stop
button (the button with a square on it). To pause recording events, click the other button,
which is the Pause button.
370 Part II ✦ Collaborating and Integrating with Office 2003
Figure 15-11: The Macro Recorder records all events until you click the Stop button.
After you have finished recording a macro, you can view the Visual Basic code created from
your events. To view the code of a macro, select Tools_Macro_Macros to display a list of
all saved macros. Then select the macro that you recorded and click the Edit button to display
the Visual Basic editor with the macro’s code. Figure 15-12 shows the Visual Basic editor
with a macro that recorded the creation of a new document using the Normal template and the
insertion of a picture using the Insert_Picture_From File menu item.
In the application for which a macro is created, the Application object is used explicitly.
When you use the code for Automation, you must create an Application object accordingly.
For example, the preceding macro uses the following code to create a new document:
Documents.Add Template:=” Normal.dot”, NewTemplate:= False,
DocumentType:=0
This code implicitly uses the Application object. To use this code for Automation, copy the
code from the Visual Basic editor, paste it into your procedure, and create an object that you
use explicitly, as follows:
Dim WordObj as New Word.Application
WordObj.Documents.Add Template:=” Normal.dot”, NewTemplate:= False,
DocumentType:=0

371Chapter 15 ✦ Exchanging Access Data with Office Applications
Figure 15-12: The Macro Recorder records all events until you click the Stop button.
The Macro Recorder enables you to effortlessly create long and complete Automation code
without ever needing to read the Automation Server’s documentation.
✦✦✦

16
16
In This Chapter
Resource sharing
and security
Collaborating in Word
Sharing Excel
workbooks
Collaborating in
PowerPoint
Sharing Access
databases
Distributing Office
documents
CHAPTER


Collaborating
on a Network
I
n most business environments, very few things are done solely
by individuals. Projects are planned, discussed, dissected, and
carried out by teams of people working together. If one of the
final products of a project is to be an Office document, it’s helpful

if all members of the team can share information, files, and ideas
online — either via the company’s internal computer network or
(if team members are more far-flung) via the Internet.
Office makes it possible!
Resource Sharing and Security
If your computer is hooked up to a local network of some type,
chances are good you have a choice of saving your files either to
your own computer or to a location somewhere on the network.
Access to various folders on the network is overseen by whoever
looks after the network; it’s quite likely that many people not in
your workgroup have access to a particular folder. However, in
most Office applications you can control who has access to files
you place in network folders. You can also allow or deny access
by network users to your own computer’s hard drive.
Setting file-sharing options
when saving
Whenever you save a Word or Excel document, you have the
option of restricting access to it.
In Word’s standard Save or Save As dialog box, choose
Tools_Security Options. This opens the Security dialog box
shown in Figure 16-1.
374 Part II ✦ Collaborating and Integrating with Office 2003
Figure 16-1: The Security dialog box in Word lets you restrict access to any file.
Three levels of file-sharing security are provided here:
✦ Password to open. If you enter a password here, only someone who knows the
password can open the file. (Passwords can be up to 15 characters long and can
contain letters, numbers, and symbols. They are case-sensitive. As you type them
in, only asterisks are displayed.)
Password protection isn’t as secure as you might think; there are utilities available on the Internet
that claim to be able to crack open protected documents (in fact, a common question in Office-

related newsgroups is “I’ve forgotten my password; how do I get in?”).
✦ Password to modify. If you enter a password here, anyone can open the file, but
only someone who knows the password can modify it. Users who don’t know the
password can open the file only as read-only — and that includes you if you forget
your password, so don’t!
✦ Read-only recommended. If you check this, users opening this file will get a
message suggesting they open it as a read-only file. If they do, they can’t change
the original document; instead, any changes they make must be saved as a new
document, under a different name.
In Excel, you have the same options, but you get to them by choosing Tools_General
Options in the Save or Save As dialog box.
In PowerPoint, you have only the password-protection options; you don’t have the Read-
only recommended option. You get to the password-protection options by choosing
Tools_Security Options in the Save or Save As dialog box.
Caution
375Chapter 16 ✦ Collaborating on a Network
Word offers additional Privacy options: You can choose to remove personal information
(e.g., the document author’s name and the names of people who have added comments)
from the file before it is saved; have Word warn you before printing, saving, or sending a
file that contains tracked changes or comments; and stop Word’s usual practice of generating
random numbers during merge activities to indicate to itself that two documents are related.
Even though those numbers are hidden in the files, they could conceivably be used to show
that two documents were related. Be aware, however, that removing this option will reduce
the accuracy of merging operations.
Protecting documents
In addition, you can fine-tune the level of access you want to allow people to have to a
particular file by applying protection to it.
Protecting documents in Word
To protect a document in Word:
1. Choose Tools_Protect Document (or click the Protect Document button in the

Security Options dialog box from the previous section). This opens the Document
Protection task pane shown in Figure 16-2.
Figure 16-2: Protect Word documents using this task pane.
376 Part II ✦ Collaborating and Integrating with Office 2003
2. Under Formatting restrictions, check the checkbox if you want to limit formatting
to a selection of styles, and then click Settings to open the Formatting Restrictions
dialog box (see Figure 16-3).
Figure 16-3: Specify formatting restrictions on a shared document here.
3. Uncheck any styles you don’t want to allow in the document, or click the
Recommended Minimum button to have Office automatically select what it
considers to be a minimum number of styles. Click All to check all styles and None
to uncheck them all.
4. If you want to allow AutoFormat to override these formatting restrictions, check
that box at the bottom of the dialog box, and then click OK.
5. Back in the Document Protection task pane, if you want to allow only certain types of
editing in the document, check the Editing restrictions box. This activates a drop-
down list with four options: Tracked changes (all changes are permitted, but they’re
automatically tracked), Comments (no changes are permitted, but comments can be
inserted), Filling in forms (no changes are permitted, but data can be entered into
forms), and No changes (no changes are permitted — the document is read-only).
6. Next, enter any exceptions to the editing rules. If you have established user groups,
they’re listed; otherwise, click More users and enter the user names for those to
whom you want to give greater editing access in the Add Users dialog box that
appears.
7. Finally, back in the Document Protection task pane, click the Yes, start enforcing
protection button if you’re ready to apply the protection settings to your document.
377Chapter 16 ✦ Collaborating on a Network
Protecting documents in Excel
To protect an Excel worksheet or workbook:
1. Choose Tools_Protection.

2. From the submenu, choose which part of your Excel document you want to protect:
a particular worksheet or the workbook. You can also choose to protect and share
your workbook (more on sharing workbooks a little later in this chapter).
3. If you choose Protect Sheet, you’ll see the dialog box shown in Figure 16-4. Here
you can enter a password to unprotect the sheet, and then choose from the long
list provided which actions you’re willing to allow users of the worksheet to
perform.
Figure 16 4: Set protection for Excel worksheets here.
4. If you choose Protect Workbook, you’ll see the dialog box shown in Figure 16-5,
which contains three options:
• Structure prevents users from adding, deleting, moving, hiding, or unhiding
worksheets.
• Windows prevents users from moving, hiding, unhiding, resizing, or closing
workbook windows.
• Password allows you to enter a password that users must have before they can
unprotect the workbook.
378 Part II ✦ Collaborating and Integrating with Office 2003
Figure 16-5: Protect elements of your workbook here.
5. Protect and Share Workbook brings up a dialog box with only one box you can
check, to prevent those sharing the workbook from turning off change tracking.
You can enter a password that they’ll have to know before they can do so.
6. Allow Users to Edit Ranges opens the dialog box shown in Figure 16-6. Here you
can apply passwords to specific ranges within your worksheet. Even if the
worksheet as a whole is protected, users who have the password can edit the ranges
you specify. You can also click Permissions to specify which users are allowed to
edit the range without a password, and just so you don’t forget, you can even paste
permissions information into a new workbook so you can refer to it easily.
Figure 16-6: You can make ranges available for editing to those with the correct
password even if the rest of the sheet is protected.
Protecting files in Access and PowerPoint

You’ll learn about protecting Access files in detail later in this chapter. You need to use file
system features to protect PowerPoint files; talk to your system administrator.
379Chapter 16 ✦ Collaborating on a Network
Using Information Rights Management tools
In previous versions of Office, the only way to protect sensitive information was to limit
access to it, as described in the preceding sections. That didn’t necessarily prevent the
people who were granted access from copying the information and/or sending it to someone
who wasn’t supposed to have access to it.
Information Rights Management (IRM) is a new feature in Office 2003 that gives you
greater control over files even when they’re no longer on your computer or network. No
matter where the file goes, the permissions you’ve assigned go with it, so that only those
users you’ve approved can read or change it; you can also restrict printing and forwarding.
In order to use IRM, you must have access to a computer running Windows Server 2003, with
Windows Rights Management activated. If you are working in a networked environment, con-
sult your network administrator for details. As of this writing, Microsoft offers a trial Internet-
based service for individuals based on the .NET passport system; follow the prompts the first
time you attempt to use the feature to sign up for that service if it’s available (because it’s just a
trial service at this writing, it may not be by the time you read this book). Undoubtedly other
providers of public IRM servers will come forward as well.
Whenever you create a document in Word, Excel, or PowerPoint, you can set IRM policies
for it by choosing File_Permission to open the Permission dialog box (see Figure 16-7).
Note
Figure 16-7: The Permission dialog box allows you to enter the e-mail addresses of
users you’d like to be able to read or change a document’s content.
Check the Restrict permission to this document box to activate the Read and Change
options. Enter the e-mail addresses of users you want to give Read permission to (they can
read the document but can’t change, print, or copy its content) and those you want to give
Change permission to (they can read, edit, and save changes to the document but can’t print
it). Click the Read and/or Change buttons to access e-mail addresses in your Address book.
380 Part II ✦ Collaborating and Integrating with Office 2003

To fine-tune permission, click More Options. This opens the dialog box shown in Figure 16-8.
Figure 16-8: Fine-tune the permissions you grant with these controls.
At the top is a list of all the users you’ve given permission to access the document and the
access level they currently have (your name shows up at the top of the list with Full
Control). Highlight the user whose permissions you’d like to fine-tune, and then choose
from the options in the Additional permissions for users area. You can:
✦ Set an expiration date for the user’s permission.
✦ Allow users to print content.
✦ Allow a user with read access to also copy content.
✦ Give specific users permission to read a document, print a document, copy a
document, or edit a document, or any combination of those; you can also set an
expiration date.
✦ Allow users to access the content programmatically — that is, to open the file in the
same program that created it and edit its content.
Under Additional settings, you can enter a link to an e-mail address (or other hyperlink) that
will pop up whenever a document with restricted permission is forwarded to an unauthorized
individual, so that that individual can request permission to view it. If you leave this blank,
unauthorized individuals simply see an error message.
381Chapter 16 ✦ Collaborating on a Network
You can also choose to allow users to view the content in a browser; a Rights-Management
Add-on for Internet Explorer makes this possible. Otherwise, IRM-protected files can be
opened in Office 2003 only.
If you generally provide the same permissions to many different users, click Set Defaults to
make those permissions the default set.
Network administrators can create permission policies that define who can access documents,
workbooks, and presentations and what editing capabilities (if any) they have. For example, a
company might define a policy called “Confidential” that allows documents to be opened only by
users whose e-mail addresses use the company’s domain name. Once these policies have
been defined, they appear in alphabetical order on a submenu under File
_

Permission; au-
thors simply choose the one they want to use.
Sharing Excel Workbooks
One of the most common types of Office documents shared on a network is an Excel
workbook because workbooks frequently contain budgetary or sales information that is
constantly being updated by a variety of users. Excel lets multiple users share a workbook so
they can all work on it at the same time; it also lets you combine several workbooks into a
single workbook.
Creating a shared workbook
To create a shared workbook:
1. Choose Tools_Share Workbook. This opens the dialog box shown in Figure 16-9.
Note
Tip
Figure 16-9: The Editing tab of the Share Workbook dialog box shows you who
currently has the workbook open.
382 Part II ✦ Collaborating and Integrating with Office 2003
2. If you want more than one person to be able to edit the workbook at the same time,
or to combine several workbooks into one shared workbook, check the box at the
top of the dialog box.
3. To fine-tune the way the workbook is shared, click the Advanced tab (see Figure
16-10). In the Track changes section, choose the number of days you want to track
changes — if at all.
Figure 16-10: The Advanced tab lets you choose your method of tracking, updat-
ing, and dealing with conflicting changes.
4. In the Update changes section, choose when you want changes made to the
workbook to be updated: whenever the file is saved, or automatically how ever
often you specify. If you choose to automatically update changes, you can choose
to save your changes and see everyone else’s changes at the specified interval, or
just see everyone else’s changes at the specified interval without saving yours.
5. Sometimes two or more users will make conflicting changes to the workbook —

changes that are mutually exclusive. You can decide here how to deal with those
changes either by having Excel ask you which change should take effect or by
replacing any conflicting changes with your own changes every time you save.
6. Click OK.
Here’s one example of a shared workbook being useful: A sales group could share a
common workbook, with each salesperson in the group recording his or her sales as they
occur; that would give the sales manager the ability to monitor their sales, and the progress
of the group as a whole, in “real time.”
383Chapter 16 ✦ Collaborating on a Network
Reviewing changes
Once a workbook is being shared, you can review changes in it by choosing Tools_Track
Changes_Accept or Reject Changes. Choose the changes you want to review in the Select
Changes to Accept or Reject dialog box shown in Figure 16-11. You can filter the changes
you want to look at by using the three fields. The When field lets you look for changes made
on a specific date; the Who field lets you look at changes made by everyone, everyone but
you, only you, or only any other user who has made changes; and the Where field lets you
specify a range of cells in which to look for changes.
Any changes found are brought to your attention in the Accept or Reject Changes dialog box
(see Figure 16-12). You can choose to accept or reject any or all of the changes brought to
your attention.
Choose Tools
_
Highlight Changes to highlight any changes made throughout the workbook.
Tip
Figure 16-11: Use this dialog box to select the changes you want to review.
Figure 16-12: Changes made to the workbook are brought to your attention here.
You can merge different versions of the same shared workbook into a single workbook by
choosing Tools_Compare and Merge Workbooks. Track Changes must be turned on (and
the workbook must be shared) for this to work.
384 Part II ✦ Collaborating and Integrating with Office 2003

Collaborating in PowerPoint
You can send your PowerPoint presentation to others for comment and revision, and then
combine all the reviewed presentations into one for easy review.
The easiest way to send a presentation for review is to choose File
_
Mail Recipient (for Re-
view). This feature, common to most Office applications, is discussed later in this chapter.
To do so, open the presentation you want to combine reviewed presentation with and choose
Tools_Compare and Merge Presentations. Browse for the presentations you want to merge,
and then click Merge.
PowerPoint opens the Revisions Pane and the Reviewing toolbar to allow you to sort
through all the suggested revisions and decide whether you want to apply them (see
Figure 16-13).
Note
Figure 16-13: PowerPoint’s Revisions Pane shows you all the changes reviewers have
made to your presentation.
PowerPoint points out the suggested revisions in several ways. In the Revisions Pane, you
can see graphical representations of the altered slides, or you can view them as a list. You
can choose whether to look at the changes suggested by all reviewers, or just those made by
specific reviewers. The names of reviewers who made changes to a particular slide appear
above the thumbnail of the slide, color-coded. Click the name of any reviewer whose
changes you want to accept.
385Chapter 16 ✦ Collaborating on a Network
You can also call up a shortcut menu by pointing at the thumbnail and then clicking the
downward-pointing arrow that appears beside it. The shortcut menu also lets you apply
changes by the current reviewer, show only that reviewer’s changes, preview animation (in
case there was a change to an animation) and, finally, finish off your review of that
reviewer’s changes by clicking Done With This Reviewer.
The list version of the changes in the Revisions Pane is a little different; it shows a list of
changes to the slide (text edits, new graphics, etc.), and a separate list of Presentation

changes (slide transitions, for instance). The Previous and Next buttons at the bottom of the
task pane take you from slide to slide.
The Reviewing toolbar, also visible in Figure 16-13, is very similar to Word’s Reviewing
toolbar. You can step from item to item, choose to apply or unapply, edit and delete
comments, choose which reviewers’ changes you want to see, end the review, and toggle the
Revisions pane off and on.
Clicking End Review discards all unreviewed changes in the merged presentation, so don’t
click it until you’re certain you’re done.
You can also toggle markup on and off. The Markup feature shows callouts detailing
changes made to the presentation without obscuring the presentation or affecting its layout
(see Figure 16-14). Accepting a change is as simple as checking it off in the markup callout.
Caution
Figure 16-14: PowerPoint’s Markup feature provides a way to see changes in the
context of the slide they’re on.

×