Sign in with Microsoft
Sign in or create an account.
Hello,
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.
IF function - Microsoft Support
The IF function is one of the most popular functions in Excel, and it allows you to make logical comparisons between a value and what you expect. So an IF statement can have two results. The first result is if your comparison is True, the second if your comparison is False. For example, =IF (C2=”Yes”,1,2) says IF (C2 = Yes, then return a 1 ...
Applies To: Excel for Microsoft 365, Excel for Microsoft 365 for Mac, Excel for the web, Excel 2021, Excel 2021 for Mac, Excel 2019, Excel 2019 for Mac, Excel 2016
Welcome to Copilot on Windows - Microsoft Support
Copilot is designed to deliver AI-powered assistance in a convenient manner, enabling you to seamlessly engage with generative AI on Windows. You can resize, move, and use Snap Assist with Copilot, just like you can with other Windows apps. You can use Alt + Tab to switch focus between Copilot and other open apps.
Turn on device encryption - Microsoft Support
In the search box on the taskbar, type Manage BitLocker and then select it from the list of results. Or, select the Start button, and then under Windows System, select Control Panel.In Control Panel, select System and Security, and then under BitLocker Drive Encryption, select Manage BitLocker. Note: You'll only see this option if BitLocker is available for your device.
Add an exclusion to Windows Security - Microsoft Support
If you trust a file, file type, folder, or a process that Windows Security has detected as malicious, you can stop Windows Security from alerting you or blocking the program by adding the file to the exclusions list.
Turn on app permissions for your microphone in Windows 10
Once you've allowed microphone access to your apps, you can change the settings for each app. In Microphone settings, go to Choose which Microsoft apps can access your microphone, and turn on apps you want to use with it.For desktop apps, make sure that Allow desktop apps to access your microphone is turned on.
Change default programs in Windows - Microsoft Support
Select Start > Settings > Apps > Default apps. To change the default app, you can do either of the following: Set a default for a file type or link type. In the search bar, enter the file type or link type you want, then select it from the list of results. You can choose which app can open that file or link type. Set defaults for applications.
Create a system restore point - Microsoft Support
Windows 10. In the search box on the taskbar, type Create a restore point, and select it from the list of results. On the System Protection tab in System Properties, select Create. Type a description for the restore point, and then select Create. Create a system restore point.
How to sign in to a Microsoft account - Microsoft Support
To sign in to your Microsoft personal account, go to account.microsoft.com or select Sign in below. Sign in. Tip: If you don't have a Microsoft account, you can select " No account? Create one! Enter your email, phone number, or Skype sign-in that you use for other services (Outlook, Excel, etc.), then select Next.
Applies To: Microsoft 365 for home, Outlook.com, Microsoft 365 for Mac, Microsoft 365 for Windows, Microsoft account dashboard, Microsoft Edge, Microsoft Teams, OneDrive (home or personal), OneDrive for Mac, OneDrive for Windows
Join a Teams meeting - Microsoft Support
In your email invite, select Join the meeting now. Continue on this browser: Join a Teams meeting on the web. Open your Teams app: If you already have the Teams app, go right to your meeting. Type your name. Choose your audio and video settings. Select Join now. Depending on meeting settings, you'll get in right away, or go to a lobby where ...
Applies To: Microsoft Teams
Protect yourself from phishing - Microsoft Support
Protect yourself from phishing. Phishing (pronounced: fishing) is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information -- such as credit card numbers, bank information, or passwords -- on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies ...