Question about Microsoft Office Excel 2003 for PC

1 Answer

Not able to exclude hidden items from the total

I am taking report from external data source pivot
(from sap bi queries). while excluding the hidden items i am getting error like" This data provider does not support totals that excludes hidden items".

Kindly help me.

Posted by on

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points


    An expert that got 5 achievements.


    An expert who has written 20 answers of more than 400 characters.

    New Friend:

    An expert that has 1 follower.

  • Expert
  • 48 Answers

The solution to your question can probably only be resolved by the developers at SAP modifying how their software functions. Sometimes the answer is not what seems expedient because that could take months or years to have solved. I suggest posing this to them because your error exactly matches what you see as the issue.

Posted on Apr 07, 2009

1 Suggested Answer

  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%


Complete. Click "Add" to insert your video. Add



Related Questions:


Copy files even with errors and many more

You might encounter something like "Access Denied", "The file has beentransferred to another location or deleted" or some other errors whilecopying your files.

This is a typical problem to those Windows XP users. So what they do isjust recopy all the files again but they will exclude the one with theerror.

What if you have virus that you are in random folders that can't be moved/copied?
What if your old files that you don't need have random access denied files?
What if and what if?

How to continue copying files and exclude the files with error?
Here's how you do it.

What is xcopy?
Copies files and directory trees.
How to use xcopy?

XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W]
[/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U]
[/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z] [/B]

See the REFERENCE below for the detailed meaning

Step 1.
Click Start then click Run...(Or Simply Press Windows key+R)

Step 2.
type "xcopy [source] [destination]"

Sample 1: (For single File ONLY)
xcopy C:/Windows/System32/userint.exe E:/Backup

Sample 2: (For folder including their sub folders)
xcopy C:/Windows E:/BackupWIndows /S
xcopy C:/Windows E:/BackupWIndows /E

Sample 3: (For Continue Copying even Error Occurs)
xcopy C:/Windows E:/BackupWIndows /S /C

Sample 4: (For allowing copying encrypted files)
xcopy C:/Windows E:/BackupWIndows /S /G

Note: You can combine the rules/options that you like.

That's it! you now have a way to copy files that are protected, accessdenied, or even those that are encrypted. Hope This tip helps you. ^^


What are the use of the options?

source Specifies the file(s) to copy.

destination Specifies the location and/or name of new files.

/A Copies only files with the archive attribute set,
doesn't change the attribute.

/M Copies only files with the archive attribute set,
turns off the archive attribute.

/D:m-d-y Copies files changed on or after the specified date.
If no date is given, copies only those files whose
source time is newer than the destination time.

Specifies a list of files containing strings. Each string
should be in a separate line in the files. When any of the
strings match any part of the absolute path of the file to be
copied, that file will be excluded from being copied. For
example, specifying a string like obj or .obj will exclude
all files underneath the directory obj or all files with the
.obj extension respectively.

/P Prompts you before creating each destination file.

/S Copies directories and subdirectories except empty ones.

/E Copies directories and subdirectories, including empty ones.
Same as /S /E. May be used to modify /T.

/V Verifies the size of each new file.

/W Prompts you to press a key before copying.

/C Continues copying even if errors occur.

/I If destination does not exist and copying more than one file,
assumes that destination must be a directory.

/Q Does not display file names while copying.

/F Displays full source and destination file names while copying.

/L Displays files that would be copied.

/G Allows the copying of encrypted files to destination that does
not support encryption.

/H Copies hidden and system files also.

/R Overwrites read-only files.

/T Creates directory structure, but does not copy files. Does not
include empty directories or subdirectories. /T /E includes
empty directories and subdirectories.

/U Copies only files that already exist in destination.

/K Copies attributes. Normal Xcopy will reset read-only attributes.

/N Copies using the generated short names.

/O Copies file ownership and ACL information.

/X Copies file audit settings (implies /O).

/Y Suppresses prompting to confirm you want to overwrite an
existing destination file.

/-Y Causes prompting to confirm you want to overwrite an
existing destination file.

/Z Copies networked files in restartable mode.

/B Copies the Symbolic Link itself versus the target of the link.

/J Copies using unbuffered I/O. Recommended for very large files.

The switch /Y may be preset in the COPYCMD environment variable.
This may be overridden with /-Y on the command line.

Visit for more troubleshooting guides. ^^

on Jan 24, 2010 | Computers & Internet

1 Answer


A "CRC" (Cyclic Redundancy Check) is caused by an disk-drive error.

When you write a "block' of data to your disk-drive, a CRC value is calculated, and is also written to the disk. When you try to read that "block" of data, the CRC value is also read from the disk,
and a new CRC is calculated from the data. If the "new" CRC does not match the "old" CRC, then you have a "check" condition -- either the data was not written correctly, or the data could not be read correctly.

Now, did the "check" message refer to the "source" of the copying operation (namely your 'C:' drive) , or the "target"(namely the external drive) ???

Try to copy the PST file to another file on your 'C:' drive.
If you do not see the "check", then it is the external disk-drive that has a problem.
If you do see the "check", then open Outlook, create a new folder,
and copy a group of messages into the new folder. If Outlook reports that one of the messages could not be copied, then the disk-space occupied by that message is faulty, and must be excluded.

Sep 07, 2010 | Computers & Internet

2 Answers

How to automatically import data from tally to excel. Want to display auto imported data in sharepoint.

Import TALLY Data / Export TALLY Data
Tally allows users to Import data from other software's as well as Export data from Tally to other software's. Tally allows users to Import and Export in ASCII, SDF and XML formats. XML is now the most widely used format of exporting data in the world. Any transactions can be exported from Tally and imported in other software after suitably altering the current structures to accept Tally data structure. The reverse is also possible by writing a small TDL program to accept the data from other software's. The data that is to be imported into Tally can be in either XML or DBF format. Easy Tally data transfer or Tally data migration from Tally 4.5 & Tally 5.4 to Tally 6.3 , Tally 7.2 , etc.
Tally is now ODBC compliant. Hence, any program like MS-Excel, Oracle etc that is ODBC compliant can use data from Tally. Here, data connectivity is dynamic i.e. any new updation in Tally is reflected in other ODBC Compliant Software immediately. Now, with ODBC facility the user can extract data out of Tally and design his own report formats in other ODBC compliant software's.
Procedure :
Now, Load Company -> specify period -> minimize Tally -> Open a new Excel file -> select data -> select 'Get External Data' -> select New database query -> choose Data Source
Tally connects to data source and displays Tally Wizard query screen -> select the columns you would want to include in the query.
Once all the columns are selected, the user returns to excel and excel displays all the columns selected
Graphical Analysis of Tally Data
Sometimes, pictures can say better than figures. Tally also provides graphical (Bar graph) analysis of data. The user can do a graphical analysis reports like Sales register, Purchase register, Ledgers, Funds flow, Cash flow, Item registers etc. This helps the user in deeper analysis of data. In Tally, a graphical analysis can also show month wise graphs for the year in comparison with any other period. This will help the management in quickly locating the highs and lean periods in a financial year and hence be better prepared for difficult times.
Web Enabled
Tally ees 6.3 is now Web enabled. This will help the user in reducing his paper work further. Now, report in Tally can be e-mailed directly from Tally. It is not just reports, but even invoices and purchase orders can also be e-mailed directly from Tally. Hence, the user does not have to send printed invoice or purchase orders from Tally.
Procedure :
Select any report (e.g. Balance sheet) -> select Alt+M (E-mail) -> specify all details as required by Tally
Ability to Publish Reports and Documents on the Internet
Now, Tally allows users to upload reports on the web site directly from Tally. So companies that would want to publish reports on the web site can do so directly from Tally. Many companies would also like to publish their price list on their websites along with the product they deal with.
Procedure :
Select any report (Profit and Loss A/C) -> select Upload (Alt + O) -> specify all details as required by Tally.
Direct Internet Access
Tally now offers direct Internet access. A Tally user while working on Tally can directly log on to tally website get details of all the facilities offered by Tally. The user can also download the latest releases of Tally 6.3 as and when available. Tally website also offers a facility of Tally Chat. Any user can now chat with a Tally representative and get any information regarding Tally.
Procedure :
Start Tally -> now, from any screen select Web Browser (Alt+W). Tally now takes you to the Tally Web site.
Print Preview
Any user would ideally like to view format of reports / Invoices / Vouchers before printing the same. Tally now offers a facility of print preview. Now any report can be viewed before printing or before it is mailed. Once Tally shows the preview the user can either opt to print or mail the same.

Apr 15, 2010 | Microsoft Office Excel 2007

1 Answer

I'm here in the philippines i' m trying to call in korea with this # 01068710697 but i don't know how to call.

you may have to add:

00 82(the number to call excluding the first zero) if its a mobile number. South Korea

+82(the number to call excluding the first zero) if its a fixed landline number. South Korea

00 850(the number to call excluding the first zero) if its a mobile number. North Korea

+850(the number to call excluding the first zero) if its a fixed landline number. North Korea

Hope this helps. Please rate.

Nov 07, 2009 | Video Game Consoles & Games

1 Answer

Gidday, I have windows XP on my laptop, and use Avira Antivirus Personal Free Edition. I have disabled my windows firewall as reccommended. I use a trading platform, CMC Marketmaker, and cMC has advised me...

Read through this I think it will help:-
Processes to be omitted for the Guard
All file accesses of processes in this list are excluded from monitoring by the Guard.
Input box
In this box you can enter the name of the process that is not included in the on-access
scan. No process is entered as the default setting. The names of the individual process
can most easily be obtained via the task manager. The "Processes" tab in the task
manager contains the names of all currently active processes. Select "your" process and
enter its name under "Image Name".
You can enter up to 20 processes.
Only the first 15 characters of the process name (including the file extension) are
considered. If there are 2 processes with the same name, Guard excludes both processes
from the monitoring.
Please note that all file accesses by processes recorded in the list are excluded from the
scan for viruses and unwanted programs! The Windows Explorer and the operating
system itself cannot be excluded. A corresponding entry in the list is ignored.
Add rule
With this button, you can add the process entered in the input box to the display
With this button you can delete a selected process from the display window.
File objects to be omitted for the Guard
All file accesses to objects in this list are excluded from monitoring by the Guard.
The entries on the list must not result more than 6000 characters in total.
Input box
In this box you can enter the name of the file object that is not included in the on-access
scan. No file object is entered as the default setting.
The button opens a window in which you can select the file object to be excluded.
Add rule
With this button, you can add the file object entered in the input box to the display
With this button you can delete a selected file object from the display window.
Please observe the following points:
– The file name can only contain the wildcards * (any number of characters) and
? (a single character).
– Directory names must end with a backslash \, otherwise a file name is assumed.
– The list is processed from top to bottom.
– Individual file extensions can also be excluded (inclusive wildcards).
– If a directory is excluded, all its sub-directories are automatically also excluded.
– The longer the list is, the more processor time is required for processing the list
for each access. Therefore, keep the list as short as possible.
– In order to also exclude objects when they are accessed with short DOS file names
(DOS name convention 8.3), the relevant short file name must also be entered in
the list.
A file name that contains wildcards may not be terminated with a backslash.
For example:
C:\Program Files\Application\applic*.exe\
This entry is not valid and not treated as an exception!
In case of dynamic drives which are mounted as a directory on another drive, the alias of
the operating system for the integrated drive in the list of the exceptions has to be used:
e.g. \Device\HarddiskDmVolumes\PhysicalDmVolumes\BlockVolume1\
If you use the mount point itself, such as ‚C:\DynDrive’, the dynamic drive will
be scanned nonetheless. You can determine the alias of the operating system to be used
from the report file of Guard: Set the protocol function of the Guard to Complete in the
configuration under Guard :: Report. Now access the mounted drive with the activated
Guard. You can now read the drive name used from the report file of the Guard. The
report file can be accessed in Control Center under Local protection :: Guard.
C:\Program Files\Application\application.exe
C:\Program Files\Application\applic*.exe
C:\Program Files\Application\applic*
C:\Program Files\Application\applic?????.e*
C:\Program Files\
C:\Program Files
C:\Program Files\Application\*.mdb

Apr 01, 2009 | Computers & Internet

1 Answer

With spaces and exclude spaces

Use the Len function
number_or_characters = Len(your_input_string)

Taking input from a TextBox is easy:
number_or_characters = Len(txtInput.Text)

Mar 04, 2009 | Microsoft Visual Basic 6.0 for PC

1 Answer

Smelled like burnt board

Just so you know. Bosch has a 5 year warranty on any printed circuit board (excluding labor) so you pay only for labor charges. They have a 2 year warranty (again excluding labor) on the entire dishwasher. I am leaving a copy of my owners manuals warranty information I hope this helps.

Extended Limited Warranty: Bosch also provides these additional
limited warranties:
• 2 Year Limited Warranty: Bosch will repair or replace
any component that proves to be defective in materials or
workmanship (excludes labor charges).
• 5 Year Limited Warranty on Electronics: Bosch will repair or
replace any Bosch microprocessor or printed circuit board if it
proves to be defective in materials or workmanship (excludes
labor charges).
• 5 Year Limited Warranty on Dish Racks: Bosch will replace the
upper or lower dish rack (excluding rack components), if the rack
proves defective in materials or workmanship (excludes labor
• Lifetime Warranty against Stainless Steel Rust Through:
Bosch will replace your dishwasher with the same model or
a current model that is substantially equivalent or better in
functionality, if the inner liner should rust through (excludes
labor charges). Bosch will replace the stainless steel door if the
door should rust through (excludes labor charges).
The foregoing timeline begins to run upon the date of purchase, and
shall not be stalled, tolled, extended, or suspended, for any reason
Repair/Replace as Your Exclusive Remedy: During this warranty

Jan 14, 2008 | Bosch 24 in. SHU43 Built-in Dishwasher

1 Answer


go to for anything excluding map data you should be able to find your model and download the user guide there.

Jan 05, 2008 | Tomtom GO 910 GPS Receiver

Not finding what you are looking for?
Microsoft Office Excel 2003 for PC Logo

Related Topics:

121 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2642 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18357 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides