Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use People Graphs in Excel for Data Visualization

Tip of the Week: Use People Graphs in Excel for Data Visualization

With Microsoft Excel, you can use visuals to represent your data, providing greater context for the contents of your spreadsheets and making it easier to communicate what it all means. This week’s tip focuses on People Graphs, a feature that can be powerful when used appropriately.

Explaining People Graphs

One of the Microsoft Office Add-Ins your organization can use is the option to use People Graphs for data visualization. The default icon is a person, but you can also customize it with various icons like stars, hearts, clocks, bags of money, or otherwise.

Here’s how you can make a People Graph using a simple set of data.

How to Create a People Graph

The first thing you need to make a People Graph is the spreadsheet from which it will pull its data. For example, let's say you wanted to share some statistics about the work/life balance of today’s workforce. You might list out the statistics in one column, then include the actual numeric values for those statistics in another column.

Once you have your spreadsheet ready to go, select the data range. Then, using the Insert toolbar, find the option for People Graph. It will be located in Add-Ins. You’ll see a premade graph populate on the sheet. You can then use the Settings option from the top-right corner of the graph to make any adjustments you need to it.

You have a fair amount of control over how the graph looks, including its color scheme and the shape of the icons.

After you’ve customized it to your liking, you can select the grid button next to the Settings. You can use this to customize the title of your graph or the data that it pulls its information from.

Once you have selected the data, all you have to do is click on Create. This will complete your People Graph.

Did you find this helpful? We’re full of neat tips and tricks, so be sure to keep an eye on our blog for more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Email Phishing Workplace Tips Google Computer Collaboration IT Services Users Hosted Solutions Ransomware Quick Tips Mobile Device Cybersecurity Small Business Microsoft Data Backup Workplace Strategy Communication Saving Money Smartphone Business Management VoIP Smartphones Android Mobile Devices communications Backup Data Recovery Managed Service Managed IT Services Passwords Microsoft Office Upgrade Browser Social Media Disaster Recovery Tech Term Network Internet of Things Automation Artificial Intelligence Facebook Remote Cloud Computing Covid-19 Managed Service Provider Windows Miscellaneous Gadgets Remote Work Server Outsourced IT Information Employee/Employer Relationship Current Events Encryption Spam Productivity Windows 10 Holiday Data Management Business Continuity Government Office Business Technology Windows 10 Virtualization Compliance Blockchain AI Wi-Fi Training Two-factor Authentication Mobile Office Bandwidth Data Security Apps Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Networking Apple App Employer-Employee Relationship Vendor Access Control Office 365 Tip of the week Conferencing WiFi How To BDR BYOD Computing Hacker Information Technology Applications Avoiding Downtime Website Marketing Health Office Tips Analytics Help Desk Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Operating System Computers HIPAA Router Virtual Private Network Risk Management Paperless Office Infrastructure Windows 11 Monitoring 2FA IT Support Firewall Document Management Excel Remote Workers The Internet of Things Scam Telephone Data loss Social Cooperation Free Resource Project Management Patch Management Going Green Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Customer Service Vendor Management Cybercrime Solutions Display Printer Mobile Security Virtual Desktop Processor Data storage LiFi Holidays Word Data Storage Outlook Machine Learning Smart Technology Supply Chain Money Video Conferencing Managed Services Provider Humor Saving Time Virtual Machines Professional Services Safety Maintenance Antivirus Sports Managed IT Service Mouse Downloads iPhone Licensing Administration Entertainment Vulnerabilities Data Privacy Images 101 Robot Customer Relationship Management Settings Telephone System Multi-Factor Authentication Mobility Printing Wireless Cost Management Content Filtering Hacking IT Management Presentation VPN Meetings YouTube Employees Cryptocurrency Integration Wireless Technology Computer Repair User Tip Modem Virtual Assistant Outsource IT Google Wallet Monitors Database Surveillance IT Technicians Virtual Machine Environment Media Recovery Hard Drives Windows 8 Websites Laptop Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Domains Drones Tactics Development Electronic Medical Records Mirgation Hypervisor Displays SharePoint Refrigeration Halloween Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Public Speaking Lenovo Writing Addiction Virtual Reality Management PCI DSS Chatbots Lithium-ion battery Navigation Server Management Hacks Entrepreneur Private Cloud Scary Stories Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Superfish Identity Theft Fun Service Level Agreement Internet Service Provider Twitter Regulations Compliance Identity Evernote Paperless Deep Learning Undo Error Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Education Social Engineering Download Net Neutrality Remote Computing Financial Data History Business Communications Mobile Computing Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Tablet Search Upload Procurement Alert Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Application Best Practice Managed IT File Sharing Buisness CES Dark Data IoT Communitications Dark Web Cables IBM Legal IT solutions How To Trends Supply Chain Management Notifications Customer Resource management FinTech Regulations Google Calendar Term Google Apps Business Growth Travel Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Techology Google Maps Cortana Gamification Flexibility Organization Social Networking Legislation Shortcuts Alt Codes Competition Unified Threat Management Downtime Fileless Malware Digital Security Cameras Smart Devices Ransmoware Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Hosted Solution Health IT Motherboard Data Breach Comparison Google Play Be Proactive Typing Permissions Workforce Directions Videos Network Congestion Assessment Electronic Health Records Wasting Time Threats User Error Google Drive User Knowledge Physical Security Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Point of Sale Microchip 5G Internet Exlporer Software as a Service Username Managing Costs Amazon IP Address Google Docs Unified Communications Experience Tech Support Running Cable eCommerce Black Friday SSID Network Management Bitcoin

Blog Archive