Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use People Graphs in Excel for Data Visualization

Tip of the Week: Use People Graphs in Excel for Data Visualization

With Microsoft Excel, you can use visuals to represent your data, providing greater context for the contents of your spreadsheets and making it easier to communicate what it all means. This week’s tip focuses on People Graphs, a feature that can be powerful when used appropriately.

Explaining People Graphs

One of the Microsoft Office Add-Ins your organization can use is the option to use People Graphs for data visualization. The default icon is a person, but you can also customize it with various icons like stars, hearts, clocks, bags of money, or otherwise.

Here’s how you can make a People Graph using a simple set of data.

How to Create a People Graph

The first thing you need to make a People Graph is the spreadsheet from which it will pull its data. For example, let's say you wanted to share some statistics about the work/life balance of today’s workforce. You might list out the statistics in one column, then include the actual numeric values for those statistics in another column.

Once you have your spreadsheet ready to go, select the data range. Then, using the Insert toolbar, find the option for People Graph. It will be located in Add-Ins. You’ll see a premade graph populate on the sheet. You can then use the Settings option from the top-right corner of the graph to make any adjustments you need to it.

You have a fair amount of control over how the graph looks, including its color scheme and the shape of the icons.

After you’ve customized it to your liking, you can select the grid button next to the Settings. You can use this to customize the title of your graph or the data that it pulls its information from.

Once you have selected the data, all you have to do is click on Create. This will complete your People Graph.

Did you find this helpful? We’re full of neat tips and tricks, so be sure to keep an eye on our blog for more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Mobile Device Hosted Solutions Ransomware Quick Tips Microsoft Workplace Strategy Small Business Cybersecurity Data Backup Communication Passwords Smartphone Saving Money VoIP Business Management Smartphones Android Backup Mobile Devices communications Upgrade Managed Service Data Recovery Managed IT Services Browser Social Media Microsoft Office Disaster Recovery Windows Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Server Managed Service Provider Remote Work Current Events Miscellaneous Gadgets Productivity Information Outsourced IT Holiday AI Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Compliance Training Business Technology Blockchain Bandwidth Windows 10 Virtualization Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Chrome Vendor Mobile Device Management Budget Gmail Apple Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship Access Control Avoiding Downtime Office 365 Marketing Tip of the week Applications How To WiFi BDR Conferencing BYOD Computing Information Technology Hacker Health Analytics Website Office Tips Augmented Reality HIPAA Router Retail Storage Password Bring Your Own Device Managed IT Services Help Desk Big Data Operating System Healthcare Virtual Private Network Risk Management Computers Paperless Office Windows 7 Infrastructure Microsoft 365 IT Support Document Management Solutions Firewall Scam Data loss Windows 11 2FA Monitoring The Internet of Things Excel Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Cybercrime Telephone Customer Service Display Printer Cooperation Free Resource Project Management Images 101 Virtual Desktop Data storage LiFi Wireless Technology Multi-Factor Authentication Mobility Telephone System Cost Management Outlook Machine Learning Money Humor Word Employees Integration Maintenance Modem Sports User Tip Antivirus Processor Mouse Mobile Security Safety Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Saving Time Settings Printing Managed IT Service Wireless Content Filtering Downloads IT Management Customer Relationship Management VPN YouTube Meetings iPhone Licensing Physical Security Cryptocurrency Entertainment Hacking Vulnerabilities Presentation Data Privacy Computer Repair Data Analysis Google Wallet Star Wars IT Assessment Microsoft Excel IT Maintenance Monitors Gamification Flexibility Staff Value Business Intelligence Social Networking Laptop Websites Legislation Shortcuts Organization Windows 8 IP Address Fileless Malware Digital Security Cameras Drones Smart Devices Ransmoware SharePoint Content Remote Working Wearable Technology Memory Vendors Electronic Medical Records Motherboard Data Breach Halloween Recovery Comparison Google Play Be Proactive Health IT Directions Videos Lenovo Assessment Electronic Health Records Hard Drives Permissions Workforce Writing Domains Wasting Time Threats Virtual Reality Trend Micro Scary Stories Private Cloud Specifications Security Cameras Workplace Strategies Hacks Server Management Microchip Superfish Internet Exlporer Software as a Service Identity Theft Refrigeration Fraud Meta Fun Username Deep Learning Public Speaking Managing Costs Amazon Twitter Lithium-ion battery eCommerce Error Black Friday SSID Database Surveillance Education Virtual Assistant Outsource IT Social Engineering Entrepreneur Media IT Technicians Virtual Machine Environment Remote Computing Cookies Cyber Monday Medical IT Proxy Server Reviews Mobile Computing Tactics Development Tablet Undo Hotspot Transportation Small Businesses Search Best Practice Mirgation Hypervisor Displays Alert Nanotechnology Optimization Buisness File Sharing PowerPoint Dark Data Shopping Managed IT Legal Addiction IT solutions Language Employer/Employee Relationships Outsourcing How To Navigation Management PCI DSS Business Growth Chatbots Notifications Screen Reader Travel Application Distributed Denial of Service Workplace Gig Economy Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Hiring/Firing Cortana Evernote Paperless Regulations Compliance Alt Codes IBM Identity Smart Tech Memes Downtime Unified Threat Management Co-managed IT Bookmark Unified Threat Management Download Net Neutrality Hosted Solution Alerts SQL Server Technology Care Business Communications Financial Data Typing History Browsers Smartwatch Connectivity IT Break Fix Scams Network Congestion Google Drive User Error Upload Procurement Competition Azure Hybrid Work Knowledge Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES IoT Communitications Point of Sale Dark Web Cables 5G Google Docs Trends Supply Chain Management Unified Communications Experience Regulations Running Cable Tech Support User Google Calendar Term Google Apps Customer Resource management FinTech Bitcoin Network Management

Blog Archive