Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use People Graphs in Excel for Data Visualization

Tip of the Week: Use People Graphs in Excel for Data Visualization

With Microsoft Excel, you can use visuals to represent your data, providing greater context for the contents of your spreadsheets and making it easier to communicate what it all means. This week’s tip focuses on People Graphs, a feature that can be powerful when used appropriately.

Explaining People Graphs

One of the Microsoft Office Add-Ins your organization can use is the option to use People Graphs for data visualization. The default icon is a person, but you can also customize it with various icons like stars, hearts, clocks, bags of money, or otherwise.

Here’s how you can make a People Graph using a simple set of data.

How to Create a People Graph

The first thing you need to make a People Graph is the spreadsheet from which it will pull its data. For example, let's say you wanted to share some statistics about the work/life balance of today’s workforce. You might list out the statistics in one column, then include the actual numeric values for those statistics in another column.

Once you have your spreadsheet ready to go, select the data range. Then, using the Insert toolbar, find the option for People Graph. It will be located in Add-Ins. You’ll see a premade graph populate on the sheet. You can then use the Settings option from the top-right corner of the graph to make any adjustments you need to it.

You have a fair amount of control over how the graph looks, including its color scheme and the shape of the icons.

After you’ve customized it to your liking, you can select the grid button next to the Settings. You can use this to customize the title of your graph or the data that it pulls its information from.

Once you have selected the data, all you have to do is click on Create. This will complete your People Graph.

Did you find this helpful? We’re full of neat tips and tricks, so be sure to keep an eye on our blog for more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Microsoft Cybersecurity Data Backup Communication Smartphone Passwords Saving Money Business Management VoIP Smartphones Android Backup Mobile Devices communications Upgrade Data Recovery Managed Service Managed IT Services Browser Social Media Disaster Recovery Microsoft Office Windows Tech Term Network Internet of Things Remote Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Managed Service Provider Miscellaneous Gadgets Current Events Productivity Remote Work Server Outsourced IT Information Holiday Spam Encryption AI Employee/Employer Relationship Windows 10 Data Management Business Continuity Compliance Government Office Training Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Apps Data Security Mobile Office Mobile Device Management Gmail Chrome Managed Services Budget Voice over Internet Protocol Apple Networking Employer-Employee Relationship App Vendor Access Control Office 365 Tip of the week Conferencing WiFi How To BDR BYOD Hacker Computing Applications Avoiding Downtime Information Technology Marketing Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Computers Operating System HIPAA Router Virtual Private Network Risk Management Website Paperless Office Infrastructure Monitoring Firewall IT Support Document Management Remote Workers The Internet of Things Telephone Scam Data loss Social Cooperation Free Resource Windows 11 Project Management Windows 7 2FA Going Green Patch Management Save Money Microsoft 365 Excel Remote Monitoring Customer Service Vulnerability End of Support Vendor Management Solutions Cybercrime Display Printer Data Privacy Virtual Desktop Holidays Word Data storage LiFi Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Safety Managed IT Service Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Vulnerabilities Entertainment Administration Images 101 Customer Relationship Management Supply Chain Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Hacking Content Filtering Presentation IT Management VPN Employees YouTube Meetings Physical Security Integration Wireless Technology Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hard Drives Hotspot Transportation Domains Google Apps Tactics Development Windows 8 Laptop Websites Mirgation Hypervisor IT Maintenance Business Intelligence Drones Shopping Nanotechnology Optimization PowerPoint Refrigeration Electronic Medical Records Language Employer/Employee Relationships Public Speaking Shortcuts SharePoint Addiction Management PCI DSS Halloween Chatbots Lithium-ion battery Navigation Ransmoware Vendors Entrepreneur Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Be Proactive Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Workforce Undo Threats Superfish Bookmark Identity Theft Smart Tech Memes Fun Twitter Alerts SQL Server Workplace Strategies Deep Learning Download Net Neutrality Financial Data Error History Meta Amazon Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Upload Procurement Remote Computing Azure Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Application Outsource IT Search Dark Web Environment Media CES Tablet IoT Communitications Best Practice Trends Supply Chain Management Alert IBM Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Small Businesses How To Microsoft Excel Displays Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Outsourcing Organization Travel Social Networking Legislation Cortana Competition Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Workplace Hiring/Firing Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions Paperless Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time User Co-managed IT Technology Care Trend Micro Network Congestion Specifications Security Cameras Knowledge Fraud Business Communications Google Drive User Error Microchip Internet Exlporer Software as a Service Username Managing Costs IP Address Scams Hybrid Work Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Human Resources Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Recovery Cables

Blog Archive