Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use People Graphs in Excel for Data Visualization

Tip of the Week: Use People Graphs in Excel for Data Visualization

With Microsoft Excel, you can use visuals to represent your data, providing greater context for the contents of your spreadsheets and making it easier to communicate what it all means. This week’s tip focuses on People Graphs, a feature that can be powerful when used appropriately.

Explaining People Graphs

One of the Microsoft Office Add-Ins your organization can use is the option to use People Graphs for data visualization. The default icon is a person, but you can also customize it with various icons like stars, hearts, clocks, bags of money, or otherwise.

Here’s how you can make a People Graph using a simple set of data.

How to Create a People Graph

The first thing you need to make a People Graph is the spreadsheet from which it will pull its data. For example, let's say you wanted to share some statistics about the work/life balance of today’s workforce. You might list out the statistics in one column, then include the actual numeric values for those statistics in another column.

Once you have your spreadsheet ready to go, select the data range. Then, using the Insert toolbar, find the option for People Graph. It will be located in Add-Ins. You’ll see a premade graph populate on the sheet. You can then use the Settings option from the top-right corner of the graph to make any adjustments you need to it.

You have a fair amount of control over how the graph looks, including its color scheme and the shape of the icons.

After you’ve customized it to your liking, you can select the grid button next to the Settings. You can use this to customize the title of your graph or the data that it pulls its information from.

Once you have selected the data, all you have to do is click on Create. This will complete your People Graph.

Did you find this helpful? We’re full of neat tips and tricks, so be sure to keep an eye on our blog for more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 10 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Data Recovery Business Management VoIP Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Miscellaneous Automation Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Windows 10 Blockchain Bandwidth Virtualization Wi-Fi Business Technology Vendor Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol WiFi HIPAA How To Applications BDR Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Access Control Office 365 Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Router Managed IT Services Big Data 2FA Help Desk Operating System Computers Virtual Private Network Risk Management Healthcare Website Health Cooperation Free Resource Project Management Windows 7 Firewall Document Management Microsoft 365 Solutions The Internet of Things Scam Data loss Social Windows 11 Going Green Patch Management Save Money Remote Monitoring Monitoring End of Support Vulnerability Vendor Management Customer Service Cybercrime Excel Physical Security Display Remote Workers Printer Telephone Paperless Office Infrastructure Data Privacy Outlook Machine Learning Money Images 101 Humor Telephone System Multi-Factor Authentication Mobility Cost Management Maintenance Safety Antivirus Sports Mouse Employees Integration Administration User Tip Modem Mobile Security Processor Holidays Robot Customer Relationship Management Data Storage Settings Wireless Smart Technology Supply Chain Printing Video Conferencing Content Filtering Hacking IT Management Managed Services Provider Professional Services Presentation VPN Saving Time YouTube Meetings Virtual Machines Cryptocurrency Managed IT Service Wireless Technology Computer Repair Downloads iPhone Virtual Desktop LiFi Licensing Data storage Vulnerabilities Entertainment Word Trends Supply Chain Management Electronic Medical Records SharePoint Refrigeration Customer Resource management FinTech Halloween Regulations Google Calendar Term Google Apps Writing Microsoft Excel IT Maintenance Public Speaking Lenovo Data Analysis Star Wars IT Assessment Gamification Flexibility Virtual Reality Staff Value Business Intelligence Lithium-ion battery Hacks Server Management Organization Entrepreneur Scary Stories Private Cloud Social Networking Legislation Shortcuts Fun Ransmoware Superfish Fileless Malware Digital Security Cameras Identity Theft Smart Devices Deep Learning Content Remote Working Twitter Wearable Technology Memory Vendors Undo Health IT Error Motherboard Data Breach Comparison Google Play Be Proactive Assessment Electronic Health Records Social Engineering Permissions Workforce Directions Videos Education Remote Computing Wasting Time Threats Specifications Security Cameras Workplace Strategies Mobile Computing Trend Micro Internet Exlporer Software as a Service Search Fraud Meta Microchip Tablet Application Best Practice Username Alert Managing Costs Amazon Black Friday SSID Managed IT Buisness File Sharing eCommerce Dark Data Database Surveillance How To Virtual Assistant Outsource IT IBM Legal IT solutions Business Growth Notifications IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Travel Cookies Google Maps Tactics Development Cortana Hotspot Transportation Small Businesses Techology Alt Codes Mirgation Hypervisor Displays PowerPoint Competition Shopping Downtime Unified Threat Management Nanotechnology Optimization Hosted Solution Addiction Language Employer/Employee Relationships Outsourcing Unified Threat Management Typing Management PCI DSS Chatbots Navigation Network Congestion Distributed Denial of Service Workplace Gig Economy Screen Reader User Service Level Agreement Internet Service Provider Knowledge Computing Infrastructure Teamwork Hiring/Firing Google Drive User Error Regulations Compliance Identity Evernote Paperless 5G Co-managed IT Bookmark Point of Sale Smart Tech Memes Unified Communications Download Net Neutrality Experience Alerts SQL Server Technology Care IP Address Google Docs Bitcoin Network Management Financial Data Running Cable Tech Support History Business Communications Monitors Break Fix Scams Google Wallet Browsers Smartwatch Connectivity IT Recovery Upload Procurement Azure Hybrid Work Hard Drives Windows 8 Social Network Telework Laptop Websites Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Domains Drones CES IoT Communitications

Blog Archive