888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Excel to Create Eye-Catching Visuals

Tip of the Week: Use Excel to Create Eye-Catching Visuals

Spreadsheets are excellent ways to communicate a lot of information in a concise format. However, the big problem is that a spreadsheet alone isn’t very visually appealing. To remedy this, you can add other visual elements, like charts, into your Microsoft Excel spreadsheets. For today’s tip, we’ll go over some of your options.

Choosing Your Chart
Excel provides plenty of chart designs to choose from, but most are overly extravagant or overly complicated for typical business purposes. You will generally be able to present your information adequately by using a column/bar, pie, or line chart.

Types of Charts
Column
Column charts are best used to demonstrate a change in data values over time, or to compare values of multiple things at a single point. For instance, you could use a column chart to show the frequency of ransomware attacks over time, or to compare the frequency of multiple types of malware at a given point to one another.

Bar
A bar chart is essentially the same thing as a column chart, only rotated to be horizontal. These are helpful to use when the discrepancy between your data points is especially large, or when you need more space to fit your axis labels.

Pie
A pie chart is useful when you need to compare the percentages of a group of data. For example, let’s say a company experienced 10 downtime events in a month. A pie chart would be used to tell us that 30% of these attacks were ransomware attacks, 20% were DDoS attacks, and 50% were user error.

Line
A line chart is most useful when you’re trying to show how data changes over time, and allows you to display multiple data trends simultaneously. So, to return to the example shared for the column/bar charts, a line chart can demonstrate the frequency of multiple types of malware while simultaneously comparing their frequency, as compared to choosing between the two with a column/bar chart.

Building Your Chart
Excel makes it fairly simple to create a chart based on the data contained in a spreadsheet. The first step is simply to organize the data in your spreadsheet before highlighting what needs to be included in your chart.

Once that is done, click Insert and then select the chart style you want to use, either from the list of Recommended Charts, or from All Charts. Your new chart should appear. You can then use the Chart Elements, Chart Styles, and Chart Filters to customize the information that is presented in the chart to better make your intended point.

There are many more options available to customize your chart further. A bit of exploration, experimentation, and liberal use of the ‘Undo’ feature will allow you to craft a chart that clearly communicates the point you’re trying to put across.

Make sure you subscribe to our blog for more handy IT tips and computing tricks!

For Benefits over Your Old Phone System, Dial VoIP
New Year’s IT Solution: Outsource IT
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 28 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Business Computing Privacy Managed IT Services Technology Best Practices Cloud Malware Ransomware Hackers Backup Communications Outsourced IT Alert Internet Cybersecurity Productivity VoIP Software Smartphones Business Management Hardware IT Support Network Security Phishing Business Microsoft Passwords Save Money IT Services App Twitter Email Smartphone Data Breach Social Media Android Windows 10 Vulnerability Office 365 Workers Remote Monitoring Saving Money Mobile Device Management Cybercrime Data Small Business Settings Law Enforcement Data Backup Miscellaneous User Tips Google Cloud Computing Scam Politics Bandwidth Government Business Continuity Excel Microsoft Office Access Control Recovery Maintenance Antivirus Website Office Holiday Personal Information Spam Data Recovery Vendor Management BDR Hosted Solutions Internet of Things Windows Apps Productivity Facebook Virus Browser Employer-Employee Relationship Word How To Applications Education Patch Management Password Wi-Fi Computer Retail Efficiency Communication Blockchain Mobile Device Computers Chrome Entertainment e-waste Comparison Battery Phone System PowerPoint IT budget Telephony Emergency Apple Access Leadership Managed IT Networking Spyware Employer Employee Relationship disposal Specifications Multi-Factor Security Sports IT Management Voice over IP Licensing iPhone BYOD Encryption Dongle HP Automobile Value Network Hard Drives Company Culture DDoS Gadget Synergy Connectivity Tech Terms Travel WiFi Analytics SaaS Mobile Devices Tech Term Two-factor Authentication Content Filtering Router Scalability Shortcut Live Streaming Data Protection Telephone Systems IaaS Technology Tips Database Tech Support Document Management Gmail Credit Cards WhatsApp Smart Technology CrashOverride Safety Dark Data Wireless Charging Printer Server Remote Control HaaS Backup and Disaster Recovery The Internet of Things Tactics Budget Paperless Office Gadgets Dark Web Hiring/Firing Unified Threat Management Lead Generation Printers Cleaning Cost Management SSD Google Maps Internet Explorer Innovation Digital Users Current Events News VPN Botnet Virtual Assistant Email Management Computer Care Inventory Staffing Data Management Threat Edge Net Neutrality Telephone System Disaster Recovery Wireless WannaCry Sales Automation Gaming Console Yahoo Physical Security Data loss HIPAA Tablet Video Games Worker Cortana Files Remote Support Information Technology Collaboration Television Staff Hard Drive Avoiding Downtime Knowledge Managed Service Provider Printer Marketing Managed IT Service Biometrics Websites Processors Customer Relationship Management IP Address Copy Customer Service VoIP Mobile Office Paste Domains Conferencing eCommerce Business Intelligence Public Speaking Streaming Media Lithium-ion battery Network Attached Storage Online Shopping Augmented Reality Scheduling Emoji Downloads Server Management File Sharing Instagram Samsung User Tip Trends Artificial Intelligence Competition User Security Spam Blocking Fun Big Data Tip of the week Windows 10 Machine Learning Upgrade Business Technology Virtualization Remote Computing Telecommute Search Mobile Security Server Managed IT Services Printing Laptop Telecommuting Autocorrect Presentation Operating System Paper Millennials 5G Wireless Technology Environment IBM Google Drive Ink Hacker IT Support Hosted Solution Money

Newsletter Sign Up