Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

How to Resize Columns and Rows in Excel

To start resizing your columns and rows, you first should select the cells you want to adjust. We’re going to use the example of resizing all cells in the spreadsheet. To do this, click the space at the top left corner of the spreadsheet. It should be right next to the leftmost column. If you’ve clicked on the right thing, you’ll see a green outline around all of your spreadsheet.

This will give you immediate control over the width and height of all rows and columns by clicking and dragging the borders of them.

How to Get More Specific Measurements

For more specific measurements on your columns and rows, you can adjust them as well. By default, the size of rows is set to 8.43 points and the size of columns is set to 15 points. You can change these measurements by right-clicking the top or left-most part of the column or row and selecting Column Width or Row Height, accordingly. You enter the measurements into the dialog box, then hit OK. The maximum values you can plug in here are 255 points for columns and 409 points for rows.

How to Use the AutoFit Feature

Another option you have is to AutoFit the size of your cells to fit the size of the data found in them. You’ll find this option under the Home tab in the Format section. Click on AutoFit and adjust the settings for row height or column width as needed. Empty cells will simply stay at the default size.

Hopefully you found this tip helpful for your spreadsheet needs. Excel can be finicky if you’re not used to working in it, so even simple tips like these can help you get more out of it. Be sure to keep your eyes peeled on our blog for more great tips for all of your favorite business technology solutions, and contact Voyage Technology for any of your technology needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 29 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Automation Facebook Information Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Blockchain Vendor Mobile Office Data Security Two-factor Authentication Apps Managed Services Chrome Voice over Internet Protocol Budget Tip of the week Apple Mobile Device Management App Gmail Networking BYOD Employer-Employee Relationship Applications Access Control Hacker Avoiding Downtime Marketing Conferencing How To Computing BDR WiFi Information Technology Office 365 HIPAA Router Augmented Reality Computers Health Healthcare Storage Password Bring Your Own Device Website Help Desk Retail Managed IT Services Operating System Big Data Risk Management 2FA Analytics Office Tips Virtual Private Network Printer Customer Service Remote Workers Paperless Office Infrastructure Free Resource Document Management Monitoring Project Management Windows 7 Microsoft 365 Scam Going Green Firewall Data loss Solutions Telephone Cybercrime The Internet of Things Patch Management Windows 11 Cooperation Save Money Remote Monitoring Social Vulnerability End of Support Vendor Management Excel Physical Security Display Computer Repair Money Humor Hacking Presentation Modem User Tip Processor Mobile Security iPhone Wireless Technology Sports Data Privacy Mouse Machine Learning Vulnerabilities Administration Smart Technology Images 101 Word Multi-Factor Authentication Mobility Maintenance Saving Time Antivirus Managed IT Service Settings Wireless Downloads Printing Employees Content Filtering Safety Licensing Integration YouTube Entertainment Cryptocurrency Robot Holidays Supply Chain Telephone System Data Storage Virtual Desktop IT Management LiFi Cost Management Data storage VPN Meetings Video Conferencing Managed Services Provider Customer Relationship Management Virtual Machines Professional Services Outlook Specifications Evernote Technology Care Regulations Compliance Network Management Microchip Business Communications Tech Support Internet Exlporer Memes Fraud Scams Hacks Username Net Neutrality Scary Stories Monitors SQL Server Financial Data History Fun Black Friday Hybrid Work User Human Resources Smartwatch Deep Learning Websites Database IT Azure Cables Procurement IT Technicians Telework Education Electronic Medical Records Cookies Cyber security Cyber Monday Tech SharePoint IP Address Proxy Server Google Apps CES Tactics Communitications Hotspot Lenovo IT Maintenance Mobile Computing Supply Chain Management Writing Mirgation Recovery FinTech Virtual Reality Nanotechnology Search Term Business Intelligence Server Management Shortcuts Hard Drives Best Practice Private Cloud Addiction IT Assessment Language Value Superfish Ransmoware Domains Identity Theft Management Flexibility Buisness Chatbots Organization IT solutions Twitter Screen Reader Distributed Denial of Service Vendors Legal Be Proactive Refrigeration Digital Security Cameras Business Growth Error Service Level Agreement Smart Devices Computing Infrastructure Memory Workforce Public Speaking Remote Working Social Engineering Identity Remote Computing Smart Tech Data Breach Cortana Google Play Threats Lithium-ion battery Bookmark Workplace Strategies Videos Alt Codes Download Entrepreneur Electronic Health Records Alerts Wasting Time Meta Tablet Downtime Browsers Hosted Solution Alert Connectivity Trend Micro Break Fix Security Cameras Amazon Managed IT Undo Typing File Sharing Upload Software as a Service Dark Data Managing Costs Multi-Factor Security Outsource IT Social Network How To Media Notifications IoT eCommerce Knowledge Dark Web SSID Environment Google Drive Travel Trends Surveillance Virtual Assistant Regulations Virtual Machine 5G Google Calendar Techology Small Businesses Google Maps Customer Resource management Data Analysis Application Reviews Unified Communications Star Wars Experience Microsoft Excel Medical IT Displays Google Docs Bitcoin Unified Threat Management Gamification Development Running Cable Staff Transportation Social Networking Hypervisor Legislation Unified Threat Management Outsourcing IBM Google Wallet Fileless Malware Shopping Optimization PowerPoint Workplace Windows 8 Content Laptop Network Congestion Wearable Technology Employer/Employee Relationships Motherboard Comparison Navigation User Error Hiring/Firing Drones Health IT PCI DSS Directions Paperless Gig Economy Assessment Permissions Co-managed IT Competition Point of Sale Internet Service Provider Halloween Teamwork

Blog Archive