Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Resize Excel Rows and Columns

Tip of the Week: How to Resize Excel Rows and Columns

Microsoft Excel can be a great tool to help your business organize data, but the default size of the cell doesn’t leave much room for you to be productive. You can adjust the size of each cell depending on the purpose of the data stored within, starting with the width and the height of each column and row. Let’s go over how you can resize each individual cell.

How to Resize Columns and Rows in Excel

To start resizing your columns and rows, you first should select the cells you want to adjust. We’re going to use the example of resizing all cells in the spreadsheet. To do this, click the space at the top left corner of the spreadsheet. It should be right next to the leftmost column. If you’ve clicked on the right thing, you’ll see a green outline around all of your spreadsheet.

This will give you immediate control over the width and height of all rows and columns by clicking and dragging the borders of them.

How to Get More Specific Measurements

For more specific measurements on your columns and rows, you can adjust them as well. By default, the size of rows is set to 8.43 points and the size of columns is set to 15 points. You can change these measurements by right-clicking the top or left-most part of the column or row and selecting Column Width or Row Height, accordingly. You enter the measurements into the dialog box, then hit OK. The maximum values you can plug in here are 255 points for columns and 409 points for rows.

How to Use the AutoFit Feature

Another option you have is to AutoFit the size of your cells to fit the size of the data found in them. You’ll find this option under the Home tab in the Format section. Click on AutoFit and adjust the settings for row height or column width as needed. Empty cells will simply stay at the default size.

Hopefully you found this tip helpful for your spreadsheet needs. Excel can be finicky if you’re not used to working in it, so even simple tips like these can help you get more out of it. Be sure to keep your eyes peeled on our blog for more great tips for all of your favorite business technology solutions, and contact Voyage Technology for any of your technology needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 05 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone AI Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Bandwidth Blockchain Virtualization Wi-Fi Business Technology Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail Budget WiFi Apple BYOD App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Chrome Networking How To BDR HIPAA Applications Access Control Computing Hacker Information Technology Avoiding Downtime Conferencing Marketing Office 365 Storage Password Bring Your Own Device Big Data Router Physical Security 2FA Virtual Private Network Operating System Health Computers Help Desk Risk Management Website Retail Healthcare Analytics Office Tips Augmented Reality Managed IT Services Cooperation Free Resource Project Management Windows 7 Patch Management The Internet of Things Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Social Windows 11 Going Green Display Printer Excel Customer Service Paperless Office Infrastructure Cybercrime Monitoring Document Management Remote Workers Telephone Scam Data loss Firewall Safety Images 101 Sports Telephone System Multi-Factor Authentication Robot Mobility Mouse Cost Management Administration IT Management VPN Employees Meetings Integration Customer Relationship Management User Tip Supply Chain Modem Computer Repair Mobile Security Processor Settings Wireless Printing Content Filtering Holidays Hacking YouTube Data Storage Presentation Smart Technology Video Conferencing Cryptocurrency Machine Learning Managed Services Provider Wireless Technology Professional Services Saving Time Virtual Machines Virtual Desktop Managed IT Service Data storage LiFi Data Privacy Maintenance Word Antivirus Downloads iPhone Outlook Licensing Money Vulnerabilities Humor Entertainment Vendors Trends Supply Chain Management Alert Hacks Entrepreneur Scary Stories Managed IT Customer Resource management FinTech Fun Be Proactive File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel Deep Learning Data Analysis Workforce Star Wars IT Assessment Threats Gamification Flexibility Notifications Staff Value Undo Education Organization Workplace Strategies Travel Social Networking Legislation Techology Fileless Malware Digital Security Cameras Meta Google Maps Smart Devices Amazon Content Remote Working Wearable Technology Memory Mobile Computing Health IT Search Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions Application Best Practice Unified Threat Management Directions Videos Outsource IT Assessment Electronic Health Records Buisness Environment Media Wasting Time IBM Legal IT solutions Trend Micro Network Congestion Specifications Security Cameras Fraud Business Growth User Error Microchip Small Businesses Internet Exlporer Software as a Service Displays Username Managing Costs Cortana Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Alt Codes Outsourcing Downtime Network Management Tech Support IT Technicians Virtual Machine Competition Monitors Cyber Monday Medical IT Hosted Solution Proxy Server Reviews Workplace Cookies Hiring/Firing Tactics Development Hotspot Transportation Typing Paperless Websites Mirgation Hypervisor PowerPoint Google Drive User Shopping Knowledge Co-managed IT Nanotechnology Optimization Technology Care Addiction Electronic Medical Records Language Employer/Employee Relationships SharePoint Management PCI DSS 5G Business Communications Chatbots Navigation Writing Distributed Denial of Service IP Address Google Docs Unified Communications Lenovo Gig Economy Experience Scams Screen Reader Hybrid Work Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Bitcoin Running Cable Server Management Regulations Compliance Human Resources Private Cloud Identity Evernote Google Wallet Recovery Superfish Bookmark Cables Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Hard Drives Windows 8 Laptop Financial Data Google Apps Error History Domains Drones Social Engineering Break Fix Browsers Smartwatch IT Maintenance Connectivity IT Business Intelligence Upload Procurement Remote Computing Azure Refrigeration Halloween Social Network Telework Shortcuts Cyber security Multi-Factor Security Tech Public Speaking Dark Web Lithium-ion battery CES Ransmoware Tablet IoT Communitications

Blog Archive