Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Phishing Email Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Microsoft Data Backup Communication Small Business Mobile Device Smartphones communications Android Saving Money Workplace Strategy Smartphone Business Management Mobile Devices VoIP Managed IT Services Managed Service Microsoft Office Data Recovery Browser Social Media Passwords Upgrade Backup Disaster Recovery Network Tech Term Internet of Things Automation Artificial Intelligence Cloud Computing Covid-19 Remote Server Managed Service Provider Remote Work Windows Facebook Miscellaneous Outsourced IT Gadgets Encryption Spam Information Holiday Windows 10 Employee/Employer Relationship Data Management Business Continuity Government Productivity Wi-Fi Business Technology Windows 10 Current Events Blockchain Two-factor Authentication Bandwidth Compliance Virtualization Data Security Apps Vendor Office Mobile Device Management Chrome Gmail Budget Apple Networking Managed Services App Voice over Internet Protocol Employer-Employee Relationship Computing Hacker Applications Information Technology Avoiding Downtime Mobile Office Access Control Office 365 Conferencing How To BDR Operating System BYOD HIPAA Computers Router Risk Management Virtual Private Network Training Website AI Marketing Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password WiFi Bring Your Own Device Big Data Managed IT Services Healthcare Customer Service Vendor Management Cybercrime Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Monitoring Solutions IT Support Tip of the week Firewall Document Management Windows 11 Telephone Scam The Internet of Things Data loss Excel Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Content Filtering Hacking IT Management Vulnerabilities YouTube Meetings Data Privacy Presentation VPN Images 101 Cryptocurrency Modem Wireless Technology User Tip Processor Multi-Factor Authentication Computer Repair Mobile Security Mobility Virtual Desktop Data storage LiFi Word Smart Technology Outlook Employees Machine Learning Integration Money Saving Time Humor Managed IT Service Safety Maintenance Holidays Downloads Antivirus Sports Mouse Data Storage 2FA Licensing Supply Chain Video Conferencing Entertainment Administration Managed Services Provider Virtual Machines Professional Services Robot Telephone System Customer Relationship Management Cost Management Settings iPhone Wireless Printing Unified Threat Management Directions Telework Hosted Solution Assessment Cyber security Permissions Tech Human Resources CES Typing Communitications Cables Network Congestion Specifications Supply Chain Management Google Drive User Error Microchip FinTech User Internet Exlporer Knowledge Physical Security Fraud Term Google Apps Username IT Assessment IT Maintenance Point of Sale Value Business Intelligence 5G Black Friday Flexibility IP Address Google Docs Organization Unified Communications Database Experience Shortcuts Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support IT Technicians Ransmoware Cookies Memory Vendors Monitors Cyber Monday Google Wallet Proxy Server Remote Working Recovery Tactics Data Breach Hotspot Google Play Be Proactive Videos Hard Drives Windows 8 Electronic Health Records Laptop Websites Mirgation Workforce Nanotechnology Wasting Time Threats Domains Drones SharePoint Addiction Trend Micro Electronic Medical Records Language Security Cameras Workplace Strategies Refrigeration Management Software as a Service Halloween Chatbots Meta Screen Reader Managing Costs Amazon Writing Distributed Denial of Service Public Speaking Lenovo Lithium-ion battery Service Level Agreement eCommerce Virtual Reality Computing Infrastructure SSID Hacks Server Management Surveillance Entrepreneur Scary Stories Private Cloud Identity Virtual Assistant Outsource IT Identity Theft Smart Tech Virtual Machine Environment Fun Media Superfish Bookmark Reviews Deep Learning Download Twitter Alerts Medical IT Undo Development Error Transportation Small Businesses Browsers Education Connectivity Hypervisor Displays Social Engineering Break Fix Shopping Upload Optimization Remote Computing PowerPoint Employer/Employee Relationships Outsourcing Multi-Factor Security Mobile Computing Social Network PCI DSS Tablet IoT Search Dark Web Navigation Gig Economy Application Best Practice Trends Alert Workplace Buisness File Sharing Regulations Teamwork Hiring/Firing Dark Data Google Calendar Managed IT Customer Resource management Internet Service Provider IBM Legal Data Analysis Regulations Compliance IT solutions Star Wars How To Microsoft Excel Evernote Paperless Business Growth Gamification Memes Notifications Staff Co-managed IT Travel Social Networking SQL Server Technology Care Legislation Net Neutrality Techology Fileless Malware Financial Data Google Maps History Cortana Business Communications Smartwatch Alt Codes Content IT Wearable Technology Scams Downtime Unified Threat Management Motherboard Azure Hybrid Work Comparison Competition Health IT Procurement

Blog Archive