Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Communication Cybersecurity Productivity Saving Money Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones VoIP AI Mobile Devices Data Recovery communications Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Facebook Artificial Intelligence Information Automation Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Blockchain Virtualization Bandwidth Business Technology Wi-Fi Windows 10 Vendor Apps Mobile Office Data Security Two-factor Authentication Gmail Managed Services BYOD Voice over Internet Protocol Chrome Budget Employer-Employee Relationship Apple Tip of the week App Networking Mobile Device Management Office 365 WiFi HIPAA Access Control Applications Hacker Avoiding Downtime Conferencing Computing How To Marketing BDR Information Technology Analytics Office Tips Healthcare Augmented Reality Virtual Private Network Big Data 2FA Storage Password Health Router Bring Your Own Device Retail Computers Help Desk Operating System Managed IT Services Website Risk Management Cooperation Vendor Management Remote Workers Physical Security The Internet of Things Display Printer Windows 11 Social Paperless Office Free Resource Infrastructure Project Management Windows 7 Excel Microsoft 365 Document Management Customer Service Solutions Monitoring Going Green Scam Data loss Cybercrime Telephone Patch Management Save Money Firewall Remote Monitoring Vulnerability End of Support IT Management VPN Meetings Safety Outlook Telephone System iPhone Money Cost Management Humor Computer Repair Vulnerabilities Supply Chain Sports Mouse Images 101 Mobility Multi-Factor Authentication Machine Learning User Tip Customer Relationship Management Modem Administration Processor Mobile Security Hacking Presentation Maintenance Employees Integration Smart Technology Antivirus Settings Wireless Technology Printing Wireless Content Filtering Saving Time Data Privacy Holidays YouTube Managed IT Service Cryptocurrency Data Storage Word Downloads Video Conferencing Robot Licensing Managed Services Provider Virtual Machines Professional Services Virtual Desktop LiFi Entertainment Data storage Evernote Entrepreneur Windows 8 Unified Threat Management Workplace Strategies Laptop Regulations Compliance Trends Memes Customer Resource management Regulations Drones Google Calendar Meta Net Neutrality Data Analysis Network Congestion SQL Server Star Wars Microsoft Excel Amazon Undo Staff User Error Halloween Financial Data History Gamification IT Social Networking Legislation Outsource IT Smartwatch Media Point of Sale Procurement Fileless Malware Azure Environment Tech Wearable Technology Hacks Scary Stories Telework Cyber security Content Fun Tech Support Communitications Health IT Motherboard Comparison Small Businesses Network Management CES Displays Deep Learning Supply Chain Management Directions Monitors Assessment Application Permissions Term FinTech Websites IT Assessment IBM Specifications Outsourcing Education Flexibility Microchip Value Internet Exlporer Fraud Mobile Computing SharePoint Workplace Organization Electronic Medical Records Username Search Smart Devices Black Friday Hiring/Firing Digital Security Cameras Best Practice Lenovo Paperless Remote Working Writing Memory Database Competition Google Play IT Technicians Co-managed IT Buisness Virtual Reality Data Breach Private Cloud Electronic Health Records Proxy Server Cookies Legal Cyber Monday Technology Care IT solutions Server Management Videos Business Growth Superfish Business Communications Identity Theft Wasting Time Tactics Hotspot Security Cameras Mirgation Scams Twitter Trend Micro Cortana Error Software as a Service Nanotechnology User Hybrid Work Language Alt Codes Human Resources Social Engineering Managing Costs Addiction eCommerce Management SSID Chatbots Cables Downtime Remote Computing Surveillance IP Address Virtual Assistant Screen Reader Distributed Denial of Service Hosted Solution Computing Infrastructure Typing Google Apps Tablet Virtual Machine Service Level Agreement Medical IT Identity IT Maintenance Reviews Alert Managed IT Knowledge File Sharing Development Bookmark Dark Data Transportation Smart Tech Recovery Google Drive Business Intelligence Alerts Shortcuts How To Hypervisor Download Hard Drives Notifications Optimization Domains PowerPoint Ransmoware Shopping 5G Experience Travel Browsers Employer/Employee Relationships Connectivity Google Docs Break Fix Vendors Unified Communications Navigation Bitcoin Techology Be Proactive Running Cable Google Maps PCI DSS Upload Refrigeration Social Network Public Speaking Google Wallet Multi-Factor Security Workforce Gig Economy Unified Threat Management Internet Service Provider Lithium-ion battery Teamwork IoT Dark Web Threats

Blog Archive