Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Facebook Holiday Miscellaneous Automation Artificial Intelligence Compliance Cloud Computing Training Covid-19 Gadgets Remote Work Outsourced IT Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Windows 10 Virtualization Blockchain Wi-Fi Business Technology Bandwidth Vendor Apps Two-factor Authentication Managed Services Mobile Office Data Security Apple Gmail BYOD App WiFi Employer-Employee Relationship Tip of the week Chrome Networking Budget Voice over Internet Protocol Mobile Device Management Physical Security Access Control Computing HIPAA Information Technology Applications Hacker Office 365 Avoiding Downtime Managed IT Services How To Marketing BDR Conferencing Password Virtual Private Network Big Data Operating System Health Router Risk Management Retail Computers Analytics Office Tips Help Desk Augmented Reality Website Storage 2FA Healthcare Bring Your Own Device Firewall Remote Monitoring End of Support Vulnerability Vendor Management Free Resource Project Management Cooperation Windows 7 Going Green The Internet of Things Display Microsoft 365 Printer Paperless Office Solutions Social Cybercrime Infrastructure Document Management Customer Service Scam Monitoring Data loss Windows 11 Remote Workers Managed IT Service Patch Management Save Money Excel Telephone Vulnerabilities Administration Licensing Entertainment IT Management Meetings Safety VPN Images 101 Mobility Multi-Factor Authentication Settings Telephone System Computer Repair Printing Wireless Cost Management Data Privacy Content Filtering YouTube Employees Integration Cryptocurrency Customer Relationship Management Machine Learning User Tip Modem Holidays Virtual Desktop Processor Mobile Security Data storage LiFi Hacking Maintenance Data Storage Presentation Antivirus Video Conferencing Outlook Smart Technology Managed Services Provider Wireless Technology Virtual Machines Money Professional Services Humor Saving Time Supply Chain Sports Word Mouse Robot iPhone Downloads Public Speaking Tech Workplace Browsers Connectivity Telework Break Fix Cyber security Mobile Computing Unified Threat Management Communitications Lithium-ion battery Hiring/Firing Search Upload CES Entrepreneur Social Network Unified Threat Management Supply Chain Management Multi-Factor Security Best Practice Paperless Term Co-managed IT Buisness IoT FinTech Dark Web IT Assessment Legal Network Congestion Technology Care IT solutions Trends Customer Resource management User Error Regulations Flexibility Google Calendar Value Business Growth Undo Business Communications Scams Data Analysis Star Wars Organization Microsoft Excel Digital Security Cameras Staff Point of Sale Smart Devices Hybrid Work Cortana Gamification Social Networking Remote Working Legislation Memory Alt Codes Human Resources Data Breach Google Play Cables Downtime Fileless Malware Network Management Tech Support Videos Wearable Technology Electronic Health Records Monitors Hosted Solution Application Content Google Apps Health IT Motherboard Comparison Wasting Time Typing Trend Micro IBM Security Cameras IT Maintenance Directions Assessment Permissions Websites Software as a Service Google Drive Business Intelligence Knowledge Shortcuts SharePoint Specifications Electronic Medical Records Managing Costs eCommerce SSID Ransmoware Microchip 5G Internet Exlporer Fraud Lenovo Surveillance Google Docs Writing Virtual Assistant Vendors Unified Communications Experience Username Be Proactive Running Cable Black Friday Virtual Reality Virtual Machine Bitcoin Competition Private Cloud Google Wallet Medical IT Workforce Database Server Management Reviews Superfish IT Technicians Identity Theft Development Transportation Threats Workplace Strategies Laptop Proxy Server Cookies Cyber Monday Twitter Hypervisor Windows 8 Error Optimization Drones PowerPoint Meta User Tactics Shopping Hotspot Mirgation Social Engineering Employer/Employee Relationships Amazon Navigation Halloween Nanotechnology PCI DSS Remote Computing IP Address Outsource IT Addiction Gig Economy Language Chatbots Tablet Internet Service Provider Teamwork Environment Media Management Evernote Scary Stories Screen Reader Regulations Compliance Distributed Denial of Service Alert Hacks File Sharing Memes Dark Data Small Businesses Recovery Fun Service Level Agreement Managed IT Computing Infrastructure Identity Net Neutrality How To SQL Server Displays Deep Learning Hard Drives Bookmark Smart Tech Financial Data Notifications History Domains Travel IT Outsourcing Education Download Smartwatch Alerts Techology Google Maps Procurement Azure Refrigeration

Blog Archive