Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Information Facebook Holiday Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Remote Work Server Compliance Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Bandwidth Virtualization Business Technology Wi-Fi Blockchain Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security Gmail Budget BYOD WiFi Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome HIPAA Applications Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing How To Office 365 BDR Storage Password Router Physical Security Bring Your Own Device Virtual Private Network Big Data Health 2FA Help Desk Operating System Computers Retail Healthcare Risk Management Website Managed IT Services Analytics Office Tips Augmented Reality Remote Monitoring Vulnerability End of Support Vendor Management Solutions The Internet of Things Display Social Printer Paperless Office Windows 11 Infrastructure Monitoring Going Green Excel Document Management Customer Service Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Firewall Save Money Microsoft 365 Safety IT Management Sports VPN Employees Meetings Mouse Integration User Tip Modem Administration Computer Repair Mobile Security Processor Holidays Data Storage Customer Relationship Management Supply Chain Smart Technology Settings Video Conferencing Machine Learning Managed Services Provider Printing Wireless Content Filtering Saving Time Virtual Machines Professional Services Hacking Presentation YouTube Managed IT Service Cryptocurrency Maintenance Antivirus Wireless Technology Downloads iPhone Licensing Virtual Desktop LiFi Entertainment Data storage Vulnerabilities Data Privacy Word Images 101 Outlook Telephone System Multi-Factor Authentication Money Robot Mobility Cost Management Humor Content Remote Working Vendors Wearable Technology Memory Hacks Entrepreneur Scary Stories Fun Health IT Unified Threat Management Motherboard Data Breach Be Proactive Comparison Google Play Permissions Deep Learning Unified Threat Management Directions Videos Assessment Electronic Health Records Workforce Threats Wasting Time Undo Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Education Meta Fraud User Error Microchip Internet Exlporer Software as a Service Username Amazon Managing Costs Mobile Computing Search Point of Sale eCommerce Black Friday SSID Outsource IT Virtual Assistant Application Best Practice Database Surveillance Network Management Environment Tech Support IT Technicians Virtual Machine Media Buisness Proxy Server Reviews Cookies IBM Legal Monitors Cyber Monday Medical IT IT solutions Small Businesses Hotspot Transportation Business Growth Tactics Development Displays Websites Mirgation Hypervisor Cortana Shopping Nanotechnology Optimization PowerPoint Outsourcing Electronic Medical Records Language Employer/Employee Relationships Alt Codes SharePoint Addiction Management PCI DSS Chatbots Competition Navigation Downtime Lenovo Gig Economy Screen Reader Workplace Writing Distributed Denial of Service Hosted Solution Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Typing Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Paperless Evernote Knowledge Superfish Bookmark Identity Theft Smart Tech Memes Google Drive Co-managed IT User Technology Care Twitter Alerts SQL Server Download Net Neutrality Financial Data Error History Business Communications 5G Unified Communications Experience Browsers Smartwatch Connectivity IT IP Address Google Docs Scams Social Engineering Break Fix Hybrid Work Remote Computing Azure Bitcoin Running Cable Upload Procurement Social Network Telework Cyber security Google Wallet Human Resources Multi-Factor Security Tech Recovery CES Tablet IoT Communitications Cables Dark Web Alert Hard Drives Windows 8 Laptop Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Domains Drones Google Apps Dark Data Google Calendar Term Data Analysis Star Wars IT Assessment IT Maintenance How To Microsoft Excel Gamification Flexibility Business Intelligence Notifications Staff Value Refrigeration Halloween Organization Travel Social Networking Public Speaking Shortcuts Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Lithium-ion battery Ransmoware

Blog Archive