Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Managed Service AI Ransomware Users Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Cloud Computing Training Covid-19 Compliance Gadgets Server Managed Service Provider IT Support Remote Work Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Vendor Business Technology Windows 10 Bandwidth Virtualization Blockchain Managed Services Two-factor Authentication Mobile Office Data Security Apps Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Password Managed IT Services How To BDR Operating System Healthcare Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Big Data 2FA Remote Monitoring End of Support Remote Workers Vulnerability Customer Service Vendor Management Cybercrime Display Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Monitoring Microsoft 365 Firewall Document Management Solutions Managed IT Service Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation Excel Going Green Patch Management Save Money Settings Wireless Printing Content Filtering Hacking IT Management YouTube Meetings iPhone Presentation VPN Cryptocurrency Modem Vulnerabilities Wireless Technology User Tip Data Privacy Processor Computer Repair Mobile Security Virtual Desktop Images 101 Data storage LiFi Multi-Factor Authentication Mobility Word Smart Technology Outlook Machine Learning Money Saving Time Humor Employees Integration Safety Maintenance Sports Downloads Antivirus Mouse Licensing Holidays Entertainment Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Robot Virtual Machines Professional Services Telephone System Customer Relationship Management Cost Management Regulations Compliance Evernote Paperless Alt Codes Content Wearable Technology Downtime Unified Threat Management Motherboard Comparison Memes Co-managed IT Competition Health IT SQL Server Technology Care Unified Threat Management Directions Hosted Solution Assessment Permissions Net Neutrality Financial Data History Business Communications Typing Network Congestion Specifications Smartwatch IT Scams Azure Hybrid Work Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Procurement Telework Cyber security Tech Human Resources Username Point of Sale 5G Black Friday CES Communitications Cables IP Address Google Docs Unified Communications Database Experience Supply Chain Management FinTech Term Google Apps Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday IT Assessment IT Maintenance Google Wallet Proxy Server Value Business Intelligence Recovery Tactics Hotspot Flexibility Organization Shortcuts Hard Drives Windows 8 Laptop Websites Mirgation Nanotechnology Digital Security Cameras Smart Devices Ransmoware Domains Drones Memory Vendors SharePoint Addiction Electronic Medical Records Language Remote Working Data Breach Google Play Be Proactive Refrigeration Management Halloween Chatbots Screen Reader Writing Distributed Denial of Service Videos Electronic Health Records Workforce Public Speaking Lenovo Wasting Time Threats Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure Trend Micro Security Cameras Workplace Strategies Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Superfish Bookmark Identity Theft Smart Tech Fun Software as a Service Meta Managing Costs Amazon Deep Learning Download Twitter Alerts Error eCommerce SSID Undo Virtual Assistant Outsource IT Browsers Education Connectivity Social Engineering Break Fix Surveillance Virtual Machine Environment Media Upload Remote Computing Multi-Factor Security Reviews Medical IT Mobile Computing Social Network Transportation Small Businesses Tablet IoT Search Dark Web Development Hypervisor Displays Application Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Shopping Optimization PowerPoint Managed IT Customer Resource management Employer/Employee Relationships Outsourcing IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel PCI DSS Navigation Business Growth Gamification Notifications Staff Travel Social Networking Legislation Gig Economy Workplace Teamwork Hiring/Firing Techology Fileless Malware Google Maps Cortana Internet Service Provider

Blog Archive