Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management AI Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Automation Facebook Artificial Intelligence Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption IT Support Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Vendor Mobile Office Two-factor Authentication Apps Data Security BYOD Managed Services Voice over Internet Protocol Mobile Device Management Gmail Tip of the week Chrome Budget Employer-Employee Relationship Networking Apple App Avoiding Downtime Applications Marketing Computing Information Technology Access Control Conferencing Office 365 WiFi How To BDR Hacker HIPAA Router Website Operating System 2FA Healthcare Virtual Private Network Risk Management Help Desk Health Analytics Office Tips Big Data Augmented Reality Retail Storage Password Managed IT Services Bring Your Own Device Computers Remote Monitoring Going Green End of Support Vulnerability Vendor Management Windows 11 Cybercrime Remote Workers Physical Security Display Excel Firewall Monitoring Printer Paperless Office Infrastructure Free Resource Project Management The Internet of Things Windows 7 Document Management Telephone Microsoft 365 Social Solutions Cooperation Scam Data loss Customer Service Patch Management Save Money Video Conferencing Managed Services Provider Virtual Machines Professional Services Settings Printing Modem IT Management Wireless User Tip Processor Mobile Security VPN Content Filtering Meetings Word Supply Chain YouTube Computer Repair Cryptocurrency iPhone Smart Technology Vulnerabilities Virtual Desktop Safety Saving Time Data storage LiFi Images 101 Managed IT Service Machine Learning Outlook Multi-Factor Authentication Mobility Downloads Money Data Privacy Humor Licensing Maintenance Entertainment Antivirus Employees Sports Customer Relationship Management Integration Mouse Telephone System Cost Management Administration Hacking Presentation Holidays Data Storage Robot Wireless Technology Employer/Employee Relationships IP Address Specifications Outsource IT PCI DSS Environment Microchip Media Internet Exlporer Navigation Fraud Cortana Unified Threat Management Gig Economy Username Alt Codes Unified Threat Management Teamwork Downtime Black Friday Recovery Internet Service Provider Small Businesses Regulations Compliance Displays Network Congestion Database Hosted Solution Evernote Hard Drives Domains Memes Typing IT Technicians User Error SQL Server Cookies Cyber Monday Net Neutrality Outsourcing Proxy Server Financial Data Google Drive History Tactics Hotspot Knowledge Refrigeration Point of Sale Public Speaking Smartwatch IT Workplace Mirgation Azure Nanotechnology Lithium-ion battery Network Management 5G Tech Support Procurement Hiring/Firing Entrepreneur Telework Monitors Google Docs Cyber security Paperless Addiction Unified Communications Tech Language Experience Running Cable CES Communitications Co-managed IT Management Bitcoin Chatbots Google Wallet Screen Reader Distributed Denial of Service Websites Supply Chain Management Technology Care FinTech Business Communications Service Level Agreement Term Computing Infrastructure Undo SharePoint Laptop Electronic Medical Records IT Assessment Scams Windows 8 Identity Bookmark Drones Value Smart Tech Flexibility Hybrid Work Organization Writing Human Resources Download Alerts Lenovo Halloween Digital Security Cameras Virtual Reality Smart Devices Cables Browsers Memory Connectivity Break Fix Server Management Application Private Cloud Remote Working Identity Theft Data Breach Google Apps Upload Google Play Superfish Scary Stories IBM Multi-Factor Security Videos Twitter Electronic Health Records IT Maintenance Social Network Hacks Wasting Time IoT Dark Web Fun Error Business Intelligence Social Engineering Trend Micro Shortcuts Trends Deep Learning Security Cameras Regulations Google Calendar Remote Computing Software as a Service Ransmoware Customer Resource management Data Analysis Managing Costs Star Wars Education Microsoft Excel Vendors Tablet eCommerce Be Proactive Gamification SSID Staff Competition Social Networking Legislation Alert Surveillance Workforce Mobile Computing Virtual Assistant Threats Fileless Malware Dark Data Virtual Machine Managed IT Search File Sharing Reviews How To Workplace Strategies Content Best Practice Medical IT Wearable Technology Transportation Motherboard Buisness Comparison User Notifications Development Meta Health IT Amazon Directions Legal Hypervisor Assessment IT solutions Permissions Travel Google Maps Shopping Optimization Business Growth PowerPoint Techology

Blog Archive