Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Facebook Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Virtualization Apps Data Security Mobile Office Vendor Two-factor Authentication Budget Employer-Employee Relationship Apple Networking App Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail WiFi Tip of the week Chrome Conferencing How To BDR Hacker Avoiding Downtime Marketing HIPAA Computing Applications Information Technology Access Control Office 365 Retail Storage Password Bring Your Own Device 2FA Managed IT Services Computers Healthcare Website Operating System Router Physical Security Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Augmented Reality Big Data Social Telephone Scam Windows 11 Data loss Cooperation Customer Service Excel Going Green Patch Management Save Money Remote Workers Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Free Resource Project Management Display Printer Windows 7 Firewall Paperless Office Microsoft 365 Infrastructure Monitoring The Internet of Things Solutions Document Management Managed IT Service Maintenance Antivirus Sports Downloads Holidays Mouse Licensing Customer Relationship Management Data Storage Entertainment Supply Chain Administration Video Conferencing Managed Services Provider Hacking Virtual Machines Presentation Professional Services Telephone System Robot Wireless Technology Cost Management Settings Printing Wireless Content Filtering iPhone IT Management VPN YouTube Meetings Vulnerabilities Word Data Privacy Cryptocurrency User Tip Modem Computer Repair Mobile Security Images 101 Processor Multi-Factor Authentication Mobility Virtual Desktop Data storage LiFi Safety Smart Technology Outlook Machine Learning Employees Money Saving Time Humor Integration Managing Costs Amazon Application Hacks Server Management Scary Stories Private Cloud Identity Fun eCommerce Superfish Bookmark SSID Identity Theft Smart Tech Deep Learning Download Twitter Alerts Surveillance IBM Virtual Assistant Outsource IT Virtual Machine Environment Media Error Social Engineering Break Fix Reviews Browsers Medical IT Education Connectivity Transportation Small Businesses Upload Remote Computing Development Hypervisor Displays Mobile Computing Social Network Multi-Factor Security Search Dark Web Shopping Optimization Competition PowerPoint Tablet IoT Employer/Employee Relationships Outsourcing Best Practice Trends Alert PCI DSS Managed IT Customer Resource management Navigation Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Gig Economy Legal Data Analysis Workplace IT solutions Star Wars Teamwork Hiring/Firing User Business Growth Gamification Notifications Staff Internet Service Provider Regulations Compliance Evernote Paperless Travel Social Networking Legislation Cortana Memes Techology Fileless Malware Co-managed IT Google Maps SQL Server Technology Care Alt Codes Content Wearable Technology Net Neutrality IP Address Financial Data History Health IT Business Communications Downtime Unified Threat Management Motherboard Comparison Permissions Smartwatch IT Unified Threat Management Directions Scams Hosted Solution Assessment Azure Hybrid Work Recovery Typing Procurement Telework Cyber security Hard Drives Tech Human Resources Network Congestion Specifications Knowledge Fraud CES Communitications Domains Google Drive User Error Microchip Cables Internet Exlporer Username Supply Chain Management FinTech Refrigeration Term Google Apps Point of Sale 5G Black Friday Experience IT Assessment Public Speaking Google Docs IT Maintenance Unified Communications Database Value Business Intelligence Bitcoin Network Management Running Cable Tech Support IT Technicians Flexibility Lithium-ion battery Organization Google Wallet Proxy Server Shortcuts Entrepreneur Cookies Monitors Cyber Monday Hotspot Digital Security Cameras Smart Devices Ransmoware Tactics Memory Vendors Windows 8 Laptop Websites Mirgation Remote Working Data Breach Undo Drones Google Play Be Proactive Nanotechnology Addiction Electronic Medical Records Language Videos Electronic Health Records SharePoint Workforce Wasting Time Threats Management Halloween Chatbots Writing Distributed Denial of Service Trend Micro Lenovo Security Cameras Workplace Strategies Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Software as a Service Meta

Blog Archive