Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Information Automation Facebook Artificial Intelligence Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption IT Support Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App Avoiding Downtime Marketing HIPAA Computing Applications Information Technology Access Control Office 365 WiFi Conferencing How To BDR Hacker Website Operating System Healthcare Router Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Augmented Reality Big Data Retail Storage Password Bring Your Own Device Managed IT Services 2FA Computers Going Green Patch Management Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Cybercrime Physical Security Display Free Resource Printer Firewall Project Management Windows 7 Paperless Office Infrastructure Monitoring Microsoft 365 The Internet of Things Solutions Document Management Social Telephone Scam Data loss Windows 11 Cooperation Customer Service Excel Robot Telephone System Virtual Machines Professional Services Cost Management Wireless Technology Settings Wireless Printing Content Filtering IT Management VPN YouTube Meetings iPhone Word Cryptocurrency User Tip Modem Vulnerabilities Data Privacy Computer Repair Mobile Security Processor Images 101 Virtual Desktop LiFi Data storage Multi-Factor Authentication Mobility Safety Smart Technology Outlook Machine Learning Money Saving Time Humor Employees Integration Managed IT Service Maintenance Antivirus Sports Downloads Mouse Licensing Customer Relationship Management Holidays Administration Entertainment Data Storage Hacking Supply Chain Presentation Video Conferencing Managed Services Provider Legislation Gig Economy Travel Social Networking Workplace Google Maps Teamwork Hiring/Firing Cortana Techology Fileless Malware Internet Service Provider Regulations Compliance Alt Codes Content Wearable Technology Evernote Paperless IP Address Comparison Health IT Memes Downtime Unified Threat Management Motherboard Co-managed IT Hosted Solution Assessment SQL Server Technology Care Permissions Unified Threat Management Directions Net Neutrality Recovery Financial Data Typing History Business Communications Network Congestion Specifications Hard Drives Smartwatch IT Scams Internet Exlporer Azure Hybrid Work Knowledge Fraud Domains Google Drive User Error Microchip Procurement Telework Username Cyber security Tech Human Resources 5G Black Friday Refrigeration CES Communitications Point of Sale Cables Supply Chain Management Unified Communications Database Experience Public Speaking Google Docs FinTech Bitcoin Network Management Running Cable Tech Support IT Technicians Term Google Apps Lithium-ion battery IT Maintenance Monitors Cyber Monday Google Wallet Proxy Server Entrepreneur IT Assessment Cookies Flexibility Tactics Value Business Intelligence Hotspot Organization Windows 8 Laptop Websites Mirgation Shortcuts Ransmoware Undo Digital Security Cameras Drones Smart Devices Nanotechnology Remote Working Addiction Memory Vendors Electronic Medical Records Language SharePoint Management Data Breach Halloween Chatbots Google Play Be Proactive Workforce Writing Distributed Denial of Service Videos Lenovo Electronic Health Records Screen Reader Service Level Agreement Wasting Time Threats Virtual Reality Computing Infrastructure Application Hacks Server Management Trend Micro Scary Stories Private Cloud Identity Security Cameras Workplace Strategies Meta Fun Superfish Bookmark Software as a Service Identity Theft Smart Tech Deep Learning Download Managing Costs Amazon Twitter Alerts IBM eCommerce Error SSID Education Connectivity Virtual Assistant Outsource IT Social Engineering Break Fix Browsers Surveillance Upload Virtual Machine Environment Remote Computing Media Multi-Factor Security Reviews Mobile Computing Social Network Medical IT Tablet IoT Transportation Small Businesses Search Dark Web Competition Development Best Practice Trends Hypervisor Displays Alert Dark Data Google Calendar Shopping Managed IT Customer Resource management Optimization Buisness File Sharing Regulations PowerPoint IT solutions Star Wars Employer/Employee Relationships Outsourcing How To Microsoft Excel Legal Data Analysis User PCI DSS Business Growth Gamification Notifications Staff Navigation

Blog Archive