Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Passwords Cybersecurity Managed Service Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Holiday Automation Facebook Artificial Intelligence Miscellaneous Information Training Gadgets Covid-19 Cloud Computing Remote Work Managed Service Provider Compliance Server Outsourced IT Employee/Employer Relationship IT Support Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Apps Data Security Vendor Mobile Device Management Gmail Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App BYOD Computing Applications Marketing Information Technology Access Control Office 365 Conferencing WiFi How To BDR Hacker HIPAA Avoiding Downtime Website Virtual Private Network Risk Management 2FA Health Help Desk Analytics Office Tips Augmented Reality Retail Healthcare Big Data Storage Password Bring Your Own Device Managed IT Services Computers Router Operating System Physical Security Display Windows 11 Printer Firewall Monitoring Paperless Office Infrastructure Excel The Internet of Things Document Management Remote Workers Telephone Social Scam Data loss Cooperation Free Resource Project Management Windows 7 Customer Service Microsoft 365 Going Green Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Cybercrime VPN YouTube Meetings Modem User Tip Processor Cryptocurrency Mobile Security Word Holidays Computer Repair Data Storage Virtual Desktop Smart Technology Supply Chain Data storage LiFi Video Conferencing Managed Services Provider Virtual Machines Professional Services Safety Outlook Saving Time Machine Learning Money Managed IT Service Humor Downloads Maintenance iPhone Antivirus Sports Licensing Mouse Vulnerabilities Entertainment Data Privacy Customer Relationship Management Administration Images 101 Mobility Telephone System Multi-Factor Authentication Cost Management Hacking Presentation Robot Settings Wireless Technology Printing Wireless Content Filtering Employees IT Management Integration Username Managing Costs Amazon Network Congestion eCommerce Knowledge Black Friday SSID Recovery Google Drive User Error Database Surveillance Virtual Assistant Outsource IT Hard Drives Media Domains Point of Sale IT Technicians Virtual Machine Environment 5G Cookies Experience Cyber Monday Medical IT Google Docs Proxy Server Reviews Unified Communications Bitcoin Network Management Tactics Development Running Cable Tech Support Hotspot Transportation Small Businesses Refrigeration Public Speaking Google Wallet Mirgation Hypervisor Displays Monitors Nanotechnology Optimization PowerPoint Lithium-ion battery Shopping Entrepreneur Windows 8 Addiction Laptop Websites Language Employer/Employee Relationships Outsourcing Navigation Drones Management PCI DSS Chatbots Screen Reader Electronic Medical Records Distributed Denial of Service Workplace SharePoint Gig Economy Undo Service Level Agreement Internet Service Provider Halloween Computing Infrastructure Teamwork Hiring/Firing Writing Evernote Paperless Lenovo Regulations Compliance Identity Smart Tech Memes Virtual Reality Co-managed IT Bookmark Hacks Server Management Download Net Neutrality Scary Stories Private Cloud Alerts SQL Server Technology Care Fun Business Communications Superfish Financial Data Identity Theft History Deep Learning Connectivity IT Twitter Break Fix Scams Application Browsers Smartwatch Upload Procurement Error Azure Hybrid Work Social Engineering Multi-Factor Security Tech Human Resources IBM Social Network Telework Education Cyber security IoT Communitications Remote Computing Dark Web Cables CES Mobile Computing Trends Supply Chain Management Search Google Calendar Term Google Apps Customer Resource management FinTech Tablet Regulations Best Practice Star Wars IT Assessment Alert Microsoft Excel IT Maintenance Data Analysis Competition Managed IT Gamification Flexibility Buisness File Sharing Staff Value Business Intelligence Dark Data How To Legislation Shortcuts Legal Organization IT solutions Social Networking Business Growth Smart Devices Notifications Ransmoware Fileless Malware Digital Security Cameras Content Remote Working Travel Wearable Technology Memory Vendors Cortana Comparison Google Play Be Proactive User Techology Health IT Google Maps Motherboard Data Breach Directions Videos Alt Codes Assessment Electronic Health Records Permissions Workforce Downtime Unified Threat Management Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies IP Address Unified Threat Management Hosted Solution Microchip Typing Internet Exlporer Software as a Service Fraud Meta

Blog Archive