Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Information Artificial Intelligence Facebook Automation Covid-19 Cloud Computing Miscellaneous Holiday Gadgets Training Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Mobile Office Two-factor Authentication Data Security Vendor Apps Managed Services Voice over Internet Protocol Mobile Device Management Networking Gmail Chrome Budget BYOD Apple Employer-Employee Relationship App Tip of the week Avoiding Downtime Computing Marketing Information Technology How To Office 365 BDR HIPAA Applications WiFi Access Control Conferencing Hacker Operating System 2FA Healthcare Retail Website Risk Management Managed IT Services Analytics Office Tips Augmented Reality Router Storage Password Big Data Bring Your Own Device Virtual Private Network Help Desk Health Computers Document Management Windows 11 Remote Workers Cybercrime Cooperation Excel Scam Data loss Free Resource Project Management Firewall Windows 7 Microsoft 365 Patch Management Save Money Solutions The Internet of Things Remote Monitoring Vulnerability End of Support Vendor Management Social Physical Security Monitoring Display Printer Paperless Office Infrastructure Going Green Customer Service Telephone Content Filtering Licensing Wireless Technology YouTube Entertainment Supply Chain Cryptocurrency Maintenance iPhone Antivirus Word Vulnerabilities Virtual Desktop Telephone System Data storage LiFi Cost Management Images 101 Outlook Multi-Factor Authentication Mobility Robot Money Safety Humor Data Privacy User Tip Modem Employees Processor Mobile Security Integration IT Management Sports VPN Meetings Mouse Administration Smart Technology Holidays Computer Repair Customer Relationship Management Data Storage Saving Time Video Conferencing Hacking Managed Services Provider Managed IT Service Presentation Virtual Machines Settings Professional Services Machine Learning Wireless Downloads Printing Regulations Compliance Lenovo Hosted Solution Browsers Connectivity Evernote Writing Break Fix Virtual Reality Small Businesses Typing Memes Upload Server Management Social Network SQL Server Private Cloud Displays Multi-Factor Security IP Address Net Neutrality Google Drive Financial Data Superfish History Identity Theft Knowledge IoT Dark Web Twitter Outsourcing Smartwatch IT Trends Recovery Customer Resource management Azure Error 5G Regulations Google Calendar Procurement Google Docs Telework Unified Communications Hard Drives Data Analysis Cyber security Experience Star Wars Tech Social Engineering Microsoft Excel Workplace Remote Computing Staff Hiring/Firing CES Bitcoin Domains Communitications Running Cable Gamification Social Networking Legislation Paperless Google Wallet Supply Chain Management FinTech Refrigeration Fileless Malware Tablet Term Co-managed IT Alert Wearable Technology Technology Care Windows 8 Public Speaking IT Assessment Laptop Content Managed IT Health IT Value File Sharing Motherboard Dark Data Comparison Business Communications Drones Lithium-ion battery Flexibility Organization Directions Entrepreneur Assessment How To Permissions Scams Notifications Hybrid Work Digital Security Cameras Smart Devices Halloween Remote Working Memory Travel Specifications Human Resources Cables Techology Undo Microchip Data Breach Google Maps Internet Exlporer Google Play Fraud Videos Hacks Electronic Health Records Scary Stories Username Wasting Time Unified Threat Management Fun Black Friday Google Apps IT Maintenance Unified Threat Management Deep Learning Trend Micro Database Security Cameras IT Technicians Business Intelligence Software as a Service Education Application Proxy Server Managing Costs Cookies Network Congestion Cyber Monday Shortcuts Hotspot Ransmoware User Error eCommerce Tactics SSID Virtual Assistant Mirgation Vendors Mobile Computing IBM Surveillance Virtual Machine Point of Sale Search Nanotechnology Be Proactive Language Workforce Reviews Best Practice Addiction Medical IT Management Transportation Tech Support Chatbots Threats Development Network Management Buisness Legal IT solutions Hypervisor Screen Reader Monitors Distributed Denial of Service Workplace Strategies Computing Infrastructure Meta Shopping Business Growth Competition Optimization Service Level Agreement PowerPoint Employer/Employee Relationships Websites Identity Amazon PCI DSS Bookmark Cortana Smart Tech Navigation Alerts Outsource IT Gig Economy SharePoint Alt Codes Download Electronic Medical Records Downtime User Teamwork Environment Media Internet Service Provider

Blog Archive