Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Phishing Email Google Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Miscellaneous Automation Artificial Intelligence Facebook Information Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Government Business Continuity Business Technology Wi-Fi Windows 10 Blockchain Bandwidth Virtualization Apps Mobile Office Two-factor Authentication Data Security Vendor Apple Employer-Employee Relationship App Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Gmail Chrome Budget WiFi BYOD Applications Access Control Hacker Conferencing Computing Avoiding Downtime Information Technology Marketing How To Office 365 BDR HIPAA Virtual Private Network Health 2FA Help Desk Computers Operating System Retail Risk Management Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Router Bring Your Own Device Physical Security Big Data Social Display Printer Windows 11 Paperless Office Infrastructure Monitoring Going Green Customer Service Excel Document Management Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions The Internet of Things User Tip Modem Administration Computer Repair Mobile Security Processor Holidays Customer Relationship Management Data Storage Smart Technology Supply Chain Video Conferencing Settings Hacking Printing Machine Learning Managed Services Provider Wireless Professional Services Content Filtering Presentation Saving Time Virtual Machines YouTube Managed IT Service Wireless Technology Maintenance Cryptocurrency Antivirus Downloads iPhone Licensing Virtual Desktop LiFi Vulnerabilities Entertainment Word Data storage Data Privacy Images 101 Outlook Telephone System Money Multi-Factor Authentication Robot Mobility Humor Cost Management Safety IT Management Sports VPN Employees Mouse Meetings Integration Application Username Mobile Computing Managing Costs Amazon Black Friday SSID Search Point of Sale eCommerce Database Surveillance Best Practice Virtual Assistant Outsource IT IBM Network Management Tech Support IT Technicians Virtual Machine Environment Buisness Media Monitors Cyber Monday Medical IT Proxy Server Reviews Legal Cookies IT solutions Tactics Development Business Growth Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays PowerPoint Cortana Competition Shopping Nanotechnology Optimization Addiction Alt Codes Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Chatbots Downtime Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Hosted Solution Service Level Agreement Internet Service Provider Typing Virtual Reality Computing Infrastructure Teamwork Hiring/Firing User Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Knowledge Superfish Bookmark Google Drive Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care IP Address Financial Data Error History Business Communications 5G Unified Communications Social Engineering Break Fix Scams Experience Browsers Smartwatch Google Docs Connectivity IT Upload Procurement Bitcoin Remote Computing Azure Hybrid Work Running Cable Recovery Hard Drives Social Network Telework Google Wallet Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Domains CES Tablet IoT Communitications Trends Supply Chain Management Windows 8 Alert Laptop Refrigeration Managed IT Customer Resource management FinTech Drones File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Public Speaking Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Halloween Lithium-ion battery Organization Entrepreneur Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Hacks Wearable Technology Memory Vendors Scary Stories Fun Undo Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Assessment Electronic Health Records Deep Learning Permissions Workforce Unified Threat Management Directions Videos Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Education Internet Exlporer Software as a Service Fraud Meta User Error Microchip

Blog Archive