Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Productivity Cybersecurity Data Backup Managed Service Smartphone Android Upgrade Business Management Smartphones VoIP AI communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Automation Facebook Artificial Intelligence Information Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Data Management Government Business Continuity Business Technology Windows 10 Wi-Fi Virtualization Bandwidth Blockchain Two-factor Authentication Apps Data Security Vendor Mobile Office App Mobile Device Management Tip of the week Gmail Networking Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Budget BYOD Apple Applications Access Control Computing WiFi Information Technology Conferencing How To Office 365 BDR Hacker Avoiding Downtime HIPAA Marketing Health Operating System Help Desk Retail Risk Management Big Data Managed IT Services 2FA Analytics Office Tips Healthcare Augmented Reality Computers Storage Password Bring Your Own Device Virtual Private Network Router Website Paperless Office Solutions Infrastructure Going Green Firewall Monitoring Document Management Cybercrime The Internet of Things Scam Data loss Windows 11 Social Telephone Remote Workers Excel Cooperation Patch Management Save Money Customer Service Remote Monitoring End of Support Vulnerability Free Resource Vendor Management Project Management Windows 7 Physical Security Display Microsoft 365 Printer Word User Tip Modem Employees Processor Mobile Security Integration Settings Wireless Machine Learning Printing Content Filtering Smart Technology YouTube Safety Holidays Data Storage Maintenance Saving Time Cryptocurrency Antivirus Video Conferencing Managed Services Provider Managed IT Service Virtual Desktop Virtual Machines Professional Services Data storage LiFi Downloads Licensing Supply Chain Outlook Customer Relationship Management Entertainment Robot iPhone Money Humor Hacking Vulnerabilities Telephone System Presentation IT Management Cost Management Sports Images 101 VPN Meetings Mouse Wireless Technology Multi-Factor Authentication Mobility Administration Computer Repair Data Privacy Monitors IT solutions Videos IT Maintenance Hard Drives Electronic Health Records Username Legal Wasting Time Business Growth Black Friday Business Intelligence Domains Shortcuts Trend Micro Websites Security Cameras Database IT Technicians Cortana Ransmoware Refrigeration Software as a Service Managing Costs Proxy Server Electronic Medical Records Cookies Alt Codes Cyber Monday Vendors Public Speaking SharePoint Downtime Lithium-ion battery Be Proactive eCommerce SSID Tactics Hotspot Writing Mirgation Hosted Solution Workforce Lenovo Surveillance Entrepreneur Virtual Assistant Virtual Machine Virtual Reality Nanotechnology Typing Threats Language Reviews Workplace Strategies Server Management Private Cloud Medical IT Addiction Transportation Management Google Drive Chatbots Knowledge Meta Undo Superfish Development Identity Theft Hypervisor Twitter Screen Reader Distributed Denial of Service Amazon Computing Infrastructure Shopping 5G Optimization Error PowerPoint Service Level Agreement Employer/Employee Relationships Google Docs Social Engineering Identity Unified Communications Experience Outsource IT PCI DSS Media Bookmark Remote Computing Navigation Smart Tech Bitcoin Running Cable Environment Alerts Gig Economy Application Download Google Wallet Tablet Teamwork Small Businesses Internet Service Provider IBM Regulations Compliance Browsers Alert Evernote Connectivity Windows 8 Break Fix Laptop Displays Dark Data Managed IT Memes File Sharing Upload Drones SQL Server Social Network How To Multi-Factor Security Outsourcing Net Neutrality Financial Data History Notifications IoT Dark Web Halloween Smartwatch Workplace IT Travel Trends Google Maps Azure Customer Resource management Regulations Google Calendar Hiring/Firing Competition Techology Procurement Telework Paperless Cyber security Data Analysis Tech Star Wars Hacks Microsoft Excel Scary Stories Staff CES Fun Co-managed IT Communitications Unified Threat Management Gamification Social Networking Deep Learning Legislation Technology Care Unified Threat Management Supply Chain Management FinTech Business Communications User Fileless Malware Term Network Congestion Wearable Technology Education Scams IT Assessment Content Value Health IT Motherboard Comparison Hybrid Work User Error Flexibility IP Address Organization Human Resources Directions Assessment Mobile Computing Permissions Digital Security Cameras Search Cables Smart Devices Point of Sale Memory Best Practice Specifications Remote Working Google Apps Recovery Network Management Data Breach Microchip Tech Support Google Play Internet Exlporer Fraud Buisness

Blog Archive