Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Disaster Recovery VoIP Business Management Smartphones Data Recovery communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Artificial Intelligence Automation Facebook Miscellaneous Cloud Computing Covid-19 Holiday Training Gadgets Server Remote Work Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Vendor Mobile Office Apps Data Security Two-factor Authentication Chrome BYOD Budget Mobile Device Management Apple Gmail App Tip of the week Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Avoiding Downtime HIPAA Marketing Applications Access Control WiFi Conferencing Computing Information Technology How To BDR Hacker Office 365 Office Tips Analytics Augmented Reality Website Router Storage 2FA Password Virtual Private Network Bring Your Own Device Health Help Desk Retail Big Data Operating System Healthcare Managed IT Services Risk Management Computers Remote Monitoring End of Support Vulnerability Vendor Management Solutions Windows 11 Physical Security Display Printer Excel Firewall Paperless Office Infrastructure Monitoring Going Green The Internet of Things Document Management Remote Workers Social Cybercrime Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Customer Service Patch Management Save Money Microsoft 365 Outlook Wireless Technology Money IT Management Humor VPN Employees Meetings Integration Supply Chain Sports User Tip Word Modem Computer Repair Mobile Security Mouse Processor Holidays Administration Data Storage Smart Technology Video Conferencing Safety Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Settings Managed IT Service Printing Wireless Maintenance Data Privacy Content Filtering Antivirus Downloads iPhone YouTube Licensing Cryptocurrency Vulnerabilities Customer Relationship Management Entertainment Virtual Desktop Images 101 Hacking Data storage LiFi Robot Mobility Presentation Telephone System Multi-Factor Authentication Cost Management Content Remote Working Wearable Technology Memory Amazon Comparison Google Play Halloween Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Outsource IT IP Address Unified Threat Management Directions Videos Wasting Time Environment Media Network Congestion Specifications Security Cameras Hacks Scary Stories Trend Micro Internet Exlporer Software as a Service Fraud Small Businesses User Error Microchip Fun Recovery Hard Drives Username Managing Costs Displays Deep Learning Black Friday SSID Domains Point of Sale eCommerce Database Surveillance Virtual Assistant Outsourcing Education Refrigeration Network Management Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Workplace Mobile Computing Public Speaking Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Hiring/Firing Lithium-ion battery Search Entrepreneur Websites Mirgation Hypervisor Paperless Best Practice PowerPoint Co-managed IT Buisness Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Technology Care Legal IT solutions SharePoint Undo Management PCI DSS Chatbots Navigation Business Communications Business Growth Writing Distributed Denial of Service Scams Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hybrid Work Cortana Server Management Regulations Compliance Private Cloud Identity Evernote Human Resources Alt Codes Cables Downtime Superfish Bookmark Identity Theft Smart Tech Memes Application Download Net Neutrality Twitter Alerts SQL Server Hosted Solution Typing Financial Data Error History Google Apps Social Engineering Break Fix IT Maintenance IBM Browsers Smartwatch Connectivity IT Knowledge Upload Procurement Remote Computing Azure Business Intelligence Google Drive Shortcuts Social Network Telework Cyber security Multi-Factor Security Tech Dark Web Ransmoware CES 5G Tablet IoT Communitications Experience Trends Supply Chain Management Alert Vendors Google Docs Unified Communications Be Proactive Bitcoin Running Cable Competition Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Star Wars IT Assessment How To Microsoft Excel Workforce Google Wallet Data Analysis Gamification Flexibility Notifications Staff Value Threats Legislation Workplace Strategies Windows 8 Laptop Organization Travel Social Networking Google Maps Smart Devices Meta Drones Techology Fileless Malware Digital Security Cameras User

Blog Archive