Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Data Backup Smartphone AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Automation Miscellaneous Artificial Intelligence Information Holiday Training Covid-19 Gadgets Cloud Computing Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Virtualization Bandwidth Blockchain Windows 10 Two-factor Authentication Apps Data Security Mobile Office Vendor Gmail WiFi Tip of the week Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Networking Budget Apple BYOD App Mobile Device Management Applications Computing Access Control Information Technology Office 365 Conferencing How To Hacker BDR Avoiding Downtime Marketing HIPAA Operating System Health Risk Management Big Data Help Desk Retail Office Tips Analytics Augmented Reality Managed IT Services Computers 2FA Storage Healthcare Password Bring Your Own Device Website Router Virtual Private Network Solutions Printer Cybercrime Paperless Office Infrastructure The Internet of Things Monitoring Document Management Social Scam Telephone Data loss Customer Service Windows 11 Remote Workers Cooperation Excel Patch Management Save Money Remote Monitoring Free Resource Vulnerability End of Support Project Management Vendor Management Windows 7 Going Green Physical Security Microsoft 365 Firewall Display Computer Repair Content Filtering Data Privacy User Tip Modem Safety Processor YouTube Employees Mobile Security Integration Cryptocurrency Machine Learning Smart Technology Holidays Virtual Desktop Data storage LiFi Saving Time Data Storage Video Conferencing Outlook Maintenance Antivirus Customer Relationship Management Managed IT Service Managed Services Provider Virtual Machines Professional Services Money Downloads Humor Licensing Hacking Presentation Entertainment Sports Supply Chain iPhone Mouse Wireless Technology Robot Vulnerabilities Administration Telephone System Cost Management Images 101 IT Management Word Mobility VPN Meetings Multi-Factor Authentication Settings Printing Wireless Videos Entrepreneur Electronic Health Records Hosted Solution Username Network Management Typing Tech Support Google Apps Black Friday Wasting Time Trend Micro Security Cameras Database Monitors IT Maintenance Knowledge Business Intelligence IT Technicians Software as a Service Google Drive Undo Proxy Server Websites Cookies Shortcuts Cyber Monday Managing Costs Hotspot eCommerce SSID Tactics 5G Ransmoware Electronic Medical Records Experience Vendors Mirgation Surveillance Virtual Assistant SharePoint Google Docs Unified Communications Bitcoin Running Cable Nanotechnology Be Proactive Virtual Machine Language Medical IT Lenovo Google Wallet Application Addiction Reviews Writing Workforce Management Virtual Reality Threats Chatbots Development Transportation Server Management Windows 8 IBM Private Cloud Laptop Screen Reader Workplace Strategies Distributed Denial of Service Hypervisor Computing Infrastructure Optimization PowerPoint Superfish Drones Identity Theft Service Level Agreement Shopping Meta Twitter Amazon Identity Employer/Employee Relationships Navigation Bookmark Error Halloween Smart Tech PCI DSS Outsource IT Alerts Download Gig Economy Social Engineering Competition Remote Computing Environment Internet Service Provider Media Teamwork Evernote Hacks Browsers Scary Stories Connectivity Regulations Compliance Break Fix Small Businesses Memes Tablet Upload Fun Deep Learning Social Network Alert Displays Net Neutrality Multi-Factor Security SQL Server Managed IT File Sharing User IoT Financial Data Dark Data Dark Web History Outsourcing IT Education Trends Smartwatch How To Customer Resource management Notifications Regulations Procurement Google Calendar Azure Tech Mobile Computing IP Address Data Analysis Travel Star Wars Telework Workplace Microsoft Excel Cyber security Search Hiring/Firing Staff Communitications Techology Google Maps Gamification CES Best Practice Social Networking Supply Chain Management Paperless Legislation Term Fileless Malware Unified Threat Management Buisness Recovery FinTech Co-managed IT Technology Care Wearable Technology IT Assessment Unified Threat Management Legal IT solutions Hard Drives Content Business Growth Domains Health IT Motherboard Flexibility Business Communications Comparison Value Directions Assessment Organization Network Congestion Scams Permissions Cortana Hybrid Work Smart Devices User Error Refrigeration Digital Security Cameras Alt Codes Public Speaking Remote Working Human Resources Specifications Memory Google Play Lithium-ion battery Microchip Point of Sale Downtime Internet Exlporer Cables Fraud Data Breach

Blog Archive