Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade Business Management AI Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Information Facebook Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Blockchain Windows 10 Virtualization Bandwidth Mobile Office Two-factor Authentication Vendor Apps Data Security BYOD Managed Services Voice over Internet Protocol Mobile Device Management Gmail Tip of the week Chrome Budget Networking Employer-Employee Relationship Apple App Avoiding Downtime Computing Marketing Information Technology Access Control Office 365 HIPAA WiFi Applications How To BDR Conferencing Hacker Operating System Website Virtual Private Network Risk Management Health Healthcare Analytics Office Tips Router Augmented Reality Retail Big Data Storage Password Bring Your Own Device Managed IT Services Help Desk 2FA Computers Vendor Management Telephone Physical Security Cybercrime Display Printer Cooperation Remote Workers Paperless Office Infrastructure Firewall Document Management Free Resource Project Management Windows 7 The Internet of Things Microsoft 365 Scam Social Data loss Solutions Monitoring Windows 11 Customer Service Patch Management Save Money Remote Monitoring Going Green End of Support Excel Vulnerability Data Storage Settings Wireless Technology Downloads Wireless IT Management Printing VPN Video Conferencing Meetings Content Filtering Managed Services Provider Licensing Professional Services YouTube Virtual Machines Entertainment Cryptocurrency Computer Repair Word iPhone Virtual Desktop Data Privacy Telephone System Data storage Cost Management LiFi Machine Learning Vulnerabilities Outlook Safety Money Images 101 Humor Maintenance Multi-Factor Authentication Mobility Modem Antivirus User Tip Processor Mobile Security Sports Mouse Employees Integration Customer Relationship Management Administration Smart Technology Saving Time Robot Hacking Supply Chain Presentation Holidays Managed IT Service Unified Threat Management Hypervisor Download Alt Codes Alerts Workplace PowerPoint Downtime Hiring/Firing Shopping Optimization Browsers Employer/Employee Relationships Connectivity IP Address Hosted Solution Network Congestion Break Fix Paperless User Error PCI DSS Upload Typing Navigation Co-managed IT Technology Care Multi-Factor Security Gig Economy Social Network Internet Service Provider Google Drive Point of Sale Teamwork IoT Dark Web Recovery Knowledge Business Communications Regulations Compliance Trends Evernote Hard Drives Scams Tech Support Regulations Domains Hybrid Work Google Calendar 5G Network Management Memes Customer Resource management Net Neutrality Data Analysis Google Docs SQL Server Star Wars Unified Communications Monitors Microsoft Excel Experience Human Resources Financial Data History Gamification Bitcoin Staff Refrigeration Running Cable Cables Google Wallet Websites Social Networking Public Speaking Legislation Smartwatch IT Procurement Fileless Malware Azure Lithium-ion battery Google Apps Laptop IT Maintenance Entrepreneur SharePoint Telework Cyber security Content Windows 8 Electronic Medical Records Tech Wearable Technology Drones Motherboard Business Intelligence Comparison CES Communitications Health IT Lenovo Supply Chain Management Directions Assessment Writing Permissions Shortcuts Halloween Ransmoware FinTech Virtual Reality Term Undo Private Cloud Vendors Specifications Server Management IT Assessment Superfish Flexibility Microchip Identity Theft Value Internet Exlporer Fraud Be Proactive Scary Stories Workforce Organization Username Hacks Twitter Error Threats Black Friday Fun Digital Security Cameras Smart Devices Remote Working Memory Database Deep Learning Social Engineering Application Workplace Strategies Meta Data Breach Remote Computing Google Play IT Technicians Cookies IBM Education Amazon Cyber Monday Videos Electronic Health Records Proxy Server Tablet Wasting Time Tactics Hotspot Outsource IT Trend Micro Mobile Computing Alert Security Cameras Mirgation File Sharing Nanotechnology Environment Dark Data Search Media Managed IT Software as a Service Managing Costs Addiction Best Practice How To Language Buisness Small Businesses eCommerce Management Notifications SSID Chatbots Competition Surveillance Legal Travel Virtual Assistant Screen Reader IT solutions Displays Distributed Denial of Service Techology Google Maps Virtual Machine Service Level Agreement Business Growth Computing Infrastructure Medical IT Identity Outsourcing Reviews Development Bookmark Unified Threat Management Transportation Smart Tech User Cortana

Blog Archive