Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade VoIP Business Management Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Automation Facebook Information Artificial Intelligence Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Data Management Government Windows 10 Business Technology Virtualization Wi-Fi Blockchain Bandwidth Apps Data Security Two-factor Authentication Vendor Mobile Office Gmail Tip of the week Apple App Managed Services Networking Voice over Internet Protocol Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Conferencing WiFi How To BDR Computing Information Technology Hacker HIPAA Avoiding Downtime Office 365 Applications Marketing Access Control Storage Password Help Desk Bring Your Own Device Retail Big Data Managed IT Services Operating System Healthcare Risk Management Computers 2FA Router Website Analytics Office Tips Virtual Private Network Augmented Reality Health Firewall Monitoring Document Management The Internet of Things Telephone Social Scam Going Green Data loss Remote Workers Cooperation Cybercrime Customer Service Patch Management Save Money Free Resource Remote Monitoring Project Management End of Support Vulnerability Windows 11 Vendor Management Windows 7 Physical Security Microsoft 365 Excel Display Printer Solutions Paperless Office Infrastructure Sports Smart Technology Mouse Machine Learning Holidays Safety Saving Time Administration Data Privacy Data Storage Managed IT Service Maintenance Video Conferencing Downloads Managed Services Provider Antivirus Virtual Machines Professional Services Licensing Settings Wireless Printing Entertainment Content Filtering Customer Relationship Management YouTube iPhone Robot Cryptocurrency Telephone System Cost Management Vulnerabilities Hacking Presentation Virtual Desktop Images 101 Wireless Technology Data storage LiFi IT Management Meetings Multi-Factor Authentication Mobility VPN Supply Chain Outlook Modem User Tip Money Processor Mobile Security Computer Repair Humor Word Employees Integration Managing Costs Public Speaking Deep Learning Technology Care Mirgation Websites Business Communications Nanotechnology eCommerce Lithium-ion battery SSID Entrepreneur SharePoint Education Scams Addiction Language Surveillance Electronic Medical Records Virtual Assistant Virtual Machine Hybrid Work Management Chatbots Lenovo Human Resources Screen Reader Reviews Distributed Denial of Service Writing Medical IT Mobile Computing Undo Cables Service Level Agreement Search Computing Infrastructure Development Virtual Reality Transportation Private Cloud Hypervisor Best Practice Server Management Identity Superfish Buisness Google Apps Smart Tech Shopping Identity Theft Optimization PowerPoint Bookmark Legal IT solutions IT Maintenance Download Alerts Twitter Employer/Employee Relationships Error Navigation Business Growth Business Intelligence PCI DSS Shortcuts Connectivity Gig Economy Break Fix Social Engineering Application Browsers Ransmoware Upload Cortana Internet Service Provider Remote Computing Teamwork Regulations Compliance Multi-Factor Security IBM Evernote Alt Codes Vendors Social Network Downtime Be Proactive IoT Tablet Dark Web Memes SQL Server Hosted Solution Workforce Trends Net Neutrality Alert Financial Data File Sharing Google Calendar History Dark Data Typing Threats Customer Resource management Managed IT Regulations Workplace Strategies Star Wars Smartwatch Microsoft Excel IT How To Data Analysis Azure Competition Google Drive Meta Gamification Knowledge Staff Procurement Notifications Telework Travel Legislation Cyber security Tech Amazon Social Networking Techology CES Google Maps 5G Communitications Fileless Malware Google Docs Unified Communications Outsource IT Content Experience Wearable Technology Supply Chain Management FinTech Unified Threat Management Comparison Term User Bitcoin Environment Health IT Running Cable Media Motherboard Google Wallet Directions Unified Threat Management Assessment Permissions IT Assessment Value Small Businesses Flexibility Laptop Organization Specifications Network Congestion IP Address Windows 8 Displays Drones Microchip User Error Internet Exlporer Digital Security Cameras Fraud Smart Devices Memory Outsourcing Username Remote Working Halloween Point of Sale Black Friday Data Breach Google Play Recovery Workplace Database Videos Electronic Health Records Hard Drives Wasting Time Domains Hiring/Firing Network Management IT Technicians Tech Support Scary Stories Paperless Cookies Cyber Monday Trend Micro Monitors Security Cameras Hacks Proxy Server Co-managed IT Tactics Fun Hotspot Software as a Service Refrigeration

Blog Archive