Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Hosted Solutions Workplace Strategy Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Facebook Holiday Miscellaneous Automation Artificial Intelligence Cloud Computing Training Covid-19 Gadgets Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Blockchain Vendor Two-factor Authentication Apps Mobile Office Data Security Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Managed Services Voice over Internet Protocol App Mobile Device Management HIPAA Computing Applications Information Technology Access Control Office 365 Conferencing Hacker Avoiding Downtime How To Marketing BDR Operating System Router Risk Management Virtual Private Network Big Data Health Help Desk Analytics Office Tips Augmented Reality Retail Storage 2FA Computers Password Bring Your Own Device Managed IT Services Website Healthcare Remote Monitoring Firewall End of Support Vulnerability Free Resource Vendor Management Project Management Cybercrime Windows 7 Physical Security The Internet of Things Display Microsoft 365 Printer Paperless Office Social Solutions Infrastructure Monitoring Document Management Customer Service Windows 11 Telephone Scam Excel Data loss Cooperation Remote Workers Going Green Patch Management Save Money Settings Wireless Vulnerabilities Printing Data Privacy Content Filtering IT Management YouTube Meetings Images 101 Safety VPN Multi-Factor Authentication Mobility Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Employees Smart Technology Integration Outlook Customer Relationship Management Machine Learning Money Saving Time Humor Holidays Hacking Managed IT Service Presentation Maintenance Data Storage Downloads Supply Chain Antivirus Sports Mouse Video Conferencing Managed Services Provider Wireless Technology Licensing Virtual Machines Professional Services Entertainment Administration Word Robot iPhone Telephone System Cost Management Telework Cyber security Public Speaking Tech Human Resources Alt Codes Content Wearable Technology Downtime Unified Threat Management Motherboard CES Comparison Communitications Lithium-ion battery Cables Health IT Unified Threat Management Directions Hosted Solution Assessment Entrepreneur Permissions Supply Chain Management FinTech Term Google Apps Typing Network Congestion Specifications IT Assessment IT Maintenance Value Business Intelligence Google Drive User Error Microchip Undo Internet Exlporer Knowledge Fraud Flexibility Organization Shortcuts Username Point of Sale Digital Security Cameras 5G Black Friday Smart Devices Ransmoware Memory Vendors Google Docs Unified Communications Database Experience Remote Working Data Breach Google Play Be Proactive Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Videos Monitors Cyber Monday Electronic Health Records Workforce Google Wallet Proxy Server Application Wasting Time Threats Tactics Hotspot Trend Micro IBM Security Cameras Workplace Strategies Windows 8 Laptop Websites Mirgation Nanotechnology Software as a Service Meta Drones Managing Costs Amazon SharePoint Addiction Electronic Medical Records Language eCommerce SSID Management Halloween Chatbots Screen Reader Writing Distributed Denial of Service Surveillance Virtual Assistant Outsource IT Lenovo Virtual Machine Environment Competition Media Service Level Agreement Virtual Reality Computing Infrastructure Reviews Medical IT Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun Development Transportation Small Businesses Superfish Bookmark Hypervisor Displays Deep Learning Download Twitter Alerts Shopping Optimization PowerPoint User Error Browsers Education Connectivity Social Engineering Break Fix Employer/Employee Relationships Outsourcing Navigation Upload Remote Computing PCI DSS Gig Economy Multi-Factor Security IP Address Workplace Mobile Computing Social Network Tablet IoT Search Dark Web Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Best Practice Trends Alert Regulations Compliance Buisness File Sharing Regulations Dark Data Google Calendar Memes Co-managed IT Managed IT Customer Resource management Recovery Legal Data Analysis Hard Drives IT solutions Star Wars How To Microsoft Excel Net Neutrality SQL Server Technology Care History Domains Business Communications Business Growth Gamification Notifications Staff Financial Data Travel Social Networking Smartwatch Legislation IT Scams Techology Fileless Malware Refrigeration Google Maps Cortana Procurement Azure Hybrid Work

Blog Archive