Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Business Management AI Smartphones VoIP Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Facebook Artificial Intelligence Information Automation Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Blockchain Wi-Fi Business Technology Windows 10 Data Security Apps Vendor Mobile Office Two-factor Authentication Chrome Networking Budget Employer-Employee Relationship Apple BYOD App Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Gmail WiFi How To BDR HIPAA Hacker Applications Avoiding Downtime Access Control Marketing Computing Information Technology Conferencing Office 365 Analytics Office Tips Augmented Reality Managed IT Services Big Data Storage Password Bring Your Own Device Router Computers Virtual Private Network Operating System Website Health Help Desk Risk Management Healthcare 2FA Retail Scam Windows 7 The Internet of Things Data loss Microsoft 365 Social Cooperation Solutions Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Physical Security Going Green Display Printer Paperless Office Infrastructure Cybercrime Monitoring Remote Workers Document Management Firewall Windows 11 Free Resource Excel Project Management Telephone Outlook Images 101 Licensing Multi-Factor Authentication Mobility Money Humor Entertainment Sports Robot Employees Mouse Telephone System Integration Cost Management Customer Relationship Management Data Privacy Administration Hacking IT Management Meetings Presentation Holidays VPN Data Storage User Tip Modem Wireless Technology Processor Computer Repair Settings Mobile Security Video Conferencing Wireless Managed Services Provider Printing Content Filtering Virtual Machines Professional Services YouTube Smart Technology Word Cryptocurrency Machine Learning iPhone Saving Time Virtual Desktop Vulnerabilities Data storage LiFi Managed IT Service Supply Chain Maintenance Safety Downloads Antivirus Browsers Connectivity Social Engineering Break Fix Workplace IT Assessment Hiring/Firing Flexibility Value Upload Remote Computing Halloween Organization Multi-Factor Security Paperless Social Network Tablet IoT Digital Security Cameras Dark Web Co-managed IT Smart Devices Application Technology Care Remote Working Memory Hacks Trends Alert Scary Stories File Sharing Regulations Dark Data Fun Google Calendar Business Communications Data Breach Managed IT Google Play Customer Resource management Data Analysis Deep Learning Star Wars How To IBM Videos Microsoft Excel Scams Electronic Health Records Hybrid Work Wasting Time Gamification Notifications Staff Travel Education Social Networking Legislation Human Resources Trend Micro Security Cameras Techology Fileless Malware Google Maps Cables Software as a Service Managing Costs Mobile Computing Content Wearable Technology Health IT Unified Threat Management Motherboard Competition Search Comparison Google Apps eCommerce SSID Unified Threat Management Virtual Assistant Directions Best Practice Assessment Permissions IT Maintenance Surveillance Business Intelligence Virtual Machine Buisness Legal IT solutions Network Congestion Reviews Specifications Shortcuts Medical IT User Error Transportation Microchip Business Growth Internet Exlporer Fraud User Ransmoware Development Vendors Hypervisor Username Point of Sale Shopping Cortana Black Friday Be Proactive Optimization PowerPoint Employer/Employee Relationships Alt Codes Database IP Address Workforce Downtime IT Technicians Threats PCI DSS Network Management Navigation Tech Support Proxy Server Hosted Solution Cookies Monitors Gig Economy Cyber Monday Workplace Strategies Meta Internet Service Provider Teamwork Typing Tactics Hotspot Recovery Mirgation Hard Drives Amazon Regulations Compliance Evernote Websites Google Drive Nanotechnology Domains Knowledge Memes Outsource IT Net Neutrality SharePoint SQL Server Addiction Electronic Medical Records Language Chatbots Refrigeration Environment Financial Data 5G Media History Management Lenovo Google Docs Unified Communications Screen Reader Writing Public Speaking Smartwatch Experience Distributed Denial of Service IT Small Businesses Procurement Azure Bitcoin Service Level Agreement Virtual Reality Lithium-ion battery Running Cable Computing Infrastructure Private Cloud Identity Displays Telework Entrepreneur Cyber security Server Management Tech Google Wallet Superfish Bookmark Identity Theft Smart Tech CES Communitications Outsourcing Supply Chain Management Windows 8 Download Twitter Laptop Alerts Error Undo FinTech Term Drones

Blog Archive