Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade AI VoIP Business Management Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Artificial Intelligence Automation Facebook Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Data Security Two-factor Authentication Vendor Mobile Office Apps BYOD Chrome Mobile Device Management Budget Gmail Apple Tip of the week Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking BDR Information Technology Hacker HIPAA Avoiding Downtime Office 365 Applications Marketing Access Control Conferencing WiFi Computing How To Risk Management Computers Router Analytics Website Office Tips 2FA Augmented Reality Virtual Private Network Storage Help Desk Health Password Bring Your Own Device Retail Big Data Healthcare Operating System Managed IT Services Windows 7 Customer Service Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability Solutions Vendor Management Windows 11 Physical Security Display Printer Excel Paperless Office Monitoring Firewall Infrastructure Document Management The Internet of Things Remote Workers Telephone Social Going Green Scam Data loss Cooperation Cybercrime Free Resource Project Management Images 101 Cryptocurrency Telephone System Hacking Cost Management Robot Presentation Multi-Factor Authentication Mobility Virtual Desktop Data storage LiFi Wireless Technology IT Management Meetings Outlook Employees VPN User Tip Modem Integration Money Processor Mobile Security Supply Chain Humor Word Computer Repair Holidays Sports Smart Technology Mouse Data Storage Safety Saving Time Video Conferencing Administration Managed Services Provider Machine Learning Professional Services Virtual Machines Managed IT Service Downloads Maintenance Data Privacy Antivirus Licensing iPhone Settings Entertainment Wireless Printing Content Filtering Vulnerabilities Customer Relationship Management YouTube Social Networking Legislation How To Workforce IT Assessment Fileless Malware Flexibility Value 5G Notifications Threats Travel Workplace Strategies Google Docs Organization Unified Communications Content Experience Wearable Technology Smart Devices Running Cable Techology User Motherboard Google Maps Comparison Meta Digital Security Cameras Bitcoin Health IT Google Wallet Directions Remote Working Assessment Memory Permissions Amazon Google Play Unified Threat Management Data Breach Electronic Health Records Laptop Unified Threat Management Specifications Outsource IT Videos Windows 8 IP Address Media Drones Microchip Internet Exlporer Wasting Time Fraud Environment Security Cameras Network Congestion Username Trend Micro Software as a Service Halloween User Error Recovery Black Friday Small Businesses Hard Drives Database Managing Costs Displays IT Technicians SSID Point of Sale Domains eCommerce Proxy Server Surveillance Scary Stories Cookies Virtual Assistant Cyber Monday Outsourcing Hacks Refrigeration Tactics Virtual Machine Fun Network Management Hotspot Tech Support Mirgation Medical IT Monitors Workplace Reviews Deep Learning Public Speaking Development Nanotechnology Transportation Hiring/Firing Lithium-ion battery Paperless Education Addiction Hypervisor Entrepreneur Language Websites Chatbots PowerPoint Co-managed IT Shopping Management Optimization SharePoint Screen Reader Employer/Employee Relationships Distributed Denial of Service Electronic Medical Records Technology Care Mobile Computing Business Communications PCI DSS Undo Service Level Agreement Search Computing Infrastructure Navigation Identity Writing Scams Gig Economy Best Practice Lenovo Bookmark Internet Service Provider Buisness Smart Tech Teamwork Virtual Reality Hybrid Work Human Resources Legal Regulations Compliance IT solutions Download Server Management Alerts Evernote Private Cloud Identity Theft Cables Business Growth Memes Superfish Browsers Net Neutrality Application Connectivity SQL Server Break Fix Twitter Google Apps Financial Data Upload History Cortana Error Multi-Factor Security Social Engineering IT Maintenance Smartwatch Alt Codes IBM Social Network IT Procurement Downtime IoT Azure Dark Web Remote Computing Business Intelligence Shortcuts Telework Hosted Solution Trends Cyber security Tech Regulations Tablet Google Calendar Ransmoware CES Typing Customer Resource management Communitications Data Analysis Supply Chain Management Star Wars Microsoft Excel Alert Vendors File Sharing Dark Data Be Proactive Google Drive FinTech Competition Gamification Knowledge Managed IT Staff Term

Blog Archive