Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Network Security Hardware Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Communication Saving Money Cybersecurity Data Backup Smartphone Managed Service Productivity Android Upgrade Business Management Smartphones VoIP Mobile Devices Data Recovery communications Windows Disaster Recovery Browser Social Media AI Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Information Holiday Covid-19 Miscellaneous Gadgets Cloud Computing Training Remote Work Server Managed Service Provider Outsourced IT Employee/Employer Relationship Spam Compliance Encryption Windows 10 IT Support Office Data Management Business Continuity Government Virtualization Business Technology Bandwidth Blockchain Wi-Fi Windows 10 Two-factor Authentication Apps Data Security Mobile Office Vendor Gmail Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking Managed Services Voice over Internet Protocol App Mobile Device Management BYOD Applications Information Technology WiFi Access Control Office 365 Conferencing Hacker How To Avoiding Downtime BDR Marketing HIPAA Computing Virtual Private Network Risk Management Health Help Desk Big Data Analytics Office Tips Augmented Reality Retail Storage 2FA Password Bring Your Own Device Computers Managed IT Services Healthcare Website Operating System Router Microsoft 365 Display Printer Paperless Office Solutions The Internet of Things Infrastructure Monitoring Social Document Management Windows 11 Telephone Scam Customer Service Data loss Excel Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Free Resource Vendor Management Cybercrime Project Management Windows 7 Firewall Physical Security Mobility Cryptocurrency Multi-Factor Authentication User Tip Modem Processor Computer Repair Mobile Security Safety Virtual Desktop Data storage LiFi Employees Integration Smart Technology Outlook Machine Learning Money Saving Time Humor Holidays Managed IT Service Customer Relationship Management Data Storage Maintenance Sports Supply Chain Downloads Antivirus Mouse Video Conferencing Hacking Managed Services Provider Licensing Virtual Machines Professional Services Presentation Entertainment Administration Wireless Technology iPhone Robot Telephone System Cost Management Settings Printing Vulnerabilities Wireless Word Data Privacy Content Filtering IT Management VPN YouTube Meetings Images 101 Shortcuts Organization Entrepreneur Username Smart Devices Point of Sale Ransmoware 5G Black Friday Digital Security Cameras Google Docs Remote Working Unified Communications Database Memory Vendors Experience Running Cable Tech Support IT Technicians Google Play Be Proactive Undo Bitcoin Network Management Data Breach Google Wallet Proxy Server Electronic Health Records Cookies Workforce Monitors Cyber Monday Videos Tactics Wasting Time Threats Hotspot Laptop Websites Mirgation Security Cameras Workplace Strategies Windows 8 Trend Micro Drones Software as a Service Nanotechnology Meta Application SharePoint Addiction Managing Costs Amazon Electronic Medical Records Language Halloween Chatbots SSID Management eCommerce Lenovo Surveillance Screen Reader Virtual Assistant Outsource IT Writing Distributed Denial of Service IBM Service Level Agreement Virtual Machine Environment Virtual Reality Computing Infrastructure Media Scary Stories Private Cloud Identity Medical IT Reviews Hacks Server Management Superfish Bookmark Development Identity Theft Smart Tech Transportation Small Businesses Fun Deep Learning Download Hypervisor Displays Twitter Alerts Error PowerPoint Competition Shopping Optimization Browsers Education Connectivity Employer/Employee Relationships Outsourcing Social Engineering Break Fix PCI DSS Upload Remote Computing Navigation Workplace Multi-Factor Security Gig Economy Mobile Computing Social Network User Internet Service Provider Tablet IoT Teamwork Hiring/Firing Search Dark Web Evernote Paperless Regulations Compliance Best Practice Trends Alert Memes Buisness File Sharing Regulations Co-managed IT Dark Data Google Calendar Managed IT Customer Resource management Legal Data Analysis Net Neutrality IT solutions Star Wars SQL Server Technology Care How To Microsoft Excel IP Address Business Communications Financial Data Business Growth Gamification History Notifications Staff IT Travel Social Networking Scams Legislation Smartwatch Recovery Techology Fileless Malware Procurement Google Maps Azure Hybrid Work Cortana Tech Human Resources Hard Drives Telework Alt Codes Content Cyber security Wearable Technology Health IT Communitications Downtime Unified Threat Management Motherboard Cables Comparison Domains CES Unified Threat Management Directions Supply Chain Management Hosted Solution Assessment Permissions Term Google Apps Refrigeration FinTech Typing IT Assessment IT Maintenance Network Congestion Specifications Public Speaking Google Drive User Error Microchip Flexibility Internet Exlporer Value Business Intelligence Knowledge Fraud Lithium-ion battery

Blog Archive