Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Cybersecurity Communication Smartphone Data Backup Android AI Upgrade Disaster Recovery Data Recovery Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Artificial Intelligence Facebook Automation Miscellaneous Information Cloud Computing Covid-19 Training Gadgets Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Windows 10 Bandwidth Virtualization Business Technology Blockchain Wi-Fi Two-factor Authentication Apps Vendor Data Security Mobile Office Mobile Device Management BYOD Gmail Chrome WiFi Budget Tip of the week Apple Managed Services Employer-Employee Relationship Voice over Internet Protocol App Networking Office 365 Conferencing Access Control HIPAA Hacker Applications How To Avoiding Downtime BDR Computing Marketing Information Technology Help Desk 2FA Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Password Big Data Bring Your Own Device Retail Healthcare Computers Router Managed IT Services Operating System Website Risk Management Windows 11 Monitoring Remote Monitoring Vulnerability End of Support Solutions Vendor Management Firewall Excel Physical Security Display Printer Telephone Paperless Office The Internet of Things Infrastructure Social Cooperation Document Management Remote Workers Customer Service Scam Going Green Data loss Free Resource Project Management Cybercrime Windows 7 Patch Management Microsoft 365 Save Money Word Smart Technology Virtual Desktop Data storage Supply Chain LiFi IT Management Saving Time VPN Employees Meetings Integration Outlook Managed IT Service Computer Repair Safety Money Humor Downloads Holidays Licensing Data Storage Entertainment Sports Video Conferencing Mouse Machine Learning Managed Services Provider Data Privacy Virtual Machines Professional Services Administration Telephone System Cost Management Customer Relationship Management Maintenance Antivirus iPhone Hacking Presentation Settings Wireless Printing Vulnerabilities Content Filtering User Tip Modem Wireless Technology YouTube Processor Images 101 Mobile Security Multi-Factor Authentication Cryptocurrency Robot Mobility Remote Working Mirgation Google Docs Memory Unified Communications Hard Drives Experience Nanotechnology Small Businesses Unified Threat Management Data Breach Bitcoin Google Play Domains Running Cable Unified Threat Management Videos Addiction Displays Electronic Health Records Language Google Wallet Chatbots Wasting Time Refrigeration Management Screen Reader Outsourcing Trend Micro Distributed Denial of Service Windows 8 Network Congestion Security Cameras Public Speaking Laptop Lithium-ion battery User Error Service Level Agreement Software as a Service Computing Infrastructure Drones Identity Workplace Managing Costs Entrepreneur Bookmark Smart Tech Hiring/Firing Point of Sale eCommerce SSID Halloween Virtual Assistant Download Surveillance Alerts Paperless Network Management Co-managed IT Tech Support Virtual Machine Undo Browsers Reviews Connectivity Technology Care Break Fix Hacks Monitors Medical IT Scary Stories Business Communications Transportation Fun Upload Development Scams Websites Hypervisor Multi-Factor Security Deep Learning Social Network Shopping IoT Hybrid Work Optimization Dark Web PowerPoint Human Resources Electronic Medical Records Employer/Employee Relationships Education Application SharePoint Trends PCI DSS Regulations Cables Google Calendar Navigation Customer Resource management Data Analysis Lenovo Gig Economy Star Wars Microsoft Excel Mobile Computing Writing IBM Google Apps Virtual Reality Teamwork Search Gamification Internet Service Provider Staff Server Management Regulations Compliance Social Networking IT Maintenance Private Cloud Legislation Best Practice Evernote Fileless Malware Superfish Business Intelligence Identity Theft Memes Buisness Legal Shortcuts Twitter SQL Server IT solutions Content Net Neutrality Wearable Technology Health IT Financial Data Motherboard Ransmoware Error History Comparison Business Growth Competition Directions Smartwatch Assessment Vendors IT Permissions Social Engineering Be Proactive Remote Computing Azure Cortana Procurement Telework Workforce Cyber security Specifications Alt Codes Tech Downtime User Microchip CES Internet Exlporer Threats Tablet Communitications Fraud Supply Chain Management Workplace Strategies Alert Hosted Solution Username Managed IT FinTech Meta File Sharing Black Friday Typing Dark Data Term IP Address Database Amazon IT Assessment How To Flexibility IT Technicians Google Drive Notifications Value Knowledge Proxy Server Organization Cookies Outsource IT Travel Cyber Monday Recovery 5G Techology Digital Security Cameras Tactics Environment Google Maps Smart Devices Hotspot Media

Blog Archive