Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI VoIP Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Automation Facebook Information Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Blockchain Vendor Mobile Office Data Security Apps Two-factor Authentication Chrome Budget Mobile Device Management Tip of the week Apple Gmail App Networking Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Office 365 Hacker Applications Avoiding Downtime Access Control Marketing Conferencing WiFi How To Computing BDR Information Technology HIPAA Router Computers Analytics Office Tips Virtual Private Network Augmented Reality Website Health Storage Help Desk Password Bring Your Own Device Retail 2FA Managed IT Services Big Data Operating System Risk Management Healthcare Free Resource Physical Security Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Document Management Firewall Windows 11 Telephone The Internet of Things Scam Going Green Data loss Excel Social Cooperation Cybercrime Remote Workers Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Meetings Data Privacy Presentation VPN Outlook Images 101 Modem Wireless Technology User Tip Processor Money Computer Repair Mobile Security Multi-Factor Authentication Mobility Humor Sports Smart Technology Word Mouse Employees Integration Machine Learning Saving Time Administration Managed IT Service Maintenance Holidays Safety Downloads Antivirus Data Storage Licensing Supply Chain Video Conferencing Settings Wireless Managed Services Provider Entertainment Printing Professional Services Content Filtering Virtual Machines YouTube Robot Telephone System Cryptocurrency Cost Management Customer Relationship Management iPhone Virtual Desktop Vulnerabilities Hacking Data storage IT Management LiFi Laptop Supply Chain Management Network Congestion Specifications Windows 8 User Error Microchip Drones Internet Exlporer FinTech Fraud Term Google Apps User IT Maintenance Username IT Assessment Point of Sale Halloween Flexibility Black Friday Value Business Intelligence Database Organization IP Address Shortcuts Ransmoware Network Management Digital Security Cameras Tech Support IT Technicians Smart Devices Cookies Scary Stories Remote Working Monitors Cyber Monday Memory Vendors Proxy Server Hacks Tactics Hotspot Fun Data Breach Google Play Be Proactive Recovery Workforce Hard Drives Deep Learning Videos Websites Mirgation Electronic Health Records Nanotechnology Wasting Time Threats Domains SharePoint Addiction Education Electronic Medical Records Language Trend Micro Security Cameras Workplace Strategies Meta Refrigeration Management Chatbots Software as a Service Screen Reader Writing Distributed Denial of Service Managing Costs Amazon Public Speaking Lenovo Mobile Computing Service Level Agreement Virtual Reality Computing Infrastructure Search eCommerce Lithium-ion battery SSID Virtual Assistant Outsource IT Entrepreneur Server Management Best Practice Private Cloud Identity Surveillance Identity Theft Smart Tech Buisness Virtual Machine Environment Media Superfish Bookmark Legal Download IT solutions Reviews Twitter Alerts Medical IT Transportation Small Businesses Undo Business Growth Error Development Connectivity Social Engineering Break Fix Hypervisor Displays Browsers Upload Shopping Remote Computing Cortana Optimization PowerPoint Multi-Factor Security Employer/Employee Relationships Outsourcing Social Network Alt Codes Tablet IoT Downtime PCI DSS Dark Web Navigation Workplace Application Trends Hosted Solution Gig Economy Alert Internet Service Provider Dark Data Google Calendar Teamwork Hiring/Firing Managed IT Customer Resource management Typing File Sharing Regulations Star Wars Regulations Compliance How To Microsoft Excel IBM Evernote Paperless Data Analysis Co-managed IT Google Drive Gamification Notifications Staff Knowledge Memes Net Neutrality Legislation SQL Server Technology Care Travel Social Networking Google Maps Financial Data 5G History Business Communications Techology Fileless Malware Scams Google Docs Content Unified Communications Smartwatch Wearable Technology Experience IT Running Cable Procurement Comparison Azure Hybrid Work Competition Health IT Bitcoin Unified Threat Management Motherboard Unified Threat Management Directions Google Wallet Assessment Telework Permissions Cyber security Tech Human Resources Cables CES Communitications

Blog Archive