Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones Data Recovery Business Management AI VoIP Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Network Tech Term Current Events Remote Internet of Things Information Automation Artificial Intelligence Facebook Gadgets Cloud Computing Holiday Training Miscellaneous Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing WiFi How To Operating System 2FA Computers Router Virtual Private Network Risk Management Website Health Healthcare Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Customer Service Cybercrime Physical Security Excel Display Printer Paperless Office Infrastructure Remote Workers Monitoring Document Management Firewall Free Resource Project Management Windows 7 Telephone The Internet of Things Scam Data loss Microsoft 365 Solutions Social Cooperation Employees Integration Robot Telephone System Cost Management Customer Relationship Management Settings Wireless Printing Holidays Content Filtering Hacking IT Management Data Storage Presentation VPN YouTube Meetings Supply Chain Video Conferencing Cryptocurrency Wireless Technology User Tip Managed Services Provider Modem Virtual Machines Professional Services Computer Repair Mobile Security Processor Virtual Desktop LiFi Data storage Smart Technology Word Outlook iPhone Machine Learning Money Saving Time Humor Vulnerabilities Data Privacy Managed IT Service Safety Maintenance Images 101 Downloads Antivirus Sports Mobility Mouse Multi-Factor Authentication Licensing Administration Entertainment IT solutions Star Wars Security Cameras Workplace Strategies How To Microsoft Excel IBM Legal Data Analysis Trend Micro Software as a Service Business Growth Gamification Meta Notifications Staff Legislation Managing Costs Amazon Travel Social Networking eCommerce Google Maps SSID Cortana Techology Fileless Malware Surveillance Alt Codes Content Virtual Assistant Outsource IT Wearable Technology Media Comparison Competition Health IT Virtual Machine Environment Downtime Unified Threat Management Motherboard Hosted Solution Assessment Medical IT Permissions Reviews Unified Threat Management Directions Development Typing Transportation Small Businesses Network Congestion Specifications Hypervisor Displays Optimization User Internet Exlporer PowerPoint Knowledge Fraud Shopping Google Drive User Error Microchip Username Employer/Employee Relationships Outsourcing Navigation 5G Black Friday PCI DSS Point of Sale Unified Communications Database Workplace Experience Gig Economy IP Address Google Docs Internet Service Provider Bitcoin Network Management Teamwork Hiring/Firing Running Cable Tech Support IT Technicians Evernote Paperless Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Cookies Memes Recovery Tactics Co-managed IT Hotspot Net Neutrality Hard Drives Windows 8 SQL Server Technology Care Laptop Websites Mirgation Business Communications Financial Data Domains Drones History Nanotechnology SharePoint IT Addiction Scams Electronic Medical Records Language Smartwatch Procurement Refrigeration Management Azure Hybrid Work Halloween Chatbots Screen Reader Tech Human Resources Writing Distributed Denial of Service Telework Public Speaking Lenovo Cyber security Lithium-ion battery Communitications Service Level Agreement Cables Virtual Reality Computing Infrastructure CES Supply Chain Management Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Identity Theft Smart Tech Term Google Apps Fun FinTech Superfish Bookmark IT Assessment Deep Learning Download IT Maintenance Twitter Alerts Flexibility Undo Value Business Intelligence Error Education Connectivity Shortcuts Social Engineering Break Fix Organization Browsers Smart Devices Upload Ransmoware Remote Computing Digital Security Cameras Multi-Factor Security Remote Working Mobile Computing Social Network Memory Vendors Tablet IoT Google Play Be Proactive Search Dark Web Data Breach Electronic Health Records Application Best Practice Trends Workforce Alert Videos Dark Data Google Calendar Managed IT Customer Resource management Wasting Time Threats Buisness File Sharing Regulations

Blog Archive