Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade AI Business Management Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Information Covid-19 Cloud Computing Miscellaneous Holiday Gadgets Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Data Management Government Business Continuity Windows 10 Virtualization Wi-Fi Business Technology Bandwidth Blockchain Vendor Data Security Apps Two-factor Authentication Mobile Office App Gmail BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome Tip of the week Budget Apple Mobile Device Management Networking How To Applications BDR WiFi Computing Information Technology Conferencing Office 365 Access Control Hacker Avoiding Downtime Marketing HIPAA Router Operating System 2FA Help Desk Big Data Risk Management Virtual Private Network Health Analytics Office Tips Computers Augmented Reality Healthcare Storage Retail Password Website Bring Your Own Device Managed IT Services Firewall Solutions Going Green Patch Management Save Money Remote Monitoring The Internet of Things Windows 11 Vulnerability Cybercrime End of Support Vendor Management Monitoring Social Physical Security Excel Display Printer Paperless Office Telephone Infrastructure Customer Service Remote Workers Cooperation Document Management Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 User Tip Modem Processor Employees Safety Mobile Security Settings Robot Integration Wireless Printing Content Filtering YouTube IT Management Smart Technology Supply Chain VPN Cryptocurrency Meetings Holidays Saving Time Data Storage Video Conferencing Virtual Desktop Computer Repair Data storage Customer Relationship Management LiFi Managed Services Provider Managed IT Service Professional Services Virtual Machines Downloads Outlook Hacking Licensing Money Presentation Entertainment Humor Machine Learning Data Privacy iPhone Wireless Technology Sports Vulnerabilities Telephone System Mouse Maintenance Antivirus Cost Management Images 101 Administration Word Multi-Factor Authentication Mobility Legal Remote Working Public Speaking IT solutions Alert Memory Specifications Workplace Strategies Microchip Managed IT Lithium-ion battery Internet Exlporer Business Growth File Sharing Data Breach Fraud Dark Data Meta Google Play Electronic Health Records How To Amazon Entrepreneur Videos Username Notifications Wasting Time Black Friday Cortana Security Cameras Database Alt Codes Travel Trend Micro Outsource IT Software as a Service Undo IT Technicians Downtime Environment Media Techology Google Maps Proxy Server Cookies Hosted Solution Managing Costs Cyber Monday SSID Tactics Typing Unified Threat Management eCommerce Hotspot Small Businesses Surveillance Mirgation Displays Virtual Assistant Unified Threat Management Google Drive Nanotechnology Virtual Machine Knowledge Medical IT Reviews Addiction Application Language Network Congestion Outsourcing Development Chatbots Transportation 5G User Error Management Google Docs IBM Screen Reader Unified Communications Hypervisor Distributed Denial of Service Experience Workplace PowerPoint Shopping Service Level Agreement Bitcoin Point of Sale Optimization Computing Infrastructure Running Cable Hiring/Firing Google Wallet Identity Employer/Employee Relationships Paperless Bookmark Network Management PCI DSS Smart Tech Tech Support Co-managed IT Navigation Alerts Laptop Monitors Technology Care Gig Economy Download Windows 8 Drones Internet Service Provider Competition Teamwork Business Communications Browsers Regulations Compliance Connectivity Websites Break Fix Scams Evernote Halloween Hybrid Work Upload Memes Social Network Net Neutrality Electronic Medical Records SQL Server Multi-Factor Security Human Resources SharePoint Financial Data IoT History User Dark Web Cables Scary Stories Writing Lenovo Smartwatch Trends Hacks IT Customer Resource management Procurement Regulations Virtual Reality Azure Google Calendar Fun Google Apps Data Analysis Server Management Telework IP Address Star Wars Deep Learning Private Cloud Cyber security Microsoft Excel IT Maintenance Tech Staff Business Intelligence Superfish CES Gamification Identity Theft Communitications Supply Chain Management Social Networking Education Twitter Legislation Shortcuts Fileless Malware FinTech Error Recovery Ransmoware Term Hard Drives Wearable Technology Social Engineering Vendors Content Mobile Computing IT Assessment Health IT Flexibility Domains Motherboard Remote Computing Value Comparison Search Be Proactive Directions Organization Assessment Best Practice Permissions Workforce Refrigeration Buisness Threats Digital Security Cameras Tablet Smart Devices

Blog Archive