Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Ransomware Backup Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Holiday Facebook Miscellaneous Automation Information Cloud Computing Training Gadgets Covid-19 Remote Work Managed Service Provider Compliance Server IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Government Business Continuity Data Management Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Blockchain Data Security Vendor Mobile Office Apps Two-factor Authentication Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi Managed Services Voice over Internet Protocol App Tip of the week Employer-Employee Relationship Networking BDR Marketing Applications Conferencing Access Control Computing Information Technology Hacker How To Avoiding Downtime Office 365 HIPAA Office Tips Router Website Analytics Augmented Reality 2FA Storage Password Bring Your Own Device Help Desk Physical Security Virtual Private Network Health Big Data Healthcare Operating System Retail Risk Management Computers Managed IT Services Windows 11 Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Firewall Excel Monitoring Display The Internet of Things Printer Paperless Office Infrastructure Remote Workers Social Going Green Telephone Document Management Cybercrime Free Resource Cooperation Project Management Windows 7 Customer Service Scam Data loss Microsoft 365 Solutions Employees Outlook Integration Money Robot Modem Word Humor User Tip Processor Mobile Security Supply Chain Holidays IT Management Sports Data Storage VPN Mouse Meetings Smart Technology Video Conferencing Safety Managed Services Provider Administration Saving Time Professional Services Computer Repair Virtual Machines Managed IT Service Downloads iPhone Settings Data Privacy Printing Machine Learning Wireless Licensing Content Filtering Entertainment Vulnerabilities Customer Relationship Management YouTube Maintenance Cryptocurrency Images 101 Hacking Antivirus Presentation Multi-Factor Authentication Telephone System Mobility Cost Management Virtual Desktop Wireless Technology Data storage LiFi Security Cameras How To Outsource IT Specifications Trend Micro Software as a Service Microchip Notifications Halloween Internet Exlporer Environment Fraud Media Recovery Hard Drives Managing Costs Travel Username SSID Small Businesses Domains Black Friday Techology eCommerce Google Maps Surveillance Hacks Virtual Assistant Scary Stories Database Displays Refrigeration Virtual Machine Unified Threat Management Fun IT Technicians Medical IT Cookies Outsourcing Public Speaking Cyber Monday Reviews Unified Threat Management Deep Learning Proxy Server Development Transportation Tactics Lithium-ion battery Hotspot Workplace Entrepreneur Hypervisor Education Network Congestion Mirgation PowerPoint Nanotechnology Hiring/Firing Shopping User Error Optimization Mobile Computing Employer/Employee Relationships Addiction Language Paperless Search Chatbots Co-managed IT Undo PCI DSS Point of Sale Management Navigation Best Practice Screen Reader Technology Care Distributed Denial of Service Gig Economy Internet Service Provider Network Management Teamwork Tech Support Buisness Service Level Agreement Computing Infrastructure Business Communications Monitors Identity Scams Regulations Compliance Legal IT solutions Evernote Business Growth Bookmark Smart Tech Hybrid Work Memes Human Resources Application Net Neutrality SQL Server Websites Download Alerts Cortana Cables Financial Data History Alt Codes Browsers Electronic Medical Records Connectivity IBM Break Fix Smartwatch SharePoint IT Google Apps Procurement Azure Downtime Upload Writing IT Maintenance Multi-Factor Security Telework Lenovo Cyber security Hosted Solution Social Network Tech Typing Virtual Reality IoT Business Intelligence Dark Web CES Communitications Shortcuts Supply Chain Management Server Management Private Cloud Trends Knowledge Regulations Ransmoware Competition Google Calendar FinTech Superfish Google Drive Identity Theft Customer Resource management Term Data Analysis Twitter Star Wars Vendors Microsoft Excel IT Assessment Be Proactive Flexibility Value Error Gamification 5G Staff Social Engineering Experience Social Networking Workforce Legislation Organization Google Docs Unified Communications Bitcoin Fileless Malware Remote Computing Running Cable Threats Digital Security Cameras User Smart Devices Workplace Strategies Remote Working Google Wallet Memory Content Wearable Technology Motherboard Meta Comparison Data Breach Tablet Health IT Google Play Electronic Health Records Windows 8 Directions Alert Laptop Assessment Amazon IP Address Permissions Videos Managed IT Drones Wasting Time File Sharing Dark Data

Blog Archive