Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Automation Artificial Intelligence Information Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Blockchain Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Computing Conferencing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA How To Applications BDR 2FA Help Desk Operating System Virtual Private Network Risk Management Computers Healthcare Health Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Router Managed IT Services Big Data Going Green Patch Management Windows 11 Social Save Money Monitoring Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Excel Physical Security Customer Service Display Remote Workers Printer Telephone Paperless Office Infrastructure Cooperation Free Resource Project Management Document Management Windows 7 Microsoft 365 Firewall Scam Solutions Data loss The Internet of Things Holidays Robot Settings Data Storage Printing Smart Technology Supply Chain Wireless Video Conferencing Content Filtering IT Management Managed Services Provider Customer Relationship Management VPN Virtual Machines YouTube Meetings Professional Services Saving Time Cryptocurrency Managed IT Service Hacking Presentation Computer Repair Downloads Virtual Desktop iPhone Data storage LiFi Licensing Wireless Technology Entertainment Vulnerabilities Outlook Data Privacy Machine Learning Images 101 Money Word Humor Multi-Factor Authentication Mobility Telephone System Cost Management Maintenance Antivirus Sports Mouse Safety Employees Administration Integration Modem User Tip Processor Mobile Security Cookies Travel Cyber Monday Medical IT Application Proxy Server Reviews Techology Tactics Development Google Maps Hotspot Transportation Small Businesses Cortana Alt Codes Mirgation Hypervisor Displays IBM Nanotechnology Optimization Downtime Unified Threat Management PowerPoint Shopping Unified Threat Management Addiction Hosted Solution Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Typing Chatbots Screen Reader Distributed Denial of Service Workplace Network Congestion Gig Economy Google Drive User Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Competition Knowledge Evernote Paperless Regulations Compliance Identity Smart Tech Memes Point of Sale Co-managed IT 5G Bookmark Google Docs Download Net Neutrality Unified Communications Alerts SQL Server Technology Care Experience Running Cable Tech Support Business Communications User Financial Data Bitcoin Network Management History Google Wallet Connectivity IT Break Fix Scams Monitors Browsers Smartwatch Upload Procurement Azure Hybrid Work IP Address Laptop Websites Multi-Factor Security Tech Human Resources Social Network Telework Windows 8 Cyber security CES Drones IoT Communitications Dark Web Cables SharePoint Trends Supply Chain Management Electronic Medical Records Regulations Halloween Google Calendar Term Google Apps Recovery Customer Resource management FinTech Data Analysis Lenovo Star Wars IT Assessment Microsoft Excel IT Maintenance Hard Drives Writing Virtual Reality Gamification Flexibility Staff Value Business Intelligence Domains Hacks Server Management Social Networking Scary Stories Private Cloud Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Superfish Smart Devices Identity Theft Ransmoware Refrigeration Fun Twitter Content Remote Working Deep Learning Wearable Technology Memory Vendors Public Speaking Motherboard Data Breach Lithium-ion battery Error Comparison Google Play Be Proactive Health IT Directions Videos Assessment Electronic Health Records Education Permissions Workforce Social Engineering Entrepreneur Remote Computing Wasting Time Threats Mobile Computing Trend Micro Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Tablet Fraud Meta Undo Search Alert Username Best Practice Managing Costs Amazon Managed IT eCommerce Buisness File Sharing Black Friday SSID Dark Data Legal Database Surveillance IT solutions Virtual Assistant Outsource IT How To Notifications Media Business Growth IT Technicians Virtual Machine Environment

Blog Archive