Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Productivity Passwords Backup Communication Cybersecurity Saving Money Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones VoIP AI communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Information Artificial Intelligence Cloud Computing Holiday Miscellaneous Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship Spam IT Support Encryption Windows 10 Office Business Continuity Government Data Management Wi-Fi Virtualization Business Technology Blockchain Bandwidth Windows 10 Two-factor Authentication Apps Vendor Mobile Office Data Security BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Networking Apple Mobile Device Management App Gmail Computing WiFi Information Technology Access Control Office 365 HIPAA Hacker Applications Avoiding Downtime Marketing How To BDR Conferencing Operating System Risk Management Big Data Virtual Private Network Health Analytics Office Tips Augmented Reality Healthcare Router 2FA Computers Retail Storage Password Bring Your Own Device Website Managed IT Services Help Desk Vendor Management Cybercrime Telephone The Internet of Things Physical Security Display Cooperation Printer Social Paperless Office Infrastructure Remote Workers Windows 11 Document Management Customer Service Excel Scam Free Resource Data loss Project Management Windows 7 Monitoring Microsoft 365 Firewall Solutions Patch Management Going Green Save Money Remote Monitoring End of Support Vulnerability Safety Content Filtering Downloads IT Management Meetings YouTube VPN Licensing Holidays Cryptocurrency Entertainment Data Storage Computer Repair Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Virtual Machines Telephone System Professional Services Cost Management Customer Relationship Management Outlook Machine Learning Money Humor Hacking iPhone Presentation Supply Chain Maintenance Sports User Tip Vulnerabilities Modem Wireless Technology Antivirus Mobile Security Mouse Processor Images 101 Administration Mobility Multi-Factor Authentication Word Smart Technology Robot Saving Time Data Privacy Employees Settings Printing Integration Wireless Managed IT Service Alerts Unified Threat Management IT Maintenance Hosted Solution Managing Costs Download SSID Business Intelligence Undo Typing eCommerce Shortcuts Surveillance Network Congestion Browsers Virtual Assistant Connectivity Break Fix User Error Google Drive Ransmoware Virtual Machine Knowledge Upload Social Network Medical IT Vendors Multi-Factor Security Reviews Be Proactive Point of Sale Development Transportation 5G IoT Dark Web Google Docs Workforce Application Unified Communications Hypervisor Experience Trends Optimization Running Cable Customer Resource management PowerPoint Regulations Threats Google Calendar Network Management Shopping Bitcoin Tech Support Google Wallet Workplace Strategies Monitors Data Analysis Employer/Employee Relationships Star Wars IBM Microsoft Excel Navigation Staff Meta PCI DSS Gamification Laptop Social Networking Amazon Legislation Gig Economy Windows 8 Websites Drones Internet Service Provider Fileless Malware Teamwork Content Evernote Wearable Technology SharePoint Outsource IT Regulations Compliance Electronic Medical Records Memes Halloween Health IT Motherboard Environment Competition Comparison Media Permissions Lenovo Net Neutrality Writing Directions SQL Server Assessment Small Businesses Financial Data Virtual Reality History Private Cloud IT Scary Stories Displays Specifications Server Management Smartwatch Hacks Fraud Superfish User Identity Theft Procurement Microchip Azure Fun Internet Exlporer Username Tech Outsourcing Telework Deep Learning Twitter Cyber security Error Communitications Black Friday CES Workplace Supply Chain Management Education Social Engineering Database IP Address Term IT Technicians Hiring/Firing FinTech Remote Computing IT Assessment Proxy Server Cookies Cyber Monday Mobile Computing Paperless Hotspot Co-managed IT Recovery Tablet Flexibility Value Search Tactics Mirgation Technology Care Hard Drives Organization Best Practice Alert Business Communications File Sharing Smart Devices Buisness Dark Data Nanotechnology Domains Managed IT Digital Security Cameras Language Legal Scams Remote Working IT solutions How To Memory Addiction Management Google Play Chatbots Hybrid Work Refrigeration Business Growth Notifications Data Breach Human Resources Travel Electronic Health Records Screen Reader Public Speaking Distributed Denial of Service Videos Lithium-ion battery Computing Infrastructure Techology Cables Google Maps Wasting Time Cortana Service Level Agreement Security Cameras Identity Alt Codes Entrepreneur Trend Micro Google Apps Unified Threat Management Software as a Service Downtime Bookmark Smart Tech

Blog Archive