Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade VoIP Business Management Smartphones AI Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Automation Artificial Intelligence Facebook Information Covid-19 Miscellaneous Cloud Computing Gadgets Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Vendor Mobile Office Data Security Apps Two-factor Authentication Chrome Tip of the week Budget Mobile Device Management Apple Gmail Networking Managed Services App Voice over Internet Protocol BYOD Employer-Employee Relationship Access Control Hacker Office 365 Applications Avoiding Downtime Marketing Conferencing How To BDR WiFi Computing Information Technology HIPAA Computers Router Health Office Tips Analytics Augmented Reality Website Storage 2FA Password Help Desk Retail Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Risk Management Virtual Private Network Paperless Office Solutions Infrastructure Document Management Windows 11 Monitoring Excel Firewall Scam Data loss Telephone Remote Workers The Internet of Things Going Green Patch Management Save Money Cooperation Remote Monitoring Social Cybercrime End of Support Vulnerability Vendor Management Free Resource Project Management Windows 7 Physical Security Display Microsoft 365 Printer Customer Service Presentation Employees Outlook User Tip Modem Integration Wireless Technology Money Processor Mobile Security Humor Machine Learning Holidays Supply Chain Word Sports Smart Technology Mouse Maintenance Data Storage Antivirus Saving Time Video Conferencing Managed Services Provider Administration Virtual Machines Professional Services Managed IT Service Safety Downloads Licensing Settings Robot iPhone Printing Entertainment Wireless Data Privacy Content Filtering Vulnerabilities YouTube IT Management Cryptocurrency Meetings Telephone System Images 101 VPN Customer Relationship Management Cost Management Multi-Factor Authentication Mobility Virtual Desktop Computer Repair Data storage Hacking LiFi Windows 8 Workplace Strategies Videos Laptop Monitors Electronic Health Records Specifications Drones Meta Microchip User Internet Exlporer Fraud Wasting Time Trend Micro Security Cameras Amazon Websites Username Halloween Software as a Service Black Friday Managing Costs SharePoint IP Address Outsource IT Electronic Medical Records Database IT Technicians eCommerce SSID Environment Media Hacks Proxy Server Scary Stories Writing Cookies Surveillance Cyber Monday Virtual Assistant Lenovo Virtual Machine Small Businesses Recovery Virtual Reality Tactics Fun Hotspot Reviews Mirgation Medical IT Server Management Displays Hard Drives Deep Learning Private Cloud Domains Identity Theft Nanotechnology Development Transportation Superfish Hypervisor Outsourcing Education Twitter Addiction Language Shopping Chatbots Optimization PowerPoint Refrigeration Error Management Public Speaking Mobile Computing Workplace Social Engineering Screen Reader Distributed Denial of Service Employer/Employee Relationships Navigation Lithium-ion battery Hiring/Firing Remote Computing Service Level Agreement PCI DSS Search Computing Infrastructure Entrepreneur Gig Economy Identity Best Practice Paperless Tablet Co-managed IT Bookmark Buisness Smart Tech Internet Service Provider Teamwork Alerts Evernote Legal Technology Care IT solutions Alert Download Regulations Compliance Business Communications Dark Data Memes Managed IT Undo Business Growth File Sharing Scams Browsers How To Connectivity Net Neutrality Break Fix SQL Server History Hybrid Work Notifications Upload Financial Data Cortana Travel Human Resources Social Network Smartwatch IT Multi-Factor Security Alt Codes Techology Google Maps Cables Downtime IoT Procurement Dark Web Azure Cyber security Tech Application Hosted Solution Trends Telework Typing Unified Threat Management Google Apps Customer Resource management CES Regulations Communitications Google Calendar Unified Threat Management IBM IT Maintenance Data Analysis Star Wars Supply Chain Management Microsoft Excel Knowledge Staff Term Google Drive Business Intelligence Gamification FinTech Shortcuts Network Congestion Social Networking IT Assessment Legislation User Error Ransmoware Fileless Malware Flexibility 5G Value Experience Wearable Technology Google Docs Vendors Unified Communications Content Organization Bitcoin Point of Sale Be Proactive Health IT Digital Security Cameras Running Cable Motherboard Smart Devices Comparison Competition Google Wallet Workforce Directions Assessment Remote Working Permissions Memory Data Breach Google Play Network Management Threats Tech Support

Blog Archive