Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Cybersecurity Saving Money Communication Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management AI Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Facebook Automation Information Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Covid-19 Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Wi-Fi Blockchain Virtualization Business Technology Bandwidth Two-factor Authentication Vendor Apps Data Security Mobile Office Mobile Device Management BYOD Gmail Tip of the week Employer-Employee Relationship Chrome Budget Networking Apple Managed Services App Voice over Internet Protocol Computing Information Technology Access Control WiFi HIPAA Office 365 Applications Hacker How To BDR Avoiding Downtime Conferencing Marketing Operating System Virtual Private Network Risk Management Health Big Data Router Office Tips Analytics Augmented Reality Retail Storage Password Computers 2FA Bring Your Own Device Managed IT Services Help Desk Website Healthcare Vendor Management Firewall Cybercrime Physical Security Free Resource Cooperation Project Management Display Printer Windows 7 Paperless Office The Internet of Things Infrastructure Microsoft 365 Solutions Social Document Management Windows 11 Customer Service Scam Data loss Monitoring Excel Patch Management Remote Workers Save Money Going Green Remote Monitoring End of Support Telephone Vulnerability Settings iPhone Printing IT Management Licensing Wireless Meetings Content Filtering VPN Entertainment Vulnerabilities Data Privacy YouTube Images 101 Cryptocurrency Safety Computer Repair Multi-Factor Authentication Mobility Telephone System Cost Management Virtual Desktop Data storage LiFi Machine Learning Outlook Employees Integration Money Customer Relationship Management Modem Humor User Tip Processor Maintenance Mobile Security Antivirus Holidays Sports Hacking Mouse Data Storage Presentation Supply Chain Smart Technology Video Conferencing Administration Wireless Technology Managed Services Provider Saving Time Virtual Machines Professional Services Robot Managed IT Service Word Downloads Smartwatch Browsers Unified Threat Management Alt Codes Scams IT Connectivity Break Fix Hybrid Work Procurement Upload Downtime Refrigeration Azure Cyber security Tech Multi-Factor Security Network Congestion Telework Social Network Hosted Solution Human Resources Public Speaking CES User Error Typing Cables Lithium-ion battery Communitications IoT Dark Web Supply Chain Management Trends Entrepreneur Regulations Point of Sale Knowledge Term Google Calendar Google Drive FinTech Customer Resource management Google Apps Data Analysis IT Maintenance IT Assessment Star Wars Microsoft Excel Business Intelligence Flexibility Gamification Network Management Undo Value Staff Tech Support 5G Social Networking Experience Legislation Monitors Google Docs Organization Unified Communications Shortcuts Digital Security Cameras Fileless Malware Bitcoin Ransmoware Smart Devices Running Cable Google Wallet Vendors Remote Working Content Memory Wearable Technology Websites Data Breach Motherboard Google Play Comparison Health IT Be Proactive Videos Directions SharePoint Windows 8 Workforce Electronic Health Records Assessment Laptop Application Permissions Electronic Medical Records Drones Threats Wasting Time IBM Trend Micro Security Cameras Specifications Writing Lenovo Workplace Strategies Microchip Meta Software as a Service Internet Exlporer Halloween Fraud Virtual Reality Amazon Username Server Management Managing Costs Private Cloud eCommerce Identity Theft SSID Black Friday Superfish Hacks Outsource IT Surveillance Database Scary Stories Virtual Assistant Twitter Environment Media Competition Virtual Machine IT Technicians Error Fun Cookies Medical IT Cyber Monday Social Engineering Reviews Proxy Server Deep Learning Small Businesses Development Tactics Transportation Hotspot Remote Computing Displays Education Hypervisor Mirgation Optimization Nanotechnology Tablet User PowerPoint Shopping Mobile Computing Outsourcing Addiction Employer/Employee Relationships Language Alert Search Navigation Dark Data PCI DSS Management Managed IT Chatbots File Sharing Gig Economy Best Practice Workplace IP Address Screen Reader Distributed Denial of Service How To Hiring/Firing Internet Service Provider Service Level Agreement Buisness Teamwork Computing Infrastructure Notifications Identity Travel Evernote Legal Regulations Compliance IT solutions Paperless Bookmark Techology Business Growth Co-managed IT Memes Smart Tech Google Maps Recovery Technology Care Net Neutrality Download Hard Drives SQL Server Alerts History Unified Threat Management Cortana Financial Data Business Communications Domains

Blog Archive