Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google IT Services Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android Upgrade Disaster Recovery AI Data Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Miscellaneous Information Holiday Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Windows 10 Virtualization Blockchain Wi-Fi Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Gmail Apple App WiFi Networking Employer-Employee Relationship BYOD Managed Services Chrome Voice over Internet Protocol Budget Conferencing How To Computing BDR HIPAA Information Technology Applications Hacker Office 365 Avoiding Downtime Marketing Access Control Storage Password Bring Your Own Device Retail Big Data Managed IT Services Operating System 2FA Router Risk Management Computers Office Tips Analytics Virtual Private Network Help Desk Website Augmented Reality Health Healthcare Firewall Telephone Document Management Free Resource Project Management Windows 7 Cooperation The Internet of Things Microsoft 365 Going Green Scam Data loss Solutions Social Windows 11 Cybercrime Excel Patch Management Save Money Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Monitoring Display Printer Remote Workers Paperless Office Infrastructure iPhone Managed IT Service Sports Mouse Machine Learning Vulnerabilities Downloads Licensing Administration Images 101 Safety Entertainment Maintenance Multi-Factor Authentication Mobility Antivirus Settings Telephone System Cost Management Printing Wireless Content Filtering Employees Integration Supply Chain YouTube Customer Relationship Management Cryptocurrency Robot Holidays Hacking User Tip Modem Mobile Security Virtual Desktop Data Storage Presentation Processor IT Management Data storage LiFi VPN Video Conferencing Meetings Wireless Technology Managed Services Provider Virtual Machines Professional Services Outlook Smart Technology Computer Repair Data Privacy Money Humor Saving Time Word Smartwatch IT Websites Identity Shortcuts Deep Learning Ransmoware Procurement Refrigeration Bookmark Azure Smart Tech Cyber security Electronic Medical Records Download Tech Vendors Alerts Education SharePoint Telework Public Speaking CES Lithium-ion battery Communitications Be Proactive Connectivity Workforce Mobile Computing Break Fix Lenovo Supply Chain Management Browsers Entrepreneur Writing Virtual Reality Upload Term Threats FinTech Search Multi-Factor Security Server Management IT Assessment Private Cloud Social Network Workplace Strategies Best Practice IoT Meta Dark Web Buisness Superfish Flexibility Undo Identity Theft Value Twitter Trends Amazon Legal IT solutions Organization Google Calendar Digital Security Cameras Smart Devices Error Customer Resource management Regulations Business Growth Social Engineering Star Wars Outsource IT Microsoft Excel Remote Working Data Analysis Memory Data Breach Remote Computing Gamification Google Play Environment Staff Media Cortana Alt Codes Legislation Videos Electronic Health Records Application Social Networking Small Businesses Downtime Tablet Fileless Malware Wasting Time Trend Micro Alert Content Security Cameras Displays Wearable Technology Hosted Solution IBM Typing Comparison Managed IT Software as a Service File Sharing Health IT Dark Data Motherboard How To Assessment Outsourcing Permissions Directions Managing Costs Knowledge eCommerce Notifications SSID Google Drive Specifications Surveillance Travel Virtual Assistant Workplace Internet Exlporer Hiring/Firing Fraud Techology Competition 5G Google Maps Microchip Virtual Machine Experience Username Medical IT Google Docs Paperless Unified Communications Reviews Bitcoin Black Friday Running Cable Development Unified Threat Management Transportation Co-managed IT Database Technology Care Google Wallet Unified Threat Management Hypervisor Optimization User PowerPoint IT Technicians Business Communications Shopping Scams Windows 8 Cyber Monday Laptop Proxy Server Employer/Employee Relationships Network Congestion Cookies Tactics Navigation Hybrid Work Drones Hotspot User Error PCI DSS Gig Economy IP Address Mirgation Human Resources Cables Halloween Internet Service Provider Point of Sale Teamwork Nanotechnology Addiction Evernote Language Regulations Compliance Network Management Memes Recovery Tech Support Management Chatbots Google Apps IT Maintenance Hacks Distributed Denial of Service Scary Stories Net Neutrality Hard Drives SQL Server Monitors Screen Reader History Service Level Agreement Business Intelligence Computing Infrastructure Financial Data Domains Fun

Blog Archive