Error
  • Error loading component: com_advancedmodules, 1

Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Holiday Information Automation Artificial Intelligence Facebook Gadgets Cloud Computing Compliance Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Data Security Managed Services Apps Two-factor Authentication Mobile Office Vendor Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking How To Conferencing BDR Computing Hacker Physical Security Information Technology Avoiding Downtime Access Control Marketing HIPAA Office 365 Applications Managed IT Services Healthcare Operating System Computers Risk Management Virtual Private Network Website Health Analytics Router Office Tips Augmented Reality Retail Storage Password 2FA Help Desk Bring Your Own Device Big Data Social Managed IT Service Remote Workers Going Green Patch Management Telephone Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Cooperation Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Firewall Document Management Windows 11 The Internet of Things Scam Monitoring Data loss Excel Professional Services Saving Time Virtual Machines Robot Customer Relationship Management Downloads iPhone Settings Licensing Wireless Printing Content Filtering Vulnerabilities Hacking Entertainment IT Management YouTube Meetings Data Privacy Presentation VPN Images 101 Cryptocurrency Wireless Technology Telephone System Multi-Factor Authentication Computer Repair Mobility Cost Management Virtual Desktop Data storage LiFi Word Outlook Employees Integration Machine Learning Money Humor User Tip Modem Mobile Security Processor Safety Maintenance Holidays Sports Antivirus Mouse Data Storage Smart Technology Supply Chain Video Conferencing Administration Managed Services Provider Distributed Denial of Service Workplace Application Gig Economy Best Practice Screen Reader Alert Service Level Agreement Internet Service Provider Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Dark Data Managed IT IBM Legal Regulations Compliance IT solutions Identity How To Evernote Paperless Co-managed IT Bookmark Business Growth Smart Tech Memes Notifications Download Net Neutrality Travel Alerts SQL Server Technology Care Techology Financial Data Google Maps History Cortana Business Communications Break Fix Scams Browsers Smartwatch Alt Codes Connectivity IT Upload Procurement Downtime Unified Threat Management Azure Hybrid Work Competition Unified Threat Management Social Network Telework Hosted Solution Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Typing IoT Communitications Trends Supply Chain Management Network Congestion Google Drive User Error User Customer Resource management FinTech Regulations Knowledge Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Gamification Flexibility Point of Sale Staff Value Business Intelligence 5G IP Address Google Docs Organization Unified Communications Social Networking Experience Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support Content Remote Working Wearable Technology Memory Vendors Monitors Google Wallet Recovery Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Hard Drives Directions Videos Windows 8 Assessment Electronic Health Records Laptop Websites Wasting Time Threats Domains Drones SharePoint Trend Micro Electronic Medical Records Specifications Security Cameras Workplace Strategies Fraud Meta Refrigeration Microchip Internet Exlporer Software as a Service Halloween Username Managing Costs Amazon Writing Public Speaking Lenovo Lithium-ion battery eCommerce Virtual Reality Black Friday SSID Virtual Assistant Outsource IT Hacks Server Management Entrepreneur Database Surveillance Scary Stories Private Cloud Superfish Identity Theft IT Technicians Virtual Machine Environment Fun Media Proxy Server Reviews Deep Learning Cookies Twitter Cyber Monday Medical IT Tactics Development Error Hotspot Transportation Small Businesses Undo Education Mirgation Hypervisor Displays Social Engineering PowerPoint Shopping Nanotechnology Optimization Remote Computing Addiction Language Employer/Employee Relationships Outsourcing Mobile Computing Management PCI DSS Tablet Chatbots Search Navigation

Blog Archive