Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Gadgets Cloud Computing Compliance Training Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Data Security Managed Services Apps Two-factor Authentication Mobile Office Vendor Budget Gmail Apple Networking WiFi App Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Applications Password Managed IT Services How To BDR Conferencing Computing Physical Security Hacker Information Technology Avoiding Downtime Access Control Office 365 Marketing HIPAA Retail Storage Bring Your Own Device Help Desk Big Data Healthcare Operating System Computers Risk Management Virtual Private Network 2FA Health Website Analytics Office Tips Router Augmented Reality Firewall Scam Data loss The Internet of Things Monitoring Social Going Green Patch Management Remote Workers Save Money Managed IT Service Remote Monitoring Telephone End of Support Vulnerability Vendor Management Cybercrime Customer Service Cooperation Free Resource Project Management Display Printer Windows 11 Windows 7 Paperless Office Infrastructure Microsoft 365 Excel Solutions Document Management User Tip Modem Processor Maintenance Mobile Security Sports Antivirus Mouse Safety Holidays Data Privacy Data Storage Administration Smart Technology Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Settings Customer Relationship Management Wireless Downloads Printing Content Filtering iPhone Licensing IT Management YouTube Meetings VPN Entertainment Hacking Vulnerabilities Presentation Cryptocurrency Images 101 Computer Repair Wireless Technology Telephone System Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi Cost Management Supply Chain Outlook Word Machine Learning Money Employees Humor Integration Scary Stories Private Cloud Technology Care Public Speaking Managing Costs Hacks Server Management Username Superfish Identity Theft Lithium-ion battery eCommerce Fun Business Communications Black Friday SSID Entrepreneur Deep Learning Database Surveillance Twitter Scams Virtual Assistant Error Hybrid Work IT Technicians Virtual Machine Proxy Server Reviews Education Cookies Social Engineering Human Resources Cyber Monday Medical IT Tactics Development Remote Computing Cables Undo Hotspot Transportation Mirgation Hypervisor Mobile Computing Shopping Tablet Nanotechnology Optimization Search Google Apps PowerPoint Best Practice Addiction Alert IT Maintenance Language Employer/Employee Relationships Management PCI DSS Buisness File Sharing Business Intelligence Chatbots Dark Data Navigation Managed IT Legal Gig Economy IT solutions Screen Reader How To Shortcuts Application Distributed Denial of Service Computing Infrastructure Teamwork Business Growth Service Level Agreement Internet Service Provider Notifications Ransmoware Regulations Compliance Travel Vendors IBM Identity Evernote Techology Bookmark Google Maps Smart Tech Memes Cortana Be Proactive Alerts SQL Server Alt Codes Download Net Neutrality Workforce Financial Data Downtime Unified Threat Management Threats History Unified Threat Management Browsers Smartwatch Hosted Solution Connectivity IT Workplace Strategies Break Fix Competition Azure Typing Upload Procurement Meta Social Network Telework Amazon Cyber security Network Congestion Multi-Factor Security Tech Google Drive User Error CES IoT Communitications Knowledge Dark Web Trends Supply Chain Management Outsource IT Customer Resource management FinTech Point of Sale Environment Regulations 5G Media User Google Calendar Term Google Docs Data Analysis Unified Communications Star Wars IT Assessment Experience Microsoft Excel Staff Value Bitcoin Network Management Gamification Flexibility Running Cable Tech Support Small Businesses Organization Displays IP Address Social Networking Monitors Legislation Google Wallet Fileless Malware Digital Security Cameras Smart Devices Outsourcing Wearable Technology Memory Windows 8 Content Remote Working Laptop Websites Health IT Motherboard Data Breach Recovery Comparison Google Play Drones SharePoint Directions Videos Assessment Electronic Health Records Electronic Medical Records Workplace Hard Drives Permissions Hiring/Firing Domains Wasting Time Halloween Lenovo Trend Micro Writing Paperless Specifications Security Cameras Microchip Internet Exlporer Software as a Service Virtual Reality Co-managed IT Refrigeration Fraud

Blog Archive