Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Data Recovery Android AI Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Facebook Automation Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Two-factor Authentication Data Security Mobile Office Vendor Apps Networking Chrome BYOD Mobile Device Management Budget Gmail Apple WiFi Tip of the week App Managed Services Voice over Internet Protocol Employer-Employee Relationship Information Technology How To Hacker BDR Avoiding Downtime Office 365 Marketing HIPAA Applications Access Control Conferencing Computing Risk Management Managed IT Services Computers Analytics Website Office Tips Augmented Reality Router Storage Virtual Private Network Password Bring Your Own Device 2FA Health Help Desk Big Data Retail Operating System Healthcare Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Firewall Display Printer Windows 11 Paperless Office Infrastructure Monitoring The Internet of Things Excel Social Going Green Document Management Remote Workers Telephone Cybercrime Scam Data loss Cryptocurrency Data Privacy Hacking Entertainment Vulnerabilities Presentation Images 101 Virtual Desktop LiFi Wireless Technology Data storage Telephone System Multi-Factor Authentication Robot Mobility Cost Management Outlook Money Humor IT Management Word VPN Employees Meetings Integration User Tip Modem Sports Computer Repair Mobile Security Processor Mouse Holidays Safety Administration Supply Chain Data Storage Smart Technology Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Settings Wireless Printing Managed IT Service Content Filtering Maintenance Antivirus Customer Relationship Management Downloads YouTube iPhone Licensing Social Network Telework Cyber security Multi-Factor Security Tech 5G CES Google Apps Tablet IoT Communitications Dark Web Unified Communications Alert Experience IT Maintenance Google Docs Trends Supply Chain Management Business Intelligence Managed IT Customer Resource management FinTech Bitcoin File Sharing Regulations Running Cable Dark Data Google Calendar Term User Data Analysis Shortcuts Google Wallet Star Wars IT Assessment How To Microsoft Excel Gamification Flexibility Notifications Staff Value Ransmoware Vendors Organization Windows 8 Travel Social Networking IP Address Laptop Legislation Techology Fileless Malware Digital Security Cameras Be Proactive Drones Google Maps Smart Devices Content Remote Working Wearable Technology Memory Workforce Threats Health IT Unified Threat Management Motherboard Data Breach Halloween Comparison Google Play Recovery Permissions Hard Drives Unified Threat Management Directions Videos Workplace Strategies Assessment Electronic Health Records Wasting Time Domains Meta Amazon Hacks Trend Micro Scary Stories Network Congestion Specifications Security Cameras Fraud Refrigeration Fun User Error Microchip Internet Exlporer Software as a Service Username Deep Learning Managing Costs Public Speaking Outsource IT Environment Media Point of Sale eCommerce Lithium-ion battery Black Friday SSID Education Virtual Assistant Entrepreneur Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Small Businesses Displays Proxy Server Reviews Mobile Computing Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Undo Search Tactics Development Best Practice Websites Mirgation Hypervisor Outsourcing Shopping Nanotechnology Optimization Buisness PowerPoint IT solutions Electronic Medical Records Language Employer/Employee Relationships SharePoint Workplace Legal Addiction Management PCI DSS Business Growth Chatbots Navigation Hiring/Firing Lenovo Gig Economy Paperless Screen Reader Writing Distributed Denial of Service Application Virtual Reality Computing Infrastructure Teamwork Cortana Co-managed IT Service Level Agreement Internet Service Provider Server Management Regulations Compliance Alt Codes Private Cloud Identity IBM Evernote Technology Care Superfish Bookmark Business Communications Identity Theft Smart Tech Memes Downtime Hosted Solution Twitter Alerts SQL Server Scams Download Net Neutrality Financial Data Typing Error History Hybrid Work Browsers Smartwatch Human Resources Connectivity IT Social Engineering Break Fix Remote Computing Azure Competition Knowledge Cables Google Drive Upload Procurement

Blog Archive