Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Phishing Email Computer Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Compliance Gadgets Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Government Data Management Bandwidth Wi-Fi Windows 10 Virtualization Business Technology Blockchain Apps Vendor Data Security Mobile Office Two-factor Authentication Employer-Employee Relationship Budget Apple Networking App Managed Services Mobile Device Management BYOD Voice over Internet Protocol Gmail WiFi Tip of the week Chrome HIPAA Applications Hacker How To BDR Avoiding Downtime Marketing Conferencing Computing Information Technology Access Control Office 365 Retail Storage Router Password Bring Your Own Device Computers Managed IT Services Help Desk Website 2FA Operating System Physical Security Healthcare Risk Management Virtual Private Network Health Big Data Analytics Office Tips Augmented Reality Solutions Customer Service Scam Data loss Monitoring Windows 11 Going Green Patch Management Save Money Remote Monitoring End of Support Excel Vulnerability Vendor Management Remote Workers Cybercrime Firewall Telephone Display Printer Paperless Office Cooperation Free Resource The Internet of Things Infrastructure Project Management Windows 7 Social Microsoft 365 Document Management Customer Relationship Management Employees Maintenance Antivirus Sports Integration Mouse User Tip Modem Hacking Presentation Processor Mobile Security Administration Holidays Wireless Technology Data Storage Smart Technology Robot Video Conferencing Managed Services Provider Supply Chain Saving Time Virtual Machines Settings Professional Services Wireless Word Printing Content Filtering IT Management Managed IT Service YouTube Meetings VPN Downloads Cryptocurrency iPhone Licensing Safety Computer Repair Entertainment Vulnerabilities Virtual Desktop Data storage LiFi Data Privacy Images 101 Outlook Telephone System Multi-Factor Authentication Mobility Cost Management Machine Learning Money Humor Vendors Directions Videos Hacks Server Management Assessment Electronic Health Records Scary Stories Private Cloud Permissions Identity Theft Wasting Time Fun Be Proactive Superfish Workforce Deep Learning Trend Micro Twitter Specifications Security Cameras Competition Threats Microchip Internet Exlporer Software as a Service Error Fraud Education Managing Costs Social Engineering Workplace Strategies Username Meta eCommerce Remote Computing Black Friday SSID Amazon Mobile Computing Database Surveillance Virtual Assistant Tablet IT Technicians Virtual Machine Search User Outsource IT Proxy Server Reviews Best Practice Cookies Alert Cyber Monday Medical IT Dark Data Environment Media Managed IT Tactics Development Buisness File Sharing Hotspot Transportation IT solutions Mirgation Hypervisor IP Address How To Legal Small Businesses Shopping Business Growth Nanotechnology Optimization Notifications PowerPoint Language Employer/Employee Relationships Displays Addiction Travel Techology Management PCI DSS Google Maps Chatbots Cortana Navigation Recovery Outsourcing Gig Economy Alt Codes Screen Reader Distributed Denial of Service Hard Drives Downtime Unified Threat Management Computing Infrastructure Teamwork Domains Service Level Agreement Internet Service Provider Unified Threat Management Regulations Compliance Hosted Solution Identity Evernote Workplace Hiring/Firing Bookmark Typing Smart Tech Memes Refrigeration Alerts SQL Server Public Speaking Network Congestion Paperless Download Net Neutrality Google Drive User Error Financial Data History Lithium-ion battery Knowledge Co-managed IT Entrepreneur Technology Care Browsers Smartwatch Connectivity IT Break Fix Point of Sale Azure 5G Business Communications Upload Procurement Scams Google Docs Social Network Telework Unified Communications Cyber security Experience Multi-Factor Security Tech Undo Hybrid Work CES Bitcoin Network Management IoT Communitications Running Cable Tech Support Dark Web Monitors Human Resources Google Wallet Trends Supply Chain Management Cables Customer Resource management FinTech Regulations Google Calendar Term Data Analysis Windows 8 Star Wars IT Assessment Laptop Websites Microsoft Excel Staff Value Google Apps Drones Gamification Flexibility IT Maintenance SharePoint Organization Social Networking Electronic Medical Records Legislation Application Business Intelligence Fileless Malware Digital Security Cameras Smart Devices Halloween Wearable Technology Memory IBM Writing Shortcuts Lenovo Content Remote Working Ransmoware Health IT Motherboard Data Breach Virtual Reality Comparison Google Play

Blog Archive