Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android AI Upgrade Disaster Recovery VoIP Business Management Data Recovery Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Artificial Intelligence Automation Facebook Miscellaneous Cloud Computing Covid-19 Holiday Training Gadgets Server Remote Work Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Blockchain Two-factor Authentication Vendor Mobile Office Apps Data Security BYOD Chrome Mobile Device Management Budget Gmail Tip of the week Apple Managed Services Voice over Internet Protocol App Networking Employer-Employee Relationship Hacker HIPAA Avoiding Downtime Office 365 Applications Marketing Access Control Conferencing WiFi How To Computing BDR Information Technology Computers 2FA Router Analytics Website Office Tips Virtual Private Network Augmented Reality Health Storage Help Desk Password Bring Your Own Device Retail Big Data Healthcare Managed IT Services Operating System Risk Management Windows 11 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Excel Physical Security Display Printer Paperless Office Infrastructure Firewall Monitoring Document Management The Internet of Things Remote Workers Telephone Social Scam Going Green Data loss Cooperation Free Resource Project Management Cybercrime Windows 7 Patch Management Customer Service Save Money Microsoft 365 Presentation Virtual Desktop LiFi Wireless Technology Supply Chain Data storage IT Management VPN Employees Meetings Integration Outlook User Tip Modem Processor Money Computer Repair Mobile Security Word Humor Holidays Data Storage Sports Smart Technology Mouse Video Conferencing Machine Learning Managed Services Provider Data Privacy Saving Time Virtual Machines Safety Professional Services Administration Managed IT Service Maintenance Downloads Antivirus iPhone Licensing Settings Entertainment Printing Vulnerabilities Wireless Content Filtering Customer Relationship Management Images 101 YouTube Telephone System Cryptocurrency Multi-Factor Authentication Robot Mobility Cost Management Hacking Unified Communications Wearable Technology Memory Experience Google Docs Content Remote Working Health IT Bitcoin Unified Threat Management Motherboard Data Breach Running Cable Comparison Google Play User Small Businesses Displays Unified Threat Management Directions Videos Google Wallet Assessment Electronic Health Records Permissions Wasting Time Outsourcing Windows 8 Trend Micro IP Address Laptop Network Congestion Specifications Security Cameras User Error Microchip Drones Internet Exlporer Software as a Service Fraud Managing Costs Workplace Username Hiring/Firing Point of Sale eCommerce Halloween Black Friday SSID Recovery Paperless Database Surveillance Virtual Assistant Hard Drives Tech Support IT Technicians Virtual Machine Domains Co-managed IT Network Management Technology Care Proxy Server Reviews Hacks Cookies Scary Stories Monitors Cyber Monday Medical IT Fun Business Communications Tactics Development Hotspot Transportation Refrigeration Deep Learning Websites Mirgation Hypervisor Public Speaking Scams Hybrid Work Shopping Nanotechnology Optimization Lithium-ion battery PowerPoint Entrepreneur SharePoint Human Resources Addiction Education Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Cables Management PCI DSS Lenovo Gig Economy Mobile Computing Screen Reader Writing Distributed Denial of Service Search Google Apps Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Undo Best Practice Private Cloud Identity Evernote IT Maintenance Server Management Regulations Compliance Business Intelligence Superfish Bookmark Identity Theft Smart Tech Memes Buisness Shortcuts Legal Download Net Neutrality IT solutions Twitter Alerts SQL Server Business Growth Error History Ransmoware Financial Data Vendors Browsers Smartwatch Connectivity IT Social Engineering Break Fix Application Cortana Be Proactive Upload Procurement Remote Computing Azure Alt Codes Cyber security IBM Multi-Factor Security Tech Workforce Social Network Telework Threats CES Tablet IoT Communitications Downtime Dark Web Workplace Strategies Trends Supply Chain Management Hosted Solution Alert Managed IT Customer Resource management FinTech Typing File Sharing Regulations Dark Data Google Calendar Term Meta Amazon Data Analysis Star Wars IT Assessment How To Microsoft Excel Notifications Staff Value Competition Knowledge Google Drive Gamification Flexibility Organization Travel Social Networking Legislation Outsource IT 5G Environment Techology Fileless Malware Digital Security Cameras Media Google Maps Smart Devices

Blog Archive