Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management AI Smartphones communications Mobile Devices Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Facebook Information Automation Artificial Intelligence Cloud Computing Holiday Miscellaneous Training Covid-19 Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Government Data Management Business Continuity Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Data Security Vendor Apps Two-factor Authentication Mobile Office Mobile Device Management Apple Gmail BYOD App Employer-Employee Relationship Tip of the week Chrome Managed Services Networking Budget Voice over Internet Protocol BDR WiFi HIPAA Applications Computing Access Control Information Technology Hacker Office 365 Conferencing Avoiding Downtime Marketing How To 2FA Bring Your Own Device Virtual Private Network Big Data Router Operating System Health Risk Management Help Desk Computers Retail Analytics Office Tips Augmented Reality Website Managed IT Services Storage Password Healthcare Cooperation Firewall Patch Management Save Money Excel Remote Monitoring Free Resource Vulnerability Project Management End of Support Vendor Management Windows 7 Going Green The Internet of Things Physical Security Microsoft 365 Display Solutions Social Printer Cybercrime Paperless Office Infrastructure Monitoring Customer Service Document Management Scam Data loss Telephone Remote Workers Windows 11 Mouse iPhone Entertainment Supply Chain Robot Administration Vulnerabilities Telephone System Safety Images 101 IT Management Cost Management VPN Multi-Factor Authentication Meetings Mobility Settings Printing Wireless Computer Repair Content Filtering Data Privacy Employees YouTube Integration User Tip Modem Cryptocurrency Processor Mobile Security Customer Relationship Management Machine Learning Holidays Virtual Desktop LiFi Hacking Smart Technology Data storage Data Storage Presentation Maintenance Saving Time Outlook Video Conferencing Antivirus Managed Services Provider Wireless Technology Money Virtual Machines Professional Services Managed IT Service Humor Downloads Licensing Word Sports Social Network How To Displays Smartwatch Multi-Factor Security IT Education Azure Notifications IoT Refrigeration Dark Web Procurement Outsourcing Telework Mobile Computing Cyber security Travel Tech Trends Public Speaking Customer Resource management Lithium-ion battery Search Regulations CES Google Calendar Techology Communitications Google Maps Best Practice Data Analysis Star Wars Workplace Microsoft Excel Entrepreneur Supply Chain Management Hiring/Firing Staff FinTech Unified Threat Management Buisness Term Gamification Social Networking Paperless Legislation Unified Threat Management Legal IT Assessment IT solutions Business Growth Value Fileless Malware Undo Co-managed IT Flexibility Technology Care Wearable Technology Organization Content Network Congestion Health IT Cortana Motherboard Digital Security Cameras Business Communications Comparison User Error Smart Devices Remote Working Alt Codes Memory Directions Assessment Scams Permissions Hybrid Work Data Breach Point of Sale Downtime Google Play Hosted Solution Application Videos Human Resources Specifications Electronic Health Records Network Management Typing Wasting Time Microchip Tech Support Internet Exlporer Cables Fraud IBM Trend Micro Security Cameras Username Monitors Knowledge Google Apps Black Friday Google Drive Software as a Service Managing Costs Websites Database IT Maintenance 5G Business Intelligence IT Technicians eCommerce SSID Unified Communications Virtual Assistant Proxy Server Electronic Medical Records Experience Cookies Shortcuts Cyber Monday SharePoint Google Docs Surveillance Hotspot Bitcoin Virtual Machine Running Cable Tactics Competition Ransmoware Writing Vendors Mirgation Reviews Lenovo Google Wallet Medical IT Transportation Virtual Reality Nanotechnology Be Proactive Development Language Server Management Windows 8 Hypervisor Private Cloud Laptop Addiction Workforce Management Threats Chatbots User Shopping Superfish Drones Optimization Identity Theft PowerPoint Employer/Employee Relationships Twitter Screen Reader Workplace Strategies Distributed Denial of Service Computing Infrastructure PCI DSS Error Halloween Navigation Service Level Agreement Meta Social Engineering IP Address Amazon Identity Gig Economy Teamwork Bookmark Remote Computing Smart Tech Internet Service Provider Outsource IT Alerts Regulations Compliance Hacks Scary Stories Evernote Download Fun Environment Recovery Media Memes Tablet Deep Learning SQL Server Browsers Alert Connectivity Hard Drives Break Fix Net Neutrality Small Businesses Financial Data Managed IT History File Sharing Upload Dark Data Domains

Blog Archive