Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Gadgets Cloud Computing Covid-19 Training Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Managed Services Apps Data Security Vendor Mobile Office Mobile Device Management Gmail Tip of the week Chrome Budget WiFi Voice over Internet Protocol Apple Networking Employer-Employee Relationship App BYOD Access Control Office 365 Conferencing Managed IT Services How To BDR Hacker HIPAA Computing Avoiding Downtime Physical Security Applications Information Technology Marketing Health Help Desk Analytics Office Tips 2FA Augmented Reality Retail Storage Big Data Password Bring Your Own Device Healthcare Computers Operating System Router Website Virtual Private Network Risk Management Paperless Office Infrastructure Firewall Monitoring Windows 11 Document Management The Internet of Things Excel Managed IT Service Telephone Social Scam Remote Workers Data loss Cooperation Going Green Patch Management Customer Service Free Resource Project Management Save Money Windows 7 Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Solutions Display Printer Virtual Desktop Data storage LiFi Smart Technology Holidays Outlook Machine Learning Money Saving Time Safety Data Storage Humor Supply Chain Video Conferencing Managed Services Provider Virtual Machines Professional Services Maintenance Sports Downloads Antivirus Mouse Licensing Entertainment Administration iPhone Customer Relationship Management Vulnerabilities Telephone System Robot Data Privacy Cost Management Hacking Settings Presentation Images 101 Printing Wireless Multi-Factor Authentication Mobility Content Filtering Wireless Technology IT Management VPN YouTube Meetings Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Employees Word Integration Google Wallet Proxy Server Cookies Monitors Cyber Monday Managing Costs Amazon eCommerce SSID Tactics Hotspot Refrigeration Laptop Websites Mirgation Public Speaking Surveillance Virtual Assistant Outsource IT Windows 8 Virtual Machine Environment Drones Media Nanotechnology Lithium-ion battery Reviews Entrepreneur SharePoint Medical IT Addiction Electronic Medical Records Language Halloween Chatbots Development Transportation Small Businesses Management Hypervisor Displays Lenovo Screen Reader Writing Distributed Denial of Service Undo Shopping Optimization PowerPoint Service Level Agreement Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Employer/Employee Relationships Outsourcing Hacks Server Management Superfish Bookmark Navigation Identity Theft Smart Tech Fun PCI DSS Gig Economy Workplace Deep Learning Download Twitter Alerts Error Internet Service Provider Teamwork Hiring/Firing Browsers Evernote Paperless Education Connectivity Social Engineering Break Fix Application Regulations Compliance Memes Co-managed IT Upload Remote Computing IBM Multi-Factor Security Net Neutrality SQL Server Technology Care Mobile Computing Social Network History Business Communications Tablet IoT Search Dark Web Financial Data Smartwatch IT Scams Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Procurement Azure Hybrid Work Managed IT Customer Resource management Cyber security Legal Data Analysis Tech Human Resources IT solutions Star Wars How To Microsoft Excel Telework Competition CES Communitications Cables Business Growth Gamification Notifications Staff Travel Social Networking Legislation Supply Chain Management Techology Fileless Malware Term Google Apps Google Maps Cortana FinTech Wearable Technology IT Assessment IT Maintenance Alt Codes Content Health IT Downtime Unified Threat Management Motherboard Comparison User Flexibility Value Business Intelligence Unified Threat Management Directions Shortcuts Hosted Solution Assessment Permissions Organization Digital Security Cameras Smart Devices Ransmoware Typing IP Address Network Congestion Specifications Remote Working Memory Vendors Data Breach Google Drive User Error Microchip Google Play Be Proactive Internet Exlporer Knowledge Fraud Videos Electronic Health Records Workforce Username Point of Sale 5G Black Friday Recovery Wasting Time Threats Trend Micro Google Docs Security Cameras Workplace Strategies Unified Communications Database Experience Hard Drives Running Cable Tech Support IT Technicians Domains Software as a Service Meta Bitcoin Network Management

Blog Archive