Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Android AI Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Artificial Intelligence Holiday Facebook Miscellaneous Automation Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Two-factor Authentication Data Security Vendor Mobile Office Apps Networking Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi App Tip of the week Employer-Employee Relationship Information Technology Hacker How To Avoiding Downtime Office 365 HIPAA BDR Marketing Applications Conferencing Access Control Computing Risk Management Computers Managed IT Services Router Analytics Office Tips Website Augmented Reality Healthcare Storage Password Help Desk Bring Your Own Device Virtual Private Network Health Big Data 2FA Operating System Retail Customer Service Scam Data loss Remote Workers Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Firewall Monitoring Free Resource Physical Security Project Management Windows 7 Display Printer The Internet of Things Microsoft 365 Paperless Office Infrastructure Windows 11 Social Solutions Going Green Telephone Document Management Excel Cybercrime Cooperation Holidays Cryptocurrency Maintenance Antivirus Hacking Presentation Data Storage Telephone System Cost Management Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Wireless Technology Virtual Machines Professional Services Outlook Data Privacy Money Robot Word Modem Humor User Tip Processor iPhone Mobile Security Sports IT Management Vulnerabilities Mouse VPN Meetings Smart Technology Safety Images 101 Administration Saving Time Computer Repair Multi-Factor Authentication Mobility Managed IT Service Downloads Settings Employees Wireless Supply Chain Machine Learning Integration Licensing Printing Content Filtering Entertainment Customer Relationship Management YouTube Reviews Data Analysis Paperless Twitter Star Wars Medical IT Microsoft Excel 5G Co-managed IT Error Development Gamification Transportation Staff Hypervisor Social Networking Google Docs Legislation Unified Communications Experience Technology Care Social Engineering Shopping Fileless Malware Business Communications Remote Computing User Optimization PowerPoint Bitcoin Running Cable Scams Content Employer/Employee Relationships Wearable Technology Google Wallet Motherboard Navigation Comparison Hybrid Work Tablet PCI DSS Health IT IP Address Gig Economy Directions Human Resources Alert Assessment Permissions Windows 8 Laptop Drones Managed IT Cables File Sharing Internet Service Provider Dark Data Teamwork How To Evernote Specifications Regulations Compliance Halloween Microchip Google Apps Notifications Recovery Memes Internet Exlporer Fraud IT Maintenance Travel Hard Drives Net Neutrality Username SQL Server History Black Friday Techology Business Intelligence Google Maps Domains Financial Data Scary Stories Smartwatch Shortcuts IT Database Hacks Fun Ransmoware Unified Threat Management Refrigeration Procurement Azure IT Technicians Cyber security Cookies Tech Cyber Monday Deep Learning Unified Threat Management Vendors Public Speaking Telework Proxy Server Lithium-ion battery CES Be Proactive Communitications Tactics Hotspot Education Workforce Supply Chain Management Network Congestion Entrepreneur Mirgation Nanotechnology Term User Error Threats FinTech Workplace Strategies IT Assessment Addiction Language Mobile Computing Chatbots Search Meta Point of Sale Undo Flexibility Management Value Screen Reader Distributed Denial of Service Best Practice Amazon Organization Buisness Network Management Digital Security Cameras Tech Support Smart Devices Service Level Agreement Computing Infrastructure Identity Legal IT solutions Outsource IT Remote Working Monitors Memory Bookmark Media Data Breach Smart Tech Google Play Business Growth Environment Videos Websites Application Electronic Health Records Download Alerts Cortana Small Businesses Wasting Time Browsers Electronic Medical Records Trend Micro Connectivity Security Cameras Break Fix Alt Codes SharePoint Displays IBM Downtime Software as a Service Upload Multi-Factor Security Hosted Solution Lenovo Outsourcing Social Network Writing Managing Costs Virtual Reality eCommerce IoT SSID Dark Web Typing Server Management Workplace Private Cloud Surveillance Trends Virtual Assistant Virtual Machine Regulations Google Drive Google Calendar Superfish Knowledge Hiring/Firing Identity Theft Competition Customer Resource management

Blog Archive