Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer IT Services Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Data Backup Smartphone Android Disaster Recovery Data Recovery AI Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Automation Miscellaneous Information Holiday Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Business Technology Virtualization Wi-Fi Blockchain Windows 10 Bandwidth Apps Data Security Two-factor Authentication Mobile Office Vendor WiFi Tip of the week Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Gmail Budget Conferencing How To Computing Hacker BDR Information Technology Avoiding Downtime Marketing HIPAA Office 365 Applications Access Control 2FA Bring Your Own Device Help Desk Big Data Retail Healthcare Operating System Managed IT Services Computers Risk Management Website Office Tips Router Analytics Augmented Reality Virtual Private Network Storage Password Health Monitoring The Internet of Things Excel Social Document Management Remote Workers Going Green Telephone Scam Data loss Customer Service Cybercrime Free Resource Cooperation Project Management Windows 7 Patch Management Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Physical Security Firewall Display Printer Windows 11 Paperless Office Infrastructure Data Storage Mouse Supply Chain Smart Technology Video Conferencing Managed Services Provider Machine Learning Administration Professional Services Saving Time Virtual Machines Managed IT Service Maintenance Antivirus Customer Relationship Management Downloads iPhone Settings Printing Licensing Wireless Content Filtering Hacking Vulnerabilities Entertainment Presentation Data Privacy YouTube Cryptocurrency Images 101 Wireless Technology Telephone System Multi-Factor Authentication Mobility Robot Cost Management Virtual Desktop Data storage LiFi IT Management Word Employees VPN Outlook Meetings Integration Money User Tip Humor Modem Computer Repair Mobile Security Processor Safety Holidays Sports Hypervisor Displays Websites Mirgation Education PowerPoint Shopping Optimization Nanotechnology Addiction Mobile Computing Employer/Employee Relationships Outsourcing Electronic Medical Records Language SharePoint Search Management PCI DSS Chatbots Navigation Application Best Practice Workplace Writing Distributed Denial of Service Gig Economy Lenovo Screen Reader Service Level Agreement Internet Service Provider Teamwork Hiring/Firing Virtual Reality Computing Infrastructure Buisness Regulations Compliance Server Management IBM Legal Private Cloud Identity IT solutions Evernote Paperless Business Growth Co-managed IT Bookmark Superfish Memes Identity Theft Smart Tech Download Net Neutrality SQL Server Technology Care Twitter Alerts Cortana Financial Data History Error Business Communications Alt Codes Scams Social Engineering Break Fix Browsers Smartwatch IT Connectivity Upload Procurement Competition Azure Hybrid Work Remote Computing Downtime Social Network Telework Cyber security Hosted Solution Tech Human Resources Multi-Factor Security Typing Cables Dark Web CES Communitications Tablet IoT Trends Supply Chain Management Alert Knowledge Customer Resource management FinTech Managed IT Google Drive File Sharing Regulations User Term Google Apps Dark Data Google Calendar IT Maintenance How To Microsoft Excel Data Analysis IT Assessment Star Wars Gamification Flexibility Value Business Intelligence Notifications Staff 5G Experience Organization IP Address Google Docs Travel Social Networking Unified Communications Shortcuts Legislation Bitcoin Ransmoware Running Cable Fileless Malware Digital Security Cameras Techology Smart Devices Google Maps Content Remote Working Google Wallet Memory Vendors Wearable Technology Health IT Data Breach Unified Threat Management Motherboard Recovery Google Play Be Proactive Comparison Assessment Electronic Health Records Hard Drives Windows 8 Workforce Permissions Laptop Directions Videos Unified Threat Management Domains Drones Wasting Time Threats Security Cameras Workplace Strategies Network Congestion Specifications Trend Micro Internet Exlporer Software as a Service Refrigeration Meta Fraud Halloween Microchip User Error Username Public Speaking Managing Costs Amazon SSID Black Friday Lithium-ion battery eCommerce Point of Sale Database Surveillance Hacks Virtual Assistant Outsource IT Entrepreneur Scary Stories Network Management Virtual Machine Environment Tech Support IT Technicians Media Fun Medical IT Monitors Cyber Monday Proxy Server Reviews Cookies Deep Learning Tactics Development Undo Transportation Small Businesses Hotspot

Blog Archive