Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Managed Service Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Disaster Recovery Data Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Holiday Miscellaneous Covid-19 Cloud Computing Training Gadgets Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Blockchain Bandwidth Windows 10 Wi-Fi Virtualization Two-factor Authentication Apps Vendor Mobile Office Data Security Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Mobile Device Management App Gmail Managed Services Voice over Internet Protocol WiFi BYOD Access Control Office 365 Hacker HIPAA Avoiding Downtime Applications Marketing How To BDR Conferencing Computing Information Technology Health Analytics Office Tips Computers Augmented Reality Retail Storage Router Password Website Bring Your Own Device Managed IT Services 2FA Help Desk Operating System Big Data Healthcare Virtual Private Network Risk Management Paperless Office Cooperation Free Resource Infrastructure Project Management Windows 7 Customer Service Microsoft 365 Document Management Solutions Scam Data loss Windows 11 Monitoring Firewall Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Remote Workers Cybercrime Telephone Physical Security Social Display Printer Virtual Desktop Data Privacy Customer Relationship Management Data storage LiFi Images 101 Outlook Telephone System Multi-Factor Authentication Mobility Machine Learning Hacking Cost Management Money Presentation Humor Wireless Technology Employees Maintenance Sports Integration Antivirus Mouse User Tip Modem Mobile Security Processor Word Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Safety Saving Time Virtual Machines Settings Professional Services Wireless Printing Content Filtering Managed IT Service IT Management VPN YouTube Meetings Downloads iPhone Cryptocurrency Licensing Computer Repair Vulnerabilities Entertainment Google Wallet Trends Supply Chain Management Monitors Customer Resource management FinTech Regulations Google Calendar Term Google Apps Laptop Websites Microsoft Excel IT Maintenance Data Analysis Windows 8 Star Wars IT Assessment Drones Gamification Flexibility Staff Value Business Intelligence Competition SharePoint Organization Social Networking Electronic Medical Records Legislation Shortcuts Halloween Ransmoware Fileless Malware Digital Security Cameras Smart Devices Lenovo Content Remote Working Wearable Technology Memory Vendors Writing Health IT User Motherboard Data Breach Virtual Reality Comparison Google Play Be Proactive Scary Stories Private Cloud Permissions Workforce Directions Videos Hacks Server Management Assessment Electronic Health Records Superfish Identity Theft Wasting Time Threats Fun IP Address Deep Learning Trend Micro Twitter Specifications Security Cameras Workplace Strategies Error Fraud Meta Microchip Internet Exlporer Software as a Service Username Education Managing Costs Amazon Social Engineering Recovery eCommerce Remote Computing Black Friday SSID Virtual Assistant Outsource IT Hard Drives Mobile Computing Database Surveillance Domains Tablet IT Technicians Virtual Machine Environment Search Media Proxy Server Reviews Best Practice Cookies Alert Cyber Monday Medical IT Buisness File Sharing Hotspot Transportation Small Businesses Dark Data Refrigeration Managed IT Tactics Development Public Speaking Legal IT solutions Mirgation Hypervisor Displays How To Lithium-ion battery Shopping Business Growth Nanotechnology Optimization Notifications PowerPoint Entrepreneur Travel Language Employer/Employee Relationships Outsourcing Addiction Techology Management PCI DSS Google Maps Chatbots Cortana Navigation Gig Economy Alt Codes Screen Reader Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Downtime Unified Threat Management Computing Infrastructure Teamwork Hiring/Firing Undo Unified Threat Management Regulations Compliance Hosted Solution Identity Evernote Paperless Co-managed IT Bookmark Typing Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Network Congestion Google Drive User Error Financial Data History Knowledge Business Communications Break Fix Scams Browsers Smartwatch Application Connectivity IT Upload Procurement Point of Sale Azure Hybrid Work 5G IBM Google Docs Social Network Telework Unified Communications Cyber security Experience Multi-Factor Security Tech Human Resources Running Cable Tech Support Dark Web Cables CES Bitcoin Network Management IoT Communitications

Blog Archive