Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade AI VoIP Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Facebook Automation Information Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Government Data Management Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Blockchain Vendor Mobile Office Data Security Apps Two-factor Authentication Chrome Networking Budget Mobile Device Management Gmail Apple BYOD App Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Avoiding Downtime Applications Marketing How To BDR Conferencing WiFi Access Control Computing Information Technology Hacker HIPAA Office 365 Router Analytics Office Tips Augmented Reality Website Managed IT Services Storage Password Help Desk Bring Your Own Device Virtual Private Network Big Data Operating System Health Healthcare 2FA Risk Management Computers Retail Scam Data loss Solutions Patch Management Firewall Monitoring Save Money Remote Monitoring Vulnerability End of Support Vendor Management The Internet of Things Physical Security Going Green Display Telephone Social Printer Remote Workers Windows 11 Paperless Office Infrastructure Cybercrime Cooperation Excel Free Resource Document Management Customer Service Project Management Windows 7 Microsoft 365 Outlook Money User Tip Humor Modem Employees Processor Mobile Security Data Privacy Word Integration Sports Mouse Robot Smart Technology Holidays Administration Saving Time Safety Data Storage IT Management VPN Meetings Video Conferencing Managed Services Provider Managed IT Service Virtual Machines Professional Services Downloads Settings Computer Repair Wireless Printing Licensing Content Filtering Entertainment YouTube iPhone Supply Chain Customer Relationship Management Cryptocurrency Machine Learning Vulnerabilities Telephone System Hacking Cost Management Virtual Desktop Images 101 Presentation Data storage LiFi Multi-Factor Authentication Mobility Maintenance Antivirus Wireless Technology Memory Specifications Scams IP Address Remote Working Social Engineering Remote Computing Data Breach Microchip Google Play Internet Exlporer Fraud Hybrid Work Halloween Human Resources Videos Electronic Health Records Username Recovery Wasting Time Black Friday Cables Tablet Scary Stories Alert Hard Drives Trend Micro Security Cameras Database Hacks IT Technicians Managed IT Google Apps File Sharing Fun Domains Software as a Service Dark Data Managing Costs Proxy Server Cookies Deep Learning Cyber Monday IT Maintenance How To Notifications Refrigeration eCommerce SSID Tactics Hotspot Business Intelligence Mirgation Education Shortcuts Travel Public Speaking Surveillance Virtual Assistant Virtual Machine Nanotechnology Techology Ransmoware Google Maps Lithium-ion battery Reviews Entrepreneur Medical IT Addiction Mobile Computing Language Vendors Chatbots Be Proactive Unified Threat Management Search Development Transportation Management Hypervisor Screen Reader Unified Threat Management Best Practice Distributed Denial of Service Workforce Buisness Shopping Undo Optimization PowerPoint Service Level Agreement Computing Infrastructure Threats Legal Identity IT solutions Workplace Strategies Network Congestion Employer/Employee Relationships Bookmark Navigation Smart Tech User Error Business Growth Meta PCI DSS Gig Economy Download Alerts Amazon Point of Sale Cortana Internet Service Provider Teamwork Application Browsers Evernote Connectivity Alt Codes Break Fix Outsource IT Regulations Compliance Network Management Downtime Media Tech Support Memes Upload Environment Hosted Solution Multi-Factor Security IBM Net Neutrality Monitors SQL Server Social Network History IoT Typing Dark Web Small Businesses Financial Data Displays Smartwatch Websites IT Trends Customer Resource management Google Drive Regulations Google Calendar Knowledge Procurement Azure Telework Electronic Medical Records Cyber security Data Analysis Tech Star Wars SharePoint Microsoft Excel Outsourcing Staff CES 5G Competition Communitications Gamification Google Docs Social Networking Lenovo Unified Communications Legislation Workplace Experience Supply Chain Management Writing FinTech Virtual Reality Fileless Malware Term Bitcoin Hiring/Firing Running Cable Wearable Technology Server Management Paperless Private Cloud IT Assessment Content Google Wallet User Value Health IT Motherboard Superfish Comparison Co-managed IT Identity Theft Flexibility Organization Twitter Directions Assessment Windows 8 Permissions Technology Care Laptop Business Communications Digital Security Cameras Error Smart Devices Drones

Blog Archive