Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Smartphone Managed Service Data Backup Android Upgrade Smartphones VoIP Data Recovery AI Business Management Disaster Recovery Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Tech Term Network Internet of Things Remote Information Facebook Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Blockchain Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Apps Data Security Mobile Office Vendor Two-factor Authentication Employer-Employee Relationship Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management BYOD Gmail Chrome Budget Tip of the week Conferencing Hacker How To Avoiding Downtime BDR Marketing Computing Information Technology HIPAA Applications Office 365 Access Control WiFi Storage Password Retail Bring Your Own Device Healthcare Computers Managed IT Services Operating System Website Risk Management Router Virtual Private Network Analytics Office Tips Health Augmented Reality 2FA Big Data Help Desk Document Management Remote Workers Telephone Customer Service Scam Data loss Cooperation Free Resource Going Green Project Management Windows 7 Patch Management Save Money Microsoft 365 Cybercrime Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Physical Security Display Printer Windows 11 The Internet of Things Paperless Office Infrastructure Monitoring Social Excel Professional Services Saving Time Virtual Machines Sports Mouse Managed IT Service Customer Relationship Management Maintenance Administration Antivirus Downloads iPhone Hacking Licensing Presentation Vulnerabilities Entertainment Data Privacy Wireless Technology Images 101 Settings Wireless Printing Telephone System Content Filtering Multi-Factor Authentication Robot Mobility Cost Management YouTube Word Cryptocurrency IT Management VPN Employees Meetings Integration Virtual Desktop Data storage LiFi User Tip Modem Computer Repair Mobile Security Safety Processor Outlook Holidays Money Data Storage Smart Technology Supply Chain Humor Video Conferencing Machine Learning Managed Services Provider Writing Distributed Denial of Service Workplace IBM Deep Learning Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Education Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Mobile Computing Competition Financial Data Search Error History Business Communications Social Engineering Break Fix Scams Best Practice Browsers Smartwatch Connectivity IT Buisness Upload Procurement Remote Computing Azure Hybrid Work Legal IT solutions Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Business Growth CES User Tablet IoT Communitications Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Cortana File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance IP Address Alt Codes Data Analysis Star Wars IT Assessment Downtime Gamification Flexibility Notifications Staff Value Business Intelligence Hosted Solution Organization Travel Social Networking Legislation Shortcuts Google Maps Smart Devices Ransmoware Typing Techology Fileless Malware Digital Security Cameras Recovery Hard Drives Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Google Drive Domains Health IT Knowledge Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Refrigeration 5G Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Google Docs Public Speaking Unified Communications Experience Trend Micro Running Cable Internet Exlporer Software as a Service Fraud Meta Lithium-ion battery Bitcoin User Error Microchip Google Wallet Username Entrepreneur Managing Costs Amazon Black Friday SSID Point of Sale eCommerce Laptop Database Surveillance Virtual Assistant Outsource IT Windows 8 Drones Undo Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Halloween Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays PowerPoint Shopping Nanotechnology Optimization Scary Stories Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hacks SharePoint Application Management PCI DSS Fun Chatbots Navigation

Blog Archive