Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email IT Services Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Holiday Automation Artificial Intelligence Information Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Data Security Apps Two-factor Authentication Mobile Office Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 HIPAA Applications 2FA Help Desk Operating System Computers Healthcare Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Retail Storage Router Password Bring Your Own Device Managed IT Services Big Data Windows 11 Social Monitoring Going Green Patch Management Save Money Excel Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Remote Workers Physical Security Telephone Display Printer Cooperation Free Resource Paperless Office Infrastructure Project Management Windows 7 Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Holidays Data Storage Smart Technology Supply Chain Video Conferencing Robot Customer Relationship Management Managed Services Provider Professional Services Settings Saving Time Virtual Machines Printing Wireless Content Filtering Hacking IT Management Managed IT Service Presentation VPN YouTube Meetings Downloads Cryptocurrency iPhone Wireless Technology Licensing Computer Repair Vulnerabilities Entertainment Data Privacy Virtual Desktop LiFi Data storage Images 101 Word Mobility Telephone System Outlook Multi-Factor Authentication Cost Management Machine Learning Money Humor Maintenance Employees Safety Antivirus Integration Sports Mouse User Tip Modem Mobile Security Processor Administration Application Best Practice Cyber Monday Medical IT Alert Proxy Server Reviews Cookies Tactics Development Managed IT Hotspot Transportation Small Businesses Buisness File Sharing Dark Data How To IBM Legal Mirgation Hypervisor Displays IT solutions Business Growth PowerPoint Notifications Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Travel Cortana Management PCI DSS Techology Chatbots Google Maps Navigation Alt Codes Distributed Denial of Service Workplace Gig Economy Screen Reader Service Level Agreement Internet Service Provider Competition Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Regulations Compliance Unified Threat Management Identity Hosted Solution Evernote Paperless Typing Co-managed IT Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Network Congestion Knowledge Financial Data Google Drive User Error History User Business Communications Connectivity IT Break Fix Scams Browsers Smartwatch Upload Procurement Azure Hybrid Work Point of Sale 5G Unified Communications Multi-Factor Security Tech Human Resources Experience Social Network Telework IP Address Google Docs Cyber security IoT Communitications Bitcoin Network Management Dark Web Cables Running Cable Tech Support CES Monitors Trends Supply Chain Management Google Wallet Recovery Google Calendar Term Google Apps Customer Resource management FinTech Regulations Star Wars IT Assessment Hard Drives Windows 8 Microsoft Excel IT Maintenance Laptop Websites Data Analysis Gamification Flexibility Domains Drones Staff Value Business Intelligence Legislation Shortcuts Electronic Medical Records Organization SharePoint Social Networking Smart Devices Refrigeration Ransmoware Halloween Fileless Malware Digital Security Cameras Writing Content Remote Working Public Speaking Lenovo Wearable Technology Memory Vendors Comparison Google Play Be Proactive Virtual Reality Health IT Lithium-ion battery Motherboard Data Breach Assessment Electronic Health Records Hacks Server Management Permissions Workforce Entrepreneur Scary Stories Private Cloud Directions Videos Fun Superfish Wasting Time Threats Identity Theft Deep Learning Specifications Security Cameras Workplace Strategies Twitter Trend Micro Internet Exlporer Software as a Service Undo Fraud Meta Error Microchip Social Engineering Username Managing Costs Amazon Education Black Friday SSID Remote Computing eCommerce Database Surveillance Mobile Computing Virtual Assistant Outsource IT Search IT Technicians Virtual Machine Environment Tablet Media

Blog Archive