Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Smartphone Data Backup Android Disaster Recovery Data Recovery Upgrade AI VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Information Facebook Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Business Technology Data Security Mobile Office Vendor Two-factor Authentication Apps Budget Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management BYOD Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Conferencing Hacker Avoiding Downtime How To BDR Marketing Computing Information Technology HIPAA Applications Access Control Office 365 Retail Storage Password Computers Bring Your Own Device Healthcare Managed IT Services Website Operating System Virtual Private Network Risk Management Router Big Data Health Analytics Office Tips 2FA Augmented Reality Help Desk Excel Customer Service Scam Remote Workers Data loss Telephone Cooperation Free Resource Going Green Patch Management Project Management Save Money Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Firewall Microsoft 365 Cybercrime Physical Security Solutions Display Printer The Internet of Things Paperless Office Infrastructure Social Windows 11 Monitoring Document Management Video Conferencing Managed Services Provider Saving Time Virtual Machines Maintenance Professional Services Sports Hacking Antivirus Mouse Presentation Managed IT Service Administration Downloads Wireless Technology iPhone Licensing Entertainment Vulnerabilities Data Privacy Robot Word Images 101 Settings Wireless Printing Telephone System Multi-Factor Authentication Mobility Content Filtering Cost Management IT Management YouTube Meetings VPN Cryptocurrency Safety Employees Computer Repair Integration Virtual Desktop User Tip Data storage Modem LiFi Processor Mobile Security Outlook Holidays Machine Learning Data Storage Money Humor Smart Technology Supply Chain Customer Relationship Management Language Employer/Employee Relationships Outsourcing Scary Stories Private Cloud Addiction Hacks Server Management Management PCI DSS Superfish Chatbots Identity Theft Navigation Competition Fun Gig Economy Screen Reader Deep Learning Distributed Denial of Service Workplace Twitter Computing Infrastructure Teamwork Hiring/Firing Error Service Level Agreement Internet Service Provider Regulations Compliance Identity Education Evernote Paperless Social Engineering User Bookmark Smart Tech Memes Co-managed IT Remote Computing Alerts SQL Server Technology Care Download Net Neutrality Mobile Computing Financial Data History Tablet Business Communications Search Browsers Smartwatch Connectivity IT Best Practice Break Fix Scams IP Address Alert Azure Hybrid Work Buisness File Sharing Dark Data Upload Procurement Managed IT Social Network Telework Legal Cyber security IT solutions Multi-Factor Security Tech Human Resources How To Recovery CES IoT Communitications Business Growth Dark Web Cables Notifications Travel Hard Drives Trends Supply Chain Management Customer Resource management FinTech Techology Regulations Google Maps Google Calendar Term Google Apps Domains Cortana Data Analysis Star Wars IT Assessment Alt Codes Microsoft Excel IT Maintenance Staff Value Business Intelligence Downtime Unified Threat Management Refrigeration Gamification Flexibility Organization Unified Threat Management Social Networking Hosted Solution Legislation Shortcuts Public Speaking Fileless Malware Digital Security Cameras Smart Devices Typing Ransmoware Lithium-ion battery Wearable Technology Memory Vendors Network Congestion Entrepreneur Content Remote Working Health IT Google Drive User Error Motherboard Data Breach Comparison Google Play Be Proactive Knowledge Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Point of Sale Undo 5G Google Docs Trend Micro Unified Communications Specifications Security Cameras Workplace Strategies Experience Running Cable Tech Support Microchip Internet Exlporer Software as a Service Bitcoin Network Management Fraud Meta Google Wallet Managing Costs Amazon Monitors Username eCommerce Black Friday SSID Laptop Websites Application Database Surveillance Windows 8 Virtual Assistant Outsource IT Drones IT Technicians Virtual Machine Environment Media Proxy Server Reviews SharePoint Cookies Cyber Monday Medical IT IBM Electronic Medical Records Hotspot Transportation Small Businesses Halloween Tactics Development Lenovo Mirgation Hypervisor Displays Writing Shopping Nanotechnology Optimization PowerPoint Virtual Reality

Blog Archive