Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Holiday Automation Information Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Two-factor Authentication Mobile Office Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 HIPAA Applications Healthcare Operating System Computers Physical Security Virtual Private Network Risk Management Website Health Office Tips Analytics Router Augmented Reality Retail Storage Password Bring Your Own Device 2FA Big Data Managed IT Services Help Desk Social Excel Going Green Patch Management Save Money Remote Workers Remote Monitoring Vulnerability End of Support Telephone Vendor Management Customer Service Cybercrime Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Firewall Document Management Windows 11 The Internet of Things Scam Data loss Monitoring Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Robot Managed IT Service Customer Relationship Management Settings Downloads Printing Wireless Content Filtering iPhone Hacking IT Management Licensing Presentation VPN YouTube Meetings Entertainment Vulnerabilities Cryptocurrency Data Privacy Wireless Technology Computer Repair Images 101 Multi-Factor Authentication Mobility Virtual Desktop Telephone System Cost Management Data storage LiFi Word Outlook Machine Learning Money Employees Integration Humor Modem User Tip Processor Mobile Security Safety Maintenance Antivirus Sports Holidays Mouse Data Storage Smart Technology Supply Chain Administration Alert Addiction Language Employer/Employee Relationships Outsourcing Application Best Practice Navigation Managed IT Buisness File Sharing Dark Data Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace IBM Legal IT solutions How To Gig Economy Business Growth Notifications Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Travel Regulations Compliance Identity Cortana Bookmark Smart Tech Memes Co-managed IT Techology Google Maps Alt Codes Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Competition Downtime Unified Threat Management Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Unified Threat Management Hosted Solution Typing Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Network Congestion Social Network Telework Knowledge CES IoT Communitications Dark Web Cables Google Drive User Error User Trends Supply Chain Management Regulations Google Calendar Term Google Apps Point of Sale 5G Customer Resource management FinTech Experience Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance IP Address Google Docs Unified Communications Bitcoin Network Management Running Cable Tech Support Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Google Wallet Monitors Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Recovery Hard Drives Windows 8 Laptop Websites Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Domains Drones Health IT Electronic Medical Records Directions Videos Assessment Electronic Health Records Permissions Workforce SharePoint Refrigeration Halloween Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Public Speaking Lenovo Writing Virtual Reality Microchip Internet Exlporer Software as a Service Fraud Meta Lithium-ion battery Hacks Server Management Entrepreneur Scary Stories Private Cloud Username Managing Costs Amazon eCommerce Black Friday SSID Superfish Identity Theft Fun Twitter Database Surveillance Virtual Assistant Outsource IT Deep Learning Media Undo Error IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Education Social Engineering Proxy Server Reviews Remote Computing Tactics Development Hotspot Transportation Small Businesses Mobile Computing Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Tablet Search Shopping

Blog Archive