Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Disaster Recovery Data Recovery Upgrade Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Artificial Intelligence Information Holiday Facebook Automation Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Virtualization Apps Vendor Data Security Mobile Office Two-factor Authentication Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Managed Services Voice over Internet Protocol WiFi Tip of the week HIPAA How To Hacker BDR Applications Avoiding Downtime Marketing Computing Information Technology Conferencing Access Control Office 365 Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Router Computers Website Operating System Help Desk Virtual Private Network Risk Management 2FA Health Healthcare Office Tips Analytics Big Data Social Document Management Cooperation Free Resource Project Management Windows 7 Microsoft 365 Scam Data loss Customer Service Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Monitoring Cybercrime Physical Security Firewall Display Windows 11 Printer Remote Workers Paperless Office Telephone Infrastructure The Internet of Things Excel Money Humor Images 101 Multi-Factor Authentication Mobility Telephone System Maintenance Antivirus Customer Relationship Management Cost Management Sports Mouse Data Privacy Administration Hacking Presentation Employees Integration Wireless Technology Modem User Tip Processor Mobile Security Robot Holidays Settings Printing Wireless Content Filtering Data Storage IT Management Word Smart Technology VPN Video Conferencing YouTube Meetings Managed Services Provider Saving Time Cryptocurrency Virtual Machines Professional Services Computer Repair Managed IT Service Safety Virtual Desktop Supply Chain Downloads Data storage LiFi iPhone Licensing Outlook Entertainment Machine Learning Vulnerabilities Paperless Lenovo Trends Supply Chain Management Application Writing Regulations Virtual Reality Co-managed IT Google Calendar Term Customer Resource management FinTech Data Analysis Hacks Server Management IBM Star Wars IT Assessment Scary Stories Private Cloud Technology Care Microsoft Excel Business Communications Superfish Gamification Flexibility Identity Theft Staff Value Fun Social Networking Twitter Scams Legislation Organization Deep Learning Fileless Malware Digital Security Cameras Smart Devices Error Hybrid Work Human Resources Content Remote Working Education Wearable Technology Memory Social Engineering Competition Motherboard Data Breach Remote Computing Cables Comparison Google Play Health IT Directions Videos Mobile Computing Assessment Electronic Health Records Permissions Google Apps Tablet Wasting Time Search Best Practice Trend Micro Alert IT Maintenance Specifications Security Cameras Microchip Managed IT Internet Exlporer Software as a Service Buisness File Sharing Business Intelligence User Fraud Dark Data How To Shortcuts Legal Username IT solutions Managing Costs Business Growth eCommerce Notifications Ransmoware Black Friday SSID IP Address Database Surveillance Travel Vendors Virtual Assistant Cortana Be Proactive Techology Google Maps IT Technicians Virtual Machine Proxy Server Reviews Alt Codes Cookies Workforce Cyber Monday Medical IT Tactics Development Downtime Unified Threat Management Threats Recovery Hotspot Transportation Hard Drives Mirgation Hypervisor Workplace Strategies Unified Threat Management Hosted Solution Shopping Typing Domains Nanotechnology Optimization Meta PowerPoint Addiction Amazon Language Employer/Employee Relationships Network Congestion Refrigeration Chatbots Knowledge Navigation Google Drive User Error Management PCI DSS Gig Economy Public Speaking Screen Reader Outsource IT Distributed Denial of Service Media Lithium-ion battery Service Level Agreement Internet Service Provider Point of Sale Environment Computing Infrastructure Teamwork 5G Identity Experience Entrepreneur Evernote Google Docs Regulations Compliance Unified Communications Bookmark Bitcoin Network Management Smart Tech Memes Running Cable Tech Support Small Businesses Google Wallet Download Net Neutrality Displays Alerts SQL Server Monitors Undo History Financial Data Browsers Smartwatch Windows 8 Connectivity IT Laptop Websites Outsourcing Break Fix Drones Upload Procurement Azure Cyber security Electronic Medical Records Workplace Multi-Factor Security Tech SharePoint Social Network Telework CES IoT Communitications Halloween Hiring/Firing Dark Web

Blog Archive