Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Blockchain Wi-Fi Virtualization Business Technology Bandwidth Vendor Two-factor Authentication Apps Data Security Mobile Office BYOD Gmail Tip of the week Employer-Employee Relationship Chrome Budget Managed Services Voice over Internet Protocol Networking Apple App Mobile Device Management Computing HIPAA Information Technology WiFi Applications Access Control Office 365 Conferencing Hacker Avoiding Downtime How To BDR Marketing Operating System Virtual Private Network Risk Management Router Big Data Health Office Tips Analytics Augmented Reality Help Desk Retail Storage Password Computers Bring Your Own Device Healthcare Managed IT Services 2FA Website Firewall Vendor Management Cybercrime Solutions Physical Security Display Printer The Internet of Things Paperless Office Infrastructure Social Monitoring Document Management Customer Service Remote Workers Scam Data loss Telephone Windows 11 Free Resource Project Management Cooperation Going Green Windows 7 Patch Management Excel Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Content Filtering Telephone System Cost Management IT Management VPN Meetings YouTube Cryptocurrency Safety Employees Integration Computer Repair Virtual Desktop Data Privacy User Tip Modem Data storage LiFi Mobile Security Holidays Processor Data Storage Outlook Machine Learning Money Video Conferencing Customer Relationship Management Managed Services Provider Humor Smart Technology Virtual Machines Professional Services Saving Time Maintenance Sports Hacking Antivirus Mouse Presentation Managed IT Service iPhone Downloads Administration Wireless Technology Licensing Vulnerabilities Entertainment Supply Chain Images 101 Robot Word Settings Multi-Factor Authentication Mobility Printing Wireless Memory Unified Threat Management Paperless Social Networking Legislation Hosted Solution Public Speaking Remote Working Typing Lithium-ion battery Data Breach Fileless Malware Co-managed IT Google Play Content Wearable Technology Videos Network Congestion Electronic Health Records Technology Care Entrepreneur Knowledge Wasting Time Health IT User Error Business Communications Motherboard Google Drive Comparison Permissions Trend Micro Directions Scams Security Cameras Assessment Point of Sale Undo Software as a Service Hybrid Work 5G Experience Managing Costs Human Resources Google Docs Specifications Unified Communications Fraud Tech Support Bitcoin Running Cable eCommerce Microchip Cables SSID Internet Exlporer Network Management Virtual Assistant Username Google Wallet Monitors Surveillance Virtual Machine Google Apps Black Friday Websites Windows 8 Reviews Laptop Application IT Maintenance Medical IT Database Transportation IT Technicians Drones Development Business Intelligence IBM Hypervisor Proxy Server SharePoint Shortcuts Cookies Cyber Monday Electronic Medical Records Hotspot Shopping Halloween Optimization Ransmoware PowerPoint Tactics Employer/Employee Relationships Lenovo Mirgation Writing Vendors PCI DSS Be Proactive Navigation Nanotechnology Virtual Reality Language Private Cloud Hacks Gig Economy Scary Stories Workforce Addiction Server Management Threats Fun Teamwork Management Superfish Chatbots Identity Theft Competition Internet Service Provider Deep Learning Regulations Compliance Workplace Strategies Evernote Screen Reader Distributed Denial of Service Twitter Computing Infrastructure Error Memes Meta Service Level Agreement Amazon SQL Server Identity Social Engineering Education Net Neutrality Financial Data User History Bookmark Smart Tech Remote Computing Alerts Mobile Computing Smartwatch IT Outsource IT Download Environment Search Azure Media Tablet Procurement Best Practice IP Address Telework Cyber security Browsers Tech Connectivity Break Fix Alert File Sharing CES Dark Data Buisness Communitications Small Businesses Upload Managed IT Displays Social Network Legal Multi-Factor Security How To IT solutions Supply Chain Management Business Growth FinTech Recovery Term IoT Dark Web Notifications Travel Hard Drives IT Assessment Outsourcing Trends Cortana Value Customer Resource management Techology Regulations Google Maps Google Calendar Domains Flexibility Alt Codes Organization Data Analysis Workplace Star Wars Microsoft Excel Staff Unified Threat Management Digital Security Cameras Downtime Refrigeration Smart Devices Hiring/Firing Gamification

Blog Archive