Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Special Symbols

Tip of the Week: How to Type Special Symbols

The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy to change your device’s language.

The first thing you should do is right-click on the taskbar and select Show touch keyboard button on the menu that appears.

Cortana

An icon resembling a keyboard will now display in your taskbar next to your clock and calendar.

keyboard icon

Clicking this icon will bring up a touch-enabled keyboard. If your device doesn’t have touch capabilities, you can also select keys with your mouse.

Touch Keyboard

To insert a letter with an accent mark, click and hold the base letter until the available options appear. Click the option you need to insert, and voila!

keyboard accents

However, if you need to write in a different language regularly enough that the above option isn’t convenient, you can change the layout of your keyboard to suit your needs. Returning to the bottom-right corner of your screen, you can find your chosen language next to the touch keyboard icon.

EnglishRussianKeyboard

Changing this language will also alter how your physical keyboard works. If the language you need to use doesn’t appear in the list of available languages, you can edit this list (and possibly add the language you need) in the Language preferences menu item.

For Other Versions of Windows, Use ALT Codes
If you’re still using an older version of the Windows OS, like Windows 7, 8.1, or even Vista or XP (which we don’t recommend), you can use ALT Codes to insert symbols or letters augmented with assorted accent marks. Each option of symbol or augmented letter has a numeric code assigned to it that allows you to insert that symbol or letter by holding the ALT key and typing the code into your numeric keypad. You can find a good resource here.

Are there any tricks you have for communicating in another language on your computer? Share them below! Partagez-les ci-dessous! Ossza meg őket lent! Compartilhe-os abaixo!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Computer Phishing Workplace Tips IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Passwords Communication Saving Money Data Backup Smartphone Backup Android Managed Service VoIP Business Management Smartphones Mobile Devices communications Upgrade Disaster Recovery Social Media Data Recovery Browser Windows Microsoft Office Managed IT Services Productivity Current Events Tech Term Remote Network Internet of Things Artificial Intelligence AI Facebook Automation Cloud Computing Covid-19 Holiday Gadgets Server Managed Service Provider Remote Work Miscellaneous Outsourced IT Information Compliance Training Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Wi-Fi IT Support Blockchain Bandwidth Windows 10 Virtualization Business Technology Two-factor Authentication Data Security Mobile Office Vendor Apps Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Gmail Apple App Employer-Employee Relationship Computing Conferencing Information Technology Hacker How To Avoiding Downtime Office 365 BDR Marketing HIPAA Applications WiFi Access Control Tip of the week Retail Risk Management Healthcare Computers Managed IT Services Office Tips Analytics Website Augmented Reality Storage Password Router Bring Your Own Device Virtual Private Network Health Big Data Help Desk Operating System Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Firewall Vendor Management Solutions Physical Security Display Printer The Internet of Things Windows 11 Paperless Office Infrastructure Going Green Monitoring Social 2FA Excel Document Management Cybercrime YouTube Managed IT Service Maintenance Cryptocurrency Antivirus Hacking Downloads iPhone Presentation Licensing Virtual Desktop Vulnerabilities Data storage Entertainment LiFi Wireless Technology Data Privacy Outlook Images 101 Money Telephone System Multi-Factor Authentication Robot Mobility Word Humor Cost Management IT Management Sports Mouse VPN Employees Meetings Integration Safety User Tip Administration Modem Computer Repair Mobile Security Processor Holidays Data Storage Smart Technology Supply Chain Video Conferencing Settings Printing Machine Learning Managed Services Provider Wireless Professional Services Saving Time Virtual Machines Content Filtering Customer Relationship Management Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Google Drive Superfish Bookmark Competition Identity Theft Smart Tech Memes Knowledge Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Error History 5G Business Communications Social Engineering Break Fix Scams Google Docs Browsers Smartwatch Unified Communications Connectivity IT Experience Upload Procurement Running Cable User Remote Computing Azure Hybrid Work Bitcoin Google Wallet Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Tablet IoT Communitications Windows 8 IP Address Trends Supply Chain Management Laptop Alert Drones Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Gamification Flexibility Halloween Recovery Notifications Staff Value Business Intelligence Organization Hard Drives Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Domains Google Maps Smart Devices Hacks Content Remote Working Scary Stories Wearable Technology Memory Vendors Health IT Refrigeration Unified Threat Management Motherboard Data Breach Fun Comparison Google Play Be Proactive Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Deep Learning Public Speaking Lithium-ion battery Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Education Trend Micro Entrepreneur Internet Exlporer Software as a Service Fraud Meta User Error Microchip Mobile Computing Username Managing Costs Amazon Black Friday SSID Undo Point of Sale eCommerce Search Database Surveillance Virtual Assistant Outsource IT Best Practice Network Management Buisness Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Legal Proxy Server Reviews IT solutions Cookies Tactics Development Hotspot Transportation Small Businesses Business Growth Application Websites Mirgation Hypervisor Displays PowerPoint Shopping Nanotechnology Optimization Cortana Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Alt Codes IBM Management PCI DSS Downtime Chatbots Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Hosted Solution Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Typing

Blog Archive