Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking Managed Services Voice over Internet Protocol App Computing Hacker Information Technology Avoiding Downtime Access Control HIPAA Marketing Office 365 Applications Conferencing How To BDR Operating System Computers Risk Management Virtual Private Network Website Health Router Analytics Office Tips Augmented Reality Retail Storage 2FA Help Desk Password Bring Your Own Device Managed IT Services Big Data Healthcare Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Cooperation Free Resource Vendor Management Project Management Cybercrime Windows 7 Physical Security Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Firewall Document Management Windows 11 Monitoring The Internet of Things Scam Data loss Excel Social Remote Workers Telephone Robot iPhone Customer Relationship Management Licensing Settings Wireless Entertainment Printing Vulnerabilities Data Privacy Content Filtering Hacking IT Management YouTube Meetings Images 101 Presentation VPN Telephone System Multi-Factor Authentication Cryptocurrency Mobility Cost Management Wireless Technology Computer Repair Virtual Desktop Data storage LiFi Employees Word Integration Outlook User Tip Modem Machine Learning Processor Money Mobile Security Humor Holidays Safety Maintenance Data Storage Antivirus Smart Technology Supply Chain Sports Video Conferencing Mouse Managed Services Provider Saving Time Virtual Machines Professional Services Administration Managed IT Service Downloads Travel Browsers Smartwatch Connectivity IT Break Fix Scams Techology Azure Hybrid Work Google Maps Cortana Upload Procurement Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources Downtime Unified Threat Management CES IoT Communitications Competition Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Customer Resource management FinTech Regulations Typing Google Calendar Term Google Apps Network Congestion Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Google Drive User Error Staff Value Business Intelligence User Knowledge Gamification Flexibility Organization Social Networking Legislation Shortcuts Point of Sale 5G Fileless Malware Digital Security Cameras Smart Devices Ransmoware IP Address Google Docs Wearable Technology Memory Vendors Unified Communications Experience Content Remote Working Health IT Motherboard Data Breach Bitcoin Network Management Comparison Google Play Be Proactive Running Cable Tech Support Monitors Directions Videos Assessment Electronic Health Records Google Wallet Permissions Workforce Wasting Time Threats Recovery Trend Micro Hard Drives Windows 8 Specifications Security Cameras Workplace Strategies Laptop Websites Microchip Internet Exlporer Software as a Service Domains Drones Fraud Meta SharePoint Managing Costs Amazon Electronic Medical Records Username eCommerce Refrigeration Black Friday SSID Halloween Writing Database Surveillance Public Speaking Lenovo Virtual Assistant Outsource IT Lithium-ion battery IT Technicians Virtual Machine Environment Media Virtual Reality Proxy Server Reviews Cookies Hacks Server Management Cyber Monday Medical IT Entrepreneur Scary Stories Private Cloud Identity Theft Fun Tactics Development Superfish Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Deep Learning Twitter Shopping Nanotechnology Optimization Undo PowerPoint Error Education Social Engineering Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Remote Computing Management PCI DSS Gig Economy Screen Reader Mobile Computing Distributed Denial of Service Workplace Tablet Search Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Identity Application Best Practice Evernote Paperless Alert Dark Data Bookmark Smart Tech Memes Managed IT Co-managed IT Buisness File Sharing Legal Alerts SQL Server Technology Care IT solutions How To Download Net Neutrality IBM Financial Data History Business Growth Business Communications Notifications

Blog Archive