Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Special Symbols

Tip of the Week: How to Type Special Symbols

The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy to change your device’s language.

The first thing you should do is right-click on the taskbar and select Show touch keyboard button on the menu that appears.

Cortana

An icon resembling a keyboard will now display in your taskbar next to your clock and calendar.

keyboard icon

Clicking this icon will bring up a touch-enabled keyboard. If your device doesn’t have touch capabilities, you can also select keys with your mouse.

Touch Keyboard

To insert a letter with an accent mark, click and hold the base letter until the available options appear. Click the option you need to insert, and voila!

keyboard accents

However, if you need to write in a different language regularly enough that the above option isn’t convenient, you can change the layout of your keyboard to suit your needs. Returning to the bottom-right corner of your screen, you can find your chosen language next to the touch keyboard icon.

EnglishRussianKeyboard

Changing this language will also alter how your physical keyboard works. If the language you need to use doesn’t appear in the list of available languages, you can edit this list (and possibly add the language you need) in the Language preferences menu item.

For Other Versions of Windows, Use ALT Codes
If you’re still using an older version of the Windows OS, like Windows 7, 8.1, or even Vista or XP (which we don’t recommend), you can use ALT Codes to insert symbols or letters augmented with assorted accent marks. Each option of symbol or augmented letter has a numeric code assigned to it that allows you to insert that symbol or letter by holding the ALT key and typing the code into your numeric keypad. You can find a good resource here.

Are there any tricks you have for communicating in another language on your computer? Share them below! Partagez-les ci-dessous! Ossza meg őket lent! Compartilhe-os abaixo!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 30 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Productivity Upgrade Android VoIP Business Management Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser AI Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Training Miscellaneous Gadgets Cloud Computing Holiday Covid-19 Remote Work Server Managed Service Provider Outsourced IT Employee/Employer Relationship IT Support Compliance Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Chrome Mobile Device Management Budget Managed Services Gmail Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Computers Health Help Desk Office Tips Analytics Website Augmented Reality 2FA Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Router Virtual Private Network Risk Management Printer Paperless Office Infrastructure Monitoring Windows 11 Document Management Excel Firewall Telephone Scam Remote Workers Data loss Cooperation The Internet of Things Going Green Patch Management Free Resource Social Project Management Save Money Windows 7 Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Physical Security Customer Service Solutions Display Processor Employees Presentation Computer Repair Mobile Security Integration Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Outlook Holidays Machine Learning Money Saving Time Data Storage Supply Chain Word Humor Video Conferencing Managed Services Provider Managed IT Service Professional Services Maintenance Virtual Machines Antivirus Sports Downloads Mouse Licensing Safety Entertainment Administration iPhone Vulnerabilities Telephone System Data Privacy Robot Cost Management Settings Images 101 Printing Wireless Multi-Factor Authentication Content Filtering Mobility Customer Relationship Management IT Management VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Security Cameras Workplace Strategies Google Docs Unified Communications Database Trend Micro Experience Bitcoin Network Management Software as a Service Running Cable Tech Support IT Technicians Meta User Google Wallet Proxy Server Cookies Managing Costs Amazon Monitors Cyber Monday Hotspot SSID Tactics eCommerce Windows 8 Surveillance IP Address Laptop Websites Mirgation Virtual Assistant Outsource IT Drones Nanotechnology Virtual Machine Environment Media Electronic Medical Records Language Medical IT SharePoint Reviews Addiction Management Development Halloween Chatbots Transportation Small Businesses Recovery Lenovo Screen Reader Hypervisor Displays Hard Drives Writing Distributed Denial of Service Virtual Reality Computing Infrastructure PowerPoint Shopping Service Level Agreement Optimization Domains Hacks Server Management Scary Stories Private Cloud Identity Employer/Employee Relationships Outsourcing Superfish Bookmark PCI DSS Identity Theft Smart Tech Refrigeration Fun Navigation Twitter Alerts Workplace Gig Economy Deep Learning Download Public Speaking Internet Service Provider Lithium-ion battery Error Teamwork Hiring/Firing Browsers Regulations Compliance Education Connectivity Social Engineering Break Fix Evernote Paperless Entrepreneur Remote Computing Co-managed IT Upload Memes Mobile Computing Social Network Net Neutrality SQL Server Technology Care Multi-Factor Security Financial Data Tablet IoT History Undo Search Dark Web Business Communications Alert Scams Smartwatch Best Practice Trends IT Managed IT Customer Resource management Procurement Buisness File Sharing Regulations Azure Hybrid Work Dark Data Google Calendar Legal Data Analysis Telework IT solutions Star Wars Cyber security How To Microsoft Excel Tech Human Resources Notifications Staff Cables CES Business Growth Gamification Communitications Supply Chain Management Travel Social Networking Application Legislation Techology Fileless Malware FinTech Google Maps Cortana Term Google Apps IBM Wearable Technology IT Maintenance Alt Codes Content IT Assessment Health IT Flexibility Downtime Unified Threat Management Motherboard Value Business Intelligence Comparison Unified Threat Management Directions Organization Hosted Solution Assessment Permissions Shortcuts Smart Devices Ransmoware Digital Security Cameras Typing Remote Working Memory Vendors Network Congestion Specifications Google Play Be Proactive Google Drive User Error Microchip Internet Exlporer Data Breach Competition Knowledge Fraud Electronic Health Records Workforce Videos Username Point of Sale Wasting Time Threats 5G Black Friday

Blog Archive