Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accent Marks and Symbols

Tip of the Week: How to Type Accent Marks and Symbols

When it comes to businesses-to-business relationships, the global impact of the Internet has unlocked quite a few doors. Rather than developing relationships with exclusively businesses in their region, it’s not uncommon for a small manufacturer of model airplanes in Iowa to use the web to find the vendor that can meet all of their needs, even if they’re located in Austria. Doing business internationally means there may be an occasion where you’ll need to communicate in another language. Fortunately, for Windows 10 users, it has never been easier to switch your computer or mobile device’s language.

First, hover over the taskbar and right-click. Select show touch keyboard button.

Cortana

You’ll now see a keyboard icon next to your clock and calendar on the right-hand size of your taskbar.

keyboard icon

This will bring up a touch keyboard. In the case that you don’t have a touch screen, you can also click on the buttons with your mouse.

Touch Keyboard

Click and hold the base letter to see all the possible accents for that letter. Click the one that you would like to insert.

keyboard accents

For those who are going to be writing in another language on a regular basis. It’s possible to change the entire layout of your keyboard. Your chosen language can be found to the right of the touch keyboard icon.

EnglishRussianKeyboard

This doesn’t just apply to the touch keyboard. It applies to your physical one, as well.

Hint: If you don’t see the language you’re looking for in the list of available languages, you can add and edit your list by selecting Language preferences.

Using Another Version of Windows?
For those of you who are using Windows 7 or 8.1 (or even Vista or XP), in addition to seriously thinking about upgrading your operating system, you can still use ALT Codes. A numeric list of codes is assigned to the accented letter or symbol in question. While pressing down the ALT key, type the four-digit code on the numeric keypad at the right edge of the keyboard.

Do you have any tips or tricks that use you like use when communicating in another language? Tell us below! Comentario a continuación! Commentaires ci-dessous! Комментарий ниже!

Can Chargers Be Interchanged Between Devices?
Do You Use 2FA? If So, You’re in the Minority
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Backup Malware Hosted Solutions Managed IT Services Google VoIP Microsoft Disaster Recovery Mobile Devices Software Productivity Business Continuity Email Business Internet Outsourced IT Data Innovation Data Backup Cybercrime Efficiency communications Windows 10 Ransomware Computer IT Support Smartphones Cloud Computing Android Data Recovery Hardware IT Services Browser Office BDR Internet of Things Tech Term Windows Saving Money Computers Server Business Management Alert Telephone Systems User Tips Virtualization Mobile Device Management Cybersecurity Network Small Business Smartphone Upgrade Save Money Managed IT Law Enforcement Microsoft Office Collaboration Quick Tips BYOD Chrome Workplace Tips Social Engineering Facebook Mobility Recovery Router Holiday Work/Life Balance Office 365 Communication Avoiding Downtime Private Cloud Social Media Miscellaneous Productivity How To Hacking Passwords App Firewall Office Tips Managed Service Provider Artificial Intelligence Bandwidth Password Money Business Intelligence HaaS Automation Flexibility Operating System Wi-Fi Two-factor Authentication Gmail Information Technology Health Redundancy Data Protection Phishing Applications Data Management Data Security Remote Monitoring Bring Your Own Device VPN Budget Proactive IT Document Management Connectivity Identity Theft Windows 10 Safety Apps Word Compliance Mobile Device Blockchain User Error Marketing Entertainment Gadgets Data Breach Spam Big Data Black Market Google Drive Cleaning Risk Management Vulnerability Managed IT Services SaaS Employer-Employee Relationship Value Scam Workers Data storage Shadow IT Government End of Support Paperless Office Internet Exlporer Meetings Wireless Save Time YouTube Apple Windows 7 Credit Cards Worker Automobile The Internet of Things USB CES eWaste IT Management Smart Tech Sports OneNote Legal Content Management Settings IT Plan Public Cloud Battery Remote Computing Streaming Media Training Wireless Technology Unsupported Software Servers Education Content Filtering Encryption Comparison PDF Charger Computing Infrastructure Wearable Technology Networking Electronic Medical Records Spam Blocking Physical Security Mobile Computing Solid State Drive Data loss Hiring/Firing Access Control Infrastructure Update Computer Care HIPAA IT Support Downtime Samsung History Patch Management Analysis Business Owner DDoS Best Practice Website Data Storage Keyboard NIST How to Accountants Remote Work Tip of the week IaaS WiFi Mobile Bluetooth Computer Fan Distributed Denial of Service Touchpad Techology Recycling Voice over Internet Protocol Loyalty Experience Knowledge Windows Server 2008 Transportation Cryptocurrency Outlook Professional Services FENG Devices Wireless Charging Music Network Congestion Students Criminal Multi-Factor Security Data Warehousing Internet exploMicrosoft Benefits Emails Safe Mode Humor IoT Mouse Fiber-Optic Tools iPhone Thought Leadership Healthcare Trending Assessment Advertising Regulations Smart Technology File Sharing Monitor Fraud Cables Rootkit Content Filter NarrowBand Troubleshooting IT Consultant Electronic Health Records Lithium-ion battery Environment Lifestyle Television Business Technology Reputation Insurance Running Cable Amazon Unified Communications Botnet Files Content Storage Hosted Solution Leadership Machine Learning Public Computer Hybrid Cloud Two Factor Authentication Netflix Virtual Assistant Customer Practices Amazon Web Services Theft SharePoint Travel Vendor Management Root Cause Analysis Colocation Audiobook Chromecast Human Resources Software Tips Flash Telephone System Hosted Computing Online Shopping Hard Drives Cortana Politics Addiction webinar Video Games Notifications Staff Uninterrupted Power Supply Specifications People Fax Server Sync Users Inventory Evernote Google Apps Software as a Service Unified Threat Management hacker Cache Books Conferencing HVAC Scalability Digital Signature Millennials Mobile Office IBM HBO IT solutions Telephony Windows 10s Virtual Reality Screen Mirroring Wireless Internet Emergency Enterprise Content Management Instant Messaging Strategy Workforce Supercomputer Frequently Asked Questions Skype Employer Employee Relationship Worker Commute Authentication Going Green Password Manager Google Docs Cast Wire Password Management Robot Search Tech Support Antivirus Telecommuting Current Events Excel Start Menu Computer Accessories Audit Relocation Nanotechnology Laptop Business Mangement Smart Office Thank You Congratulations Webinar IT solutions CrashOverride Twitter Company Culture Managing Stress Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!