Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accent Marks and Symbols

Tip of the Week: How to Type Accent Marks and Symbols

When it comes to businesses-to-business relationships, the global impact of the Internet has unlocked quite a few doors. Rather than developing relationships with exclusively businesses in their region, it’s not uncommon for a small manufacturer of model airplanes in Iowa to use the web to find the vendor that can meet all of their needs, even if they’re located in Austria. Doing business internationally means there may be an occasion where you’ll need to communicate in another language. Fortunately, for Windows 10 users, it has never been easier to switch your computer or mobile device’s language.

First, hover over the taskbar and right-click. Select show touch keyboard button.

Cortana

You’ll now see a keyboard icon next to your clock and calendar on the right-hand size of your taskbar.

keyboard icon

This will bring up a touch keyboard. In the case that you don’t have a touch screen, you can also click on the buttons with your mouse.

Touch Keyboard

Click and hold the base letter to see all the possible accents for that letter. Click the one that you would like to insert.

keyboard accents

For those who are going to be writing in another language on a regular basis. It’s possible to change the entire layout of your keyboard. Your chosen language can be found to the right of the touch keyboard icon.

EnglishRussianKeyboard

This doesn’t just apply to the touch keyboard. It applies to your physical one, as well.

Hint: If you don’t see the language you’re looking for in the list of available languages, you can add and edit your list by selecting Language preferences.

Using Another Version of Windows?
For those of you who are using Windows 7 or 8.1 (or even Vista or XP), in addition to seriously thinking about upgrading your operating system, you can still use ALT Codes. A numeric list of codes is assigned to the accented letter or symbol in question. While pressing down the ALT key, type the four-digit code on the numeric keypad at the right edge of the keyboard.

Do you have any tips or tricks that use you like use when communicating in another language? Tell us below! Comentario a continuación! Commentaires ci-dessous! Комментарий ниже!

Can Chargers Be Interchanged Between Devices?
Do You Use 2FA? If So, You’re in the Minority
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Hackers Business Computing Network Security Backup Malware Managed IT Services Hosted Solutions Google Disaster Recovery Microsoft Software VoIP Business Mobile Devices Business Continuity Email Outsourced IT Internet Productivity Data Innovation Efficiency Cybercrime Windows 10 Ransomware IT Support Smartphones communications Computer IT Services Hardware Browser Data Backup Android Office Cloud Computing Computers Server Telephone Systems Alert User Tips Mobile Device Management Windows Small Business Data Recovery Saving Money Smartphone Business Management Virtualization BDR Quick Tips BYOD Cybersecurity Social Engineering Internet of Things Chrome Upgrade Network Recovery Microsoft Office Private Cloud Managed IT How To Collaboration Hacking Holiday Mobility Work/Life Balance Social Media Office Tips Avoiding Downtime Miscellaneous Passwords Workplace Tips App Productivity Firewall Save Money Law Enforcement Budget Two-factor Authentication Health Facebook Information Technology Password Redundancy Communication Operating System Data Protection Gmail Flexibility Phishing Wi-Fi Data Management Office 365 Data Security Bring Your Own Device Managed Service Provider Proactive IT Money Remote Monitoring Business Intelligence VPN Bandwidth HaaS Artificial Intelligence Safety Value Tech Term Gadgets Spam Black Market Apps Router User Error Marketing Google Drive Compliance Cleaning Mobile Device Vulnerability Managed IT Services Data Breach SaaS Big Data Risk Management Identity Theft Automation Employer-Employee Relationship Windows 10 IT Management Samsung Patch Management Word OneNote Business Owner Meetings Keyboard IT Plan Public Cloud Wireless Scam Remote Computing Apple Wireless Technology Document Management Unsupported Software eWaste Save Time Comparison PDF CES Computing Infrastructure Worker Settings Automobile Spam Blocking Physical Security Mobile Computing Data loss Legal Entertainment Battery Update Encryption Training Downtime History Wearable Technology Content Filtering Applications Best Practice Data Storage Charger Data storage Shadow IT Workers Government Electronic Medical Records Solid State Drive End of Support Internet Exlporer Hiring/Firing HIPAA Computer Care DDoS Credit Cards The Internet of Things Trending Advertising Distributed Denial of Service Current Events Monitor WiFi Sports Search Fraud Regulations Business Mangement Accountants Computer Accessories NarrowBand Lifestyle IT Consultant Reputation How to Amazon Recycling Botnet Files Bluetooth Experience Techology Wireless Charging Hybrid Cloud Leadership Loyalty Netflix Mouse Customer Transportation Amazon Web Services Servers Criminal Travel IoT Root Cause Analysis Colocation Chromecast Music Software Tips Fiber-Optic Benefits Online Shopping Flash Smart Tech Lithium-ion battery Environment USB Uninterrupted Power Supply Specifications Cables webinar Running Cable Assessment Streaming Media Smart Technology Evernote Sync Content Management Software as a Service Insurance hacker Rootkit Troubleshooting Millennials HBO Unified Communications Conferencing Television Windows 10s SharePoint Telephony Blockchain Practices Screen Mirroring Content Hosted Solution Workforce Frequently Asked Questions Theft IT Support Public Computer Human Resources Two Factor Authentication Education Skype Google Docs Hosted Computing Cast Notifications Vendor Management Going Green People Audiobook Robot Fax Server Tech Support Telecommuting Excel Cortana Staff Audit Relocation Start Menu Hard Drives Website Inventory Laptop Mobile Office Politics Networking IT solutions Video Games Remote Work Tip of the week Google Apps Digital Signature Computer Fan Users IaaS Mobile Voice over Internet Protocol Access Control Knowledge Unified Threat Management Touchpad IBM Outlook Books Scalability Windows Server 2008 Infrastructure Professional Services Strategy FENG YouTube Virtual Reality Multi-Factor Security Authentication Data Warehousing Internet exploMicrosoft Network Congestion Antivirus Emails Supercomputer Humor Emergency Instant Messaging Windows 7 Password Manager Tools Analysis iPhone Employer Employee Relationship Worker Commute Nanotechnology Webinar IT solutions Thank You CrashOverride Congratulations Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!