crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Special Symbols

The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy to change your device’s language.

The first thing you should do is right-click on the taskbar and select Show touch keyboard button on the menu that appears.

Cortana

An icon resembling a keyboard will now display in your taskbar next to your clock and calendar.

keyboard icon

Clicking this icon will bring up a touch-enabled keyboard. If your device doesn’t have touch capabilities, you can also select keys with your mouse.

Touch Keyboard

To insert a letter with an accent mark, click and hold the base letter until the available options appear. Click the option you need to insert, and voila!

keyboard accents

However, if you need to write in a different language regularly enough that the above option isn’t convenient, you can change the layout of your keyboard to suit your needs. Returning to the bottom-right corner of your screen, you can find your chosen language next to the touch keyboard icon.

EnglishRussianKeyboard

Changing this language will also alter how your physical keyboard works. If the language you need to use doesn’t appear in the list of available languages, you can edit this list (and possibly add the language you need) in the Language preferences menu item.

For Other Versions of Windows, Use ALT Codes
If you’re still using an older version of the Windows OS, like Windows 7, 8.1, or even Vista or XP (which we don’t recommend), you can use ALT Codes to insert symbols or letters augmented with assorted accent marks. Each option of symbol or augmented letter has a numeric code assigned to it that allows you to insert that symbol or letter by holding the ALT key and typing the code into your numeric keypad. You can find a good resource here.

Are there any tricks you have for communicating in another language on your computer? Share them below! Partagez-les ci-dessous! Ossza meg őket lent! Compartilhe-os abaixo!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Software Mobile Devices Data IT Support Network Hardware Small Business Communication Server Smartphones Computer VoIP Upgrade Efficiency Business Continuity Google Windows Disaster Recovery Mobile Device Management Innovation Microsoft Office Virtualization Tech Term Data Backup Miscellaneous Outsourced IT Mobile Office Vendor Management Holiday Social Media Gadgets Network Security Quick Tips Passwords BYOD User Tips Android Smartphone Browser Mobile Computing WiFi Bring Your Own Device Windows 10 Productivity Internet of Things Managed IT services Best Practice Ransomware Spam Remote Monitoring Data Recovery The Internet of Things Users Apple Remote Computing Artificial Intelligence Wireless Technology Alert Data Management Save Money Trending Operating System Firewall Content Filtering Customer Relationship Management Unified Threat Management History Gmail Going Green Office Collaboration Encryption App Cloud Computing Managed IT Router Printer Tech Support Big Data Analytics IT Support Information Technology Current Events IT Solutions Lithium-ion Battery Facebook IT Consultant Maintenance Antivirus Hard Drives Phishing Document Management Mobile Device Applications Paperless Office Windows 8 Employer-Employee Relationship Website Humor Saving Time Two-factor Authentication Avoiding Downtime Automation Office Tips Fax Server Retail Bandwidth Project Management Outlook Health Cybersecurity IT service Digital Payment Chrome Business Growth VPN Wi-Fi Risk Management Marketing Excel Customer Service Hacking Computers Phone System Government Apps Application Managed IT Services Virus Compliance Proactive IT Computer Repair Help Desk Regulations Point of Sale Mouse Data Security Files User Error Recovery Money Co-Managed IT Net Neutrality Running Cable Social Healthcare Licensing File Sharing PowerPoint Social Networking Unified Communications Tablet Inbound Marketing Managed Service Office 365 Password iPhone Infrastructure Administration Presentation Augmented Reality Training Budget Sports BDR Hacker User Programming Redundancy Company Culture Analyitcs Twitter Education Machine Learning Safety Specifications IBM Settings Flexibility Hosted Solution Cost Management Wireless Data storage Mobility Cybercrime Save Time Wearable Technology Robot Remote Workers Conferencing Windows 10 Hiring/Firing Display Alerts Printing Scam End of Support Information Blockchain Tip of the week LiFi HIPAA Computing Statistics Intranet Competition Business Intelligence Network Congestion Recycling eWaste Downtime Internet Exlporer Storage Search Smart Technology Mobile Security Piracy Vulnerability Virtual Desktop USB Business Owner Data loss IoT Hotspot Computer Accessories Virtual Private Network Networking Telephony Heating/Cooling Alt Codes Vulnerabilities Fleet Tracking Consumers Chatbots Features Crowdfunding Multi-Factor Security How To YouTube Star Wars Managed IT Service Gaming Console Language Typing Geography IP Address Google Drive Asset Tracking Identity Electronic Health Records Google Calendar Identity Theft Assessment How To Utility Computing Break Fix Disaster Computing Infrastructure Touchscreen Techology Refrigeration Cryptocurrency High-Speed Internet Google Docs OneNote Cyberattacks Legislation IT Management Dark Web Digital Signature Cooperation Business Technology Disaster Resistance Private Cloud Bitcoin Development Employee-Employer Relationship Motherboard Read Only Memory Adminstration 3D Network Management Laptop communications Hard Drive Data Warehousing Cables Staff IT Consulting Public Cloud Hacks Documents Modem Bookmarks Software as a Service Microsoft Excel Halloween Entrepreneur Cache Wires Operations Data Breach PC Care Sync Undo 5G PDF Cookies Favorites Value People Technology Tips Software Tips eBay Scary Stories Virtual Reality Management Remote Support Technology Laws Leadership Scheduling Mobile Device Managment Monitors Monitoring Skype Nanotechnology Instant Messaging Streaming Media Comparison New Additions Permissions Text Messaging Server Management SaaS Deep Learning Enterprise Resource Planning Print Server MSP IT Technicians Work Station Unified Threat Management Domains Google Wallet Fun Writing LinkedIn Screen Reader Black Friday Congratulations Fraud Video Surveillance Chromebook Word Mobile Law Firm IT Proactive Windows 8.1 Update Mirgation Consulting Access Control G Suite Public Speaking Drones Cortana Social Engineering Best Available Buisness Smart Tech Cyber Monday Patch Management Identities Managing Stress Remote Monitoring and Management Managed Services Provider SharePoint Travel Backups Knowledge Environment CIO Connectivity Macro Politics Solid State Drive Enterprise Content Management Bluetooth WPA3 Online Currency Migration E-Commerce Samsung Downloads Meetings Legal Experience Troubleshooting Debate Distributed Denial of Service

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code