Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accent Marks and Symbols

Tip of the Week: How to Type Accent Marks and Symbols

When it comes to businesses-to-business relationships, the global impact of the Internet has unlocked quite a few doors. Rather than developing relationships with exclusively businesses in their region, it’s not uncommon for a small manufacturer of model airplanes in Iowa to use the web to find the vendor that can meet all of their needs, even if they’re located in Austria. Doing business internationally means there may be an occasion where you’ll need to communicate in another language. Fortunately, for Windows 10 users, it has never been easier to switch your computer or mobile device’s language.

First, hover over the taskbar and right-click. Select show touch keyboard button.

Cortana

You’ll now see a keyboard icon next to your clock and calendar on the right-hand size of your taskbar.

keyboard icon

This will bring up a touch keyboard. In the case that you don’t have a touch screen, you can also click on the buttons with your mouse.

Touch Keyboard

Click and hold the base letter to see all the possible accents for that letter. Click the one that you would like to insert.

keyboard accents

For those who are going to be writing in another language on a regular basis. It’s possible to change the entire layout of your keyboard. Your chosen language can be found to the right of the touch keyboard icon.

EnglishRussianKeyboard

This doesn’t just apply to the touch keyboard. It applies to your physical one, as well.

Hint: If you don’t see the language you’re looking for in the list of available languages, you can add and edit your list by selecting Language preferences.

Using Another Version of Windows?
For those of you who are using Windows 7 or 8.1 (or even Vista or XP), in addition to seriously thinking about upgrading your operating system, you can still use ALT Codes. A numeric list of codes is assigned to the accented letter or symbol in question. While pressing down the ALT key, type the four-digit code on the numeric keypad at the right edge of the keyboard.

Do you have any tips or tricks that use you like use when communicating in another language? Tell us below! Comentario a continuación! Commentaires ci-dessous! Комментарий ниже!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Social Media Virtualization Saving Money Holiday Gadgets Tech Term Microsoft Office Automation Managed Service Managed IT Services Artificial Intelligence Facebook Computers Cybercrime Operating System Hacking Wi-Fi Health BYOD Mobile Device Management Networking Internet of Things IT Support Information Technology Remote Covid-19 Information Spam Office 365 Managed Service Provider Alert Telephone Systems Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering App History Data Breach Password Money Encryption Mobile Computing Applications Human Resources Application Law Enforcement Remote Monitoring Big Data Office Tips Training Apps VPN How To Blockchain Paperless Office Remote Computing Government Mobile Office Data Storage Patch Management Private Cloud Managed IT Bring Your Own Device Wireless Data Management Work/Life Balance Servers Flexibility Gmail Marketing Settings WiFi Data Security IT solutions Google Drive Entertainment Website Two-factor Authentication Budget Mouse HaaS Avoiding Downtime Infrastructure Vulnerability Voice over Internet Protocol Windows 7 Word Cleaning The Internet of Things Vendor Management Data Protection Lithium-ion battery End of Support Education Physical Security Firewall Safety HIPAA Vendor Sports Redundancy Virtual Reality USB Apple Managed Services Telephone System Keyboard Display Staff Software as a Service Machine Learning Social Remote Work Connectivity User Error Employee/Employer Relationship Meetings Conferencing RMM Save Time Scam Risk Management Hacker Botnet Remote Worker Digital Signage IT Plan Cryptocurrency DDoS Computing Infrastructure Virus Going Green SharePoint Unsupported Software Procurement Unified Threat Management Computer Accessories Workplace Strategy Charger Net Neutrality Comparison Battery Compliance Help Desk CES Customer Service Shadow IT Environment OneNote Printing Computer Care Legal Current Events Business Technology Content Management Fax Server Internet Exlporer Telephony Printer Samsung Access Control Bluetooth Managed Services Provider Virtual Assistant SaaS PDF Value Database Authentication Spam Blocking Remote Workers Electronic Medical Records Proactive IT Network Congestion Processor IT Consultant eWaste Best Practice Hiring/Firing Update YouTube Black Market Hard Drive Humor Google Docs Identity Theft Document Management Wearable Technology Hard Drives Computing Solid State Drive Retail Wireless Technology Downtime Instant Messaging Business Intelligence How to Robot Excel Audit Augmented Reality Worker Fraud Data storage Biometrics IT Management Automobile Virtual Desktop Dark mode Computer Fan Trend Micro Rootkit Smart Tech Trending Amazon Monitor SMS Default App Addiction Workers Saving Time Benefits Recycling Science Procedure dark theme FENG Shopping Wiring Google Search Practices User Amazon Web Services Reputation PowerPoint Streaming Media Windows Media Player AI IBM IT Infrastructure Cache Safe Mode Content Smart Technology Bing Distributed Denial of Service Criminal Customer Relationship Management Tech Support Flash FinTech Laptop Analyitcs Social Network GDPR Hosted Computing Techology Managing Stress Online Shopping Customers Programming Software Tips Supercomputer Investment Wireless Internet Emails Employee/Employer Relationships File Sharing Audiobook Sync Employees Touchpad Cameras Windows 365 Camera ISP Inventory Specifications Antivirus Evernote Video Conferencing ROI Wire Netflix Bitcoin Politics Two Factor Authentication Shortcuts Advertising Travel Windows 8 Sales Point of Sale Root Cause Analysis Personal Printers Cryptomining IT service Millennials Music Wireless Charging Notifications HBO Supply Chain Management Knowledge Smart Office Batteries Skype Tablet Monitoring Printer Server Windows 8.1 Data loss Digitize Virtual Private Network Domains Workforce Troubleshooting Cables Relocation Outlook Leadership Windows Server 2008 R2 Customer relationships IaaS Maintenance Start Menu Telecommuting Bloatware Email Best Practices Screen Mirroring IT Assessment Project Management Loyalty Manufacturing Nanotechnology Video Games Worker Commute Books Cortana Frequently Asked Questions Tablets Computer Tips Windows 10s Managed IT Service Experience Security Cameras Digital Signature Mobile Entrepreneur Virtual CIO Cast OneDrive Warranty Biometric Security Scalability HVAC Business Owner Emergency Google Apps Tip of the week Peripheral webinar Professional Services Digital Security Cameras Public Cloud Using Data Employer Employee Relationship Analysis Shortcut NarrowBand Cost Management Copiers Administrator Assessment 5G Devices Search Enterprise Content Management iPhone Social Networking Windows Server 2008 Quick Tip Tools Ergonomics MSP Smartwatch Accountants Consultant Credit Cards Analytics Development Microchip Television OLED Thought Leadership Virtual Machine Password Management Running Cable Password Manager Files PCI DSS Memory 2FA Fiber Optics Employee Best Available Multi-Factor Security Chromecast Messaging Search Engine Public Computer Cabling Twitter WIndows 7 Hypervisor NIST Transportation Business Mangement Colocation Uninterrupted Power Supply Regulations Policy

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code