Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accent Marks and Symbols

Tip of the Week: How to Type Accent Marks and Symbols

When it comes to businesses-to-business relationships, the global impact of the Internet has unlocked quite a few doors. Rather than developing relationships with exclusively businesses in their region, it’s not uncommon for a small manufacturer of model airplanes in Iowa to use the web to find the vendor that can meet all of their needs, even if they’re located in Austria. Doing business internationally means there may be an occasion where you’ll need to communicate in another language. Fortunately, for Windows 10 users, it has never been easier to switch your computer or mobile device’s language.

First, hover over the taskbar and right-click. Select show touch keyboard button.

Cortana

You’ll now see a keyboard icon next to your clock and calendar on the right-hand size of your taskbar.

keyboard icon

This will bring up a touch keyboard. In the case that you don’t have a touch screen, you can also click on the buttons with your mouse.

Touch Keyboard

Click and hold the base letter to see all the possible accents for that letter. Click the one that you would like to insert.

keyboard accents

For those who are going to be writing in another language on a regular basis. It’s possible to change the entire layout of your keyboard. Your chosen language can be found to the right of the touch keyboard icon.

EnglishRussianKeyboard

This doesn’t just apply to the touch keyboard. It applies to your physical one, as well.

Hint: If you don’t see the language you’re looking for in the list of available languages, you can add and edit your list by selecting Language preferences.

Using Another Version of Windows?
For those of you who are using Windows 7 or 8.1 (or even Vista or XP), in addition to seriously thinking about upgrading your operating system, you can still use ALT Codes. A numeric list of codes is assigned to the accented letter or symbol in question. While pressing down the ALT key, type the four-digit code on the numeric keypad at the right edge of the keyboard.

Do you have any tips or tricks that use you like use when communicating in another language? Tell us below! Comentario a continuación! Commentaires ci-dessous! Комментарий ниже!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Phishing Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Data Recovery Cloud Computing Windows 10 Passwords Saving Money Holiday Social Media Chrome Gadgets Virtualization Tech Term Automation Managed IT Services Microsoft Office Managed Service Facebook Operating System Cybercrime Artificial Intelligence Computers Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi BYOD Telephone Systems Information Technology Managed Service Provider Remote Alert Information Covid-19 Spam Office 365 Bandwidth Router BDR Social Engineering Recovery Employer-Employee Relationship Mobility Applications App History Law Enforcement Big Data Human Resources Password Money Mobile Computing Remote Monitoring Data Breach Encryption Application Office Tips Training Government How To VPN Blockchain Private Cloud Paperless Office Managed IT Remote Computing Data Storage Patch Management Apps Mobile Office Google Drive Wireless Data Security Avoiding Downtime Gmail Settings Two-factor Authentication Flexibility Bring Your Own Device Data Management Marketing Vulnerability Work/Life Balance Infrastructure Mouse HaaS Voice over Internet Protocol WiFi Windows 7 Word IT solutions Entertainment Website Budget Servers Safety Data Protection Sports Risk Management HIPAA Hacker Redundancy Keyboard The Internet of Things Lithium-ion battery Firewall Staff Software as a Service Telephone System Save Time Machine Learning Connectivity Remote Work Virtual Reality Vendor Apple Conferencing Cleaning Managed Services Social Display Scam User Error End of Support Meetings Employee/Employer Relationship Education USB Physical Security Vendor Management RMM Robot Computing Excel Unsupported Software Cryptocurrency IT Consultant PDF Charger Biometrics Virtual Desktop Humor Compliance Comparison Proactive IT OneNote Computer Care Current Events CES Digital Signage DDoS Telephony Best Practice YouTube SharePoint Samsung Content Management Black Market Business Technology Access Control Value Procurement Workplace Strategy Customer Service Net Neutrality Virtual Assistant Spam Blocking Authentication Electronic Medical Records Document Management Environment Solid State Drive Help Desk Wireless Technology Fax Server Printing How to Downtime Hiring/Firing Virus SaaS Update Data storage Unified Threat Management Automobile Managed Services Provider Computer Accessories Google Docs Database Computing Infrastructure Network Congestion Identity Theft Remote Workers Going Green Business Intelligence eWaste Audit Worker Processor Printer IT Management Augmented Reality Battery Bluetooth Botnet Shadow IT Fraud Hard Drive Legal IT Plan Wearable Technology Remote Worker Retail Hard Drives Internet Exlporer Instant Messaging IBM Recycling Smartwatch Running Cable Ergonomics Flash Notifications Wiring Practices Development Smart Technology Memory OLED Cache PCI DSS Amazon Web Services Virtual Machine Supercomputer Criminal Fiber Optics Employee Software Tips Safe Mode 2FA Sync GDPR Emails Hosted Computing Messaging Cabling Relocation Wireless Internet Policy Online Shopping Hypervisor Trend Micro Video Games Science File Sharing Dark mode Camera Netflix Inventory SMS Two Factor Authentication Specifications Worker Commute Default App Consultant Root Cause Analysis Wire Procedure Evernote Experience Saving Time Knowledge Customer Relationship Management Shopping Music Travel Scalability Google Search Analytics HBO Distributed Denial of Service dark theme Skype Printers AI Millennials Business Owner Analyitcs IT Infrastructure Bing Best Available NarrowBand Data loss Smart Office FinTech Wireless Charging Programming Leadership Social Network Troubleshooting Search WIndows 7 Outlook Start Menu Virtual Private Network Workforce Investment iPhone Employee/Employer Relationships Screen Mirroring Antivirus Employees Loyalty Cables Windows 365 Books Windows 8 ISP Frequently Asked Questions Mobile Project Management Windows 10s Nanotechnology IT service Video Conferencing Telecommuting ROI Files Bitcoin Shortcuts Chromecast Cast Sales Cortana Point of Sale Windows Media Player webinar Digital Signature Personal Emergency Tablet Cryptomining User PowerPoint Tip of the week Colocation Professional Services Uninterrupted Power Supply Warranty Public Cloud Domains Supply Chain Management Employer Employee Relationship Google Apps Batteries HVAC Monitoring Assessment IaaS Windows 8.1 Analysis Maintenance Digitize Managing Stress Monitor Windows Server 2008 Tools Administrator Devices Bloatware Windows Server 2008 R2 Cameras Enterprise Content Management Customer relationships Television Streaming Media MSP Email Best Practices Accountants IT Assessment Tablets Manufacturing Reputation Tech Support Microchip Thought Leadership Credit Cards Content Entrepreneur Password Manager Managed IT Service Techology Security Cameras Laptop Password Management Computer Tips Public Computer Regulations Virtual CIO Shortcut OneDrive Transportation Multi-Factor Security Biometric Security Customers Search Engine Computer Fan Twitter Peripheral Rootkit Audiobook Cost Management Business Mangement Social Networking Using Data Touchpad Printer Server NIST Digital Security Cameras Workers Smart Tech Copiers Benefits Trending 5G Advertising FENG Addiction Quick Tip Amazon Politics

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code