Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

LiFi Administrator Tech Terms Scam Two-factor Authentication Network Electronic Health Records Comparison Smartphone Customer Service Spam Consulting Unified Threat Management Update Big Data Computer Care Managing Stress Writing Humor Management Software Error Data Identity Multi-Factor Security Server Sports Time Management Laptop Managed IT Service eWaste Theft Presentation Hard Drive Business Owner Google Maps Statistics Test RMM Travel Notifications Typing VPN Server Management Managed IT services Data storage Superfish Computer Infrastructure Information Technology Hosted Solutions Document Management Employee-Employer Relationship Mobile Office Software as a Service Redundancy The Internet of Things Computing Infrastructure Connectivity Uninterrupted Power Supply Black Friday Consumers Hard Disk Drive Business Continuity Migration Work/Life Balance Mail Merge Gadget User Error Mobile Device Management Avoiding Downtime Bandwidth Windows 10 Mobile Computing Miscellaneous Social Cameras Data Backup Scary Stories CIO Unified Threat Management Printer Tech Support Upgrades Social Engineering Backups Holiday Taxes Phone System Break Fix Microsoft Programming Refrigeration Managed Service Cybersecurity Telephony Intranet Gmail Administration Computing Smart Technology Physical Security Mobile Data MSP PowerPoint Remote Workers Chromebook GPS User Hackers Zero-Day Threat Microsoft Office Processors Security Cooperation OneNote Consultation Legal Cybercrime Internet Exlporer File Sharing Regulations Cache Maintenance Monitoring Servers Malware Marketing Nanotechnology Politics Settings Shortcut Firefox Mobile Device Managment Disaster Education Mobility Software Tips Hosted Solution Mobile Remote Computing Cloud Remote Monitoring and Management Training Upgrade Patch Management Lenovo IT Technicians Machine Learning Managed IT Employer-Employee Relationship Technology Tips Mouse Budget Botnet Identity Theft Firewall Content Filtering Risk Management Government Tip of the Week Monitors Domains Digital Network Congestion Hacker Cyber Monday Users Privacy Compliance Flexibility Webcam Twitter Business Computing Saving Time Data Management Virus Piracy Apps Technology WPA3 Recycling Cleaning Analyitcs Collaboration Phishing Windows 8 IT Management Wireless Technology Bookmarks Staff Knowledge Black Market Proactive Public Speaking Vulnerabilities Web Server Fleet Tracking App Data Warehousing Unsupported Software Encryption Favorites Wearable Technology Efficiency Lithium-ion Battery Health Cabling Tip of the week Authentication Backup Hacking IT Consulting Office Tips Business Intelligence Applications Virtual Reality Techology Social Networking User Tips Cyberattacks Identities Utility Computing Hiring/Firing Hard Drives YouTube Halloween Business Growth Windows End of Support Workplace Tips Operations Google Disaster Resistance Going Green Recovery Development iPhone Business Technology Net Neutrality Retail How To Quick Tips Mobile Security E-Commerce Personal Information Disaster Recovery Antivirus Robot Wireless Office 365 Human Error Smartphones Unified Communications Procurement Tech Term Cables Remote Worker communications Automation Hacks Entrepreneur Hotspot Sync Instant Messaging Data Security CCTV Geography Proactive IT Remote Monitoring Windows 10 IBM Cortana Small Business Conferencing Features Authorization Specifications Saving Money Paperless Office Business Management Best Practice Money Cryptocurrency Solid State Drive Spyware Troubleshooting Data loss IT Budget Router Star Wars Alt Codes Application Augmented Reality Virtualization Best Practices Screen Reader BDR Assessment Microsoft Excel Website Cloud Computing ROI Access Control Address IT Services Google Drive Co-managed IT Computers Point of Sale How To Finance Staffing Innovation Data Breach Data Recovery Corporate Profile Communication Apple Google Calendar Bluetooth Healthcare Digital Signature Meetings Word Motion Sickness Save Money Supercomputer Permission Dark Data History Virtual Desktop Display IP Address Employees Crowdsourcing Technology Laws Security Cameras Productivity Mobile Device 5G Search Google Docs Tablet IT Support Vendor Management Digital Payment IT solutions Hardware Mirgation Deep Learning Running Cable Business Computer Repair Gadgets Bitcoin Enterprise Resource Planning HIPAA Read Only Customer Relationship Management Language Permissions Smart Tech Asset Tracking Vulnerability Virtual Private Network Artificial Intelligence Alert Information IT Consultant Files Chatbots Private Cloud Save Time Productivity Networking Internet of Things Financial Company Culture USB Buisness Downloads Email VoIP Managed Service Provider Google Wallet IT Support Safety Undo Ransomware Alerts Public Cloud Relocation Storage Websites Network Security Browser High-Speed Internet Distributed Denial of Service Blockchain Outsourced IT Fun Legislation IoT Network Management Chrome Operating System Automobile Wires WannaCry G Suite Tracking Touchscreen Passwords Social Media Licensing Documents PDF SaaS Motherboard Backup and Disaster Recovery 3D Printing Wi-Fi Outlook Law Enforcement Drones WiFi Modem Fraud Internet Electronic Medical Records Cost Management Telephone Systems Environment Project Management Enterprise Content Management Downtime Samsung Dark Web Mobile Devices Experience Current Events Cookies Help Desk Analytics BYOD Android VoIP IT service Trending Managed Services Provider Printing Heating/Cooling Competition Managed IT Services Emoji Office Facebook Bring Your Own Device Password SharePoint

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code