facebook linkedin twitter

Computerware Blog

Tip of the Week: How to Type Special Characters Like Accents

b2ap3_thumbnail_special_characters_alt_codes_400.jpgWhat’s the difference between a cafe and a café? By definition, there’s no difference, but to a coffee aficionado, that symbol above the ‘e’ makes all the difference. But how do you type special characters like this? Here are two easy ways.

Copy/Paste What You Need
One way to type special characters is to cheat by copying and pasting. To do this, use Google Search to find the word you need with its special character. For example, if you search for “cafe,” then you’ll inevitably see the word “café” in the results. Simply copy and paste the word you need into your document. Just make sure you paste it as plain text. Otherwise, you might have conflicting fonts.

Although, in order to have the pasted word match the style of the rest of your document, you may have to reformat it. To do this, highlight the word and clear its formatting with Ctrl+\. Next, adjust the font, font size, color, and other style properties to match the rest of your text.

Use Alt Codes
The average PC user might not know about Alt codes. Basically, Alt codes allow you to enter in a string of characters while holding down the Alt key. When you release it, it should result in a special character. Just be sure that you’re using the number pad on the right-hand side of the keyboard. Otherwise, if you’re using the normal numbers on the top of the keyboard, it won’t work. You can find a list of codes here.

Now that you know how to type special characters, you’ll never again be limited to only what you can see on your keyboard. For more useful tech tips, subscribe to Computerware’s blog and be sure to check back every week!

PC Users Share Some of the Blame For Falling Victi...
5 Cloud Security Issues that Every Business Has In...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, December 03, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Network Security Microsoft Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity Saving Money IT Services Malware Efficiency Google Innovation Small Business Computer User Tips Collaboration IT Support VoIP Quick Tips Smartphones Data Backup Network IT Support Mobile Devices communications Business Continuity Data Recovery Microsoft Office Gadgets Disaster Recovery Android Cybersecurity Social Media Smartphone Upgrade Phishing Mobile Office Communication Server Virtualization Miscellaneous Mobile Device Management Windows Mobile Device Ransomware Passwords Users Managed IT Services Holiday Operating System Vendor Management Windows 10 Apps BDR Outsourced IT Internet of Things Tech Term Unified Threat Management Remote Monitoring Facebook Automation BYOD Remote Computing Managed IT services Apple Mobile Computing Data Management Analytics WiFi Windows 10 Artificial Intelligence Browser Cloud Computing Save Money Marketing The Internet of Things Training Help Desk History Managed Service Firewall Covid-19 Business Technology App Encryption Big data Spam Health Alert Information Technology Office 365 Budget Two-factor Authentication Bandwidth Office IT Consultant Cybercrime Content Filtering Going Green Information Maintenance Hard Drives Printer Bring Your Own Device Access Control Antivirus VPN Gmail Windows 7 Blockchain Managed IT Government Recovery Employer-Employee Relationship Retail Windows 8 Lithium-ion Battery Outlook Best Practice Cost Management Networking Wi-Fi Document Management Hiring/Firing Healthcare Tech Support Virus Remote Work Wireless Technology Saving Time Computers Search Conferencing Data Loss Update iPhone Hacking Project Management IBM Money Humor Augmented Reality Computing Customer Service It Management Data Security Travel Phone System Storage Education Data storage Current Events Avoiding Downtime Flexibility Risk Management Voice over Internet Protocol Laptop Data Breach Value Password Legal Save Time Hacker Downtime Customer Relationship Management Regulations PowerPoint Proactive IT SaaS Computer Repair Running Cable Vendor End of Support File Sharing Administration Law Enforcement Applications Hard Drive Wireless Twitter Intranet Compliance Mobility Website Patch Management Solid State Drive Social Engineering Remote Scam Black Market Word Cryptocurrency Net Neutrality Meetings Monitoring Chrome Business Intelligence Private Cloud Cortana Business Growth Excel Digital Digital Payment Fax Server Telephony Websites Router Management Machine Learning Employee/Employer Relationship Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Sports Cooperation Software as a Service Company Culture User Disaster Virtual Desktop Social Networking Hosted Solution Robot Social Securty Google Maps DDoS Emails Bluetooth Streaming Media Automobile Inbound Marketing Chromebook Co-managed IT Cost User Error Integration Redundancy Smart Devices Computing Infrastructure Hack Google Docs Pain Points Memory How To eWaste Download Managed Services Provider Evernote Experience Video Conferencing Display Monitors Lifestyle Virtual Assistant Cleaning Office Tips Multi-factor Authentication How To Computer Accessories Microchip Taxes Managed Services Telephone Processors Start Menu Tech Terms USB Managed IT Service Mobile Technology YouTube Distributed Denial of Service Trending Presentation Gaming Console Unified Communications Settings Mouse Public Cloud Licensing Uninterrupted Power Supply Processor Webcam Specifications Safety Vulnerability Text Messaging Statistics Bitcoin Programming Identity Theft Notifications IT service Network Congestion Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Solutions Employees Downloads Politics Professional Services Virtual Reality Virtual Private Network Recycling Mobile Security GDPR Managing Risk Time Management Freedom of Information LiFi Analytic Telephone System Printers PDF SQL Server Corporate Profile Motion Sickness Best Available Tech Keyboard Hypervisor Assessment Leadership SharePoint FinTech Multi-Factor Security Product Reviews Scalability Adminstration Pirating Information Development Software License Trends Fileless Malware Hybrid Cloud Google Calendar Data Storage Deep Learning Devices Messenger Tracking Domains Holidays Tip of the week Work/Life Balance Fraud Tactics Read Webinar Procurement UTM Content Rental Service Modem Public Speaking Strategy Touchscreen News Visible Light Communication Reviews Proxy Server Azure VoIP Enterprise Resource Planning Web Server Term Shortcut Consultation IT consulting Organization Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Directions Entrepreneur Technology Tips PCI DSS Accountants Business Managemenet A.I. Books Workers Troubleshooting Recording Optimization Communitications email scam Content Management Addiction Administrator Audit CIO Supply Chain Management Supercomputer HIPAA SSID Upselling Fake News Advertising Flash Dark Web Environment Free Resource Migration online Currency Connected Devices Processing Competition Data Warehousing Windows XP AI Wireless Headphones Worker Best Practives Health IT Electronic Payment Video Surveillance Staffing Internet Service Provider Google Wallet Wasting Time Access Saving ZTime Regulations Compliance Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal IT Assessment Society Network Management Computer Care Remote Working Micrsooft Device security LinkedIn MSP Employer Employee Relationship Microserver IP Address Cyber security Microsoft Excel G Suite Bookmark Desktop Finance Hacks Physical Security Google Play Application Telephone Service Harddrive Google Drive Windows Server 2008 Supply Chains Nanotechnology Social Network Employer/Employee Relationships Human Resources Debate Drones Botnet Managing Costs Spyware Mobile Payment Financial Data Startup Skype Asset Tracking Relocation Tablets Get More Done Microsoft 365 GPS Electronic Health Records Business Cards Archive Service Level Agreement Banking External Harddrive Electricity Printing Username Turn Key Medical IT Trend Micro Memes Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Printer Server Browsers Gamification CCTV Digital Signature Security Cameras Threats 2FA Point of Contact Screen Reader Customer Resource management Trojan User Tip Proactive Maintenance Managing IT Services Business Metrics Computer Malfunction Organize Navigation Virtual Machine cache Thin CLient Television switches Telework Writing Smart Tech Reliable Computing 3D Ebay Surveillance Music Piracy Upload Smart Phones WannaCry Remote Workers Upgrades HTML eCommerce IT Fiber-Optic Database In Internet of Things Data Analysis Managing Stress CrashOverride Regulation 3D Printing Capital Productuvuty Personal Information Financial