Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Phishing Managed IT Services Windows Ransomware Data Backup Outsourced IT Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Gadgets Social Media Tech Term Chrome Virtualization Managed IT Services Managed Service Automation Microsoft Office Computers Artificial Intelligence Facebook Operating System Cybercrime BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Hacking Health Remote Spam Office 365 Alert Telephone Systems Information Covid-19 Managed Service Provider Information Technology BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router Mobile Computing Remote Monitoring Law Enforcement Application App History Password Money Big Data Encryption Applications Human Resources Data Breach Government Mobile Office Private Cloud Blockchain Paperless Office Managed IT How To Office Tips Training Apps VPN Data Storage Patch Management Remote Computing Servers WiFi Mouse Avoiding Downtime IT solutions HaaS Entertainment Website Budget Data Security Bring Your Own Device Data Management Wireless Work/Life Balance Infrastructure Voice over Internet Protocol Gmail Settings Vulnerability Windows 7 Word Google Drive Flexibility Two-factor Authentication Marketing Vendor Management Social User Error Meetings USB Save Time Vendor Telephone System Staff Software as a Service Managed Services Risk Management Machine Learning Display Hacker Remote Work Connectivity Cleaning The Internet of Things Lithium-ion battery Employee/Employer Relationship RMM End of Support Conferencing Education Physical Security Firewall Safety Scam Sports HIPAA Data Protection Virtual Reality Redundancy Apple Keyboard Comparison Network Congestion Best Practice eWaste Procurement Net Neutrality Unsupported Software YouTube Workplace Strategy CES Printer Black Market Bluetooth Charger Help Desk Business Technology Content Management Printing Compliance Access Control OneNote Computer Care Wearable Technology Document Management Hard Drives Solid State Drive Virtual Assistant Wireless Technology Current Events Retail Managed Services Provider Instant Messaging How to Telephony Downtime IT Consultant Authentication Samsung Robot Excel Database Humor Biometrics Data storage Value Remote Workers Virtual Desktop Automobile Update Electronic Medical Records Processor Spam Blocking Computing Infrastructure DDoS Going Green Google Docs Hiring/Firing Identity Theft SharePoint Hard Drive Battery Shadow IT Computing Customer Service Environment Legal Augmented Reality Fraud Business Intelligence Internet Exlporer Virus Fax Server Remote Worker Worker Unified Threat Management Audit Digital Signage PDF IT Management Cryptocurrency SaaS Computer Accessories Botnet IT Plan Proactive IT Benefits AI IT Infrastructure Bloatware Video Games GDPR Workers Hosted Computing FENG Wireless Internet FinTech Online Shopping Worker Commute Bing Tablets File Sharing IBM Social Network Experience Smart Technology Specifications Investment Entrepreneur Scalability Flash Camera Inventory Wire Employees Evernote Employee/Employer Relationships Business Owner ISP Software Tips NarrowBand Supercomputer Windows 365 Printer Server Travel Shortcut Video Conferencing Millennials ROI Cost Management Search Sync Printers Emails iPhone Smart Office Sales Wireless Charging Bitcoin Social Networking Shortcuts Cryptomining Point of Sale Personal Two Factor Authentication Supply Chain Management Workforce Virtual Private Network Netflix Files Root Cause Analysis Monitoring Cables Running Cable Batteries Memory HBO Chromecast Knowledge Windows 8.1 Music Digitize Telecommuting Windows Server 2008 R2 Skype Project Management Nanotechnology Colocation Data loss Uninterrupted Power Supply Customer relationships Cortana Manufacturing Outlook Leadership Email Best Practices Digital Signature Troubleshooting IT Assessment Start Menu Warranty Monitor Science Screen Mirroring HVAC Loyalty Computer Tips Consultant Google Apps Managed IT Service Security Cameras Biometric Security Frequently Asked Questions Virtual CIO Analysis Books OneDrive Analytics Devices Streaming Media Peripheral Mobile Administrator Reputation Windows 10s Cast Enterprise Content Management Tech Support Digital Security Cameras Best Available Distributed Denial of Service Using Data Customer Relationship Management Content 5G Analyitcs Techology Tip of the week MSP Laptop webinar WIndows 7 Accountants Emergency Copiers Thought Leadership Employer Employee Relationship Quick Tip Credit Cards Programming Professional Services Microchip Customers Public Cloud Password Management Assessment Ergonomics Password Manager Audiobook Smartwatch Development Multi-Factor Security OLED Windows Server 2008 Touchpad Twitter PCI DSS Antivirus Virtual Machine Tools Search Engine Employee Windows 8 Advertising NIST Television 2FA Business Mangement Fiber Optics Politics Messaging PowerPoint Trending IT service Cabling Windows Media Player User Smart Tech Addiction Notifications Policy Amazon Hypervisor Tablet Public Computer Dark mode Recycling Trend Micro SMS Domains Default App Regulations Wiring Managing Stress Practices Transportation Computer Fan Cache Rootkit Procedure Amazon Web Services Saving Time Relocation Google Search Safe Mode dark theme Criminal IaaS Shopping Cameras Maintenance

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code