Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android Disaster Recovery VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Upgrade Phishing Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Virtualization Saving Money Holiday Gadgets Social Media Chrome Tech Term Managed IT Services Managed Service Automation Microsoft Office Computers Artificial Intelligence Facebook Operating System Cybercrime BYOD Internet of Things Mobile Device Management Networking Wi-Fi IT Support Hacking Health Remote Spam Alert Office 365 Telephone Systems Covid-19 Information Managed Service Provider Information Technology Router BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Mobile Computing Law Enforcement Remote Monitoring Application App History Password Money Big Data Encryption Applications Data Breach Human Resources Remote Computing Government Mobile Office Private Cloud How To Blockchain Paperless Office Managed IT Office Tips Apps Training Data Storage Patch Management VPN Servers Marketing Two-factor Authentication WiFi IT solutions Avoiding Downtime Entertainment Mouse Website HaaS Budget Data Security Bring Your Own Device Data Management Work/Life Balance Wireless Infrastructure Voice over Internet Protocol Vulnerability Gmail Windows 7 Word Settings Google Drive Flexibility Data Protection Keyboard Vendor Management Virtual Reality Apple Social USB User Error Meetings Vendor Save Time Managed Services Software as a Service Display Telephone System Staff Risk Management Machine Learning Hacker Cleaning Connectivity Remote Work Employee/Employer Relationship The Internet of Things Lithium-ion battery Conferencing RMM End of Support Education Physical Security Scam Safety Firewall HIPAA Sports Redundancy SaaS Cryptocurrency Proactive IT Unsupported Software Best Practice Procurement Comparison Net Neutrality Printer Network Congestion Workplace Strategy YouTube Charger Black Market Bluetooth eWaste Compliance CES Help Desk OneNote Computer Care Printing Current Events Document Management Telephony Business Technology Content Management Access Control Solid State Drive Wireless Technology Samsung Downtime Managed Services Provider IT Consultant How to Wearable Technology Retail Virtual Assistant Hard Drives Authentication Database Value Instant Messaging Data storage Robot Excel Humor Automobile Spam Blocking Electronic Medical Records Remote Workers Biometrics Virtual Desktop Processor Update Computing Infrastructure Hiring/Firing Going Green DDoS Hard Drive Google Docs Identity Theft SharePoint Battery Shadow IT Computing Legal Business Intelligence Customer Service Virus Audit Augmented Reality Internet Exlporer Worker Environment Fraud IT Management Unified Threat Management Fax Server Digital Signage Botnet Computer Accessories PDF Remote Worker IT Plan Relocation Workers Procedure Benefits Tablet Recycling Saving Time Google Search Cameras FENG Domains Wiring dark theme Practices Shopping IBM Cache AI Amazon Web Services IT Infrastructure Video Games Worker Commute Flash IaaS Maintenance Safe Mode FinTech Smart Technology Criminal Bing Experience GDPR Bloatware Hosted Computing Social Network Supercomputer Wireless Internet Online Shopping Investment Scalability Software Tips Business Owner Sync Emails File Sharing Employees Tablets Employee/Employer Relationships Specifications ISP Printer Server Camera Windows 365 NarrowBand Entrepreneur Inventory Wire Video Conferencing Evernote ROI Search iPhone Netflix Shortcut Sales Two Factor Authentication Bitcoin Travel Shortcuts Personal Millennials Cryptomining Root Cause Analysis Printers Point of Sale Cost Management Knowledge Social Networking Smart Office Supply Chain Management Music Wireless Charging HBO Skype Files Monitoring Batteries Digitize Workforce Data loss Virtual Private Network Windows 8.1 Chromecast Running Cable Leadership Troubleshooting Cables Windows Server 2008 R2 Outlook Start Menu Colocation Customer relationships Uninterrupted Power Supply Memory Nanotechnology IT Assessment Telecommuting Manufacturing Screen Mirroring Project Management Email Best Practices Loyalty Frequently Asked Questions Monitor Books Cortana Security Cameras Consultant Mobile Windows 10s Computer Tips Digital Signature Managed IT Service OneDrive Biometric Security Analytics Cast Warranty Virtual CIO Tip of the week Reputation webinar HVAC Peripheral Streaming Media Emergency Science Google Apps Best Available Content Professional Services Public Cloud Digital Security Cameras Tech Support Employer Employee Relationship Analysis Using Data Laptop Assessment Devices Copiers 5G WIndows 7 Techology Administrator Windows Server 2008 Distributed Denial of Service Customers Customer Relationship Management Enterprise Content Management Quick Tip Smartwatch Audiobook Tools MSP Ergonomics Analyitcs Accountants Touchpad Television Programming Thought Leadership Development Credit Cards OLED Microchip Password Management PCI DSS Password Manager Virtual Machine Multi-Factor Security Employee Politics Advertising 2FA Fiber Optics Public Computer Twitter Messaging Cabling User PowerPoint Antivirus Search Engine Windows Media Player Regulations NIST Policy Notifications Transportation Windows 8 Business Mangement Hypervisor Trending Computer Fan IT service Dark mode Rootkit Smart Tech Trend Micro Addiction SMS Amazon Default App Managing Stress

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code