Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Managed IT Services Upgrade Data Backup Outsourced IT Ransomware Windows 10 Save Money Cloud Computing Office Data Recovery Server Windows 10 Passwords Chrome Virtualization Tech Term Saving Money Holiday Gadgets Social Media Microsoft Office Managed Service Managed IT Services Automation Cybercrime Operating System Computers Facebook Artificial Intelligence Health Hacking BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Managed Service Provider Covid-19 Information Spam Office 365 Telephone Systems Remote Information Technology Alert Social Engineering Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Password Human Resources Big Data Money Encryption Remote Monitoring Applications Mobile Computing App Law Enforcement Application History Data Breach Paperless Office Apps Remote Computing Mobile Office How To Government Data Storage Office Tips Patch Management Training Private Cloud VPN Managed IT Blockchain Work/Life Balance Two-factor Authentication Data Security Mouse HaaS Infrastructure Voice over Internet Protocol Flexibility Google Drive Marketing WiFi IT solutions Entertainment Website Avoiding Downtime Budget Wireless Vulnerability Windows 7 Word Gmail Settings Bring Your Own Device Servers Data Management Cleaning Software as a Service Telephone System Staff Virtual Reality Machine Learning Apple Connectivity Remote Work Employee/Employer Relationship End of Support RMM Social Physical Security Education User Error Safety Meetings HIPAA Sports Redundancy Keyboard Risk Management Data Protection Hacker USB Conferencing The Internet of Things Scam Lithium-ion battery Save Time Vendor Managed Services Firewall Vendor Management Display Computing Infrastructure Unsupported Software Processor Going Green SaaS Charger Update Hard Drive Compliance OneNote Computer Care Battery Current Events Network Congestion Shadow IT Telephony Google Docs eWaste Legal Virus Identity Theft Computing Samsung Unified Threat Management Internet Exlporer Computer Accessories Value PDF Spam Blocking Wearable Technology Electronic Medical Records Augmented Reality Hard Drives Fraud Retail Digital Signage Instant Messaging Proactive IT Hiring/Firing Robot Remote Worker Printer Excel Best Practice Bluetooth Biometrics Cryptocurrency YouTube Black Market Procurement Virtual Desktop Net Neutrality Workplace Strategy Comparison DDoS Help Desk Document Management Business Intelligence Printing IT Consultant SharePoint Solid State Drive Wireless Technology CES Downtime Audit Worker How to Humor IT Management Managed Services Provider Business Technology Content Management Data storage Access Control Botnet Customer Service Automobile Database Environment IT Plan Virtual Assistant Authentication Remote Workers Fax Server IT service Manufacturing Email Best Practices Cables IT Assessment IBM Smart Technology Best Available Flash Tablet Reputation Nanotechnology Streaming Media Computer Tips Telecommuting Managed IT Service WIndows 7 Security Cameras Project Management Domains Content Biometric Security Tech Support Virtual CIO Cortana Software Tips OneDrive Supercomputer Sync Peripheral Emails Techology Laptop Digital Signature Warranty Customers Digital Security Cameras IaaS Using Data Maintenance Audiobook 5G Bloatware HVAC Google Apps Copiers Analysis Quick Tip Netflix Two Factor Authentication Touchpad Administrator PowerPoint Tablets Devices Windows Media Player Ergonomics Root Cause Analysis User Smartwatch Knowledge Politics OLED Music Entrepreneur Advertising Enterprise Content Management HBO Development Accountants Skype PCI DSS Virtual Machine MSP Microchip Thought Leadership Notifications 2FA Credit Cards Data loss Fiber Optics Managing Stress Shortcut Employee Leadership Cabling Troubleshooting Cost Management Password Management Password Manager Outlook Messaging Start Menu Policy Multi-Factor Security Hypervisor Social Networking Cameras Search Engine Relocation Twitter Dark mode Screen Mirroring Trend Micro Loyalty SMS Default App Books NIST Business Mangement Frequently Asked Questions Smart Tech Mobile Procedure Trending Windows 10s Running Cable Saving Time Video Games Worker Commute Google Search Memory Addiction dark theme Amazon Cast Shopping AI webinar Experience IT Infrastructure Emergency Recycling Tip of the week Practices Professional Services FinTech Public Cloud Employer Employee Relationship Scalability Bing Wiring Printer Server Business Owner Cache Amazon Web Services Social Network Assessment Investment Safe Mode NarrowBand Criminal Windows Server 2008 Hosted Computing Tools Employees Employee/Employer Relationships Search GDPR Science ISP iPhone Wireless Internet Windows 365 Online Shopping Television Video Conferencing ROI File Sharing Inventory Sales Specifications Distributed Denial of Service Bitcoin Customer Relationship Management Shortcuts Camera Cryptomining Analyitcs Files Wire Point of Sale Evernote Personal Public Computer Supply Chain Management Travel Transportation Programming Chromecast Regulations Monitoring Millennials Computer Fan Batteries Rootkit Printers Colocation Smart Office Uninterrupted Power Supply Windows 8.1 Wireless Charging Digitize Workers Antivirus Windows Server 2008 R2 Benefits Consultant Analytics Windows 8 Monitor Customer relationships Workforce FENG Virtual Private Network

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code