Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Upgrade Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Save Money Data Recovery Cloud Computing Office Server Passwords Windows 10 Chrome Virtualization Tech Term Social Media Saving Money Gadgets Holiday Microsoft Office Managed Service Managed IT Services Automation Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things BYOD Mobile Device Management Networking Health Wi-Fi IT Support Managed Service Provider Covid-19 Spam Office 365 Information Telephone Systems Information Technology Alert Remote Social Engineering Mobility Router BDR Employer-Employee Relationship Bandwidth Recovery Big Data Remote Monitoring Encryption Applications App History Mobile Computing Law Enforcement Application Human Resources Password Data Breach Money Mobile Office Blockchain Paperless Office How To Government Office Tips Training Private Cloud VPN Data Storage Patch Management Managed IT Remote Computing Apps Servers Mouse HaaS Google Drive Data Security Flexibility Marketing WiFi Avoiding Downtime Wireless Infrastructure Voice over Internet Protocol IT solutions Entertainment Website Budget Gmail Settings Vulnerability Windows 7 Bring Your Own Device Data Management Word Two-factor Authentication Work/Life Balance Managed Services Vendor Management Display Social End of Support Physical Security User Error Education Meetings Safety Software as a Service Telephone System Employee/Employer Relationship Staff HIPAA Sports RMM Machine Learning Redundancy Connectivity Keyboard Remote Work Risk Management Hacker The Internet of Things Lithium-ion battery USB Save Time Conferencing Data Protection Firewall Scam Cleaning Virtual Reality Apple Vendor Network Congestion Remote Workers eWaste Business Technology Content Management Battery Unsupported Software Access Control Shadow IT Processor Legal Charger Virtual Assistant Authentication Internet Exlporer Hard Drive Compliance Virus Computer Care Wearable Technology OneNote Retail Hard Drives Current Events PDF Telephony Instant Messaging Unified Threat Management Computer Accessories Excel Samsung Update Computing Robot Proactive IT Biometrics Value Google Docs Best Practice Virtual Desktop Identity Theft YouTube Black Market Spam Blocking Electronic Medical Records Printer DDoS Digital Signage Bluetooth SharePoint Hiring/Firing Document Management Augmented Reality Fraud Solid State Drive Wireless Technology Downtime Procurement How to Customer Service Workplace Strategy Remote Worker Net Neutrality IT Consultant Environment Data storage Cryptocurrency Help Desk Fax Server Business Intelligence Automobile Printing Humor Worker Audit IT Management Comparison Computing Infrastructure SaaS Managed Services Provider Going Green Botnet CES Database IT Plan Windows Server 2008 R2 Wire Bloatware Workers Evernote Techology Benefits Laptop Travel Customers Customer relationships Best Available FENG Manufacturing WIndows 7 Audiobook Tablets IBM Millennials Email Best Practices IT Assessment Printers Flash Smart Office Entrepreneur Wireless Charging Smart Technology Touchpad Computer Tips Managed IT Service Security Cameras Biometric Security Shortcut Software Tips Politics Supercomputer Workforce Advertising Virtual CIO OneDrive Virtual Private Network Peripheral Sync Cost Management Emails Cables Digital Security Cameras Notifications Using Data Social Networking 5G User Nanotechnology PowerPoint Telecommuting Windows Media Player Copiers Project Management Quick Tip Netflix Cortana Two Factor Authentication Relocation Ergonomics Running Cable Smartwatch Root Cause Analysis Digital Signature Warranty OLED Managing Stress HBO Memory Knowledge Music Development PCI DSS Virtual Machine Skype HVAC Google Apps Video Games Analysis Worker Commute Cameras 2FA Fiber Optics Employee Data loss Administrator Cabling Outlook Devices Experience Leadership Troubleshooting Messaging Policy Hypervisor Start Menu Enterprise Content Management Scalability Accountants Business Owner Science Loyalty Dark mode Trend Micro MSP Screen Mirroring Microchip Default App Frequently Asked Questions Thought Leadership Credit Cards Books NarrowBand SMS Procedure Saving Time Mobile Password Management Windows 10s Password Manager Search Printer Server Multi-Factor Security iPhone dark theme Shopping Distributed Denial of Service Google Search Customer Relationship Management Cast Search Engine IT Infrastructure Tip of the week Twitter Analyitcs webinar Emergency AI FinTech Professional Services NIST Bing Programming Public Cloud Business Mangement Employer Employee Relationship Smart Tech Assessment Trending Files Social Network Investment Windows Server 2008 Addiction Amazon Chromecast Employees Employee/Employer Relationships Antivirus Tools Recycling Practices Windows 8 Television Colocation Windows 365 Uninterrupted Power Supply Wiring ISP ROI IT service Cache Amazon Web Services Video Conferencing Monitor Sales Bitcoin Safe Mode Shortcuts Criminal Hosted Computing Tablet Public Computer Point of Sale Personal GDPR Cryptomining Supply Chain Management Domains Regulations Wireless Internet Online Shopping Transportation Rootkit Reputation Monitoring Streaming Media Batteries File Sharing Consultant Computer Fan Maintenance Inventory Content Analytics Specifications Windows 8.1 Tech Support Digitize IaaS Camera

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code