(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Malware Backup Internet Google Mobile Devices Efficiency VoIP IT Support Business Email Network Security IT Services Managed Service Provider Miscellaneous Server Innovation Data Workplace Tips Upgrade Disaster Recovery Business Continuity Network Software Windows Business Management Saving Money Hardware Managed IT Services Communication Computer Save Money Android Mobile Device Management Virtualization Smartphone Browser communications User Tips Data Backup Smartphones Outsourced IT Holiday Cybercrime Microsoft Office Computers Internet of Things BYOD Windows 10 WiFi Data Recovery Mobile Computing Hacking Chrome Big Data Ransomware Small Business Cloud Computing Social Media Remote Monitoring Operating System Collaboration IT Solutions VPN Alert Application Apple Managed IT Services Automation Proactive IT Avoiding Downtime Office Marketing Budget The Internet of Things Quick Tips Social Engineering Information Technology BDR Employer-Employee Relationship Tech Term Passwords Going Green Remote Computing Health Mobility Bring Your Own Device Managed IT Recovery spam Gadgets Telephone Systems Bandwidth Artificial Intelligence Cybersecurity Redundancy Wireless Technology Office 365 User Error Two-factor Authentication How To Document Management Vulnerability Data Security Vendor Management Website iPhone Money IT Support Save Time Firewall App Data Protection Router Gmail Business Intelligence Private Cloud Compliance Networking Mouse Apps Data Management Phishing Risk Management Identity Theft PowerPoint Excel Phone System Antivirus Office Tips Content Filtering Downtime Law Enforcement Facebook History Entertainment Tablet Productivity Lithium-ion battery Analytics Word Value Windows 10 Connectivity Retail Memory Search People Servers Safety Work/Life Balance Programming Government Cleaning Smart Tech Network Congestion IT Plan Trending Meetings CES Education HaaS Unsupported Software Fax Server Data loss IT Consultant Black Market Content Management Update Public Cloud Humor Saving Time Statistics Streaming Media Internet Exlporer Online Currency Data storage HIPAA Biometrics Encryption Sports Outlook Credit Cards Printer eWaste YouTube Flexibility USB Hard Drives Solid State Drive Current Events Applications Administration Infrastructure Maintenance Analysis Data Storage Running Cable Workers Physical Security DDoS Unified Threat Management Robot Comparison Skype Windows 7 Business Owner Mobile Office Environment Google Drive Customer Relationship Management OneNote Intranet Human Resources SaaS Mobile Device Training Best Available IT Management Domains Wireless Charging Healthcare Bloatware Criminal IaaS Internet exploMicrosoft Cameras Customer Service Root Cause Analysis Workforce Thought Leadership Video Surveillance Fiber-Optic Electronic Health Records Flash Consultant Entrepreneur Software as a Service Patch Management Advertising Tech Support Printer Server Insurance Telecommuting Content Filter Cables Machine Learning Sync Hacker Worker Commute Cost Management Piracy Scam Charger Software Tips Shadow IT Practices Remote Work Storage Unified Communications HVAC Telephony User Wireless Science Hybrid Cloud Instant Messaging Blockchain Company Culture Licensing Google Docs Computer Care Shortcut Hosted Computing Addiction Windows 8.1 Update Samsung Theft Start Menu SharePoint Twitter Windows 8 PDF Staff Spam Blocking Voice over Internet Protocol Audit HBO Inventory Bluetooth Cache Crowdfunding Cortana Mobile Monitor Keyboard Tablets Digital Signature Multi-Factor Security Screen Mirroring Notifications Frequently Asked Questions Access Control Fraud Wireless Internet Google Apps Professional Services Print Server Reputation Wearable Technology Windows Media Player Social Strategy Computer Fan Lifestyle Cast Tip of the week NarrowBand Authentication Amazon Wire Tools Customers Files Password Social Networking Net Neutrality Hiring/Firing FENG Computer Repair Best Practice Windows Server 2008 Chromecast Wi-Fi WIndows 7 Nanotechnology Amazon Web Services Smart Office Password Manager Colocation Analyitcs Accountants Electronic Medical Records Laptop Managing Stress Settings Online Shopping Paperless Office Business Mangement Botnet Hosted Solution Distributed Denial of Service Computing Infrastructure Legal Virus Virtual Desktop Touchscreen Specifications LinkedIn Data Warehousing Regulations Touchpad IT service Devices Evernote Students Virtual Reality Recycling Debate Travel Relocation End of Support Uninterrupted Power Supply Computer Accessories IoT Millennials IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Users Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride