(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency IT Support Business VoIP Managed Service Provider Email Miscellaneous IT Services Server Disaster Recovery Business Continuity Workplace Tips Upgrade Innovation Network Data Windows Hardware Business Management Software Save Money Saving Money Communication Computer Network Security Mobile Device Management Android Smartphones Holiday communications Managed IT Services Browser Smartphone Microsoft Office Virtualization User Tips Windows 10 WiFi Outsourced IT BYOD Small Business Computers Data Backup Social Media Hacking Chrome Operating System Mobile Computing IT Solutions Alert Apple Proactive IT Cybercrime Remote Monitoring Avoiding Downtime Application Automation The Internet of Things Quick Tips Office Managed IT Services Ransomware Budget Collaboration Information Technology Social Engineering Big Data Passwords Employer-Employee Relationship Marketing Remote Computing Gadgets Mobility Health Recovery Bring Your Own Device VPN Telephone Systems Data Recovery spam Going Green Firewall How To Managed IT Vendor Management Bandwidth Cloud Computing Two-factor Authentication Compliance iPhone Wireless Technology User Error Cybersecurity App BDR Save Time History Tablet Mouse Value Redundancy Vulnerability Retail Memory Risk Management Search Office 365 IT Support Internet of Things Networking Antivirus Windows 10 Office Tips Analytics Router Gmail Lithium-ion battery PowerPoint Website Artificial Intelligence Excel Phone System Content Filtering Money Downtime Private Cloud Administration SaaS Apps Unsupported Software IT Consultant Phishing Entertainment Safety Government Running Cable Skype Meetings Saving Time Unified Threat Management Document Management HaaS Fax Server Identity Theft Data Security Mobile Office Black Market Online Currency Customer Relationship Management Data Management Law Enforcement Credit Cards Best Available Solid State Drive Printer People Programming Internet Exlporer Network Congestion Data storage Trending Biometrics Current Events Workers Maintenance Data Storage Business Owner Hard Drives Word Humor OneNote Business Intelligence Statistics Facebook Intranet Work/Life Balance Outlook Physical Security DDoS IT Management Robot Google Drive Environment Flexibility Public Cloud Charger Relocation Virtual Reality Software as a Service Uninterrupted Power Supply Training Telecommuting Hybrid Cloud Domains Cables Sync Hiring/Firing Computer Care IaaS Bloatware Update WIndows 7 Remote Work Software Tips HIPAA Cleaning Customer Service Unified Communications Telephony Spam Blocking Entrepreneur Google Docs Company Culture Managing Stress Windows 8.1 Update Keyboard Tech Support LinkedIn Theft Hacker Start Menu Virus Audit Cost Management Voice over Internet Protocol HBO Debate Shadow IT Wireless Cortana Science Mobile Computer Accessories Computer Fan Screen Mirroring Applications Streaming Media Instant Messaging Multi-Factor Security Files Shortcut Fraud Frequently Asked Questions Productivity Video Surveillance Password SharePoint Google Apps Windows 8 Professional Services Cameras FENG Print Server Consultant Cast Wi-Fi Encryption Lifestyle Colocation Amazon Bluetooth Tip of the week Education Sports Monitor eWaste Infrastructure Tablets Tools Printer Server Computer Repair Notifications Data Protection Net Neutrality Computing Infrastructure Amazon Web Services USB Windows Server 2008 Worker Commute Piracy Hosted Solution YouTube Reputation Wearable Technology Password Manager User Social Comparison End of Support Online Shopping Windows 7 Licensing NarrowBand Customers Samsung Mobile Device Botnet Touchscreen Data Warehousing Twitter Best Practice Social Networking Specifications Internet exploMicrosoft Evernote Regulations Chromecast Crowdfunding Analyitcs Travel Root Cause Analysis Millennials Advertising Settings Wireless Charging Servers Patch Management Laptop Distributed Denial of Service Data loss IT Plan Virtual Desktop Workforce IT service Fiber-Optic Human Resources Flash Windows Media Player Scam Touchpad Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Electronic Medical Records Techology Public Computer Users Employer Employee Relationship Legal Data Breach Automobile Emails Books Business Mangement CrashOverride IBM Webinar Emergency Worker Recycling Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix