(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Hosted Solutions Productivity Microsoft Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Miscellaneous Managed Service Provider Innovation Server Data Business Continuity Network Disaster Recovery Workplace Tips Software Windows Upgrade Business Management Communication Saving Money Hardware Mobile Device Management Smartphone Browser Managed IT Services Virtualization Computer Android Save Money communications Smartphones Data Backup User Tips Microsoft Office Cybercrime Holiday BYOD WiFi Computers Outsourced IT Windows 10 Small Business Social Media Cloud Computing Remote Monitoring Data Recovery Operating System Hacking Mobile Computing Chrome Big Data Ransomware Alert Automation Apple Proactive IT Avoiding Downtime Collaboration Managed IT Services VPN Internet of Things IT Solutions Application Quick Tips BDR Employer-Employee Relationship Information Technology Office Budget Passwords Marketing The Internet of Things Social Engineering Gadgets Bandwidth Managed IT Tech Term Health Mobility Bring Your Own Device Going Green Remote Computing Cybersecurity Recovery spam Telephone Systems Gmail iPhone How To Data Protection Private Cloud Business Intelligence Compliance Router IT Support Redundancy Wireless Technology User Error Artificial Intelligence Two-factor Authentication Website Vulnerability Data Security Save Time Firewall Vendor Management App Tablet Lithium-ion battery Value Antivirus Phishing Memory Retail Search Analytics Networking Mouse Law Enforcement Productivity Office 365 Data Management Windows 10 PowerPoint Apps Excel Identity Theft Phone System Money Office Tips Content Filtering Downtime Document Management Risk Management History Entertainment Running Cable Public Cloud Printer Physical Security DDoS Infrastructure Robot Unified Threat Management Skype Data Storage Mobile Office Google Drive Current Events Environment HIPAA Word Customer Relationship Management Comparison Maintenance Human Resources SaaS Training Best Available People Safety Programming Government Cleaning Network Congestion Trending Meetings Solid State Drive IT Management Intranet HaaS Applications Fax Server Black Market Smart Tech IT Plan CES Humor Workers Unsupported Software Statistics Streaming Media Business Owner Internet Exlporer Update OneNote Data storage IT Consultant Biometrics Encryption Outlook eWaste Mobile Device Work/Life Balance Saving Time Flexibility Credit Cards Hard Drives Online Currency Facebook Administration Data loss Google Apps Social Networking Professional Services Hiring/Firing Best Practice Chromecast Scam Strategy WIndows 7 Lifestyle Cast Tip of the week Storage Charger Authentication Amazon Analyitcs Tools Laptop Analysis Settings Hybrid Cloud Managing Stress Print Server Windows Server 2008 Addiction Computer Care Nanotechnology Distributed Denial of Service Amazon Web Services Password Manager Virtual Desktop Virus LinkedIn Spam Blocking Touchpad Accountants IT service PDF Virtual Reality Windows 7 Debate Cache Relocation Connectivity Net Neutrality Online Shopping Computer Repair Uninterrupted Power Supply Keyboard Business Mangement Computer Accessories Botnet Domains Specifications Data Warehousing Bloatware Regulations Wireless Internet Devices IaaS Evernote Recycling Customer Service Cameras Travel Video Surveillance Computer Fan IoT Consultant Millennials Entrepreneur Servers Education Touchscreen Wireless Charging Tech Support Criminal Files Printer Server FENG Password Workforce Hacker Fiber-Optic Cost Management Worker Commute Flash Piracy Wi-Fi Shadow IT Colocation Software as a Service Electronic Medical Records Insurance Wireless User Telecommuting Science Cables Instant Messaging Sync Licensing Hosted Solution Content Management Shortcut Computing Infrastructure Samsung Twitter Software Tips Practices SharePoint Legal Remote Work Windows 8 Unified Communications Telephony Crowdfunding Sports Blockchain End of Support Google Docs Bluetooth Monitor Hosted Computing Tablets Theft Start Menu Notifications YouTube Staff Internet exploMicrosoft Voice over Internet Protocol USB Audit HBO Root Cause Analysis Thought Leadership Reputation Inventory Company Culture Wearable Technology Cortana Windows 8.1 Update Social Windows Media Player Mobile NarrowBand Patch Management Digital Signature Advertising Multi-Factor Security Screen Mirroring Frequently Asked Questions Content Filter Customers Access Control Fraud Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits Users Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Wire Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games