(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 21 September 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Productivity Business Computing Microsoft Backup Hosted Solutions Malware Internet Efficiency Mobile Devices IT Support Google Business Miscellaneous IT Services Managed Service Provider Server Workplace Tips VoIP Disaster Recovery Business Continuity Network Innovation Data Hardware Email Upgrade Business Management Computer Windows Save Money Saving Money Mobile Device Management Software Communication Virtualization User Tips Windows 10 Microsoft Office Network Security Browser Smartphone Smartphones BYOD Social Media WiFi Hacking Holiday Android Application Managed IT Services Apple Operating System Computers Mobile Computing Cybercrime communications Chrome IT Solutions Quick Tips Small Business Automation Proactive IT Information Technology Office Outsourced IT Budget Marketing The Internet of Things Big Data Alert spam Managed IT Services Remote Monitoring Avoiding Downtime Employer-Employee Relationship Passwords Collaboration Health Going Green VPN Remote Computing Managed IT Vendor Management Save Time Firewall iPhone Ransomware Gadgets Recovery Social Engineering App Wireless Technology Mobility User Error Bring Your Own Device Office 365 Excel Phone System Downtime IT Support Antivirus History Tablet Retail Memory Analytics Search Bandwidth Telephone Systems Data Backup Compliance Gmail Lithium-ion battery Networking Private Cloud Mouse PowerPoint Document Management Black Market Outlook Website Risk Management Data Management Online Currency Internet of Things Content Filtering Flexibility Data Storage Cloud Computing Printer Internet Exlporer Data storage Administration Law Enforcement Solid State Drive Biometrics Entertainment Running Cable Current Events Value Office Tips Skype Unified Threat Management Maintenance Hard Drives Mobile Office Router Windows 10 Customer Relationship Management Facebook Business Owner Best Available Intranet Physical Security DDoS People Robot Cybersecurity Unsupported Software BDR Programming Network Congestion Google Drive Environment Safety Humor Public Cloud IT Consultant Statistics Redundancy Meetings HaaS How To Fax Server Saving Time Professional Services Crowdfunding Hacker HIPAA Company Culture Windows 8.1 Update Cast Spam Blocking Cost Management Two-factor Authentication Tip of the week Shadow IT Tools Wireless Money Science Streaming Media Instant Messaging Shortcut Windows Media Player Windows Server 2008 Word SharePoint Windows 8 Business Intelligence Encryption Computer Fan Bluetooth Applications Print Server Windows 7 Sports Hiring/Firing WIndows 7 Botnet Monitor eWaste Tablets Files Data Warehousing Notifications FENG USB Regulations YouTube Managing Stress Computer Repair Travel Reputation Wearable Technology Workers Net Neutrality Colocation IT Management Social LinkedIn Virus Servers NarrowBand Customers Hosted Solution Computing Infrastructure IT Plan Best Practice OneNote Debate Social Networking Chromecast Computer Accessories Flash End of Support Analyitcs Touchscreen Sync Laptop Settings Video Surveillance Cameras Internet exploMicrosoft Consultant Distributed Denial of Service Trending Artificial Intelligence Virtual Desktop Software Tips Root Cause Analysis Education Telephony Touchpad IT service Human Resources Printer Server Advertising Relocation Vulnerability SaaS Virtual Reality Patch Management Training Worker Commute Data Security Uninterrupted Power Supply Data loss Piracy Start Menu Domains Apps User Government Audit IaaS Bloatware Customer Service HBO Cleaning Licensing Mobile Phishing Samsung Hybrid Cloud Twitter Screen Mirroring Entrepreneur Frequently Asked Questions Tech Support webinar PDF Benefits Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Productivity Television Wi-Fi Users Troubleshooting Techology Electronic Medical Records Public Computer Data Recovery Employer Employee Relationship Legal Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Work/Life Balance Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scam Charger Scalability Politics Transportation Computer Care How to