ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Privacy Business Computing Hackers Backup Microsoft Cloud Innovation Small Business Android Business Cybercrime Smartphones Email Software Hardware Network Security Ransomware Efficiency Data Backup VoIP Windows Malware Mobile Devices Data How To Productivity Business Management User Tips Internet Cybersecurity Cloud Computing Social Engineering Business Continuity Managed IT Services Browser Computers Chrome Safety Spam Data Breach Bring Your Own Device Operating System Social Media Mobile Device Management Gadgets App Upgrade Telephone Systems Smartphone Money Internet of Things Computer Two-factor Authentication Law Enforcement Windows 10 Outsourced IT Alert Collaboration Managed IT Services Server Data Recovery Automation Communication Disaster Recovery Business Intelligence Google Drive Phishing Save Money Passwords Spam Blocking Wi-Fi Public Cloud Gmail CES Data Security Office 365 Communications Miscellaneous The Internet of Things Virtualization Vulnerability Bandwidth Hosted Solutions Word Router Government BDR Downtime Data Storage Windows 10 Recovery IT Management Quick Tips Redundancy OneNote Avoiding Downtime Comparison IT Plan Saving Money Network Physical Security Internet Exlporer Unsupported Software Artificial Intelligence Data storage Private Cloud Remote Monitoring Software Tips Work/Life Balance Electronic Medical Records Charger Outlook Evernote Health Telephony Keyboard Criminal Update Millennials BYOD webinar Microsoft Office Facebook Computer Care Humor Wireless Charging YouTube Skype Windows 10s Meetings Networking Apps Hybrid Cloud Workforce Frequently Asked Questions Conferencing Hiring/Firing Samsung Cortana Files Start Menu IBM Content Management Patch Management PDF Google Docs Telecommuting Office Excel HBO Emails Value Monitor Google Apps History Tools Solid State Drive Uninterrupted Power Supply Data loss Supercomputer Blockchain Scam Going Green Website Password Black Market Remote Work Relocation Tip of the week Audit Employer-Employee Relationship NarrowBand Data Management Office Tips Screen Mirroring Budget HIPAA Voice over Internet Protocol Identity Theft Windows Server 2008 Computer Fan Workers User Error Wireless Technology Managed IT Cleaning Cast Human Resources HaaS Credit Cards Sports Windows 7 Netflix FENG IT Services Infrastructure Botnet Multi-Factor Security Reputation Tech Support Current Events Staff Robot Fraud Apple Flash IT Support Holiday Password Manager End of Support Travel Trending Customer Shadow IT Knowledge Data Protection Laptop Flexibility Amazon iPhone Business Mangement Internet exploMicrosoft Chromecast Hacking Network Congestion Digital Signature Marketing Touchpad Amazon Web Services Managed Service Provider Sync Settings Recycling Advertising Specifications IT Consultant Automobile Productivity Legal Online Shopping DDoS Root Cause Analysis eWaste Big Data Thank You Best Practice Books Congratulations Save Time Mobile Device Experience Emergency WiFi Music Video Games Battery Employer Employee Relationship Scalability Education Information Technology Webinar Content Computer Accessories Loyalty Workplace Tips Computing Infrastructure Transportation Bluetooth Techology IT solutions Audiobook SaaS Instant Messaging Applications Benefits Entertainment Users Firewall Wireless Worker IT Support Assessment Wearable Technology Virtual Reality Smart Technology Rootkit VPN Television USB Worker Commute Two Factor Authentication Training Mobility Remote Computing Risk Management CrashOverride Public Computer Search Troubleshooting Encryption Vendor Management Politics How to