(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 20 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Hosted Solutions Productivity Microsoft Internet Backup Malware Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Miscellaneous Managed Service Provider Server Innovation Data Workplace Tips Disaster Recovery Business Continuity Network Business Management Software Windows Upgrade Communication Saving Money Hardware Android Mobile Device Management Virtualization Computer Browser Smartphone Managed IT Services Save Money Data Backup User Tips Smartphones Microsoft Office communications Holiday Cybercrime BYOD Windows 10 Outsourced IT WiFi Computers Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing Hacking Chrome Alert Application Apple Automation Proactive IT Avoiding Downtime Collaboration IT Solutions VPN Internet of Things Managed IT Services Quick Tips Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget The Internet of Things Recovery spam Cybersecurity Gadgets Telephone Systems Bandwidth Managed IT Going Green Remote Computing Mobility Health Bring Your Own Device Vendor Management Business Intelligence Tech Term iPhone Save Time Firewall App Gmail Private Cloud How To Vulnerability Compliance Artificial Intelligence Data Security Redundancy Wireless Technology User Error IT Support Two-factor Authentication Data Protection PowerPoint Windows 10 Website Excel Antivirus Phone System Office Tips Content Filtering Money Downtime History Tablet Lithium-ion battery Analytics Router Value Retail Memory Search Phishing Identity Theft Networking Mouse Apps Office 365 Law Enforcement Data Management Document Management Productivity Risk Management Data storage Online Currency Workers Word Comparison Encryption Biometrics Outlook Business Owner Printer eWaste OneNote Flexibility Hard Drives Current Events IT Management Mobile Device Work/Life Balance Facebook Administration Maintenance Entertainment Smart Tech IT Plan Running Cable Physical Security DDoS CES Unified Threat Management Robot Data loss Skype Unsupported Software Update Google Drive Public Cloud Mobile Office Environment Customer Relationship Management Intranet Human Resources SaaS Training Best Available Safety HIPAA People Programming Government Network Congestion Credit Cards Cleaning Meetings Trending HaaS Fax Server IT Consultant Black Market Solid State Drive Humor Applications Infrastructure Saving Time Statistics Data Storage Streaming Media Internet Exlporer SharePoint Colocation Twitter Windows 8 Password Manager Accountants Electronic Medical Records Connectivity Bluetooth Online Shopping Crowdfunding Windows 7 Sports Botnet Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Specifications Data Warehousing Notifications Legal Devices USB Evernote Regulations YouTube Travel Print Server Reputation Wearable Technology End of Support Recycling IoT Millennials Windows Media Player Social NarrowBand Wireless Charging Servers Customers Internet exploMicrosoft Criminal Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Best Practice Chromecast WIndows 7 Fiber-Optic Flash Software as a Service Patch Management Advertising Analyitcs Insurance Telecommuting Content Filter Laptop Managing Stress Settings Cables Sync Scam Distributed Denial of Service Content Management Virus Virtual Desktop Practices Touchscreen Remote Work Storage LinkedIn Charger Software Tips Touchpad IT service Unified Communications Telephony Debate Google Docs Relocation Hybrid Cloud Virtual Reality Blockchain Computer Accessories Hosted Computing Addiction Computer Care Uninterrupted Power Supply Domains Theft Start Menu Spam Blocking Voice over Internet Protocol Audit IaaS PDF Bloatware Staff Cameras Customer Service Inventory Video Surveillance HBO Keyboard Consultant Cortana Mobile Education Multi-Factor Security Screen Mirroring Entrepreneur Digital Signature Printer Server Access Control Fraud Frequently Asked Questions Tech Support Hacker Google Apps Professional Services Piracy Computer Fan Lifestyle Cast Worker Commute Cost Management Strategy Authentication Amazon Tip of the week Shadow IT User Wireless Files Science Tools Company Culture Licensing FENG Password Instant Messaging Analysis Shortcut Nanotechnology Amazon Web Services Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Users Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits Cache Loyalty Conferencing Windows 10s Smart Technology Wireless Internet Battery Experience Two Factor Authentication Assessment Music Television