Female Rep 3

 

 "Quality is Job One"

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 23 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Network Security Hackers Malware Hosted Solutions Microsoft Google VoIP Software bgc roundup nonprofit Disaster Recovery Managed IT Services Email Alert Business Mobile Devices Business Continuity Internet Outsourced IT Data Windows 10 Smartphones communications Ransomware Saving Money Hardware Android Browser IT Services Cybercrime Innovation Managed IT Services Computer Computers Efficiency Small Business IT Support Server Productivity Internet of Things Office Cloud Computing Data Backup Smartphone Business Management BYOD Windows Passwords Tech Term User Tips Mobile Device Management Quick Tips Cybersecurity Money Telephone Systems Social Engineering BDR Recovery Data Recovery Managed IT Mobility Work/Life Balance Collaboration Productivity Hacking Phishing Network Virtualization Vulnerability Law Enforcement Upgrade Artificial Intelligence Communication Save Money IT Support Avoiding Downtime Health Holiday Social Media Office 365 Two-factor Authentication Private Cloud Facebook Bandwidth How To Office Tips Firewall Automation App Chrome Managed Service Provider Wi-Fi VPN Remote Monitoring Data Protection Proactive IT Miscellaneous Bring Your Own Device Flexibility Budget Apps Black Market Operating System Windows 10 Workplace Tips Applications Information Technology Gadgets History Router Mobile Device Identity Theft Compliance Business Intelligence Connectivity Safety Password Word Redundancy Data Breach Microsoft Office Remote Computing Google Drive HaaS Value Data Security Worker Servers Data Management Update USB End of Support Battery YouTube Entertainment SaaS Workers Big Data PDF Spam Solid State Drive The Internet of Things Data Storage OneNote Legal Website Charger Risk Management IT Management Electronic Medical Records Sports IT Plan CES Physical Security Mobile Computing Employer-Employee Relationship Spam Blocking Wireless Technology Keyboard Content Filtering Content Management Credit Cards Hiring/Firing Business Owner Data storage Cleaning Emergency Windows 7 Document Management Computer Care Government Patch Management Computing Infrastructure Unsupported Software Marketing Save Time Infrastructure Samsung HIPAA Scam Automobile Comparison Addiction Online Shopping Audiobook Computer Fan Business Mangement Loyalty iPhone Specifications Going Green Benefits HBO Encryption Knowledge Cache Evernote Rootkit Flash Screen Mirroring FENG Gmail WiFi Troubleshooting Scalability Millennials Smart Technology Advertising Outlook Accountants Network Congestion Wireless Internet Education Wireless Charging Downtime Training Hard Drives Sync Cast Recycling Reputation Google Docs Workforce Two Factor Authentication Wire Fiber-Optic Robot Vendor Management Telephony Relocation Books Files eWaste Customers Assessment IT Consultant Instant Messaging Telecommuting Laptop Frequently Asked Questions Practices Smart Office Settings Users Cables Skype Humor Hosted Solution CrashOverride Content Criminal Television Best Practice Voice over Internet Protocol Leadership Search Remote Work Touchpad Excel Hosted Computing Nanotechnology Paperless Office Virtual Reality Unified Communications Start Menu NarrowBand Politics Meetings Public Computer Multi-Factor Security How to Tip of the week Inventory Smart Tech Machine Learning Worker Commute Theft Unified Threat Management Tools User Error Data loss Video Games Trending Wireless Windows Server 2008 Access Control HVAC Windows 10s Cortana Experience Colocation Data Warehousing Blockchain Lifestyle Devices webinar Fraud Employer Employee Relationship Authentication Public Cloud Google Apps Monitor Techology Mobile Human Resources IBM Thought Leadership Conferencing Shadow IT Amazon Computer Accessories Regulations Professional Services Chromecast Hacker Software Tips Staff Supercomputer Twitter Netflix Amazon Web Services Bluetooth Audit Password Manager Software as a Service Apple Transportation Internet Exlporer Digital Signature Current Events NIST Thank You Congratulations Networking nonprofits Enterprise Content Management Password Management