Contact us today!

Professional Computer Associates Blog

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!

Where You May be Seeing More AI Soon
Technology Addiction is a Very Real, Very Scary Th...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Managed IT Services VoIP Google Mobile Devices Microsoft Disaster Recovery Email Software Productivity Business Internet Business Continuity Innovation Data Outsourced IT Data Backup Smartphones communications Efficiency Cybercrime Hardware IT Services IT Support Data Recovery Windows 10 Computer Ransomware Android Cloud Computing Browser Tech Term Office Internet of Things BDR Server Alert User Tips Network Windows Business Management Saving Money Telephone Systems Computers Upgrade Small Business Cybersecurity Miscellaneous Mobile Device Management Smartphone Virtualization Microsoft Office Law Enforcement Social Engineering Artificial Intelligence Applications Managed IT Passwords Social Media Quick Tips Collaboration Facebook BYOD Chrome Workplace Tips Save Money Router Automation Communication Productivity Avoiding Downtime Holiday Office Tips Managed Service Provider Recovery Office 365 Password Firewall How To Work/Life Balance Private Cloud Money Bandwidth Gadgets App Hacking Mobility Data Management HaaS Gmail Bring Your Own Device Managed IT Services Data Protection VPN Operating System Health Remote Monitoring Information Technology Phishing Wi-Fi Redundancy Business Intelligence Data Security Proactive IT Flexibility Budget Two-factor Authentication Word Value IT Support Vulnerability Black Market Entertainment Document Management Encryption Data Breach Safety Big Data Risk Management Google Drive Mobile Device Analysis Cleaning Marketing Blockchain User Error Employer-Employee Relationship Spam Identity Theft Apps SaaS Connectivity Windows 10 Compliance Training IT Management Internet Exlporer Computing Infrastructure OneNote Keyboard Machine Learning Education Instant Messaging YouTube IT Plan Scam CES eWaste Mobile Computing Content Filtering Access Control Physical Security Legal Infrastructure Smart Tech Charger The Internet of Things Unsupported Software Paperless Office Save Time Website Settings Content Management Data Storage Networking Servers Sports Workers Electronic Medical Records Comparison Downtime Automobile Worker Public Cloud Hiring/Firing Remote Computing History USB Information HIPAA Computer Care Wireless Technology Spam Blocking File Sharing Data loss Credit Cards Best Practice Windows 7 Shadow IT Samsung Meetings Data storage Solid State Drive Battery Government Wearable Technology PDF Patch Management Wireless Streaming Media Business Owner Update Apple End of Support DDoS Proactive Workforce IoT Outlook Frequently Asked Questions Two Factor Authentication Google Apps Skype Virtual Assistant Audiobook Vendor Management Lifestyle Mobile Office Digital Signature IT Consultant Smart Office Fiber-Optic Thought Leadership Uninterrupted Power Supply NIST Bluetooth Google Docs Internet exploMicrosoft Supercomputer Cast Amazon IT solutions Distributed Denial of Service hacker Botnet Remote Monitoring and Maintenance Experience Loyalty Telecommuting Humor Excel iPhone Search Audit Start Menu Telephone System Politics Strategy Leadership Transportation Cables Content Filter Cryptocurrency Environment Notifications Advertising Current Events Amazon Web Services Authentication Netflix Password Manager Root Cause Analysis Travel Line of Business Music Remote Work Insurance Running Cable Monitor Tip of the week Users How to Computer Fan Mobile Unified Threat Management Antivirus NarrowBand Software Tips Students Benefits Unified Communications Storage Flash Safe Mode Voice over Internet Protocol Knowledge Cache Books IBM Online Shopping Nanotechnology Mouse Business Mangement Going Green MSP Assessment Practices Reputation Techology Windows Server 2008 HVAC Virtual Reality Files FENG Professional Services Specifications Accountants Robot Hard Drives webinar Healthcare Smart Technology Theft SharePoint Tech Support Video Games Sync Rootkit Multi-Factor Security Human Resources Hybrid Cloud Network Congestion Data Warehousing Wireless Internet Emergency Evernote WiFi Relocation Worker Commute Employer Employee Relationship Software as a Service Recycling Lithium-ion battery Laptop Augmented Reality Troubleshooting Television Hosted Computing Customer Emails Enterprise Content Management Colocation Tools Managed Service Millennials Chromecast Conferencing HBO Electronic Health Records Cortana Addiction Scalability Windows 10s Telephony Business Technology Content Trending People Staff IaaS Wire Wireless Charging Devices Computer Accessories Criminal Touchpad Screen Mirroring Hosted Solution Public Computer Fraud Fax Server Inventory Regulations Password Management Congratulations Wiring IT solutions CrashOverride Company Culture Administration Managing Stress Regulation Twitter Thank You Remote Worker Webinar

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!