Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Creating Canned Responses in Gmail

Tip of the Week: Creating Canned Responses in Gmail

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!

Where You May be Seeing More AI Soon
Technology Addiction is a Very Real, Very Scary Th...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Managed IT Services Hosted Solutions Malware Google VoIP Disaster Recovery Microsoft Software Business Internet Mobile Devices Email Business Continuity Outsourced IT Productivity Data Innovation Cybercrime Computer Ransomware Smartphones Efficiency IT Support Windows 10 Data Backup communications Hardware IT Services Browser Android Internet of Things Office Cloud Computing Computers Server Telephone Systems Data Recovery Alert Business Management Saving Money BDR Upgrade User Tips Mobile Device Management Windows Virtualization Small Business Smartphone Chrome Workplace Tips Quick Tips BYOD Social Engineering Managed IT Cybersecurity Collaboration Law Enforcement Network Tech Term Recovery Work/Life Balance Miscellaneous Avoiding Downtime Passwords Communication App Private Cloud Firewall Productivity Hacking How To Bandwidth Office Tips Managed Service Provider Artificial Intelligence Facebook Microsoft Office Money Save Money Holiday Office 365 Mobility Social Media Router Two-factor Authentication Health Information Technology Redundancy Data Protection Phishing VPN Data Management Remote Monitoring Data Security Bring Your Own Device Budget Operating System Password Proactive IT Gmail Business Intelligence Flexibility Wi-Fi HaaS Automation Safety Entertainment Compliance Word Mobile Device Data Breach Applications Gadgets Big Data Spam Risk Management Black Market Employer-Employee Relationship Google Drive Cleaning Vulnerability Managed IT Services Value SaaS Document Management Identity Theft Connectivity User Error Marketing Windows 10 Apps IT Management Encryption Sports Legal OneNote Battery IT Plan Public Cloud Training Remote Computing Wearable Technology CES Wireless Technology Education Smart Tech Unsupported Software Content Filtering Servers Content Management Comparison PDF Charger Computing Infrastructure Electronic Medical Records Solid State Drive Physical Security Mobile Computing Spam Blocking Data loss Hiring/Firing DDoS HIPAA Computer Care Update Downtime Samsung Patch Management Meetings Wireless History Business Owner Keyboard Apple Infrastructure Scam Best Practice Website Data Storage Data storage Shadow IT eWaste Workers Government Analysis End of Support Save Time Internet Exlporer Settings YouTube Worker Streaming Media Automobile USB Credit Cards Windows 7 The Internet of Things Trending SharePoint Devices Wireless Charging Advertising Rootkit Monitor Troubleshooting Fraud Students Regulations Criminal Television NarrowBand IoT Lifestyle Thought Leadership Fiber-Optic IT Consultant Content Reputation Notifications Hosted Solution Amazon Healthcare People Public Computer Files Two Factor Authentication Botnet Fax Server Content Filter Cables Leadership Hybrid Cloud Vendor Management Audiobook Customer Amazon Web Services Electronic Health Records Mobile Office Netflix Root Cause Analysis Colocation Chromecast Travel IT solutions Insurance Hard Drives Storage Software Tips Unified Communications Politics Networking Online Shopping Video Games Machine Learning Flash Blockchain Practices Users Uninterrupted Power Supply Specifications Theft webinar Unified Threat Management IBM Books Evernote Antivirus Scalability Sync Human Resources Hosted Computing hacker Virtual Reality Software as a Service Millennials Addiction HBO Cortana Conferencing Supercomputer Emergency Instant Messaging Telephony Staff Windows 10s WiFi Inventory Screen Mirroring Employer Employee Relationship Distributed Denial of Service Worker Commute Workforce Cache Frequently Asked Questions Google Apps IT Support Current Events Search HVAC Skype Digital Signature Google Docs Access Control Cast Computer Accessories Going Green Robot Tech Support Telecommuting Wireless Internet Excel Audit Relocation How to Start Menu Strategy Authentication Bluetooth Laptop Mouse Experience Remote Work Techology Wire Tip of the week Password Manager Loyalty Computer Fan Transportation IaaS Mobile Voice over Internet Protocol Nanotechnology Knowledge Touchpad Outlook Lithium-ion battery Music Environment Smart Office Windows Server 2008 Business Mangement FENG Benefits Running Cable Professional Services Accountants Multi-Factor Security Data Warehousing Network Congestion Internet exploMicrosoft Humor Paperless Office Recycling Emails Assessment iPhone Smart Technology Tools Webinar IT solutions CrashOverride Twitter Company Culture Managing Stress Administration Thank You Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!