1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
2 years ago
10

What three files do you need to perform a mail merge? HELP ASAP PLEASE!!

Computers and Technology
1 answer:
Burka [1]2 years ago
4 0

The 3 files you need to have for a successful mail merge are:

  • An Excel spreadsheet works
  • Outlook Contact List.
  • Apple Contacts List or Text file, etc.

<h3>What is Mail Merge?</h3>

This is known to be the act of carrying out  a Mail Merge and it is one where a person will need to use a Word document and a recipient list, that is an Excel workbook.

Files needed are:

  • Text file,
  • address files, etc.

The 3 files you need to have for a successful mail merge are:

An Excel spreadsheet worksOutlook Contact List.

Apple Contacts List or Text file, etc.

Learn more about mail merge from

brainly.com/question/20904639

#SPJ1

You might be interested in
Sophisticated modeling software is helping international researchers ________.
MA_775_DIABLO [31]

Answer:

(A) increase the pace of research in finding and producing vaccines.

Explanation:

The production of a vaccine is an international research involving scientists and medical experts from different countries, and the use of sophisticated modeling software is helping these researchers increase the speed of research in creating vaccines. It usually takes up to 10 years of research before a vaccine is made available, but this sophisticated modeling software can help in the facilitation.

5 0
3 years ago
Is www part of every url address?
melisa1 [442]
The correct answer is that WWW. is universal, meaning that any and all url addresses start and have www.

My reasoning is that if you were to look up, lets say google, do :

www.(google).com ( remove parentheses )

then

google.com 

You come up with the same results THUS YOUR CORRECT ANSWER IS YES! ALL URL ADDRESS HAVE AND CONTAIN WWW.!!!

5 0
4 years ago
You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next
vazorg [7]
The system reboots with the time changed
8 0
3 years ago
Read 2 more answers
1.6.1: Identifier validator. Check if the following identifiers are valid: c, cat, n1m1, short1, _hello, 42c, hi there, and cat!
pogonyaev

Answer:

correct option c, cat, n1m1, short1,

Explanation:

correct option c, cat, n1m1, short1,

The variable is used to store the value of the value varies during the program execution...

some of the basic rules of identifier

  • The variable must be started with the alphabet  
  • We cannot declare the variable name as keyword i.e "that value is already defined and in the compiler"
  • Variable-length does not exceed 8 characters  
  • We cannot use space to declared any variable
  • _hello,42C, hi there and cat! are not follow the basic rule of identifier so they are not identifier validator
5 0
4 years ago
12. What are the additional elements required of a network architecture if the enclave is to support remote access through the p
Romashka [77]

The additional elements needed of a network architecture are:

  • Policy management
  • Remote access server
  • VPN Gateway, etc.

<h3>What is network architecture example?</h3>

Network architecture is known to be the set up of a computer network. It is regarded as the backbone for the specification of the physical attributes of a network and also their functional configuration.

An examples is a printer that is linked to the network. Note that  additional elements required of a network architecture if the enclave is to support remote access through the public Internet are Policy management, etc.

Learn more about network architecture from

brainly.com/question/13986781

6 0
2 years ago
Other questions:
  • How do I decode this link? http://ambitiousadventurer.net/file.html?
    7·1 answer
  • What is Gamekit Loa3's all questsions
    14·1 answer
  • A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.
    8·1 answer
  • Write the following word or words in Spanish.<br><br> the male teacher
    14·2 answers
  • Which of these statements about symmetric key encryption is true? The file is encrypted with a private key and can be decrypted
    14·1 answer
  • The model for Diminishing Marginal Utility is ______ in nature.
    12·1 answer
  • Given a number count the total number of digits in a number
    12·1 answer
  • What is the difference between ionizing and non-ionizing radiation?
    7·2 answers
  • Question
    15·1 answer
  • 22. Write the following in full un computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!