1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
2 years ago
10

What three files do you need to perform a mail merge? HELP ASAP PLEASE!!

Computers and Technology
1 answer:
Burka [1]2 years ago
4 0

The 3 files you need to have for a successful mail merge are:

  • An Excel spreadsheet works
  • Outlook Contact List.
  • Apple Contacts List or Text file, etc.

<h3>What is Mail Merge?</h3>

This is known to be the act of carrying out  a Mail Merge and it is one where a person will need to use a Word document and a recipient list, that is an Excel workbook.

Files needed are:

  • Text file,
  • address files, etc.

The 3 files you need to have for a successful mail merge are:

An Excel spreadsheet worksOutlook Contact List.

Apple Contacts List or Text file, etc.

Learn more about mail merge from

brainly.com/question/20904639

#SPJ1

You might be interested in
Write 2 paragraphs. 1 comparing Shrek the movie and Shrek the musical and another contrasting them.
kvv77 [185]
The movie was way better, though the actors in tge musical did a good job. Shrek
8 0
3 years ago
Read 2 more answers
The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
Novosadov [1.4K]

Answer:

Coins c1 = new Coins (4, 3, 2, 1);

     c1.bankValue();

     c1.addQuarter();

     c1.addQuarter();

     c1.addDime();

     c1.addDime();

     c1.addPenny();

     c1.bankCount();

     c1.bankValue();

Explanation:

8 0
3 years ago
Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform
gtnhenbr [62]

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

5 0
3 years ago
A computer’s BIOS is defined as the
Roman55 [17]

Answer:

c. software within hardware

Explanation:

The BIOS stands for a basic input/output system and is special system software that interfaces with all the main hardware of the PC with the OS. And it is generally stored in the flash memory chip which can be found on the motherboard, though sometimes the chip can be a kind of ROM. And when we turn on the computer, the BIOS does various important things. And it is not an application software for hardware. It is a system software.

8 0
3 years ago
Read 2 more answers
Which best describes an advantage of conceptual notes? They are great for studying vocabulary terms. They help students memorize
larisa86 [58]

Answer:

They make it easy to quickly see relationships between ideas.

Explanation:

A concept is an idea or a principle that could be used to understand an abstract notion. A conceptual note is one that makes the relationship between ideas easily discernible.

Without breaking much sweat or reading too deeply, the reader would find it easier to easily determine the relationship between ideas and how they relate to the subject matter. Conceptual notes can be taken on a laptop or paper.

5 0
3 years ago
Read 2 more answers
Other questions:
  • How many times is "Alert" displayed in the following loop? for (int k =0; k&lt;= 100; k++) cout &lt;&lt; "Alert"; O 101 0 1 oo О
    7·1 answer
  • An operating system is an example of _______. The hard drive, keyboard and monitor are example of_______.​
    11·1 answer
  • Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without t
    11·1 answer
  • What is ODBC? How is it related to SQL/CLI? 10.2. What is JDBC? Is it an example of embedded SQL or of using function calls? 10.
    8·1 answer
  • Do you believe that technology has indeed flattened the world in terms of providing
    8·1 answer
  • By observing human behavior,_______are able to understand the cause and effect relationship between the supply of things we want
    13·2 answers
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    14·1 answer
  • Look at (d), is it accurate? ​
    9·2 answers
  • Why Prithvi Narayan Shah are appointed the person favoured by the people at Kazi
    8·1 answer
  • Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!