1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
4 years ago
5

What are some common options to sort a Mail Merge Recipient list?​

Computers and Technology
1 answer:
Zarrin [17]4 years ago
3 0

Answer:

Create and save the main document.

On the Mailings tab, in the Start Mail Merge group, choose Select Recipients→Type a New List.

Click the Customize Columns button.

Select a field that you do not need.

Click the Delete button.

Click Yes in the confirmation dialog box.

Explanation:

Hope it is helpful for you

please follow me and mark me as a brainest

You might be interested in
If I Uninstall Nba 2k 19 from my ps4 will my career be gone forever?​
Rudik [331]

Answer:

Not unless you have a ps plus membership

Explanation:

Ps plus have cloud storage so if you have ps plus membership,even if you delete 2k19 your data will be saved in the cloud storage therefore your my carrer will not be gone forever!

7 0
4 years ago
Read 2 more answers
Write a program that allows the user to navigate the lines of text in a file. The program should prompt the user for a filename
pickupchik [31]

Answer:

Explanation:

iname=input("Enter the file name: ")

inputfile=open(iname,'r')

lines=[]

for line in inputfile:

lines.append(line)

inputfile.close()

print("The file has ",len(lines)," lines")

while True:

linenumber=int(input("Enter the line number or 0 to quit: "))

if linenumber==0:

break

elif linenumber > len(lines):

print("Error: line number must be less than ", len(lines))

else:

print(linenumber, " : ", lines[linenumber - 1])

7 0
4 years ago
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
aalyn [17]
What is the question?
4 0
3 years ago
Read 2 more answers
Compute the monthly cost of gas.
aalyn [17]

Answer:

Attached excel file containing formula for monthly cost of gas.

Explanation:

To find mileage note down readings at the star of month and at end of month.

Subtract end of month reading from start this will give you number of miles in month. Now as per mentioned in question, divide number of miles by average mpg and multiply by the price of a gallon of gas.

Here is your monthly cost of gas.

Download xlsx
6 0
4 years ago
Other questions:
  • Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s
    8·1 answer
  • Which payment type is best if you are trying to sick to a budget?
    15·1 answer
  • What these large numbers in unemployment could mean long term for America?
    6·1 answer
  • In learning information security, it is important to understand that threats to your company's information assets are present 24
    13·1 answer
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • Describe your WGU program, including two specific requirements that this degree has for completion.
    14·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • 2. Explain the difference between a JMP instruction and CALL instruction
    6·1 answer
  • If you do a Find and Replace for a term, where will Word begin looking for the term?
    6·1 answer
  • Select the function of keypunches that were used as one of the earliest input devices. A. It was used to control the cursor on t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!