1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
7

An example of how a merge field will appear in a document is ______.

Computers and Technology
2 answers:
VMariaS [17]3 years ago
8 0

Answer

,<<Name>>

Explanation

A merge field is a placeholder such as address and greetings.They correspond to the column headings in the data file that one selects and in a data file they represent categories of information.Placeholders for these categories are the fields that you add to the main document. Merge fields appears with the V-shaped lines or chevrons<<>>around them. To add merge fields in a document, you just click where you want to add the merge field in your document then on the drop down next to insert merge field select the field name.

Colt1911 [192]3 years ago
6 0

Answer:

«Name»

Explanation:

Merge fields are a way to personalize your document by adding information from a data source. The name of the data field is displayed between «»

I hope you find this information useful and interesting! Good luck!

You might be interested in
The compare_strings function is supposed to compare just the alphanumeric content of two strings, ignoring upper vs lower case a
Korolek [52]

Answer:

There is a problem in the given code in the following statement:

Problem:

punctuation = r"[.?!,;:-']"

This produces the following error:

Error:

bad character range

Fix:

The hyphen - should be placed at the start or end of punctuation characters. Here the role of hyphen is to determine the range of characters. Another way is to escape the hyphen - using using backslash \ symbol.

So the above statement becomes:

punctuation = r"[-.?!,;:']"  

You can also do this:

punctuation = r"[.?!,;:'-]"  

You can also change this statement as:

punctuation = r"[.?!,;:\-']"

Explanation:

The complete program is as follows. I have added a print statement print('string1:',string1,'\nstring2:',string2) that prints the string1 and string2 followed by return string1 == string2  which either returns true or false. However you can omit this print('string1:',string1,'\nstring2:',string2) statement and the output will just display either true or false

import re  #to use regular expressions

def compare_strings(string1, string2):  #function compare_strings that takes two strings as argument and compares them

   string1 = string1.lower().strip()  # converts the string1 characters to lowercase using lower() method and removes trailing blanks

   string2 = string2.lower().strip()  # converts the string1 characters to lowercase using lower() method and removes trailing blanks

   punctuation = r"[-.?!,;:']"  #regular expression for punctuation characters

   string1 = re.sub(punctuation, r"", string1)  # specifies RE pattern i.e. punctuation in the 1st argument, new string r in 2nd argument, and a string to be handle i.e. string1 in the 3rd argument

   string2 = re.sub(punctuation, r"", string2)  # same as above statement but works on string2 as 3rd argument

   print('string1:',string1,'\nstring2:',string2)  #prints both the strings separated with a new line

   return string1 == string2  # compares strings and returns true if they matched else false

#function calls to test the working of the above function compare_strings

print(compare_strings("Have a Great Day!","Have a great day?")) # True

print(compare_strings("It's raining again.","its raining, again")) # True

print(compare_strings("Learn to count: 1, 2, 3.","Learn to count: one, two, three.")) # False

print(compare_strings("They found some body.","They found somebody.")) # False

The screenshot of the program along with its output is attached.

4 0
3 years ago
(tco 5) how many 4-bit parallel adders are required to add the numbers 5,345 and 3,892? explain how you got your answer.
Igoryamba
The sum is 9237. To express this as binary requires log(9237)/log(2) bits ≈ 13.2 bits, rounded up at least 14 bits. (You can check: 2^13 is not enough, 2^14 is enough)

So you need four 4-bit adders, giving you 16 bits resolution.
7 0
3 years ago
What programs provide email communication
Greeley [361]
One program would be Outlook. There is also Incredimail 
5 0
3 years ago
Read 2 more answers
Digital transmissions are superior to analog transmissions because of their __________.
makkiz [27]

Answer: B reliability

Explanation: i took the test

hope it helps :)

3 0
2 years ago
You are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform
ruslelena [56]

Answer:

The Fn key.

Explanation:

In this scenario, you are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform tasks such as toggling the display or adjusting the display brightness.

The user should strike the "Fn" key in combination with the special function keys.

In Computer science, the special function keys found on the top row of a keyboard are the F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11, and F12 keys. Each of the special function keys just like their name suggests are used to perform different tasks respectively as defined by the operating system of a computer.

Fn is an acronym for function. In order to use the special function keys, a user must first hold down the Fn key before pressing the specific special function key which then triggers functions configured to use this key.

<em>For instance, </em><em>"Fn+F2" </em><em>is to reduce brightness on the Windows operating system. Also, </em><em>"Fn+F12"</em><em> is to increase audio volume on the Mac operating system. </em>

6 0
3 years ago
Other questions:
  • An archive of files that usually contain scripts that install the software contents to the correct location on the system is ref
    11·1 answer
  • Websites that are designed to adapt gracefully to any screen size use a technique called
    5·1 answer
  • Write a JavaScript statement to convert "Information Technology" to uppercase.
    6·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • Yolanda lost her left foot during her military service, but she has been issued a prosthetic that enables her to walk normally,
    13·1 answer
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • The invention of the transistor was important to the development of computers because
    14·1 answer
  • In learning information security, it is important to understand that threats to your company's information assets are present 24
    13·1 answer
  • Assume that you are working with spreadsheets, word processing documents, presentation slides, images, and sound files for a sch
    15·1 answer
  • Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!