1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
4 years ago
9

What is the purpose of a mail merge field?

Computers and Technology
2 answers:
goblinko [34]4 years ago
8 0

Answer:

Mail Merge is a way to send the same message to a large number of persons, with each one properly addressed to a specific person.

Explanation:

KatRina [158]4 years ago
4 0

Answer:

to set up placeholders in a document where data will be inserted

Explanation:

got it correct

You might be interested in
True or false? any webb app can be accessed and run on any computing
Mademuasel [1]

Answer:

B. False

Explanation:

A web application is a computer program that  works over the internet. So, in order to access and run it you need a web browser and this will also require to have an internet access. If you don't have one of these you will not be able to run the app.

6 0
3 years ago
What is a bitmap ???
leva [86]
<span>a representation in which each item corresponds to one or more bits of information, especially the information used to control the display of a computer screen.
</span><span>represent (an item) as a bitmap.
</span>
4 0
3 years ago
Read 2 more answers
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
If they spend all night writing computer programs, Laurence can write 10 programs while Carrie Anne can write 5. If they spend a
kondaur [170]

Answer:

Laurence can write 10 programs while Carrie Anne can write 5.

Laurence can make 6 sunglasses while Carrie Anne can make 4

Explanation:

3 0
3 years ago
You are running cable for a temporary network in a large auditorium. What is the maximum length you can have for the Ethernet ca
mote1985 [20]

It would be about 1K yards because it is a, as you stated<em> and</em> not to be rude, a large auditorium and 1K yards is the biggest number there.

4 0
3 years ago
Other questions:
  • Create an instance of your queue that accepts java.lang.String Objects. Starting with an empty queue, use the enqueue(E e) metho
    15·1 answer
  • The access code for a? car's security system consists of fivefive digits. the first digit cannot be zerozero and the last digit
    13·1 answer
  • A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a
    10·2 answers
  • Which option on the Format tab is used to modify particular portions of the chart?
    12·1 answer
  • Give a detailed example of how an app (that you use regularly)uses parameters. You must state the app's name and function, the p
    7·1 answer
  • Freeeee BRAINLIESTHBJHBJHB
    8·2 answers
  • How many countries don't uses the metric system?​
    12·2 answers
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • What is 11x12x12x14x15x16
    7·1 answer
  • Write a Java program that will be able to generate the sample table below.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!