1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
9

What process combines data from a list with the content of a document to provide personalized documents?

Computers and Technology
2 answers:
kakasveta [241]3 years ago
8 0
The answer to this question is "Mail Merge". Due to the advancement of technology, this process was discovered and developed by IT engineers. Mail merge is the process that combines the available data from the list together with the content of a document and the purpose of this is to provide a personalized and organized document which is easier to access.
alina1380 [7]3 years ago
4 0

Answer:

mail merge

Explanation:

You might be interested in
What are the correct answers to the following questions?
Lena [83]

Answer:

1. analog sound

2. digital sound

3. pixels

4.  local area network

5.bus

6. slots

Explanation:

4 0
2 years ago
What is the output of this program?
vladimir1956 [14]

All of the conditions of the elif statement are true. numA does equal 2 and numB does equal 3.

The output of this program is no.

3 0
2 years ago
Alguien que me pueda ayudar diciéndome las características de Visual Object en programacion porfavor?!
Verizon [17]

Answer:

vvbdndndndndndnznmzxbbsvs

kgkgcicgfhjgyofdhkdyfjfgeghehehehehsbbsbsb

PLS HELP ??? LOL INEED HELP ITS TOO HARD

5 0
3 years ago
Traffic flow analysis is classified as which?
Anna35 [415]

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

8 0
2 years ago
Jameelah has files all over her computer. Thus, it is often difficult for her to find the files she is looking for.
VLD [36.1K]

Answer:

folders

Explanation:

it is a very good way to keep your desktop organized and keep tidy

3 0
3 years ago
Other questions:
  • What is binary in computer science ​
    11·1 answer
  • Which are considered regulatory agencies? Check all that apply. WHO PPO HMO CMS CDC NIOSH
    11·2 answers
  • According to ________ law, in a sealed chamber, the pressure and temperature of a gas are directly related to each other.
    10·1 answer
  • The Speed of Sound (Java Project. Please make it easy to understand. I'm a beginner at this. I believe we are supposed to use a
    5·1 answer
  • What: A challenging question on this module's material.
    14·1 answer
  • What are the correct answers?
    11·1 answer
  • Which program will have the output shown below?
    7·1 answer
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • - A blacksmith is shoeing a miser's horse. The blacksmith charges ten dollars for his work. The miser refuses to pay. "Very well
    6·1 answer
  • In the year, , the American Department of Defense put a military research network, called ARPANET online.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!