1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
6

When creating a mail merge, you must insert all of the items from your data source into your merged document. Truth or false ?

Computers and Technology
2 answers:
Veronika [31]3 years ago
6 0
True because you got to put everything
ElenaW [278]3 years ago
3 0
True <----------------
You might be interested in
What setting in Blender allows you to see the Graph Editor?
Brut [27]

The answer is b It allows you to modify the animation for any properties using F-Curves. The Graph editor has two modes, F-Curve for Actions, and Drivers for Drivers. Both are very similar in function.

3 0
3 years ago
Anyone know how to fix this problem on Microsoft Team?
lesya [120]

Answer:

Wait for some time and reload the page

Fix the corrupted file

The file is deleted before finishing upload

Clear browser cache.

Explanation:

7 0
2 years ago
Read 2 more answers
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
Under which command group will you find the options to configure Outlook rules?
stiks02 [169]

Answer:

Move

Explanation:

I hope that helps :)

4 0
2 years ago
Read 2 more answers
What is the storage of a modern hard disk drive?
Alinara [238K]

Answer:

80 gigs of storage

Explanation:

it gives a bunch of room because of the calculations the vomputer

3 0
3 years ago
Other questions:
  • Which is a real-world example of a procedure?
    11·1 answer
  • Why is plastic durable?
    9·2 answers
  • Calculate the performance of a processor taking into account stalls due to data cache and instruction cache misses. The data cac
    11·1 answer
  • What did major networks do to combat audience erosion in the 1990s?
    15·1 answer
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • What does the FixedUpdate loop do? Why do developers use it?
    14·1 answer
  • Viết thuật toán, chương trình xử lý hạn chế trong việc xử lý số liệu phần nguyên để hiển thị lên lcd
    14·1 answer
  • List the difference between GIGO and bug ​
    15·1 answer
  • Choose the missing words in the code below.
    12·1 answer
  • When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!