1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
15

What types of data sources could be used in a mail merge? Check all that apply.

Computers and Technology
2 answers:
krok68 [10]3 years ago
8 0

<u>The types of data sources that could be used in a mail merge are:</u>

  1. Word tables
  2. a database
  3. an excel sheet
  4. an outlook contacts list

<u>Explanation:</u>

Mail merge allows one to send a particular document to different individuals.  It is generally used in office environment where some information is to be communicated  to a number of people. The information is attached by adding the data sources.

Mail merge comprises of joining mail and letters and pre-tended to envelopes or mailing names for mass mailings from a structure letter.

In database mail merging it is embedding it into reports, for example, letters, mailing marks, and unofficial IDs.

Tables assist you with exhibiting data in an unmistakable and sorted out way. Tables are helpful for different assignments, for example, introducing content data and numerical information.

In excel the component in Microsoft Word and Excel streamlines the way toward sending a similar report with customized changes to a few beneficiaries.

In outlook contacts, the wellspring of customized data in a bunch of Word reports, through Word's mail blend include through Word's mail merge feature.

alexdok [17]3 years ago
8 0

Answer:

1.) a database

2.) Word tables

5.)an Excel spreadsheet

6.) an Outlook contacts list

Explanation:

edg 2020

You might be interested in
What are technology trends in science check all that apply
Doss [256]

Answer:

3D Printing Molecules.

Adaptive Assurance of Autonomous Systems.

Neuromorphic Computing (new types of hardware) and Biomimetic AI.

Limits of Quantum Computing: Decoherence and use of Machine Learning.

Ethically Trustworthy AI & Anonymous Analytics.

Explanation:

6 0
3 years ago
Help me with this question asap please :)
Svetradugi [14.3K]

Answer:

I think it's sequence as there is a pattern of connection in the words

8 0
2 years ago
I will mark you as brainlist
weeeeeb [17]

Answer:

download it

Explanation:

because if u upload it will not save .

7 0
3 years ago
Read 2 more answers
E lvl:
Alexxandr [17]
I’m cool here here here pizza
5 0
3 years ago
True or false you have no control over who views your social network information
il63 [147K]
  Your answer would be false. That's what you have security settings for.
4 0
4 years ago
Read 2 more answers
Other questions:
  • The email administrator has suggested that a technique called SPF should be deployed. What issue does this address?
    5·1 answer
  • A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da
    6·1 answer
  • What are some common security threats for our home devices and IoTs?
    14·1 answer
  • Write the definition of a function named isSorted that receives three arguments: an array of int , an int that indicates the num
    11·1 answer
  • Write a program that sorts an array of 20 random numbersin the range from 0 through 1000.
    6·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • Help Me Please, Ill mark whoever has the best answer with brainliest.
    14·1 answer
  • Do you all like IXL?
    8·1 answer
  • The one who will defeat me in this typing race I will mark him/her brainliest
    10·1 answer
  • What is the difference between packaged and tailored software ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!