1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
3 years ago
8

How important is the mail merge feature of microsoft word in different organization.?

Computers and Technology
2 answers:
elena55 [62]3 years ago
4 0
A mail merge can help an organization can save time but instantly personalizing a letter according to the address and personal contact saved on the computer. It also can be specified to the people whom you wanted to share a letter. 

The process involves three steps which are; the document or letter you wanted to send, the saved mailing list or your contacts, and the merged document where it becomes personalized after the contacts are saved for mail.
Stolb23 [73]3 years ago
3 0

Explanation:

The importance of the microsoft word mail merge feature in an organization is that it is a tool that not only optimizes time and productivity in mailing, but is also a direct customer relationship tool.

Through direct mail is possible to customize the message sent according to the profile of certain customers, applying a more direct and differentiated approach, which will reach the customer more effectively, and the possibility of generating greater proximity to the customer, offering advantages invitations, event invitations, surveys related to product and service improvements, and more.

You might be interested in
What is a symptom of a failing power supply? The display has only a blinking cursor. The computer displays a POST error code. Th
Mariulka [41]

Answer:

A sympton of a failing power supply is The computer sometimes does not turn on.

Explanation:

All right, the power supply is the terminal that receives electric current to process it and distribute it to the different parts of the hardware that compose the computer. When it fails, the current is not distributed and doesn't reach the different pieces of hardware. Therefore, option D) is the correct one. Another error that could be related is the malfunction of fans but it could be related to wires more than the power itself.

7 0
3 years ago
What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
Scrat [10]
<span>On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.</span>
7 0
3 years ago
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
alexira [117]

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

8 0
2 years ago
What will the following code print out: int numbers [] = {99, 87, . 66, 55, 101}; for (int i = 1; i &lt; 4; i++) cout &lt;&lt; n
forsale [732]

Answer:

87 66 55

Explanation:

Array is used o store the multiple values with same data type.

the array show a decimal value .66, i assume this is enter by mistake because option has no decimal value.

The index of the array is start from zero, it means the first element store in the array at position zero.

In the for loop the variable 'i' start from 1 not zero and it goes to i<4 means i=3.

So, it access the element from 2 to 4 because the index is position of element less than 1.

Therefore, 87 66 55 print.

5 0
3 years ago
Look at the data set below. {9, 12, 12, 15, 18, 20, 25} in this data set, what is the median
cluponka [151]

. Answer: Median: 15

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • Which of the following is NOT a fixed expense?
    6·1 answer
  • What feature of Windows Server allows for agentless authentication?
    7·1 answer
  • What do we call the time it takes for all of the sub-pixels on the panel to go from pure black to pure white and black again
    6·1 answer
  • What resources can be shared over a computer network?
    12·2 answers
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • Why security must be planned, tested, and ready by the time the erp implementation is at go-live?
    11·1 answer
  • When machining rotors, what is the reason for setting the indexing collars to zero?
    9·1 answer
  • The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
    11·1 answer
  • Can someone reply me
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!