1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
15

Mail merge can be used in business to complete which of the following tasks

Computers and Technology
2 answers:
Likurg_2 [28]3 years ago
8 0

Answer:

Mail merge lets you create a batch of documents that are personalized for each recipient. For example, a form letter might be personalized to address each recipient by name. A data source, like a list, spreadsheet, or database, is associated with the document.

igor_vitrenko [27]3 years ago
7 0

Answer:

spreadsheet, or database, is associated with the document.

Explanation:

You might be interested in
To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. TRUE
Elis [28]
I believe the statement is true. <span>To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. Hope this answers the question. Have a nice day. Feel free to ask more questions.</span>
6 0
3 years ago
When a formula contains the address of a cell, it is called a(n)
Shalnov [3]
When a formula contains the address of a cell, it is called a c<span>ell reference.

hope this helps!</span>
8 0
3 years ago
Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for
zysi [14]

Answer:

biometrics

Explanation:

Voice and fingerprint <u>biometrics</u> can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.

6 0
3 years ago
• The technical support department at your company has informed you that you will be receiving a new computer within the next we
alexdok [17]
1) back up your data
2) delete any personal information
3) clear cookies, browsing data, and saved passwords
4) restore any settings you may have changed to original settings
6 0
2 years ago
Does anyone go to connections acadomy​
Komok [63]

Answer:

no I dont where is that at

7 0
2 years ago
Read 2 more answers
Other questions:
  • When an IRET instruction is executed, what actiontakes place?
    5·1 answer
  • What is the purpose of this diamond shape in a flowchart?
    8·1 answer
  • I'm the state of Florida, your first conviction for DUI can result in your vehicle being impounded for
    5·1 answer
  • What the gas line in the car
    12·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indic
    9·1 answer
  • _____ provide a description of the data characteristics and the set of relationships that link the data found within the databas
    8·1 answer
  • All of the following are organization habits except:
    10·1 answer
  • A plan budget time for studying and activities is referred to as?
    11·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!