1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
13

. A possible data for source that could be used when completing a mail merge could be a(n)… : *

Computers and Technology
2 answers:
igor_vitrenko [27]3 years ago
8 0

Answer: d) All of the above

Explanation: Mail merge is the technique in which the emails are combined with the predefined labels so that it could be mass mailed. This tool is helpful for sending a mail to several people at one time. Data source that is used in the mass mailing is known as the database that holds a column for variables present in templates.

Therefore, outlook contact list, excel sheet access database table,word table etc can be used as the source of data at the time of mail merge.These tools acts as data source to connect with the templates.Data source is the source that contains the information about the recipient such as address etc.

Thus all the options mention in the question are correct.

Hatshy [7]3 years ago
6 0

A possible data for source that could be used when completing a mail merge could be all the above.

d. all the above

<u>Explanation:</u>

Mail merge allows one to send a particular document to different individuals.

It is generally used in office environment where some information is to be communicated  to a number of people. The information is attached by adding the data sources.

The information source is a report, spreadsheet or database that contains customized data, for example, names, locations, and telephone numbers.

You might be interested in
Select the correct answer.
Softa [21]

Answer:

D. smart phone

explanation;

a. what the heck is a radio going to do?

b. an HD television? is his job watching movies?

d. he already has a form of communication he uses, he needs something that can to both things at the same time

c. a smart phone can do everything he needs to do, likely faster than a landline phone or laptop.

5 0
2 years ago
When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
kumpel [21]

<em>The answer is : He must consult with a lawyer. </em>

<em>Hacking is considered illegal and in other countries, it is punishable by law. Hacking is gaining unauthorized access to a network. Even when someone is giving you permission to do it, it is still wrong and illegal. Therefore, you must know of your rights and make all the party involved to signed an agreement to save yourself.</em>

8 0
3 years ago
fill in the balenkes ) 1)there are ................................... function keys on the keybord 2)pressing the end key moves
Doss [256]

Answer:

1.) There are 12 function keys 2.) The return Key

Explanation:

6 0
3 years ago
Multiply each element in origList with the corresponding value in offsetAmount. Print each product followed by a semicolon (no s
oee [108]

Answer:

Replace /* Your code goes here */  with

for(i =0; i<NUM_VALS; i++) {

    printf("%d", origList[i]*offsetAmount[i]);

printf(";");

}

Explanation:

The first line is an iteration statement iterates from 0 till the last element in origList and offsetAmount

for(i =0; i<NUM_VALS; i++) {

This line calculates and print the product of element in origList and its corresponding element in offsetAmount

    printf("%d", origList[i]*offsetAmount[i]);

This line prints a semicolon after the product has been calculated and printed

printf(";");

Iteration ends here

}

5 0
3 years ago
In 3–5 sentences, describe the unique challenges e-mail presents for business communications.
alina1380 [7]
One of the things that are a challenge, is that you have to get the correct puntuation, correct capitilization, because it's a buisness email. You ont want to mess a buisness email up. You also have to have no repating phrases and sentences. You can't be adding random words and saying "and" all the time. 
7 0
3 years ago
Read 2 more answers
Other questions:
  • This question involves the implementation of the PasswordGenerator class, which generates strings containing initial passwords f
    5·1 answer
  • He smallest network is a ______________________, which is a network of personal devices, such as the network you use when you sy
    5·1 answer
  • Camera shock might happen if you do which of the following to your camera?
    6·2 answers
  • On the Insert tab, select Table &gt; _______ to create a table from selected text.
    14·1 answer
  • Recall that within our BinarySearchTree class the root variable is of type BSTNode. A BSTNode object has three attributes: info
    13·1 answer
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
  • Using complete sentences post a detailed response to the following.
    13·1 answer
  • What is the most commonly used tab in the Filter dialog box?
    9·2 answers
  • java Two smallest numbers Write a program that reads a list of integers, and outputs the two smallest integers in the list, in a
    6·1 answer
  • this feature offered by mutual funds allows investors to switch from one mutual fund to another within a fund families.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!