1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
13

. A possible data for source that could be used when completing a mail merge could be a(n)… : *

Computers and Technology
2 answers:
igor_vitrenko [27]3 years ago
8 0

Answer: d) All of the above

Explanation: Mail merge is the technique in which the emails are combined with the predefined labels so that it could be mass mailed. This tool is helpful for sending a mail to several people at one time. Data source that is used in the mass mailing is known as the database that holds a column for variables present in templates.

Therefore, outlook contact list, excel sheet access database table,word table etc can be used as the source of data at the time of mail merge.These tools acts as data source to connect with the templates.Data source is the source that contains the information about the recipient such as address etc.

Thus all the options mention in the question are correct.

Hatshy [7]3 years ago
6 0

A possible data for source that could be used when completing a mail merge could be all the above.

d. all the above

<u>Explanation:</u>

Mail merge allows one to send a particular document to different individuals.

It is generally used in office environment where some information is to be communicated  to a number of people. The information is attached by adding the data sources.

The information source is a report, spreadsheet or database that contains customized data, for example, names, locations, and telephone numbers.

You might be interested in
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
Why people get addited to mobile and by playing games​
nadya68 [22]
Because it is a very fun game and if it is fun people like it
4 0
3 years ago
George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
Alex777 [14]

Answer:

data source

Explanation:

The main aim of a data source is for the gathering of all necessary information that is needed to access a data. Since he has used the information to create a pie chart, this means that some data were used for the creation of this pie chart. Hence the information used for the creation of the pie chart is the data source for the information illustrated on the pie chart.

3 0
3 years ago
Discuss the relationship amongst the following basic file elements: • Field. • Record. • File. • Database. • Directory.​
Gwar [14]

Answer:

describe two events from the life of the prophet that illustrate the way he treated non muslims3+15-75+375.

Explanation:

53+15-75+3756,1803+15-75+375describe two events from the life of the prophet that illustrate the way he treated non muslims

4 0
2 years ago
Value appears on the left hand side of cell <br> true or false
11111nata11111 [884]

Answer:

True

Your welcome

.........

4 0
2 years ago
Read 2 more answers
Other questions:
  • A page-replacement algorithm should minimize the number of page faults. We can achieve this minimization by distributing heavily
    14·1 answer
  • type the correct answer in the Box spell the words correctly Caleb is working on a simple logic base program to stimulate the ga
    5·2 answers
  • According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
    8·1 answer
  • To copy noncontiguous slides, open Slide Sorter view, click the first slide thumbnail, press and hold ____, click each additiona
    15·1 answer
  • You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
    13·1 answer
  • When we put 10+ points for when we ask a question, do we loose the points we have?
    12·1 answer
  • Which of the following is most likely to be considered plagiarism? a. Intentionally reporting the results of inaccurate statisti
    11·1 answer
  • Applications software is also known as
    14·2 answers
  • You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to
    9·1 answer
  • 50 POINTS How do you express yourself and your creativity through computer science?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!