1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
9

Assume you have an Access database with five different tables, including various pieces of information about your client base. Y

ou want to pull information from Table 1, which includes your client names and addresses. From Table 2, you want to pull information on how much they've paid for your product in the past year. What is the best way to set this up for a mail merge?
A. Copy the two tables from Access to Excel, and then perform the mail merge from Word.
B. Export both tables from Access and import them into Word to complete the mail merge.
C. Create a query that includes the required information for the mail merge.
D. Manually retype the lists into Word to complete the mail merge.
Computers and Technology
1 answer:
Fofino [41]3 years ago
4 0

The answer is A. Copy the two tables

You might be interested in
About C header files of C programming
Neko [114]

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

3 0
3 years ago
PLZ HELP ME ITS URGENT PlZ PLZ PLZ
Lubov Fominskaja [6]

Answer:

#include <stdio.h>

void main()

{

int num;

printf("Input a number :");

scanf("%d", &num);

if (num >= 0)

printf("%d is a positive number \n", num);

else

printf("%d is a negative number \n", num);

}

Explanation:

good luck.

hope it helped you.

pls mark brainleist

8 0
3 years ago
What are the two protocols used most often with iot devices? (select two. )
makkiz [27]

Z-Wave and Zigbee are the two protocols that are used most often with IOT devices.

<h3>What is a protocol?</h3>

A protocol can be defined as a formatted blocks of data that have been designed and established by professionals to obey a set of standard rules (conventions) such as Z-Wave and Zigbee.

In Computer networking, the two protocols that are used most often with Internet of Things (IOT) devices include the following:

  • Z-Wave
  • Zigbee

Read more on protocols here: brainly.com/question/17387945

#SPJ12

4 0
2 years ago
Which is true about lists and stacks?
frutty [35]

Answer:

A. list are first in first out and stack are just a special case

<h3>hope this helps!</h3>
4 0
3 years ago
A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
Reptile [31]

Answer:

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

Explanation:

using the direct mapping method

Number of lines = 512

block size = 8 words

word offset = log ^{8} _{2}  = 3 bit

index bit = log^{512}_{2}  = 9 bit

Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

8 0
4 years ago
Other questions:
  • A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) t
    6·1 answer
  • Which type of chemical bonds are formed by sharing electrons?
    11·1 answer
  • What are examples of some Exotic currencies?
    14·1 answer
  • _________ are represented using diamonds linked withparticipant ETs
    6·1 answer
  • Why are specification for food processing tool,equipmentand untensils necessary?​
    8·1 answer
  • A lookup field allows the user to select from a list of values when updating the contents of a field. true or false.
    11·1 answer
  • How to get off of supervised user
    7·1 answer
  • When can designers use rapid application development?
    8·1 answer
  • In GD, what does RWR stands for?
    9·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!