1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
9

Assume you have an Access database with five different tables, including various pieces of information about your client base. Y

ou want to pull information from Table 1, which includes your client names and addresses. From Table 2, you want to pull information on how much they've paid for your product in the past year. What is the best way to set this up for a mail merge?
A. Copy the two tables from Access to Excel, and then perform the mail merge from Word.
B. Export both tables from Access and import them into Word to complete the mail merge.
C. Create a query that includes the required information for the mail merge.
D. Manually retype the lists into Word to complete the mail merge.
Computers and Technology
1 answer:
Fofino [41]3 years ago
4 0

The answer is A. Copy the two tables

You might be interested in
TP is commonly used to __________ and __________ files to a server.
Goshia [24]

Answer:

upload; download

Explanation:

This question is not complete: is not TP

Is FTP is an Internet protocol commonly used to upload and download files to a server, For example:

There are image banks where you can sell or share files like videos, music, and photographs, in this kind of website, you can transfer files for FTP, in FTP we must type a user name and password to send the files.

8 0
3 years ago
One disadvantage of online information sharing is that:
zubka84 [21]

Answer:

its b i just took the test

Explanation:

3 0
3 years ago
Read 2 more answers
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
Mila [183]

Answer:

c. traffic shaping

Explanation:

A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.

Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.

5 0
3 years ago
What was your first experience with listening to kpop?
Verizon [17]

Answer:

My first experience with kpop was when I was six I just danced to it lol I forgot the name of the song but it was funny watching the video of me.

Explanation:

8 0
3 years ago
Read 2 more answers
What is the process called when programmers look for and fix errors in code?
AveGali [126]

Answer:

d

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which one of the following terms is defined as the material and surfaces upon which an artist works?
    9·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:
    10·1 answer
  • Which of the following do you need to remeber about true/false questions?
    12·1 answer
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new li
    7·1 answer
  • (Bible)<br> Sin may be an inward thought or an outward act. True False
    11·2 answers
  • Help
    13·1 answer
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • I AM GIVING BRAINLIEST!!!!!!! PLEASE HELP !!!!!!!!
    7·2 answers
  • I'll mark you the brainlest please help
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!