1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
9

Assume you have an Access database with five different tables, including various pieces of information about your client base. Y

ou want to pull information from Table 1, which includes your client names and addresses. From Table 2, you want to pull information on how much they've paid for your product in the past year. What is the best way to set this up for a mail merge?
A. Copy the two tables from Access to Excel, and then perform the mail merge from Word.
B. Export both tables from Access and import them into Word to complete the mail merge.
C. Create a query that includes the required information for the mail merge.
D. Manually retype the lists into Word to complete the mail merge.
Computers and Technology
1 answer:
Fofino [41]3 years ago
4 0

The answer is A. Copy the two tables

You might be interested in
Play among us with me
omeli [17]

Answer:

cool

Explanation:oof

8 0
3 years ago
Read 2 more answers
There is the Iphone MAX, Iphone XR and Iphone XS. which iphone is the very NEWEST and which one do you recommend? explain.
Pavlova-9 [17]

Answer:me myself would go with the Iphone XR

Explanation:

Because its like a combined phone of those two phones together and its not as exspnsive as the other phones and overall its good cause i have had it since it came out and had no problems with it.

3 0
3 years ago
Read 2 more answers
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Eight houses represented as cells are arranged in a straight line java int state []
monitta

Answer:

int state[] = new int[8];

8 0
3 years ago
Select all the correct answers.
gtnhenbr [62]

Answer:

If you want to learn coding than get a game and look at the code inside.

Explanation:

I sugest terraria

8 0
3 years ago
Other questions:
  • What are the first and the last physical memory addressesaccessible using
    10·1 answer
  • Give two separate print statements: one will print your name, the other will print your major. Ensure that both will print on th
    15·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • Google Glass, glasses that allow you to take pictures and search online by speaking commands, are introduced at a technology tra
    8·1 answer
  • Primary technology skills are skills that are necessary for success in online education
    9·2 answers
  • Zoom meeting ID:987 6858 5587 Password:196133
    10·2 answers
  • Which 1898 film did George Melies create using camera trickery to create a illusion in which we now
    11·1 answer
  • IT specialists must display technical expertise and collaborative proficiency in the workplace. Select the IT specialist who dem
    7·1 answer
  • Which format of image files can be inserted in html?​
    8·2 answers
  • please help no one is helping me on this one
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!