1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
7

Josie, your best friend, is having a huge Sweet Sixteen party. She has designated you to address all 100 of the envelopes (using

labels). Explain why using Mail Merger would be to your benefit as opposed to writing out the labels.
Computers and Technology
1 answer:
marysya [2.9K]3 years ago
4 0

You add all the addresses into excel and and do mail-merge with the invitation. Adding the 100 addresses is probably a lengthy process but once this is complete you can just add on addresses and once a year or whenever you have to mail something to everyone, it's  a only mouse-click.

You might be interested in
John typed 545 words in 35 minutes, what is his typing speed
Katarina [22]

Answer: 545 words per 35 mins

Explanation:

4 0
2 years ago
Read 2 more answers
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Assume a program requires the execution of 50 x 106 (50e6) FP instructions, 110 x 106 (110e6) INT instructions, 80 x 106 (80e6)
tresset_1 [31]

Answer:I really don’t know

Explanation:

Um You can look it up though

7 0
3 years ago
I need someone's opinion<br> Which format is better? The first or second one? I can't decide 0.0
Ne4ueva [31]

Answer:

2nd one

Explanation:

4 0
3 years ago
Read 2 more answers
To use patterns and observations to say what happens next
posledela
You would need to show a pic
4 0
3 years ago
Other questions:
  • which of these paste options is commonly available from the paste options button? A&gt; use the destination them. B. keep the em
    14·2 answers
  • I wonder how world is created
    12·2 answers
  • The total revenues for a company are $150,223 and the total expenses were 125,766. If you are calculating the net income, which
    10·1 answer
  • What element is not a selection in the Interface preferences? UI Character Presets UI Font Size UI Language UI Scaling
    9·1 answer
  • Easy coding question, please help.
    13·1 answer
  • What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
    15·1 answer
  • Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further obser
    15·1 answer
  • Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would w
    9·1 answer
  • Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
    5·1 answer
  • Define a function in Scheme (or relation in Prolog) that checks whether a set of elements (represented as a list) is a subset of
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!