1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
15

You will use the Word application to design, develop, and create a business letter to potential clients of your new business. Th

e following steps will help you in this process.
Open a blank Word document.

Write a business letter introducing people to your store. You may choose any type of store you wish, but your letter should be at least one paragraph long and be able to be easily personalized to each potential client. Make sure you include the type of business, a sentence about your business plan or philosophy, the location of your business, and any relevant contact information.

With this letter open, begin a mail-merge letter using the letter you just wrote as your starting document.

Since you do not have the addresses of your contacts in the computer, you will need to type a new list and create a new data source. Save the data source as "Mail Merge Data Source Lesson 3."

For this example, enter the names and addresses of four people.

Insert merge codes for the address block, greeting line, and at least two other items from the More Items list.

Preview your letters. Make sure you proofread your work for spelling and grammar errors.

Merge your letters to a new document. Save the original and merged documents.

Show your documents to your instructor for review.

After you have written your letters, you realize you will need mailing labels for the outside of your envelopes. To quickly make these labels, you decide to use a merge.


Open a new document and begin a mail merge using the Mail Merge Wizard.

Select Avery 5160 mailing labels as your label type.

Use the data source you saved earlier, "Mail Merge Data Source Lesson 3," for the addresses for your labels.

Insert an address block on each label.

Preview your labels for format and spelling errors.

Merge your labels and save them in a new document.

Submit your labels in the space provided for your instructor to review.
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
7 0

Answer:

Mail Merge Data Source

Explanation:

You might be interested in
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
3 years ago
Which of the descriptions listed below best describes the step in the reverse engineering process called functional analysis? A)
Zepler [3.9K]
If multiple choice then d and a if not then the best one would be a!


hope this helps!!
5 0
3 years ago
Help pls put them in order for me??
Natalija [7]

Answer: i can't see the hole thing?

Explanation:

3 0
3 years ago
Read 2 more answers
A start-up is expanding overseas and spends an excessive amount of time on recruiting and hiring activities, hindering its abili
leva [86]
HCM is a word for Human Capital Management
6 0
3 years ago
Which icons allows you to add a style to a chart
ZanzabumX [31]
Click on your chart and go under Table Tools, Design... then you should see the different styles. ;)
5 0
3 years ago
Other questions:
  • Show the subnet address, subnet mask in slash notation, broadcast address, number of addresses, first valid host address, and th
    13·1 answer
  • Describe three main types of testing and the order in which they are performed.
    9·2 answers
  • What is technology addiction​
    14·1 answer
  • In which type of attack do you get malicious code in links from seemingly reliable websites?
    14·1 answer
  • This question is for one of my classes I am in right now, and the question is:
    8·1 answer
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
    11·1 answer
  • What type of result does the MATCH function, when used on its own, return?
    5·1 answer
  • Universal Containers requires that all users add at least one Product Option from the Maintenance Feature to a bundle.
    5·1 answer
  • GIVING BRAINLIST TO WHOEVER ANSWERS
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!