1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
7

What are some options available in the Write & Insert Fields group? Check all that apply.

Computers and Technology
1 answer:
GaryK [48]3 years ago
4 0

Answer:

Highlight Merge Fields

Address Block

Greeting Line

Rules

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.

Some of the options available in the Write & Insert Fields group of Mail Merge are;

I. Highlight Merge Fields.

II. Address Block.

III. Greeting Line.

IV. Rules.

You might be interested in
What is a computer network that provides connectivity in a geographic area or region larger than that covered by a local area ne
lina2011 [118]

Answer:

The correct answer for the given question is "Metropolitan Area Network"

Explanation:

The metropolitan area network connect the user with a geographic area of the size of  metropolitan area.Metropolitan area network connect LAN i.e " local area network " to a single larger network thats provide efficient  connection to the WAN network.Their are many advantage to use metropolitan area network which are mention above .

  • Provides the better security then other network.
  • Cheaper lost when we connect MAN with WAN.
  • If we use MAN network then data will be fastly transferred.
6 0
3 years ago
Here is the problem specification: An Internet service provider has three different subscription packages for its customers: Pac
Andrej [43]

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

   int hour; char pkg; float bill = 0;

   cout<<"Package: "; cin>>pkg;

   cout<<"Hour: "; cin>>hour;

   if(hour<=744 && hour >=0){

       switch (pkg) {

           case 'A':

               bill = hour * 9.95;

               if(hour >10){bill = 10 * 9.95 + (hour - 10) * 2;}

           break;

           case 'B':

               bill = hour * 14.5;

               if(hour >10){bill = 20 * 14.5 + (hour - 20) * 1;}

           break;

           

           case 'C':

               bill = 19.95;

           break;

           

           default:

               cout << "Package must be A, B or C";}

cout<<"Total Bills: $"<<bill; }

else{ cout<<"Hour must be 0 - 744"; }

return 0;

}

Explanation:

This declares all variables:    int hour; char pkg; float bill=0;

This prompts the user for package type:  cout<<"Package: "; cin>>pkg;

This prompts the user for number of hours:    cout<<"Hour: "; cin>>hour;

This checks if hour is between 0 and 744 (inclusive)

   if(hour<=744 && hour >=0){

If true, the following is executed

A switch statement to check valid input for package

       switch (pkg) {

For 'A' package

           case 'A':

Calculate the bill

<em>                bill = hour * 9.95;</em>

<em>                if(hour >10){bill = 10 * 9.95 + (hour - 10) * 2;}</em>

End of A package:            break;

For 'B' package

           case 'B':

Calculate the bill

<em>                bill = hour * 14.5;</em>

<em>                if(hour >10){bill = 20 * 14.5 + (hour - 20) * 1;}</em>

End of B package:<em>            </em>break;

For C package            

           case 'C':

Calculate bill:                bill = 19.95;

End of C package:            break;

If package is not A, or B or C

           default:

Prompt the user for valid package                cout << "Package must be A, B or C";}

Print total bills: cout<<"Total Bills: $"<<bill; }

If hour is not 0 to 744: <em>else{ cout<<"Hour must be 0 - 744"; }</em>

6 0
3 years ago
100 POINTS!!!!!!!
bogdanovich [222]

A)

<u>~</u><u>Intellectual property needs to be protected because it usually has</u><u> </u><u>psychological</u><u> </u><u>value.</u>

Hope this helped you- have a good day bro cya)

4 0
3 years ago
Read 2 more answers
. An access specifier is one of three keywords:
Zolol [24]

Answer:

Access specifiers are used to control the visibility of members like classes, variables and methods. There are three access specifiers: public, private and protected. We shall see only about the public and private access specifiers for now. Protected access specifier comes into picture when inheritance is implemented. plz brainly me

Explanation:

8 0
3 years ago
Effective online learning method for students
qwelly [4]

Answer: Desire method: This is one of the unique but most effective teaching strategies to grab student attention and...

Active learning: The one sided lecture methods are no more fruitful to get the interest of the new generation...

Cooperative learning: Give them a chance to come out of their seats

Explanation:

4 0
3 years ago
Other questions:
  • What are the 6 external parts of a computer system
    8·1 answer
  • 11What is the definition of bandwidth? the speed at which bits travel on the network the measure of the transfer of bits across
    7·1 answer
  • Using C++, Write a full class definition for a class named Acc1, containing no constructors, functions, or data members (i.e., a
    12·2 answers
  • ________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor
    13·1 answer
  • How to do this PLEASE HELP 80 points!
    15·1 answer
  • In database transaction concurrency, the lost update anomaly is said to occur if a transaction Tj reads a data item, then anothe
    6·1 answer
  • What can your employer do to protect you from overhead power lines?
    13·1 answer
  • The one who will defeat me in this typing race I will mark the one brainliest:
    5·2 answers
  • It is not really important to organize your photos because you know that they are on your computer. (TRUE/FALSE)
    10·2 answers
  • The Horse table has the following columns:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!