In which of the following scenarios would you filter a data source in preparation for a mail merge?

What will be an ideal response?


When mailing a promotional document to recipients in a particular zip code, excluding others

Computer Science & Information Technology

You might also like to view...

A combined direct/associative mapping holds only a small percentage of the complete page table for a process in __________ and keeps the complete page table in __________.

a) secondary storage, direct-mapped memory b) direct-mapped memory, secondary storage c) associative memory, main memory d) associative memory, secondary storage

Computer Science & Information Technology

Data-flow diagrams trace all data in an information system from the point at which data enter the system to their final resting places

Indicate whether the statement is true or false

Computer Science & Information Technology

Which port numbers are most vulnerable to NetBIOS attacks?

a. 135 to 137 b. 389 to 1023 c. 135 to 139 d. 110 and 115

Computer Science & Information Technology

When Windows first starts and the user signs in, a message about a missing DLL appears. Which tool or method should you use first to solve the problem? Second?

a. Use Task Manager to identify the startup process. b. Use the Services console to stop the process that needed the DLL. c. Search the web on the error message to better understand the problem. d. Use Component Services to register the DLL.

Computer Science & Information Technology