Which of the following Mail Merge Commands from the Mailings tab enables you to choose the type of main document you will work with?

A) Match Fields B) Select Recipients
C) Highlight Merge Fields D) Start Mail Merge


D

Computer Science & Information Technology

You might also like to view...

The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .

A) IAB B) SPI C) ESP D) SPD

Computer Science & Information Technology

Building a linked list forward places the item to be added at the ____ of the linked list.

A. beginning B. end C. middle D. key point

Computer Science & Information Technology

The most popular way for hackers to take over hosts today is ________.

A. by taking over an application B. by taking over the operating system C. by guessing the root password D. by taking over the user interface

Computer Science & Information Technology

The user name or initials automatically added to a document template are set in the FILE tab.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology