Mail merge commands are found on the ________ tab

A) Page Layout
B) Mailings
C) Design
D) View


B

Computer Science & Information Technology

You might also like to view...

Which of the following would be considered a vulnerability?

A. installation of a firewall B. antivirus software C. Internet-connected computer D. spyware

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A selection of two or more cells B. Displays the active cell address C. A dark rectangle that outlines the cell in which you are working D. Identified by the coordinates of the intersecting column and row E. Provides a brief description of the active command or task in progress

Computer Science & Information Technology

How many words should an abstract contain?

a. 150 to 200 b. 200 to 250 c. 250 to 300 d. 300 to 350

Computer Science & Information Technology

Least privilege is a concept associated with ___________________

A. Legacy IT systems B. Privacy C. Reliability D. Security

Computer Science & Information Technology