Mail merge commands are found on the ________ tab
A) Page Layout
B) Mailings
C) Design
D) View
B
You might also like to view...
Which of the following would be considered a vulnerability?
A. installation of a firewall B. antivirus software C. Internet-connected computer D. spyware
Identify the letter of the choice that best matches the phrase or definition.
A. A selection of two or more cells B. Displays the active cell address C. A dark rectangle that outlines the cell in which you are working D. Identified by the coordinates of the intersecting column and row E. Provides a brief description of the active command or task in progress
How many words should an abstract contain?
a. 150 to 200 b. 200 to 250 c. 250 to 300 d. 300 to 350
Least privilege is a concept associated with ___________________
A. Legacy IT systems B. Privacy C. Reliability D. Security