?Andrea, an event manager, is drafting a list of guests to invite for an event. In an Access database, she has the addresses of all the guests but not their names, which are needed for the guest list. To make sure the guests without names are included in the mail merge, Andrea should use the:

A. ?Insert Address Block Field button and choose to replace the first field.
B. ?invalid recipient dropdown menu in the Greeting Line dialog box
C. ?Create from File button to create a custom field for recipients
D. ?Insert Merge Field button to insert a field in the document


Answer: B

Computer Science & Information Technology

You might also like to view...

An operation such as login, read, perform, I/O or execute that is performed by the subject on or with an object is the _________ audit record field. ??

A. resource-usage ?? B. subject C. object ? D. action

Computer Science & Information Technology

A loop contained within another loop is called a ____ loop.

A. secondary B. nested C. replacement D. virtual

Computer Science & Information Technology

Item D in the accompany figure shows the _______________ of errors and warnings in the current document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

Computer Science & Information Technology