To access the Step-by-Step Mail Merge Wizard, click Start Mail Merge on the ____ tab.

A. Home
B. Insert
C. Mailings
D. References


Answer: C

Computer Science & Information Technology

You might also like to view...

It is good programming practice to __________ your functions by writing comments that describe what they do.

a. execute b. document c. retrieve d. create e. None of these

Computer Science & Information Technology

Match each term with the correct statement below.

A. The area drawn around the protected space B. Data about a single individual C. Specific incidents of intrusion, unauthorized access, or misuse of information D. The area of security devoted to protection of the physical space and the physical entities within it E. The process of defining the level of sensitivity of information as a means of defining privileges to access it F. Ensuring that all personal information about an individual is protected G. Proven conformance with policy, procedure, standard, regulation, directive, or law H. Lowest level of training aimed at imparting general knowledge to the entire organization I. Physical countermeasures put in place to secure physical space. Guards, gates, and locks are examples of physical controls

Computer Science & Information Technology

In a system containing several concurrent processes, a running process with a small working set tends to experience a ________ number of page faults as the page size ________.

a) greater, increases b) greater, decreases c) constant, increases d) constant, decreases

Computer Science & Information Technology

Which device can connect many computers and sends data only out of one port?

a. Hub b. Repeater c. Switch d. Router

Computer Science & Information Technology