To access the Step-by-Step Mail Merge Wizard, click Start Mail Merge on the ____ tab.
A. Home
B. Insert
C. Mailings
D. References
Answer: C
You might also like to view...
It is good programming practice to __________ your functions by writing comments that describe what they do.
a. execute b. document c. retrieve d. create e. None of these
Match each term with the correct statement below.
A. The area drawn around the protected space B. Data about a single individual C. Specific incidents of intrusion, unauthorized access, or misuse of information D. The area of security devoted to protection of the physical space and the physical entities within it E. The process of defining the level of sensitivity of information as a means of defining privileges to access it F. Ensuring that all personal information about an individual is protected G. Proven conformance with policy, procedure, standard, regulation, directive, or law H. Lowest level of training aimed at imparting general knowledge to the entire organization I. Physical countermeasures put in place to secure physical space. Guards, gates, and locks are examples of physical controls
In a system containing several concurrent processes, a running process with a small working set tends to experience a ________ number of page faults as the page size ________.
a) greater, increases b) greater, decreases c) constant, increases d) constant, decreases
Which device can connect many computers and sends data only out of one port?
a. Hub b. Repeater c. Switch d. Router