If the preview of the address block in the mail merge is correct, click OK. If it is incorrect, click ____ to make adjustments.

A. Match Fields
B. Filter Fields
C. Edit Fields
D. Format Fields


Answer: A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The straightforward use of public-key encryption provides confidentiality and authentication. 2. A CTR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks. 3. An important characteristic of the MAC algorithm is that it needs to be reversible. 4. As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search. 5. To attack MD5, the attacker can choose any set of messages and work on these offline on a dedicated computing facility to find a collision.

Computer Science & Information Technology

A Pinterest pinboard is like an old-fashioned chalkboard, only online

Indicate whether the statement is true or false

Computer Science & Information Technology

Business letters are generally intended for ________ distribution between two businesses, or a business and its clients

Fill in the blank(s) with correct word

Computer Science & Information Technology

IPv6 jumbograms are specified as a proposed standard in which of the following RFCs?

A. 1100 B. 1700 C. 2314 D. 2675

Computer Science & Information Technology