Mail merge is used most frequently to create:
A) form letters. B) envelopes. C) a directory. D) e-mail messages.
A
Computer Science & Information Technology
You might also like to view...
The ____________________ professional is a specialist in protecting personal information.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?
A. MAC B. RSA C. DES D. AES
Computer Science & Information Technology
If a technician wanted to create a copy of the group policy configuration for a particular domain computer, which command could be used?
A) MSDIAG B) MSCTC C) GPRESULT D) REGSERV
Computer Science & Information Technology
You can restore an accidentally deleted layer by deleting the Delete Layer state on the ____________________ panel.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology