Mail merge is used most frequently to create:

A) form letters. B) envelopes. C) a directory. D) e-mail messages.


A

Computer Science & Information Technology

You might also like to view...

The ____________________ professional is a specialist in protecting personal information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?

A. MAC B. RSA C. DES D. AES

Computer Science & Information Technology

If a technician wanted to create a copy of the group policy configuration for a particular domain computer, which command could be used?

A) MSDIAG B) MSCTC C) GPRESULT D) REGSERV

Computer Science & Information Technology

You can restore an accidentally deleted layer by deleting the Delete Layer state on the ____________________ panel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology