Perform a mail merge to send invitation, Basic Computer Science

Assignment Help:

Question

Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conducted in your organization.

  1. Mail merge wizard
  2. Second step in mail merge wizard
  3. Customizing icon in mail merge (third step)
  4. Data entry columns (fourth step)
  5. Data source Column
  6. Task Pane
  7. Address book insertion
  8. Greeting line option
  9. Preview letters link

Question:- Have to perform a mail merge to send invitation based on the above steps and attach the output print outs.


Related Discussions:- Perform a mail merge to send invitation

What is computer, how to use computer and how we can manage it

how to use computer and how we can manage it

Software design, Ineed help to do my homework which is for designing of req...

Ineed help to do my homework which is for designing of requirenments.

Write short notes on joint fiction reserve, QUESTION (i) Write short no...

QUESTION (i) Write short notes on each of the following: a) Shelf reading b) Joint Fiction Reserve c) London and South-Eastern Library Region d) Document access

Access database, 1.Add a Validation Rule for Date of Birth so no one under ...

1.Add a Validation Rule for Date of Birth so no one under the age of 18 can be added to the table. Hint: subtract the DOB from today''s date and divide by 365.25 (watch the parenth

Discuss the roles of system analysts in detail, Question 1 Explain the ...

Question 1 Explain the following system design tools in detail System Flowcharts Decision tables Decision trees Organization charts Question 2 Write s

Time sharing, Time Sharing Time sharing allows a large number of users ...

Time Sharing Time sharing allows a large number of users at various remote terminals to simultaneously use a centrally located computer for problem solving. Each user operates

Spreadsheet software , Spreadsheet Software : Consider the grid in Fig. ...

Spreadsheet Software : Consider the grid in Fig. 9.4. It is split into rows and columns and is a pictorial representation of a typical spreadsheet program.  Figure: Spr

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd