Which of the following applications can be used as a data source for a Microsoft® Word® mail merge? A.Outlook Contacts B.Microsoft Access Databases C.Microsoft Excel Spreadsheet D.All of the above

Answers

Answer 1
Word can pull data from a variety of data sources to perform a mail merge. As part of the Microsoft Office suite, Word easily accepts data from Outlook, Excel, and Access, and other data sources such as web pages, OpenDocument text files, and delimited data files stored as plain text. And if you don't have an existing data source, you can create a new one in Word.
ALL OF THE ABOVE

Answer 2

Answer:

D.All of the above

Explanation:

Microsoft word mail merges are possible from all of the sources of the family of the Home Office Applications, so since Microsofts access database, Microsoft Excel, and Outlook COntacts are all part of the family of Microsoft Home Applications all of the documents and information are trasnferible between applications, the correct answer would be All of the above.


Related Questions

The action or actions that occur within a loop are known as a(n) _________.

Answers

code block or block of code

Using features on demand results in saving potentially significant amounts of disk space. features on demand becomes a third installation state per feature in windows server 2012 r2. while previous versions allowed only enable or disable, features on demand provides _______.

Answers

The answer is Disabled with payload removed
The development is extremely crucial in the age where we contstantly receive access to overload of content.
Large hardisk means that we could store much more of the amount of data that we could put without compromising the performance.

Which of these is not a form of customization?
a. Assembly
b. Design
c. Travel
d. Fabrication

Answers

c. travel is the correct answer i believe

Among the given options, travel is not a form of customization. Thus, the correct option for this question is C.

What is Customization?

Customization may be defined as the process of constructing or altering something according to the need or demand of the user or buyer. Each and every industry from clothing to the internet follow this concept of customization in order to make their product's customer based.

There are numerous aspects of customization through which the company or manufacturers modify their products and make them attractive to buyers. This strategy of the company and manufacturers are depend on the assembly, design, and fabrication of products or items.

Therefore, among the given options, travel is not a form of customization. Thus, the correct option for this question is C.

To learn more about Customization, refer to the link:

https://brainly.com/question/3520848

#SPJ2

What is the primary difference between universal groups and global groups in windows server 2012 r2?

Answers

The primary difference between universal groups and global groups in windows server 2012 R2 is that Global groups utilize fewer data in the global catalog. So, in considering replication traffic, universal groups should be within a site. The set of all objects in an Active Directory Domain Services (AD DS) forest is called the global catalog. 

The most popular wireless lan technology is ____. wusb (wireless usb) wi-fi bluetooth wimax

Answers

The most popular wireless LAN technology is Wi-Fi.

 What should every Software Engineer know about Software Architecture? ”
??

Answers

Answer: -Software architecture isn't about big design up front; -Every software team needs to consider software architecture; -The software architecture role is about coding, coaching and collaboration; -You don't need to use UML; -A good software architecture enables agility.

The first window displayed when you install opensuse is the ____ window.

Answers

is the Boot Options window.

Write the sql code that will change the proj_num to 14 for those employees who were hired before january 1, 1994 and whose job code is at least

Answers

update employees set proj_num = 14 where hire_date <= ‘19940101’

A database is used instead of a spreadsheet when?

Answers

Lists involve date with multiple themes. 

In cell h5 enter a formula that will calculate the percentage of attendees tjat went ro altmonte speings job gair in 2018

Answers

Let the number of attendees who went to the job fain in 2018 be x.
Let the total number of attendees be y.

To find the percentage of attendees in 2018, we will divide the number of attendees in 2018 by the total number of attendees and then multiply the quotient by 100 to get the percentage.

Based on this, the formula would be as follows:
(x/y) * 100

Write a program that displays in the title of the window the position of the mouse as the user moves the mouse around the window.

Answers

The java program displays these 

Can you subnet the 172.16.128.0/17 network address to support this subnet?

Answers

Address: 172.16.128.0 10101100.00010000.1 0000000.00000000
Netmask: 255.255.128.0 = 17 11111111.11111111.1 0000000.00000000
Wildcard: 0.0.127.255 00000000.00000000.0 1111111.11111111
=> Network: 172.16.128.0/17 10101100.00010000.1 0000000.00000000 (Class B)
Broadcast: 172.16.255.255 10101100.00010000.1 1111111.11111111
HostMin: 172.16.128.1 10101100.00010000.1 0000000.00000001
HostMax: 172.16.255.254 10101100.00010000.1 1111111.11111110
Hosts/Net: 32766 (Private Internet)

Which of the following is true? ADebit Cards often have a higher interest rate than Credit Cards. BChecks are the most widely accepted form of payment CDebit cards offer the highest level of fraud protection. DChecks and Debit Cards both withdraw money directly from a bank account

Answers

A: Debit Cards often have a higher interest rate than Credit Cards.
B: Checks are the most widely accepted form of payment
C: Cebit cards offer the highest level of fraud protection.
D: Checks and Debit Cards both withdraw money directly from a bank account

If you only have one choice then c:
b: only in the US
a: is wrong, Debit card have no interest rates.

____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Answers

C
Trojans only show when the damage has been done, no sooner.

The ________ layer is roughly the same in osi and tcp/ip

Answers

The transport layer is roughly the same in OSI and TCP/IP

Once i have internet connection do i need anything else to surf the web

Answers

 no, no you do not
havee a great day

In your own words explain the difference between projects, operations and programs. elaborate on your answer by providing a high level example of each.

Answers

A project is a collection of operations and programs that is designed to achieve a high-level strategic goal for an individual or organization. An operation is a more detailed and nuanced aspect of a project that needs to be accomplished for the purpose of ensuring that the overall strategic goal will be met. A program is a process or program implemented in order to carry out and execute a specific operation.

Business intelligence applications access large pools of data, usually transactional records stored in large databases called ____.

Answers

Business intelligence applications access large pools of data, usually transactional records stored in large databases called data warehouses (DW or DWH). The data warehouse contains integrated data from one or more disparate sources that is used for reporting and data analysis.

Sql provides the ________ technique, which involves placing an inner query within the where or having clause of an outer query.

Answers

This is a subquery. These queries allow the user to make two or more queries within the same command, giving the user the ability to find data that will then be used as the arguments for the outermost query. This is typically found with queries that use the SELECT statement, finding data within a table or chart.

Explain the purpose of the frame check sequence (fcs) field in a data link frame trailer.

Answers

I think it's to make sure no plagerise 

Your grandmother tells you a dollar doesn’t go as far as it used to. She says the “purchasing power” of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer.

Answers

What she means is that a dollar does not buy the same amount of things as it used to. Take a .05 cent candy as an example, in year one the candy costs 5 cents which means you can buy 20 candies. In year 2 the price is .08 cents and you can buy 1/.08 = 12.5 or simply 12 candies. Assuming the candy hasn't increased in quality, this is known as inflation.

Ou are a web page designer and you set up a page with five different links. a user of the page can click on one of the links or he or she can leave that page. describe the sample space for the outcome of a visitor to your web page.

Answers

There are 6 possible outcomes and they are :

S={link1,link2,link3,link4,link5,leave}

this is the sample space for the outcome of a visitor to your webpage.

Your license can be canceled if you __________
A. accumulate 12 or more points on your license.
B. give incorrect information when applying for your license.
C. you reach age 75.

Answers

its B i think hope this helps ! 
It’s b hope that helps

Using a "word" of 3 bits, list all of the possible signed binary numbers and their decimal equivalents that are representable in:

Answers

The sign bit is the high order bit, so that leaves two bits for the value. Two bits can represent 0-3. 2^2 possibilities.

Final answer:

Using a 3-bit word, the possible signed binary numbers range from -4 to +3, with the most significant bit indicating the sign. The numbers are 000 (+0), 001 (+1), 010 (+2), 011 (+3), 100 (-4), 101 (-3), 110 (-2), and 111 (-1) in binary and their corresponding decimal values.

Explanation:

The question involves listing all of the possible signed binary numbers and their decimal equivalents using a 3-bit word. In signed binary using 3 bits, we can represent a limited range of numbers, from -4 to 3. We use the most significant bit (MSB) as the sign bit where 0 denotes non-negative and 1 denotes negative.

It is important to note that using two's complement, the binary sequence 100 represents -4, which is the minimum value for a 3-bit signed binary number.

Bianca added a picture to an Excel spreadsheet, but the picture is too dark. She opens the Adjust group in the Picture Tools tab. Which group should Bianca click to make the picture brighter? Color Corrections Compress Picture Remove Background

Answers

Final answer:

Bianca should use the Color Corrections option in the Picture Tools tab to make a picture brighter in Excel.

Explanation:

To make a picture brighter in an Excel spreadsheet, Bianca should use the Color Corrections option within the Adjust group in the Picture Tools tab. She can adjust the brightness, contrast, and sharpness of the picture here. This is different from zooming in to clear a distracting background, which focuses more on composition by cropping out unwanted elements and does not affect the brightness or contrast of the subject itself.

Using Powerpoint or Impress guarantees that your presentation will do the following

A) Stay on schedule and end on time

B) Be clear and understood

C) Keep your audience engaged and excited

D) None of these

Answers

The key word in this question is "guarantees". I can speak from experience that using a PowerPoint does not guarantee that the audience will understand everything included or end on schedule. Anyone who has sat through a PowerPoint-driven lecture can tell you that being engaged and excited depends a lot more on content and delivery than the fact that a PowerPoint was used.

While a PowerPoint may help the presentation stay on schedule, be clear and understood, and keep the audience engaged, the mere fact that a PowerPoint was used guarantees none of these. 
Answer is D

Answer:

D) None of these

Explanation:

Remember that this is a question where you have to think in your experiences, powerpoint can help you make more dynamic a presentation or have a more engaging presentation, but you that doesn´t actually help you or guarantees that your presentation will be engaging and be clear, that all depends solely on you or the presentator that is doing the presentation.

Why would you use the filters when searching the supplier network for a venue?

Answers

The application of filters when searching a supplier network to find an appropriate venue allows the searcher to have displayed only those venues that meet their specific criteria. This makes the search process much faster and more efficient.

When a typist changes from a conventional typewriter to a word processor, his typing schema will have to _____ to incorporate the new techniques needed for the new equipment?

Answers

Final answer:

A typist transitioning from a typewriter to a word processor needs to adapt their typing schema to effectively use the new features and functionalities offered by word processing software, enhancing productivity and document quality.

Explanation:

When a typist changes from a conventional typewriter to a word processor, his typing schema will have to adapt to incorporate the new techniques needed for the new equipment. The transition from a conventional typewriter to a word processor involves learning how to utilize features such as variable width fonts, WYSIWYG (what you see is what you get), and leveraging higher resolution output devices like laser and inkjet printers. This adaptation is crucial for taking full advantage of the productivity gains offered by modern word processing software, which can significantly increase the number of pages a typist can produce per hour compared to both manual and electric typewriters.

Copying and imitating others is not a source of innovation – true or false?

Answers

-True

Innovation is a discovery of an idea, or thought that eventually turns into a physical thing. Copying is not innovation, its plagiarism. 
This is true just as this is under computer and technology I would use the example of Apple with the launch of the iPhone X which claims was it’s the most advanced phone is basically just copying features of other android phones like wireless charging and fast charging which already has been the standard of other android phones from 2 years before

Checking the ___________ will reduce the possibility of having to rebuild or replace the engine.

Answers

Answer: The correct answer to the question is to check the oil in the engine.

Explanation: It is very important to check the oil regularly in an engine. This preventive maintenance will reduce the possibility of having to rebuild or replace the engine.

Other Questions
The primary bronchi enter the lungs at an area called the The symmetrical layout of the forbidden city intentionally emphasizes the emperor's role as _____________, who maintains the cosmic order from his throne in the center of the world. Tengo unos boligrafos rojo.is this sentence right? Which definition correctly illustrates the bandwagon propaganda technique? Which of the following was a goal of Peter I of Russia? A. Returning Russia to its ancient traditional values B. The conversion of the Russian population to Islam C. The return of Russia to the Roman Catholic Church D. Modernization of Russia SOMEONE PLEASE HELP ASAP!!1. Which of the following are examples of substrates? Select all that apply.A. canvasB. cardboardC. charcoalD. pencil2. What responds to both visual appeal and functional needs?A. applied artB. decorationC. fine artD. visual art3. What is a portrait?A. a representation of a personB. a written biography of a personC. an artwork depicting the sea or oceanD. an original artwork4. What is a sculpture?A. a piece of 2-D artwork in which there is only one copyB. a 3-D type of artworkC. an artist's representation of herselfD. an artwork depicting the sea or ocean6. What term used to be defined as "using a blade to cut a physical photograph so that only a segment remains"?A. clip artB. cropC. cut and pasteD. typeface7. What term used to be defined as "an image in a printed work that a designer cut around with scissors or an X-ACTO blade and pasted into designs"?A. clip artB. cropC. cut and pasteD. typography8. Which technological improvement has reduced graphic designers' exposure to hazardous chemical developers?A. computerB. digital cameraC. smartphoneD.tablet9. There are two sculptures of George Washington. One sculpture makes use of sharp edges and abstract shapes, while the other captures a more realistic view. Which of the following is different about these two sculptures?A. mediumB. perspectiveC. subject matterD. technique10. What is a composition that is designed so that every element in the composition represents a single idea or theme?A. abstractB. allegoryC. chiaroscuroD. mosaic11. Which of the following would be considered a disadvantage of using newer technology instead of traditional graphic design tools?A. completing a project much fasterB. expense of the specialized programs used to complete the processC. fewer people needed to finish the designD. large number of design options available to choose from12. What term refers to the sharing and application of technology from one field to another?A. mass mediaB. technology systemsC. technology transferD. trade-off13. Which of the following accurately describes a piece of work that contains a Creative Commons: No Derivative Works license?A. It can be copied, distributed, and displayed as long as the author is credited.B. It can be copied, distributed, and displayed as long as no other version of the work is created.C. It has been made available for any use in any piece of artwork that is also put in the public domain.D. It has been made available to the general public for any use at no charge.14. Which of the following accurately describes a piece of artwork that contains a Creative Commons: Share Alike license?A. It can be copied, distributed, and displayed as long as the author is credited.B. It can be used for any noncommercial use without attribution or cost.C. It has been made available for any use in any piece of work that is also put in the public domain.D. It has been made available to the general public for any use at no charge.15. Which of the following copyright licenses is most appropriate if you create a video that you want to make available to anyone for any use unless they're going to use it to make money?A. All Rights ReservedB. Public DomainC. Some Rights Reserved: NoncommercialD. Some Rights Reserved: Share Alike which formula represents Gay-Lussac's law? What evidence helped give strong support for the hypothesis of seafloor spreading at mid-ocean ridges? 7 berries are 5 less than twice the number of berries Mickey had for lunch. What is 0.10221 in scientific notation How did merchants most likely influence medieval culture An aluminum recycling center pays $0.08 per pound for cans. How much will Mark receive for 21.5 pounds of cans? Ou are a web page designer and you set up a page with five different links. a user of the page can click on one of the links or he or she can leave that page. describe the sample space for the outcome of a visitor to your web page. 13.Mara y Elena _____ la televisin. (prender) 15 points for best answer!Correctly finish the spelling of each form of jugar.1. yo j___go A. uB. ue2. t j___gas A. u B. ue3. l, ella, usted j__ ga A. uB. ue4. nosotros(as) j___ gamos A. uB.ue5. vosotros(as) j___ gis A. u B. ue6. ellos(as), ustedes j___gan A. uB.ueThanks! :D What is the logarithmic form of 144=12^2 use exponential form to evaluate log8(2) A bike rider pedals with constant acceleration to reach a velocity of 7.5 (vf)m/s over a time of 4.5 s(t). during the period of acceleration, the bike's displacement is 19 m(d). what was the initial velocity of the bike? Which of the following is an example of a good listening skill Who ascended the English throne as a joint monarch after accepting the Bill of Rights? Steam Workshop Downloader