Which command is used to create a recipient list


Asked by admin @ in Computer Science viewed by 318 People


Which command is used to create a recipient list ?

Answered by admin @



Answer:

Create and save the main document.

Creating the recipient list works the same no matter what type of mail merge document you created.

On the Mailings tab, in the Start Mail Merge group, choose Select Recipients→Type a New List.

If this option isn’t available, you haven’t properly created the main document. Otherwise, you see the New Address List dialog box.

image0.jpg

Word assumes that you need a dozen or so fields for your mail merge, which is silly because it’s more than you need. So the next set of steps removes the surplus fields and replaces them with the fields your document requires.

Click the Customize Columns button.

The Customize Address List dialog box appears, displaying fields that Word assumes you need. Such foolishness cannot be tolerated.

Select a field that you do not need.

Click it with the mouse.

Click the Delete button.

Click Yes in the confirmation dialog box.

The keyboard shortcut for the Yes button is the Y key. Oh, and the keyboard shortcut for the Delete button (refer to Step 5) is D. Typing D and then Y deletes the selected field.

Repeat Steps 4 through 6 for each field you don’t need.

After removing the excess fields, your next step is to add the fields you need — if any.

Whether it appears in the message body or not, you need the Email_Address field when you’re merging an e-mail message. Word uses this field so that it knows where to send the message. Don’t delete the field!

Rather than delete all fields, you can rename some fields to match what you need: Select a field and click the Rename button.

To add a field that’s needed in your document, click the Add button.

The teeny Add Field dialog box pops into view.

Type the field name and click the OK button.

Name the field to reflect the kind of information in it; for example, Shark Bite Location.

No two fields can have the same name.

Field names can contain spaces but cannot start with a space.

Field names can be quite long, though shorter is best.

The following characters are forbidden in a field name: . ! ` [ ].

Repeat Steps 8 and 9 for each new field you need in the main document.

When you’re done, review the list. It should match up with the list of ALL CAPS fields in the document (if you chose to create them). Don’t worry if it doesn’t — you can add fields later, though it takes more time.

Click OK.

You now see customized fields appear as column headings in the New Address List dialog box.

In the final set of steps, you fill in the recipient list. You need to input records, one for each document you plan to create:

Type the first record’s data.

Type the information that’s appropriate to each field shown in the New Address List dialog box: name, title, evil nickname, planet of origin, and so on.

Press Tab to enter the next field.

After filling in the last field, you’ll probably want to add another record:

To add a new record, press the Tab key after typing in the last field.

When you press the Tab key in the last field in a record, a new record is automatically created and added on the next line. Keep filling in data!

Review your work when you’re done.

You can edit any field in any record by selecting it with the mouse.

If you accidentally add a blank record at the end of the list, click to select it and then click the Delete Entry button. You do this because blank records are still processed in a mail merge, which can result in wasted paper.

Click OK.

The Save Address List dialog box pops up, allowing you to save the recipient list.

The recipient lists dwell in the folder named my Data Sources, found in the Documents or my Documents folder. Word automatically chooses (or creates) this folder.

Type a name for the address list.

Descriptive names are best. After all, you might use the same recipient list again.

Click the Save button.

You return to the document.

Explanation:


Similar Questions

What command is used to create a backup configuration

Asked by admin @ in Computer Science viewed by 345 persons

Which command is used to create a backup configuration?

How to create a recipient list for the main document

Asked by admin @ in Computer Science viewed by 341 persons

How will you create a recipient list for the main document

Which tag is used to create a numbered list

Asked by admin @ in Computer Science viewed by 358 persons

In html, which of the tag is used to creates a number list?

It __________ be used to create a competitive advantage ___________

Asked by admin @ in Business viewed by 276 persons

Which competitive advantage will companies that implement information systems get? Companies that implement and apply an information system effectively can create new ___________

List of different uses of water in our daily life

Asked by admin @ in Science viewed by 285 persons

List 10 uses of water in our daily life

Make a list of detergent that you use

Asked by admin @ in Science viewed by 362 persons

Make a list detergent that you use

Which command is used to see the version

Asked by admin @ in Computer Science viewed by 318 persons

Which command is used to see the version of operating system?

Which command is used to clear the screen

Asked by admin @ in Computer Science viewed by 297 persons

______ command is used to clear the screen​

List three ways in which early humans used fire

Asked by admin @ in Social Sciences viewed by 338 persons

3. List three ways in which early humans used fire.​

List out five resources you use in your home

Asked by admin @ in Social Sciences viewed by 315 persons

List out five resources you use in your home and five you use in your classroom.

List the various uses of it in banking system

Asked by admin @ in Computer Science viewed by 302 persons

List the various uses of IT in a banking system.

List of things we use in our daily life

Asked by admin @ in Science viewed by 332 persons

List the things that we use in our daily life which are made from wood

List any four methods of contraception used by humans

Asked by admin @ in Biology viewed by 414 persons

list any four methods of contraception used by humans. how does their use have a direct effect on the health and prosperity of the family?

To create a formula you can use

Asked by admin @ in Computer Science viewed by 345 persons

In MS Excel, to create a formula, you can use(A) Values but not cell references(B) Cell references but not values(c) Values or cell references although notboth …

List three ways in which hunter gatherers used fire

Asked by admin @ in Social Sciences viewed by 318 persons

List three ways in which hunter gatherers used fire.

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 19029 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15815 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10977 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10407 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8723 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8142 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7845 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6492 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5795 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5696 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5479 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4985 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4976 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4688 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4492 persons