Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do lots of neat things. In fact, you can create a professional envelope for your organization, add a list of contacts from a CSV file or from Outlook, and so much more.

Step 1: Open a New Document
Blank Page

Step 2: Access the Layout Menu

Step 3: Change the Size of the Page
You want the page to be set to the proper envelope size. If you need to know what size your envelopes are, try checking the box. #10 is generally the traditional letter envelope.
Envelope 10

Step 4: Check the Layout
Before proceeding, make sure that the layout has changed to the proper size.
Envelope 10 Resize

Step 5: Go to the Insert Tab and Select Text Box
Insert Tex Box

Step 6: Use the Simple Text Box Option
This will be used for your return address.
Insert Tex Box2

Step 7: Update the Address and Draft the Text to the Desired Location.
Drag to Position

Step 8: Remove the Border Around the Text Box
You can do this by right-clicking the box and selecting Format Shape. Switch the radial button from Solid Line to No Line.
Remove Border

Step 9: Style and Brand Your Return Address
You can use the Font options to customize the appearance of your return address. Make sure you don’t forget your logo.

Step 10: Start Your Mail Merge
First, let’s add another Text Box. You should remove the standing text and leave the cursor right where it is in the box.
Mail Merge 5

Step 11: Load Your Contacts
To do this, access Select Recipients and check the source of your contacts. You’ll need a CSV file for this next step.
Mail Merge 1

Step 12: Select Address Box. This appears in the text box that you created earlier.
Mail Merge 6

Step 13: Follow the Directions to Format Your Address
Mail Merge 4

Step 14: Preview Your Results
Use the Preview Results option to check that the addresses are displaying properly, are simple to read, and fit on the envelope. This might change depending on how many recipients you have. Just scroll through them to ensure that the formatting remains the same throughout them all.
Mail Merge 7

Step 15: Save or Print
That just about wraps it up. You can finish your work or print them out as you see fit.
Mail Merge 8

For more great tips and tricks, subscribe to Professional Computer Associates’s blog.

Don’t Underestimate The Value Of Managed IT
Professional Services Benefit Significantly from M...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Disaster Recovery Mobile Devices Microsoft Software Productivity Business Internet Email Business Continuity Data Innovation Outsourced IT Data Backup Efficiency Cybercrime communications Computer Ransomware Smartphones IT Support Windows 10 Android Hardware Cloud Computing IT Services Browser Data Recovery BDR Internet of Things Office Telephone Systems Computers Server Business Management Windows Tech Term Saving Money Alert Network Cybersecurity Upgrade User Tips Mobile Device Management Small Business Virtualization Smartphone Chrome Workplace Tips Managed IT Quick Tips BYOD Social Engineering Microsoft Office Collaboration Save Money Law Enforcement Artificial Intelligence Miscellaneous Recovery Passwords Password App Firewall Private Cloud Mobility Bandwidth Hacking Work/Life Balance Router Communication Office Tips Avoiding Downtime Managed Service Provider Facebook Productivity How To Money Holiday Office 365 Social Media Budget Information Technology Health Redundancy Business Intelligence Flexibility Wi-Fi VPN Two-factor Authentication Data Management Bring Your Own Device Data Protection Operating System Phishing Applications Data Security Proactive IT Gmail Remote Monitoring HaaS Automation Entertainment Managed IT Services Safety Value Document Management Identity Theft Blockchain Windows 10 Risk Management Gadgets Apps Word Black Market Employer-Employee Relationship Compliance Mobile Device Google Drive Cleaning Data Breach Spam SaaS Big Data Connectivity User Error Marketing Vulnerability Samsung Encryption The Internet of Things Patch Management CES Business Owner Website Smart Tech Data Storage Sports Keyboard Workers Wearable Technology Scam Content Management Public Cloud Remote Computing Wireless Technology Save Time Credit Cards Windows 7 PDF Worker Automobile IT Management USB Computing Infrastructure DDoS OneNote Legal Physical Security IT Plan Mobile Computing Battery Training Access Control Unsupported Software Meetings Education Servers Infrastructure Downtime Wireless Comparison Apple Content Filtering History Analysis Charger Networking eWaste Electronic Medical Records Spam Blocking Best Practice Data storage Data loss Shadow IT Solid State Drive Government Settings Hiring/Firing Paperless Office End of Support Update Streaming Media Computer Care Internet Exlporer HIPAA YouTube IT Support Safe Mode Google Docs IoT Humor Cast SharePoint Search Telecommuting Thought Leadership iPhone Current Events Excel Fiber-Optic Start Menu Computer Accessories Audit Healthcare Advertising File Sharing Monitor People How to Remote Work Content Filter Notifications Tip of the week Cables NarrowBand Mobile Bluetooth Computer Fan Fax Server Electronic Health Records Business Technology Voice over Internet Protocol Insurance Reputation Loyalty Experience Knowledge Techology Transportation Mobile Office Storage Files Windows Server 2008 Unified Communications Professional Services FENG IT solutions Machine Learning Hybrid Cloud Virtual Assistant Multi-Factor Security Practices Customer Data Warehousing Music Network Congestion Benefits Emails Colocation Theft Chromecast Tools Human Resources Telephone System Trending Hosted Computing Assessment Smart Technology Fraud Addiction Regulations Cortana Antivirus Staff Rootkit Uninterrupted Power Supply Lifestyle Inventory Television Troubleshooting IT Consultant Amazon Cache hacker Google Apps Botnet Digital Signature Distributed Denial of Service WiFi Content HVAC Public Computer Hosted Solution Leadership Two Factor Authentication Netflix Amazon Web Services Wireless Internet Travel Strategy Vendor Management Root Cause Analysis Audiobook Enterprise Content Management Authentication Software Tips Going Green Online Shopping Wire Flash Password Manager Mouse Robot Tech Support Politics Hard Drives Password Management Video Games Specifications Nanotechnology Relocation webinar Laptop Users Evernote Smart Office Sync Business Mangement Software as a Service Accountants Unified Threat Management NIST IaaS Scalability Millennials Lithium-ion battery IBM HBO Environment Books Conferencing Touchpad Windows 10s Virtual Reality Telephony Recycling Running Cable Outlook Screen Mirroring Cryptocurrency Instant Messaging Workforce Devices Supercomputer Frequently Asked Questions Wireless Charging Emergency Employer Employee Relationship Worker Commute Students Internet exploMicrosoft Skype Criminal Twitter Company Culture Webinar Managing Stress IT solutions CrashOverride Administration Thank You Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!