Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do lots of neat things. In fact, you can create a professional envelope for your organization, add a list of contacts from a CSV file or from Outlook, and so much more.

Step 1: Open a New Document
Blank Page

Step 2: Access the Layout Menu
Layout

Step 3: Change the Size of the Page
You want the page to be set to the proper envelope size. If you need to know what size your envelopes are, try checking the box. #10 is generally the traditional letter envelope.
Envelope 10

Step 4: Check the Layout
Before proceeding, make sure that the layout has changed to the proper size.
Envelope 10 Resize

Step 5: Go to the Insert Tab and Select Text Box
Insert Tex Box

Step 6: Use the Simple Text Box Option
This will be used for your return address.
Insert Tex Box2

Step 7: Update the Address and Draft the Text to the Desired Location.
Drag to Position

Step 8: Remove the Border Around the Text Box
You can do this by right-clicking the box and selecting Format Shape. Switch the radial button from Solid Line to No Line.
Remove Border

Step 9: Style and Brand Your Return Address
You can use the Font options to customize the appearance of your return address. Make sure you don’t forget your logo.
BrandingAddress

Step 10: Start Your Mail Merge
First, let’s add another Text Box. You should remove the standing text and leave the cursor right where it is in the box.
Mail Merge 5

Step 11: Load Your Contacts
To do this, access Select Recipients and check the source of your contacts. You’ll need a CSV file for this next step.
Mail Merge 1

Step 12: Select Address Box. This appears in the text box that you created earlier.
Mail Merge 6

Step 13: Follow the Directions to Format Your Address
Mail Merge 4

Step 14: Preview Your Results
Use the Preview Results option to check that the addresses are displaying properly, are simple to read, and fit on the envelope. This might change depending on how many recipients you have. Just scroll through them to ensure that the formatting remains the same throughout them all.
Mail Merge 7

Step 15: Save or Print
That just about wraps it up. You can finish your work or print them out as you see fit.
Mail Merge 8

For more great tips and tricks, subscribe to Professional Computer Associates’s blog.

Don’t Underestimate The Value Of Managed IT
Professional Services Benefit Significantly from M...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Managed IT Services Malware Disaster Recovery VoIP Google Microsoft Business Continuity Software Business Mobile Devices Productivity Outsourced IT Email Smartphones Windows 10 Data Internet Innovation IT Support Efficiency communications Computer Hardware Cybercrime Android Office Ransomware IT Services Browser Telephone Systems Alert Server Data Backup Windows Small Business Saving Money Computers Business Management Upgrade User Tips Mobile Device Management Quick Tips Chrome Social Engineering Save Money Virtualization Law Enforcement Network Recovery Microsoft Office How To Data Recovery BDR Collaboration Holiday Managed IT BYOD Cybersecurity Smartphone Social Media Cloud Computing Hacking Miscellaneous Mobility Passwords Workplace Tips Work/Life Balance App Office Tips Firewall Avoiding Downtime Productivity Two-factor Authentication Bandwidth Proactive IT Money Communication HaaS Facebook Operating System Budget Information Technology Health Password Private Cloud Office 365 Flexibility Wi-Fi Bring Your Own Device Managed Service Provider Risk Management Data Breach Windows 10 SaaS Employer-Employee Relationship Remote Monitoring Automation Phishing Safety Artificial Intelligence Spam Gmail Redundancy Value User Error Marketing Gadgets Data Management Managed IT Services Black Market Router Internet of Things Compliance Google Drive Downtime Mobile Device Cleaning Credit Cards VPN History Content Filtering IT Management Applications Best Practice Charger Data storage DDoS Shadow IT Word OneNote Government Solid State Drive End of Support Internet Exlporer Unsupported Software Hiring/Firing Meetings Computer Care Wireless Apple The Internet of Things Samsung Patch Management Data Security Business Owner Spam Blocking Public Cloud Keyboard Scam Remote Computing Settings Wireless Technology Save Time Vulnerability Entertainment Worker Computing Infrastructure Automobile Data Storage Physical Security Apps Mobile Computing Wearable Technology Workers Business Intelligence Battery Identity Theft Hosted Solution Professional Services IT solutions Public Computer FENG Data Warehousing Two Factor Authentication Network Congestion Education Multi-Factor Security Going Green Windows 7 Theft Vendor Management Emails Audiobook Robot Tech Support Tools Relocation Trending Laptop Hard Drives Fraud Antivirus Regulations Cortana Politics Big Data Video Games Networking IaaS IT Plan Electronic Medical Records IT Consultant Users Lifestyle Touchpad Amazon Google Apps Unified Threat Management Books Outlook Scalability Distributed Denial of Service Botnet WiFi IBM Leadership Virtual Reality YouTube Data Protection Amazon Web Services Servers Infrastructure Netflix Internet exploMicrosoft HIPAA Emergency Humor Instant Messaging Travel Supercomputer Root Cause Analysis Comparison Software Tips Employer Employee Relationship iPhone Worker Commute Online Shopping Flash Password Manager Advertising Monitor Search Mouse Sports Current Events Specifications eWaste Computer Accessories webinar NarrowBand Evernote Sync Data loss Reputation How to Software as a Service Millennials Environment HBO Bluetooth Conferencing Files Document Management Lithium-ion battery Techology Running Cable Telephony Loyalty Windows 10s Hybrid Cloud Experience Screen Mirroring Transportation Customer Streaming Media Update Workforce Frequently Asked Questions Wireless Charging IT Support Colocation Chromecast Skype PDF Music Cast Benefits Google Docs SharePoint Telecommuting Excel Fiber-Optic Encryption USB Uninterrupted Power Supply Start Menu Assessment Audit Smart Technology Website Remote Work Tip of the week Cables People Rootkit hacker Notifications Troubleshooting Legal Mobile Fax Server Television Computer Fan Knowledge Voice over Internet Protocol Windows Server 2008 Unified Communications Mobile Office Training Content Webinar IT solutions CrashOverride Thank You Congratulations Business Mangement Recycling Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!