Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do lots of neat things. In fact, you can create a professional envelope for your organization, add a list of contacts from a CSV file or from Outlook, and so much more.

Step 1: Open a New Document
Blank Page

Step 2: Access the Layout Menu

Step 3: Change the Size of the Page
You want the page to be set to the proper envelope size. If you need to know what size your envelopes are, try checking the box. #10 is generally the traditional letter envelope.
Envelope 10

Step 4: Check the Layout
Before proceeding, make sure that the layout has changed to the proper size.
Envelope 10 Resize

Step 5: Go to the Insert Tab and Select Text Box
Insert Tex Box

Step 6: Use the Simple Text Box Option
This will be used for your return address.
Insert Tex Box2

Step 7: Update the Address and Draft the Text to the Desired Location.
Drag to Position

Step 8: Remove the Border Around the Text Box
You can do this by right-clicking the box and selecting Format Shape. Switch the radial button from Solid Line to No Line.
Remove Border

Step 9: Style and Brand Your Return Address
You can use the Font options to customize the appearance of your return address. Make sure you don’t forget your logo.

Step 10: Start Your Mail Merge
First, let’s add another Text Box. You should remove the standing text and leave the cursor right where it is in the box.
Mail Merge 5

Step 11: Load Your Contacts
To do this, access Select Recipients and check the source of your contacts. You’ll need a CSV file for this next step.
Mail Merge 1

Step 12: Select Address Box. This appears in the text box that you created earlier.
Mail Merge 6

Step 13: Follow the Directions to Format Your Address
Mail Merge 4

Step 14: Preview Your Results
Use the Preview Results option to check that the addresses are displaying properly, are simple to read, and fit on the envelope. This might change depending on how many recipients you have. Just scroll through them to ensure that the formatting remains the same throughout them all.
Mail Merge 7

Step 15: Save or Print
That just about wraps it up. You can finish your work or print them out as you see fit.
Mail Merge 8

For more great tips and tricks, subscribe to Professional Computer Associates’s blog.

Don’t Underestimate The Value Of Managed IT
Professional Services Benefit Significantly from M...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google Disaster Recovery Software VoIP Microsoft Business Mobile Devices Business Continuity Email Internet Productivity Outsourced IT Data Innovation IT Support Smartphones Cybercrime Efficiency Windows 10 Ransomware Computer Hardware Browser Data Backup Android communications IT Services Cloud Computing Office Computers Server Alert Telephone Systems Business Management Virtualization User Tips Mobile Device Management Windows Small Business Data Recovery Saving Money Smartphone Chrome Social Engineering Internet of Things Upgrade Cybersecurity Network BDR Quick Tips BYOD Hacking Miscellaneous Passwords Workplace Tips App Office Tips Firewall Managed IT Save Money Law Enforcement Mobility Work/Life Balance Recovery Microsoft Office Avoiding Downtime Collaboration Holiday Private Cloud How To Productivity Social Media Remote Monitoring Data Management Bring Your Own Device Budget Managed Service Provider Password VPN Business Intelligence Bandwidth Proactive IT Money Flexibility Wi-Fi Facebook Two-factor Authentication HaaS Operating System Communication Information Technology Gmail Health Data Protection Redundancy Phishing Office 365 Data Security Black Market Vulnerability Google Drive Artificial Intelligence Managed IT Services Cleaning Value Risk Management Tech Term SaaS Identity Theft Employer-Employee Relationship Windows 10 Automation Apps Router Safety Compliance Data Breach Spam Marketing Big Data User Error Gadgets Data loss Entertainment Solid State Drive Computing Infrastructure Encryption Hiring/Firing Computer Care Physical Security HIPAA Mobile Computing Update Wearable Technology Samsung Patch Management Downtime Business Owner Data Storage Keyboard Workers History Scam Document Management Best Practice Data storage Save Time DDoS Shadow IT Government Credit Cards CES End of Support Worker Automobile Internet Exlporer IT Management Meetings Wireless Word OneNote IT Plan The Internet of Things Legal Apple Battery Training Unsupported Software Mobile Device eWaste Public Cloud Remote Computing Settings Content Filtering Wireless Technology Comparison Applications Charger Spam Blocking PDF Electronic Medical Records Unified Threat Management SharePoint Software as a Service Millennials HBO Infrastructure IBM Conferencing Books Scalability Virtual Reality Uninterrupted Power Supply Telephony Strategy Windows 10s Screen Mirroring Workforce People Frequently Asked Questions Password Manager Supercomputer IT Support hacker Emergency Notifications Instant Messaging Employer Employee Relationship Worker Commute Fax Server Skype Analysis Cast Google Docs Search Telecommuting Mobile Office Excel Business Mangement Current Events Computer Accessories IT solutions Start Menu Accountants Audit Website How to Remote Work Tip of the week Recycling Going Green Bluetooth Robot Tech Support Mobile Computer Fan Wireless Charging Loyalty Knowledge Relocation Experience Techology Voice over Internet Protocol Antivirus Windows Server 2008 Criminal Transportation Laptop Professional Services IoT FENG Data Warehousing Fiber-Optic Network Congestion Music Multi-Factor Security IaaS Windows 7 Emails Benefits Touchpad Outlook Distributed Denial of Service WiFi Tools Smart Tech Cables Assessment USB YouTube Trending Fraud Regulations Content Management Internet exploMicrosoft Smart Technology Rootkit Humor Insurance Unified Communications Television IT Consultant iPhone Troubleshooting Lifestyle Amazon Blockchain Advertising Monitor Content Mouse Sports Botnet Practices Theft Public Computer Leadership Hosted Solution NarrowBand Education Amazon Web Services Servers Human Resources Netflix Two Factor Authentication Vendor Management Reputation Audiobook Travel Hosted Computing Root Cause Analysis Software Tips Cortana Files Lithium-ion battery Environment Running Cable Online Shopping Flash Staff Hybrid Cloud Customer Politics Streaming Media Hard Drives Inventory Specifications Google Apps Networking webinar Colocation Chromecast Video Games Users Evernote Sync Digital Signature Access Control Authentication Administration Webinar Thank You IT solutions Congratulations CrashOverride

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!