Mail merge is only used to create documents that are to be mailed

Indicate whether the statement is true or false

FALSE

Computer Science & Information Technology

You might also like to view...

Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A. Brute-force attack B. Dictionary attack C. Social engineering attack D. Replay attack

Computer Science & Information Technology

People use LinkedIn to expand their list of business contacts, to keep in touch with ________, and to keep abreast of developments in their profession

A) family members B) famous people C) colleagues D) childhood friends

Computer Science & Information Technology