(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do lots of neat things. In fact, you can create a professional envelope for your organization, add a list of contacts from a CSV file or from Outlook, and so much more.

Step 1: Open a New Document
Blank Page

Step 2: Access the Layout Menu

Step 3: Change the Size of the Page
You want the page to be set to the proper envelope size. If you need to know what size your envelopes are, try checking the box. #10 is generally the traditional letter envelope.
Envelope 10

Step 4: Check the Layout
Before proceeding, make sure that the layout has changed to the proper size.
Envelope 10 Resize

Step 5: Go to the Insert Tab and Select Text Box
Insert Tex Box

Step 6: Use the Simple Text Box Option
This will be used for your return address.
Insert Tex Box2

Step 7: Update the Address and Draft the Text to the Desired Location.
Drag to Position

Step 8: Remove the Border Around the Text Box
You can do this by right-clicking the box and selecting Format Shape. Switch the radial button from Solid Line to No Line.
Remove Border

Step 9: Style and Brand Your Return Address
You can use the Font options to customize the appearance of your return address. Make sure you don’t forget your logo.

Step 10: Start Your Mail Merge
First, let’s add another Text Box. You should remove the standing text and leave the cursor right where it is in the box.
Mail Merge 5

Step 11: Load Your Contacts
To do this, access Select Recipients and check the source of your contacts. You’ll need a CSV file for this next step.
Mail Merge 1

Step 12: Select Address Box. This appears in the text box that you created earlier.
Mail Merge 6

Step 13: Follow the Directions to Format Your Address
Mail Merge 4

Step 14: Preview Your Results
Use the Preview Results option to check that the addresses are displaying properly, are simple to read, and fit on the envelope. This might change depending on how many recipients you have. Just scroll through them to ensure that the formatting remains the same throughout them all.
Mail Merge 7

Step 15: Save or Print
That just about wraps it up. You can finish your work or print them out as you see fit.
Mail Merge 8

For more great tips and tricks, subscribe to NTConnections’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency Business IT Support VoIP IT Services Managed Service Provider Email Miscellaneous Server Business Continuity Workplace Tips Disaster Recovery Data Windows Innovation Upgrade Network Software Hardware Business Management Save Money Saving Money Communication Computer Network Security Smartphones Android Mobile Device Management Browser Smartphone Managed IT Services Holiday communications Microsoft Office User Tips Virtualization Outsourced IT WiFi Windows 10 Operating System Mobile Computing Computers Hacking BYOD Small Business Data Backup Chrome Social Media IT Solutions Alert Cybercrime Apple Application Proactive IT Remote Monitoring Avoiding Downtime Passwords Employer-Employee Relationship Marketing Office The Internet of Things Budget Collaboration Managed IT Services Quick Tips Big Data Ransomware Information Technology Social Engineering Automation Going Green Remote Computing Mobility Health Bring Your Own Device VPN Gadgets spam Recovery Data Recovery Telephone Systems How To BDR Bandwidth Managed IT Compliance Cloud Computing Wireless Technology User Error Vendor Management Two-factor Authentication iPhone Cybersecurity Save Time Firewall App Value Gmail Lithium-ion battery Artificial Intelligence Retail Memory Search Vulnerability Private Cloud Networking IT Support Mouse Risk Management Redundancy Office 365 Windows 10 Antivirus Internet of Things PowerPoint Website Excel Phone System Content Filtering Router Money Analytics Downtime Office Tips History Tablet Skype Phishing Unified Threat Management Unsupported Software Physical Security DDoS Mobile Office Robot Customer Relationship Management Google Drive Environment Best Available Apps Identity Theft IT Consultant Data Security SaaS People Programming Law Enforcement Credit Cards Safety Network Congestion Saving Time Government Trending Solid State Drive Document Management Meetings Online Currency HaaS Fax Server Black Market Workers Humor Printer Data Management Statistics Business Owner Data Storage Word OneNote Current Events Business Intelligence Internet Exlporer Data storage Outlook Maintenance Biometrics Work/Life Balance Flexibility IT Management Administration Hard Drives Facebook Entertainment Intranet Running Cable Public Cloud Software as a Service Best Practice Social Networking Charger Telecommuting Chromecast Sync Analyitcs Hybrid Cloud Cables Managing Stress Update Computer Care Settings LinkedIn HIPAA Remote Work Virus Software Tips Laptop Telephony Distributed Denial of Service Spam Blocking Unified Communications Google Docs Debate Virtual Desktop IT service Human Resources Keyboard Computer Accessories Touchpad Start Menu Relocation Virtual Reality Theft Voice over Internet Protocol Audit Uninterrupted Power Supply Training Domains Video Surveillance Cameras HBO Consultant Mobile IaaS Computer Fan Bloatware Cortana Applications Company Culture Multi-Factor Security Screen Mirroring Cleaning Education Customer Service Files Fraud Printer Server Windows 8.1 Update Frequently Asked Questions Password Google Apps Professional Services FENG Entrepreneur Productivity Wi-Fi Lifestyle Worker Commute Cast Tech Support Piracy Tip of the week Hacker Colocation Amazon Infrastructure User Tools Cost Management Data Protection Shadow IT Licensing Windows Server 2008 Wireless Samsung Science Hosted Solution Computing Infrastructure Amazon Web Services Password Manager Twitter Print Server Streaming Media Instant Messaging Shortcut Comparison Windows 7 SharePoint Crowdfunding Windows 8 End of Support Online Shopping Mobile Device Botnet Encryption Bluetooth Net Neutrality Specifications Computer Repair Data Warehousing Sports Regulations Monitor eWaste Tablets Internet exploMicrosoft Evernote Travel Notifications Root Cause Analysis USB Millennials Windows Media Player YouTube Servers Reputation Wearable Technology Patch Management Advertising Wireless Charging Data loss Social Touchscreen Workforce IT Plan NarrowBand Hiring/Firing Flash Customers Scam Fiber-Optic WIndows 7 Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Electronic Medical Records Public Computer Legal Employer Employee Relationship Data Breach Automobile Emails Books Business Mangement CrashOverride IBM Users Webinar Emergency Recycling Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix