crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Begin with a New document.
Blank Page

Access the Layout menu.
Layout

Click on ‘Size’ to change the size of the page to the proper envelope size. (If you’re unsure about the size of your envelopes, it’s usually located on the box) #10 is the traditional ‘letter’ envelope.
Envelope 10

You’ll see that the document layout has changed to the appropriate size.
Envelope 10 Resize

Next, you’ll navigate to the ‘Insert’ tab and select ‘Text Box’.
Insert Tex Box

Use the ‘Simple Text Box’ option. This will be used for the return address.
Insert Tex Box2

Once you have your address updated, you’ll want to drag the text to the desired location.
Drag to Position

If you are happy with the location of your address, you’ll want to remove the black border around the text box. To do this, right click on the box and select ‘Format Shape’. Switch the radial button from ‘Solid Line’ to ‘No Line’.
Remove Border

Using Font options, you’ll want to style and brand your return address. You may even want to include your logo.
BrandingAddress

Now, it’s time to start the Mail Merge. You’ll begin by adding another ‘Text Box’, remove the standing text and leave the cursor in the box.Mail Merge 5

Access ‘Select Recipients’ to identify the source of the contacts. In this case, we’re using a file that already exists. (Note: This should be a CSV file.)
Mail Merge 1

Next select ‘Address Box’. This will appear in the text box you created earlier.
Mail Merge 6

Follow the prompts to assist with formatting the address properly.
Mail Merge 4

Use ‘Preview Results’ to make sure the addresses display properly, are easy to read and fit on the envelope. Depending on how many recipients, you’ll want to scroll through and make sure the formatting is the same throughout.
Mail Merge 7

That’s it! Now you’ve got the letters ready to go, you can either save them or send them to print.
Mail Merge 8

Did you find this Microsoft Word walkthrough helpful? We hope so! If you are interested in learning more about implementing Microsoft Office 365 for your business, reach out to us anytime at (918) 770-8738. Check back every week to find new technology tips and tricks!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 19 September 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Software Business Mobile Devices Data IT Support Network Hardware Small Business Communication Server Smartphones VoIP Computer Upgrade Business Continuity Google Windows Efficiency Mobile Device Management Microsoft Office Disaster Recovery Innovation Virtualization Miscellaneous Mobile Office Vendor Management Social Media Tech Term Holiday Gadgets Quick Tips Passwords Data Backup BYOD User Tips Outsourced IT Android Smartphone Mobile Computing Network Security Windows 10 Browser Internet of Things Managed IT services WiFi Bring Your Own Device Remote Monitoring The Internet of Things Ransomware Best Practice Spam Remote Computing Wireless Technology Alert Data Recovery Data Management Save Money Trending Operating System Apple Users Artificial Intelligence History Gmail Unified Threat Management Going Green Content Filtering Firewall App Cloud Computing Customer Relationship Management Managed IT Router Big Data Printer Office Tech Support Analytics IT Solutions Lithium-ion Battery Facebook Information Technology IT Consultant Current Events Encryption Hard Drives Paperless Office Windows 8 Employer-Employee Relationship Website Productivity IT Support Humor Applications Collaboration Two-factor Authentication Saving Time Avoiding Downtime Antivirus Maintenance Document Management IT service Digital Payment Mobile Device Bandwidth Chrome Outlook Health VPN Business Growth Risk Management Wi-Fi Customer Service Marketing Hacking Excel Computers Phone System Managed IT Services Apps Application Automation Virus Office Tips Retail Compliance Cybersecurity Phishing Fax Server Licensing Co-Managed IT File Sharing PowerPoint Social Networking Data Security Tablet Unified Communications Office 365 Infrastructure Inbound Marketing iPhone Password Administration Augmented Reality Presentation Budget Government Training Computer Repair Proactive IT Point of Sale Managed Service Recovery Mouse Project Management Money Regulations Net Neutrality Social Running Cable User Error Mobility Settings IBM Cost Management Wireless Internet Exlporer Save Time Storage Cybercrime Smart Technology Flexibility Wearable Technology Hosted Solution Mobile Security Hiring/Firing Data storage Alerts IoT Tip of the week Display Robot Printing Statistics Scam End of Support Intranet LiFi Computing Business Intelligence Competition Network Congestion Recycling Healthcare eWaste Downtime Vulnerability Search USB Data loss Piracy Virtual Desktop Business Owner BDR Sports Information Hacker Blockchain Redundancy Programming HIPAA User Twitter Analyitcs Files Company Culture Education Help Desk Safety Specifications Access Control Google Drive Proactive Mirgation Smart Tech Cyber Monday Digital Signature Network Management How To Managed Services Provider Cryptocurrency Managing Stress Networking Memory Private Cloud SharePoint Google Docs Remote Monitoring and Management Laptop Connectivity Windows 10 Bitcoin Conferencing Enterprise Content Management Documents Public Cloud Downloads Software Tips WPA3 Halloween Migration Entrepreneur Adminstration Undo 3D PC Care Distributed Denial of Service communications Hacks Value Vulnerabilities 5G Hotspot PDF People Sync Multi-Factor Security Fleet Tracking Scary Stories eBay Chatbots Remote Support Star Wars Leadership Managed IT Service Server Management Skype Streaming Media Geography New Additions Language Mobile Device Managment Google Calendar Print Server Asset Tracking Text Messaging Identity Work Station Utility Computing Domains Break Fix Virtual Reality LinkedIn E-Commerce High-Speed Internet Fun Congratulations Computing Infrastructure Scheduling Techology Legislation Monitors Law Firm IT OneNote Video Surveillance Word Deep Learning Public Speaking Dark Web Patch Management SaaS Windows 8.1 Update G Suite Best Available Features Google Wallet Development Cortana Cooperation Disaster Resistance Writing Employee-Employer Relationship Motherboard Hard Drive Data Warehousing Chromebook Travel Electronic Health Records Drones Cables Knowledge Staff Environment IT Consulting Software as a Service Social Engineering Bluetooth Remote Workers Buisness Modem Identities Cache Microsoft Excel Virtual Private Network Samsung Online Currency Backups Wires Experience Operations Troubleshooting Data Breach Debate Cookies Heating/Cooling Technology Tips How To CIO Computer Accessories Solid State Drive Management Consumers Macro Crowdfunding Telephony Technology Laws Identity Theft Legal Nanotechnology Comparison Assessment Monitoring Alt Codes Enterprise Resource Planning IP Address Permissions Unified Threat Management MSP IT Technicians Screen Reader Refrigeration Gaming Console Black Friday Disaster IT Management Consulting YouTube Touchscreen Typing Mobile Fraud Business Technology Machine Learning

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code