crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Begin with a New document.
Blank Page

Access the Layout menu.
Layout

Click on ‘Size’ to change the size of the page to the proper envelope size. (If you’re unsure about the size of your envelopes, it’s usually located on the box) #10 is the traditional ‘letter’ envelope.
Envelope 10

You’ll see that the document layout has changed to the appropriate size.
Envelope 10 Resize

Next, you’ll navigate to the ‘Insert’ tab and select ‘Text Box’.
Insert Tex Box

Use the ‘Simple Text Box’ option. This will be used for the return address.
Insert Tex Box2

Once you have your address updated, you’ll want to drag the text to the desired location.
Drag to Position

If you are happy with the location of your address, you’ll want to remove the black border around the text box. To do this, right click on the box and select ‘Format Shape’. Switch the radial button from ‘Solid Line’ to ‘No Line’.
Remove Border

Using Font options, you’ll want to style and brand your return address. You may even want to include your logo.
BrandingAddress

Now, it’s time to start the Mail Merge. You’ll begin by adding another ‘Text Box’, remove the standing text and leave the cursor in the box.Mail Merge 5

Access ‘Select Recipients’ to identify the source of the contacts. In this case, we’re using a file that already exists. (Note: This should be a CSV file.)
Mail Merge 1

Next select ‘Address Box’. This will appear in the text box you created earlier.
Mail Merge 6

Follow the prompts to assist with formatting the address properly.
Mail Merge 4

Use ‘Preview Results’ to make sure the addresses display properly, are easy to read and fit on the envelope. Depending on how many recipients, you’ll want to scroll through and make sure the formatting is the same throughout.
Mail Merge 7

That’s it! Now you’ve got the letters ready to go, you can either save them or send them to print.
Mail Merge 8

Did you find this Microsoft Word walkthrough helpful? We hope so! If you are interested in learning more about implementing Microsoft Office 365 for your business, reach out to us anytime at (918) 770-8738. Check back every week to find new technology tips and tricks!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 20 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Best Practices Productivity Workplace Tips IT Services Hackers Hosted Solutions Backup Email Mobile Devices Malware Software IT Support Business Small Business Hardware Network Data Server Smartphones Communication Upgrade Windows Business Continuity VoIP Mobile Device Management Virtualization Computer Efficiency Microsoft Office Disaster Recovery Google Vendor Management Miscellaneous Innovation Mobile Office Gadgets Social Media Holiday Outsourced IT User Tips Quick Tips Passwords Mobile Computing Smartphone BYOD Android Network Security Data Backup Browser Windows 10 WiFi Managed IT services Best Practice Ransomware The Internet of Things Remote Monitoring Bring Your Own Device Spam Internet of Things Data Management Alert Users Tech Term Trending Wireless Technology Operating System Apple Remote Computing Firewall Save Money Data Recovery Gmail Content Filtering Going Green Artificial Intelligence History Encryption App Analytics Customer Relationship Management Unified Threat Management IT Solutions Lithium-ion Battery IT Consultant Managed IT Printer Tech Support Big Data Information Technology Current Events Office Avoiding Downtime Maintenance Cloud Computing Hard Drives Facebook Applications Paperless Office Windows 8 Router Antivirus Employer-Employee Relationship Document Management Humor Saving Time Collaboration Application Cybersecurity Two-factor Authentication Virus Compliance Automation Fax Server Office Tips Retail Phone System Outlook Health Phishing IT service Chrome Marketing Business Growth Excel Managed IT Services Website Customer Service Hacking Computers Digital Payment Mobile Device VPN Risk Management Apps Training Presentation Tablet Budget Data Security iPhone User Error Regulations Co-Managed IT Recovery Money Bandwidth Administration Running Cable Augmented Reality Licensing Infrastructure Proactive IT Computer Repair Wi-Fi Unified Communications Inbound Marketing Mouse Net Neutrality Social Office 365 Password Government Project Management PowerPoint Social Networking Display Alerts Smart Technology Search Mobile Security Files Virtual Desktop USB Mobility Business Owner Help Desk Intranet Hacker User Programming Business Intelligence Tip of the week Recycling Analyitcs Education Safety Specifications Flexibility Hosted Solution Settings Piracy Cost Management Wireless Data storage Cybercrime Save Time Sports Robot Scam Hiring/Firing Point of Sale Vulnerability Productivity Printing Company Culture Twitter End of Support LiFi HIPAA Computing Statistics Data loss IBM Redundancy Competition Network Congestion File Sharing Wearable Technology eWaste Downtime Internet Exlporer Telephony SharePoint Identities Business Technology Storage Connectivity Macro PC Care Backups Environment CIO Enterprise Content Management Value Network Management Knowledge eBay Downloads Solid State Drive Networking Migration Samsung IoT Remote Support Distributed Denial of Service Leadership Legal Troubleshooting Debate Skype Streaming Media Windows 10 Hotspot New Additions Experience Gaming Console Text Messaging Machine Learning Multi-Factor Security Heating/Cooling Alt Codes Print Server Chatbots Crowdfunding Star Wars Work Station Managed IT Service Consumers YouTube LinkedIn Language Congratulations Identity Video Surveillance Private Cloud Google Calendar Typing Law Firm IT Techology Windows 8.1 Update Utility Computing Software Tips Break Fix IP Address Google Drive Best Available Server Management Computing Infrastructure How To Disaster Resistance Public Cloud Legislation Refrigeration Cryptocurrency Disaster Healthcare Dark Web Google Docs Cooperation Adminstration IT Consulting Motherboard 3D Sync Bitcoin Digital Signature Bluetooth Memory Online Currency Hard Drive Data Warehousing Laptop communications Patch Management Staff Modem Computer Accessories Mobile Device Managment Software as a Service Hacks Documents Cache IT Support Microsoft Excel Halloween Data Breach Entrepreneur Operations Cookies Technology Tips Undo PDF People Management Blockchain Scheduling 5G Scary Stories Virtual Reality Technology Laws Virtual Private Network Nanotechnology Touchscreen Travel Comparison Enterprise Resource Planning Permissions Monitors SaaS Unified Threat Management Deep Learning IT Technicians Screen Reader BDR Black Friday Domains Google Wallet Mobile Assessment Fraud Fun Writing Access Control Word Mirgation Smart Tech Identity Theft Cyber Monday Public Speaking Drones Buisness Managing Stress Conferencing IT Management Cortana Social Engineering

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code