Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Begin with a New document.
Blank Page

Access the Layout menu.

Click on ‘Size’ to change the size of the page to the proper envelope size. (If you’re unsure about the size of your envelopes, it’s usually located on the box) #10 is the traditional ‘letter’ envelope.
Envelope 10

You’ll see that the document layout has changed to the appropriate size.
Envelope 10 Resize

Next, you’ll navigate to the ‘Insert’ tab and select ‘Text Box’.
Insert Tex Box

Use the ‘Simple Text Box’ option. This will be used for the return address.
Insert Tex Box2

Once you have your address updated, you’ll want to drag the text to the desired location.
Drag to Position

If you are happy with the location of your address, you’ll want to remove the black border around the text box. To do this, right click on the box and select ‘Format Shape’. Switch the radial button from ‘Solid Line’ to ‘No Line’.
Remove Border

Using Font options, you’ll want to style and brand your return address. You may even want to include your logo.

Now, it’s time to start the Mail Merge. You’ll begin by adding another ‘Text Box’, remove the standing text and leave the cursor in the box.Mail Merge 5

Access ‘Select Recipients’ to identify the source of the contacts. In this case, we’re using a file that already exists. (Note: This should be a CSV file.)
Mail Merge 1

Next select ‘Address Box’. This will appear in the text box you created earlier.
Mail Merge 6

Follow the prompts to assist with formatting the address properly.
Mail Merge 4

Use ‘Preview Results’ to make sure the addresses display properly, are easy to read and fit on the envelope. Depending on how many recipients, you’ll want to scroll through and make sure the formatting is the same throughout.
Mail Merge 7

That’s it! Now you’ve got the letters ready to go, you can either save them or send them to print.
Mail Merge 8

Did you find this Microsoft Word walkthrough helpful? We hope so! If you are interested in learning more about implementing Microsoft Office 365 for your business, reach out to us anytime at 239-362-9902. Check back every week to find new technology tips and tricks!

3 Steps to Successful Business Continuity Planning
With Hurricane Irma Churning in The Atlantic, is Y...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 October 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Malware Privacy Network Security Hackers Productivity Backup Managed IT Services Software IT Services Ransomware Microsoft Business User Tips Outsourced IT IT Support Internet Email Business Continuity Mobile Devices Windows 10 Computer Efficiency Google Productivity Smartphone Social Media Managed IT Remote Monitoring Hosted Solutions Data Backup Hardware Android Disaster Recovery Data Recovery Recovery Workplace Tips Unified Threat Management Managed IT Services Communication Data Management App Training Data Cybersecurity Save Money Work/Life Balance Cloud Computing Tip of the week SaaS Managed Service Provider Apps Innovation IT Support Office 365 Collaboration Telephone Systems Mobile Device Internet of Things IT Service Hosted Solution Paperless Office Smartphones Robot Small Business Content Filtering Browser File Sharing Facebook Phishing How To Word Risk Management Big Data Firewall Windows Password Alert Websites Samsung Artificial Intelligence BDR Botnet Going Green Education Politics Health Antivirus Virtual Private Network Hacker Computer Care BYOD Virtual Reality Uninterrupted Power Supply Automobile Money Mobile Device Management Windows 10 Files VoIP Mobility Wireless Twitter Encryption Data Storage Vendor Management Taxes Physical Security Virtualization VoIP IT Management Wi-Fi WiFi Server Management Superfish Spyware Patch Management Travel Quick Tips Holiday Upgrades Computer Repair GPS Statistics Scam Maintenance Downtime Employer-Employee Relationship Virus Server Office Vulnerability Motion Sickness Google Drive History Bandwidth Upgrade Tracking Information Technology Bluetooth Networking Error IBM Sync Tablet VPN Meetings Avoiding Downtime Help Desk Cabling Computers Document Management Cleaning Data Security Emoji Private Cloud Corporate Profile Mobile Device Managment How To Crowdsourcing Apple Webcam Time Management Telephony Infrastructure USB WannaCry Electronic Medical Records Hacking Techology Computing Public Cloud Mail Merge Analytics Government Customer Service Unsupported Software Point of Sale Network Management Sports Disaster Social Automation Monitors Notifications Identity Theft Staffing Trending Communications Address Chrome Wireless Technology Google Maps Web Server Touchscreen Data loss Redundancy Firefox Black Market Cameras Project Management Office Tips Search Cortana G Suite Customer Relationship Management Mobile Data CCTV Solid State Drive YouTube Supercomputer Microsoft Office Assessment Legal Law Enforcement Remote Computing Heating/Cooling Business Technology Update Tech Support Hard Disk Drive Personal Information Administrator Settings IT Budget Outlook Consultation Gadget Licensing Processors IT Consultant Servers Lenovo Chromebook Budget Unified Threat Management Business Management Digital Network Digital Payment Shortcut Cybercrime Software Tips IT Solutions Business Growth User Error Thank You Congratulations CrashOverride Disaster Resistance Proactive IT Hacks IT Consulting Emergency Data Breach Cost Management Technology Laws

Newsletter Sign Up