Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Begin with a New document.
Blank Page

Access the Layout menu.

Click on ‘Size’ to change the size of the page to the proper envelope size. (If you’re unsure about the size of your envelopes, it’s usually located on the box) #10 is the traditional ‘letter’ envelope.
Envelope 10

You’ll see that the document layout has changed to the appropriate size.
Envelope 10 Resize

Next, you’ll navigate to the ‘Insert’ tab and select ‘Text Box’.
Insert Tex Box

Use the ‘Simple Text Box’ option. This will be used for the return address.
Insert Tex Box2

Once you have your address updated, you’ll want to drag the text to the desired location.
Drag to Position

If you are happy with the location of your address, you’ll want to remove the black border around the text box. To do this, right click on the box and select ‘Format Shape’. Switch the radial button from ‘Solid Line’ to ‘No Line’.
Remove Border

Using Font options, you’ll want to style and brand your return address. You may even want to include your logo.

Now, it’s time to start the Mail Merge. You’ll begin by adding another ‘Text Box’, remove the standing text and leave the cursor in the box.Mail Merge 5

Access ‘Select Recipients’ to identify the source of the contacts. In this case, we’re using a file that already exists. (Note: This should be a CSV file.)
Mail Merge 1

Next select ‘Address Box’. This will appear in the text box you created earlier.
Mail Merge 6

Follow the prompts to assist with formatting the address properly.
Mail Merge 4

Use ‘Preview Results’ to make sure the addresses display properly, are easy to read and fit on the envelope. Depending on how many recipients, you’ll want to scroll through and make sure the formatting is the same throughout.
Mail Merge 7

That’s it! Now you’ve got the letters ready to go, you can either save them or send them to print.
Mail Merge 8

Did you find this Microsoft Word walkthrough helpful? We hope so! If you are interested in learning more about implementing Microsoft Office 365 for your business, reach out to us anytime at 978-482-2020. Check back every week to find new technology tips and tricks!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Software Internet Hosted Solutions Ransomware Microsoft Android IT Services Business Google Network Security Computer Backup Smartphone Windows Mobile Devices Small Business Windows 10 Innovation Data Management Internet of Things Data App Hardware Artificial Intelligence Encryption Cloud Computing Server Business Continuity Browser Managed Service Provider Managed IT Services Office 365 Data Recovery Efficiency Saving Money User Tips Business Management Tip of the week Productivity Remote Monitoring Phishing IT Support Gmail Outsourced IT Smartphones Facebook Data storage Risk Management Money Windows 10 Word Productivity Communication Vulnerability Chrome Settings Cybersecurity IT Management IT Support Infrastructure Office Tips Robot Google Drive Big Data Upgrade Antivirus HIPAA LiFi Mobile Device Administration Mobile Security Content Filtering Microsoft Office Business Technology Analytics Holiday Data loss Telephone Systems Outlook Monitors Alert Save Money Firewall Network Two-factor Authentication Automation Mouse Scam Virtual Reality Miscellaneous Apple Employer-Employee Relationship SaaS Hosted Solution Storage VPN Bandwidth Workplace Tips Data Security YouTube Government Server Management Virtual Private Network Social Media communications Unified Threat Management BYOD Computing Managed IT Services Disaster Recovery Maintenance Passwords End of Support Data Backup Marketing Printer Time Management Network Congestion Hacks Google Wallet Corporate Profile Black Friday Training Search Emergency Wi-Fi Automobile Business Growth Applications Dell Access Control Paperless Office Network Management Computers Password Drones WannaCry Cyber Monday Hotspot Google Maps IT solutions Hacker IT Technicians SharePoint Touchscreen Display Managed IT Smart Technology Language Lenovo Running Cable Alt Codes Mirgation desktop Downloads Buisness Shortcut Virtual Desktop Politics Budget Digital Distributed Denial of Service Computing Infrastructure Superfish Collaboration Humor Laptop Typing Current Events Chatbots Deep Learning Samsung Patch Management Tech Support Spyware Managed IT Service Document Management Alerts Spam File Sharing Customer Relationship Management Cryptocurrency Going Green Identity Solid State Drive Multi-Factor Security Remote Computing Bring Your Own Device Heating/Cooling Downtime Identity Theft Websites Break Fix Licensing Networking Bitcoin Gadgets Printing Tech Term Hard Disk Drive Google Calendar Servers Writing Legal Dark Web Cooperation Cabling Apps Dark Data Halloween Windows 8 Users Compliance Legislation Retail Education How To Microsoft Excel Staff Techology Quick Tips Customer Service Scary Stories Website Regulations Tablet Statistics Office Digital Payment Mail Merge Vendor Management Operating System Firefox Blockchain Augmented Reality Disaster Unified Threat Management Unified Communications VoIP Sports Social Information Technology Comparison Bluetooth Social Engineering Address The Internet of Things Best Practice Permissions Wearable Technology Uninterrupted Power Supply User Error Avoiding Downtime VoIP IBM Specifications Computer Care Safety Wireless WiFi Google Docs Cybercrime Fraud Ben McDonald shares Cortana Point of Sale Gadget Virtualization Staffing Computer Repair Administrator what was your? Web Server Processors Mobile Device Management How To GPS Health Mobile Computing Black Market Cameras Tracking Electronic Medical Records Twitter CCTV Upgrades Notifications 3D Printing Travel Crowdsourcing G Suite Supercomputer Unsupported Software Botnet CrashOverride Update Motion Sickness Taxes IT Budget Mobile Data Machine Learning Recovery IT Consultant Relocation Chromebook Meetings Work/Life Balance Cleaning Physical Security Private Cloud Emoji Webcam Law Enforcement Personal Information Error

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3