Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do lots of neat things. In fact, you can create a professional envelope for your organization, add a list of contacts from a CSV file or from Outlook, and so much more.

Step 1: Open a New Document
Blank Page

Step 2: Access the Layout Menu

Step 3: Change the Size of the Page
You want the page to be set to the proper envelope size. If you need to know what size your envelopes are, try checking the box. #10 is generally the traditional letter envelope.
Envelope 10

Step 4: Check the Layout
Before proceeding, make sure that the layout has changed to the proper size.
Envelope 10 Resize

Step 5: Go to the Insert Tab and Select Text Box
Insert Tex Box

Step 6: Use the Simple Text Box Option
This will be used for your return address.
Insert Tex Box2

Step 7: Update the Address and Draft the Text to the Desired Location.
Drag to Position

Step 8: Remove the Border Around the Text Box
You can do this by right-clicking the box and selecting Format Shape. Switch the radial button from Solid Line to No Line.
Remove Border

Step 9: Style and Brand Your Return Address
You can use the Font options to customize the appearance of your return address. Make sure you don’t forget your logo.

Step 10: Start Your Mail Merge
First, let’s add another Text Box. You should remove the standing text and leave the cursor right where it is in the box.
Mail Merge 5

Step 11: Load Your Contacts
To do this, access Select Recipients and check the source of your contacts. You’ll need a CSV file for this next step.
Mail Merge 1

Step 12: Select Address Box. This appears in the text box that you created earlier.
Mail Merge 6

Step 13: Follow the Directions to Format Your Address
Mail Merge 4

Step 14: Preview Your Results
Use the Preview Results option to check that the addresses are displaying properly, are simple to read, and fit on the envelope. This might change depending on how many recipients you have. Just scroll through them to ensure that the formatting remains the same throughout them all.
Mail Merge 7

Step 15: Save or Print
That just about wraps it up. You can finish your work or print them out as you see fit.
Mail Merge 8

For more great tips and tricks, subscribe to Indevtech’s blog.

Sign Up For Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *

      Request a Consultation

      Request a
      Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for you!

      Contact Us!

      Free Consultation

      Tag Cloud

      Tip of the Week Security Privacy Technology Best Practices Cloud Business Computing Hackers Backup Windows 10 Microsoft Google Software Smartphones Malware Productivity Hosted Solutions Business Internet Network Security Disaster Recovery Efficiency Business Continuity Hardware Mobile Devices Email Data Browser Innovation Ransomware User Tips Computer Android Office VoIP Alert Windows Managed IT Services Miscellaneous Telephone Systems Cybercrime Smartphone Upgrade Quick Tips Outsourced IT Business Management Computers Chrome Automation Office Tips Save Money Social Media IT Services Law Enforcement Collaboration Small Business Social Engineering Data Backup Server How To Health communications Virtualization App Productivity Cloud Computing Facebook Bring Your Own Device Managed IT Services Cybersecurity Workplace Tips Work/Life Balance Passwords History Remote Computing Money Wi-Fi Spam Two-factor Authentication Operating System Network Holiday Managed Service Provider Private Cloud HaaS Communication Recovery Flexibility Data Recovery Gmail Mobile Device Management Data Breach Router Marketing Hacking Office 365 Bandwidth Application Artificial Intelligence Safety Google Drive Password Windows 10 Unsupported Software DDoS Hiring/Firing OneNote Black Market Mouse Patch Management Robot Redundancy User Error Scam Government Public Cloud IT Support Wearable Technology Downtime Avoiding Downtime Budget Data Security Spam Blocking Keyboard Data storage Internet Exlporer Employer-Employee Relationship Settings Entertainment Vulnerability Best Practice Phishing Retail Microsoft Office Data Management Data Storage Networking Word Gadgets IT Management BDR Physical Security Mobility End of Support Apps Charger Meetings Battery The Internet of Things Voice over Internet Protocol Knowledge Emergency Relocation Mobile Device IT solutions Advertising Education Credit Cards NarrowBand Flash Techology Environment Botnet Multi-Factor Security Uninterrupted Power Supply Software Tips Network Congestion Humor Video Games Computing Infrastructure Fraud Wireless Technology Distributed Denial of Service Netflix Employer Employee Relationship Assessment Risk Management Internet of Things Maintenance Travel Encryption Trending Cleaning BYOD IT Consultant Scalability Computer Accessories Applications Amazon Chromecast Sync IT Support Root Cause Analysis Television Politics Notifications Instant Messaging Comparison Tech Support Samsung Transportation Bluetooth Hybrid Cloud Users Amazon Web Services Customer Relationship Management Public Computer Apple Specifications Shadow IT HBO Leadership Benefits PDF Virtual Reality Online Shopping Customer Service Telephony Streaming Media Windows 10s Data loss Experience Running Cable Monitor Shortcut Remote Monitoring iPhone Business Intelligence Outlook Firewall Worker Information Technology Worker Commute Evernote Fax Server Skype Screen Mirroring Automobile Music Reputation Update Search Millennials Frequently Asked Questions Smart Technology Rootkit Wireless Charging Going Green Mobile Computing Start Menu Solid State Drive Cast IBM USB Customers Computer Care Files How to Workforce Sports Excel webinar Two Factor Authentication Training Wireless People Cortana Laptop Tools Audit Supercomputer Troubleshooting Telecommuting VPN Social Tip of the week Conferencing Vendor Management Mobile Office Google Apps Touchpad Biometrics Programming Computer Fan Big Data Google Docs Remote Work YouTube Windows Server 2008 Emails Electronic Medical Records Content Workers Value FENG IT Plan Current Events Books Legal Website Internet exploMicrosoft Identity Theft Social Networking Windows 7 Save Time SaaS Audiobook eWaste Infrastructure Managed IT Lithium-ion battery IT solutions Password Manager Thank You CrashOverride Congratulations Saving Money WiFi Webinar