wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Emailing the merger document

profile
Om Pandey
Aug 26, 2022
0 Likes
0 Discussions
42 Reads

 Emailing the Merger Documents

You should follow the below steps to email merged document:

1. Set Outlook to work Offline 

To make sure that the email you send is stored in the Outbox before sending. You can try this easily yourself.

2. Mail Merge

Use Microsoft Word to merge your emails, which are now stored in the Outlook outbox.

3.Add the attachment to all emails in the Outlook Outbox

Run (double-click) Outlook Mail Merge attachment.vbs

You are asked which file to add to the emails.

Note that you cannot touch the keyboard or mouse while processing the emails. Sometimes, the "Attach file" dialog is hidden behind another window.

Please minimize all windows when outlook mail merge attachment seems to stop right after the welcome message.

When the script is finished, it will display

"Successfully added the attachment to emails".

4. Check 

You are now able to check your check your emails with attachment since they still are in the Outlook outbox.


Comments ()


Sign in

Read Next

IT RISK

Blog banner

ZOHO

Blog banner

What are NFT s?

Blog banner

Article on team management software

Blog banner

The functions of operating system

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Getting into anime My anime suggestions

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Operating System Objectives and Functions

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Virtual memory in os

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Operation system

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Number Guessing game --lisp

Blog banner

Basic Security For SOAP Services

Blog banner

Data Mining

Blog banner

Virtual Machine

Blog banner

How to use GIT & GITHUB

Blog banner

Types of Hackers

Blog banner

GraphX:- A graph processing tool

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Mobile Survey

Blog banner

Chicken Dum Biryani

Blog banner

IP Address

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Memory Management

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Senseless Teeths

Blog banner

Clustering Techniques

Blog banner

FRIENDSHIP

Blog banner

Deadlock

Blog banner

What is OS and its overview

Blog banner

10 Interesting Facts about Death Note

Blog banner

Theads

Blog banner

Busted : Common Web Security Myths

Blog banner