Error
  • Error loading component: com_advancedmodules, 1

Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Begin with a New document.
Blank Page

Access the Layout menu.
Layout

Click on ‘Size’ to change the size of the page to the proper envelope size. (If you’re unsure about the size of your envelopes, it’s usually located on the box) #10 is the traditional ‘letter’ envelope.
Envelope 10

You’ll see that the document layout has changed to the appropriate size.
Envelope 10 Resize

Next, you’ll navigate to the ‘Insert’ tab and select ‘Text Box’.
Insert Tex Box

Use the ‘Simple Text Box’ option. This will be used for the return address.
Insert Tex Box2

Once you have your address updated, you’ll want to drag the text to the desired location.
Drag to Position

If you are happy with the location of your address, you’ll want to remove the black border around the text box. To do this, right click on the box and select ‘Format Shape’. Switch the radial button from ‘Solid Line’ to ‘No Line’.
Remove Border

Using Font options, you’ll want to style and brand your return address. You may even want to include your logo.
BrandingAddress

Now, it’s time to start the Mail Merge. You’ll begin by adding another ‘Text Box’, remove the standing text and leave the cursor in the box.Mail Merge 5

Access ‘Select Recipients’ to identify the source of the contacts. In this case, we’re using a file that already exists. (Note: This should be a CSV file.)
Mail Merge 1

Next select ‘Address Box’. This will appear in the text box you created earlier.
Mail Merge 6

Follow the prompts to assist with formatting the address properly.
Mail Merge 4

Use ‘Preview Results’ to make sure the addresses display properly, are easy to read and fit on the envelope. Depending on how many recipients, you’ll want to scroll through and make sure the formatting is the same throughout.
Mail Merge 7

That’s it! Now you’ve got the letters ready to go, you can either save them or send them to print.
Mail Merge 8

Did you find this Microsoft Word walkthrough helpful? We hope so! If you are interested in learning more about implementing Microsoft Office 365 for your business, reach out to us anytime at 800.618.9844. Check back every week to find new technology tips and tricks!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Covid-19 Training Outsourced IT Remote Work Server IT Support Managed Service Provider Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Vendor Business Technology Managed Services Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Conferencing Password Managed IT Services How To BDR Computing HIPAA Physical Security Information Technology Applications Hacker Access Control Avoiding Downtime Office 365 Marketing Retail Storage Bring Your Own Device Healthcare Big Data Operating System Router Risk Management Virtual Private Network Computers Health Analytics Website Office Tips 2FA Help Desk Augmented Reality Firewall Managed IT Service Remote Workers Scam Telephone Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Vendor Management Cybercrime Solutions Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Professional Services Saving Time Virtual Machines Maintenance Antivirus Sports Mouse Downloads iPhone Safety Administration Licensing Vulnerabilities Entertainment Data Privacy Robot Images 101 Telephone System Multi-Factor Authentication Settings Mobility Cost Management Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Employees Cryptocurrency Hacking Integration Presentation Computer Repair User Tip Modem Virtual Desktop Mobile Security Processor Data storage LiFi Wireless Technology Holidays Outlook Data Storage Smart Technology Supply Chain Machine Learning Video Conferencing Money Humor Managed Services Provider Word Distributed Denial of Service Workplace Gig Economy Hacks Server Management Screen Reader Scary Stories Private Cloud Service Level Agreement Internet Service Provider Identity Theft Refrigeration Computing Infrastructure Teamwork Hiring/Firing Fun Superfish Regulations Compliance Deep Learning Public Speaking Identity Twitter Evernote Paperless Co-managed IT Bookmark Lithium-ion battery Smart Tech Memes Error Download Net Neutrality Education Alerts SQL Server Technology Care Social Engineering Entrepreneur Financial Data History Remote Computing Business Communications Break Fix Scams Browsers Smartwatch Mobile Computing Connectivity IT Upload Procurement Tablet Undo Azure Hybrid Work Search Social Network Telework Best Practice Cyber security Alert Multi-Factor Security Tech Human Resources Buisness File Sharing Dark Web Cables Dark Data CES Managed IT IoT Communitications Legal Trends Supply Chain Management IT solutions How To Customer Resource management FinTech Business Growth Regulations Notifications Google Calendar Term Google Apps Travel Application Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Techology Gamification Flexibility Google Maps Staff Value Business Intelligence Cortana Organization Alt Codes IBM Social Networking Legislation Shortcuts Smart Devices Downtime Unified Threat Management Ransmoware Fileless Malware Digital Security Cameras Unified Threat Management Content Remote Working Hosted Solution Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Typing Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Network Congestion Directions Videos Google Drive User Error Competition Wasting Time Threats Knowledge Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Point of Sale Fraud Meta 5G Microchip Google Docs Username Unified Communications Managing Costs Amazon Experience Black Friday SSID Bitcoin Network Management eCommerce Running Cable Tech Support User Database Surveillance Virtual Assistant Outsource IT Monitors Google Wallet IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Windows 8 IP Address Cookies Laptop Websites Tactics Development Hotspot Transportation Small Businesses Drones SharePoint Mirgation Hypervisor Displays Electronic Medical Records Recovery PowerPoint Shopping Nanotechnology Optimization Halloween Addiction Hard Drives Language Employer/Employee Relationships Outsourcing Writing Lenovo Management PCI DSS Domains Chatbots Virtual Reality Navigation

Blog Archive