Mail-merging: The Principles

About mail-merging

Mail-merging is the process of merging variable data and fixed text.

Using mail-merging, you can create individualised letters, envelopes, labels and other documents without having to laboriously create each individual one.

Mail-merging naturally fulfils one of the DfES's conditions of reducing the administrative burden on teachers, namely that when data is inputted into a computer system it should be right first time. One of the aspects of this principle is that computer data should not have to be re-entered in order to generate a different view of it.

Examples of mail-merging

The "right first time" principle can be illustrated by the number of different kinds of document that you could create using one set of data consisting of school names and addresses and Head teachers' names:

Notification of funding allocations for anew financial year.

Invitation to a meeting.

Attendance registers for courses/conferences.

End-of-term letter.

Labels for conference packs.

Address labels for the envelopes. You can even use the same set of data (if set up properly initially) to send different letters to (for example):

Primary schools/secondary schools.

Schools that have/have not submitted their ICT Strategy.

Head teachers that are invited to a meeting on Monday, and those invited to the meeting on Tuesday. Advantages of mail-merging

It can save a lot of time over the long term.

Recipients often feel as if they have been given individual attention. Disadvantages of mail-merging

It can take a long time to set up initially, and so may not be worth it for a one-off job.

Recipients often feel as if they have been given individual attention. This is not always a good idea.

Terry Freedman runs the website http://www.ictineducation.org, on which he sells the Big Database, consisting of 1008 records and 23 fields -- ideal for practising mail-merging!

In The News:

Apple recently notified a small number of iPhone customers in 92 countries that their phones may be under attack by mercenary spyware.
An artificial intelligence-powered home security system can fire paintballs and tear gas at trespassers. The camera identifies human faces and animals.
Technology expert Kim Komando gives her tips and tricks on enhancing your user experience a smartphone and other devices you use everyday.
A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.

Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment

MP3 players are Hot! Playing music has come a long... Read More

How Does My PC Get Hot

There are many sources of heat that can raise the... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

D2X Digital SLRCoolpix 8800 Actually Refers to Two Nikon Cameras

Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More

Desktop Security Software Risks - Part 2

This is the third in a series of articles highlighting... Read More

JVCs First Three-Layer Combo-Disc Blu-Ray / DVD

JVC developed and used a high-performance reflective film to produce... Read More

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

5 Steps to Removing PC Clutter

It's hard enough as it is these days to get... Read More

Bios Term

BIOS - Basic Input Output SystemThe central processing unit of... Read More

Computer Geeks and Garden Gnomes

First and foremost before I begin my ranting it is... Read More

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

Although there are many things that can affect the performance... Read More

Keeping Passwords Secure

As the web has evolved, so have the methods of... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Cisco Certification: The Most Important Cisco Study Youll Ever Do

All of us are familiar with the pyramids of Egypt.... Read More

What Has A Portable MP3 Player Have To Do With Your Business

Plenty! When we made the decision to be our own... Read More

A Lesson in HTML

As the owner of a Country Mall and Top Site... Read More

Email Management

If you utilize a computer at home or work it... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

Basic Computer Maintenance

One of the most common questions computer users ask is,... Read More

How To Speed Up Your Aging PC And Make It Healthier Too

With a little tweaking and with proper tools, you can... Read More

PC Tools Youd Never Think You Need

Do you use Windows standard uninstall feature? How do you... Read More

This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

The DNS (Domain Name System) servers are what your computer... Read More

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

5 Ways to Speed Up Your PC

No matter how fast your processor and regardless of how... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More