Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Begin with a New document.
Blank Page

Access the Layout menu.
Layout

Click on ‘Size’ to change the size of the page to the proper envelope size. (If you’re unsure about the size of your envelopes, it’s usually located on the box) #10 is the traditional ‘letter’ envelope.
Envelope 10

You’ll see that the document layout has changed to the appropriate size.
Envelope 10 Resize

Next, you’ll navigate to the ‘Insert’ tab and select ‘Text Box’.
Insert Tex Box

Use the ‘Simple Text Box’ option. This will be used for the return address.
Insert Tex Box2

Once you have your address updated, you’ll want to drag the text to the desired location.
Drag to Position

If you are happy with the location of your address, you’ll want to remove the black border around the text box. To do this, right click on the box and select ‘Format Shape’. Switch the radial button from ‘Solid Line’ to ‘No Line’.
Remove Border

Using Font options, you’ll want to style and brand your return address. You may even want to include your logo.
BrandingAddress

Now, it’s time to start the Mail Merge. You’ll begin by adding another ‘Text Box’, remove the standing text and leave the cursor in the box.Mail Merge 5

Access ‘Select Recipients’ to identify the source of the contacts. In this case, we’re using a file that already exists. (Note: This should be a CSV file.)
Mail Merge 1

Next select ‘Address Box’. This will appear in the text box you created earlier.
Mail Merge 6

Follow the prompts to assist with formatting the address properly.
Mail Merge 4

Use ‘Preview Results’ to make sure the addresses display properly, are easy to read and fit on the envelope. Depending on how many recipients, you’ll want to scroll through and make sure the formatting is the same throughout.
Mail Merge 7

That’s it! Now you’ve got the letters ready to go, you can either save them or send them to print.
Mail Merge 8

Did you find this Microsoft Word walkthrough helpful? We hope so! If you are interested in learning more about implementing Microsoft Office 365 for your business, reach out to us anytime at 800.618.9844. Check back every week to find new technology tips and tricks!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Gadgets Cloud Computing Covid-19 Training Outsourced IT Server Remote Work Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Managed Services Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Conferencing Managed IT Services How To BDR Computing Hacker Physical Security Information Technology HIPAA Avoiding Downtime Applications Access Control Marketing Office 365 2FA Augmented Reality Help Desk Retail Storage Password Bring Your Own Device Big Data Healthcare Operating System Computers Virtual Private Network Risk Management Router Website Health Analytics Office Tips Firewall Document Management Monitoring Excel The Internet of Things Scam Remote Workers Managed IT Service Data loss Telephone Social Cooperation Free Resource Going Green Patch Management Project Management Save Money Windows 7 Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Microsoft 365 Cybercrime Solutions Display Printer Paperless Office Infrastructure Windows 11 Money Data Storage Humor Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Safety Professional Services Maintenance Sports Antivirus Mouse Downloads Administration iPhone Licensing Entertainment Vulnerabilities Robot Data Privacy Customer Relationship Management Images 101 Settings Wireless Printing Multi-Factor Authentication Mobility Content Filtering Telephone System Cost Management Hacking IT Management VPN YouTube Meetings Presentation Cryptocurrency Wireless Technology Computer Repair Employees Integration Virtual Desktop Modem Data storage LiFi User Tip Processor Mobile Security Word Holidays Outlook Machine Learning Public Speaking Lenovo Writing Mirgation Hypervisor Displays Shopping Nanotechnology Optimization Lithium-ion battery PowerPoint Virtual Reality Entrepreneur Scary Stories Private Cloud Addiction Language Employer/Employee Relationships Outsourcing Hacks Server Management Chatbots Superfish Navigation Identity Theft Fun Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Deep Learning Twitter Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Undo Identity Evernote Paperless Education Social Engineering Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Remote Computing Download Net Neutrality Alerts SQL Server Technology Care Mobile Computing History Business Communications Tablet Search Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Application Best Practice Alert Buisness File Sharing Dark Data Upload Procurement Azure Hybrid Work Managed IT Cyber security IBM Legal Multi-Factor Security Tech Human Resources IT solutions How To Social Network Telework CES IoT Communitications Dark Web Cables Business Growth Notifications Travel Trends Supply Chain Management Regulations Techology Google Calendar Term Google Apps Google Maps Cortana Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Alt Codes Downtime Unified Threat Management Gamification Flexibility Staff Value Business Intelligence Competition Social Networking Unified Threat Management Legislation Shortcuts Hosted Solution Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Typing Network Congestion Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Google Drive User Error Comparison Google Play Be Proactive User Knowledge Health IT Directions Videos Assessment Electronic Health Records Permissions Workforce Point of Sale 5G Wasting Time Threats Trend Micro IP Address Google Docs Specifications Security Cameras Workplace Strategies Unified Communications Experience Running Cable Tech Support Microchip Internet Exlporer Software as a Service Fraud Meta Bitcoin Network Management Google Wallet Monitors Username Managing Costs Amazon eCommerce Black Friday SSID Recovery Laptop Websites Database Surveillance Virtual Assistant Outsource IT Hard Drives Windows 8 Domains Drones Media IT Technicians Virtual Machine Environment Cookies SharePoint Cyber Monday Medical IT Electronic Medical Records Proxy Server Reviews Halloween Tactics Development Hotspot Transportation Small Businesses Refrigeration

Blog Archive