Mail merge consists in combining mail and letters and pre-addressed envelopes or mailing labels for mass mailings from a form letter. Microsoft Word can insert content from a database, spreadsheet, or table into Word documents
Second is the different virus in our computer.”Malware” encompasses computer viruses along with many other forms of malicious software, such as computer “worms”, spyware, adware, trojan horses, keylogger,
Malware software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Computer worms is a standalone malware computer program that replicates itself in order to spread to other computers. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Spyware software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Adware software that automatically displays or downloads advertising material (often unwanted) when a user is online.
Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
Keyloggers a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.