Martes, Nobyembre 29, 2016

                STEP BY STEP PROCESS ON HOW TO USE THE MAIL MERGE OF MICROSOFT
Mail merge is used to create multiple documents at once. These documents have identical layout, formatting, text, and graphics. Only specific sections of each document varies and is personalized. The documents Word can create with mail merge include bulk labels, letters, envelopes, and emails. There are three documents involved in the mail merge process:
·         Your main document
·         Your data source
·         Your merged document
Step 1: Prepare data in Excel for mail merge
The most important step in the mail merge process is to set up and prepare your data. You'll use your Excel spreadsheet as the data source for the recipient list.
Step 2: Start the mail merge
1.   In Word, choose File > New Blank document.
2.   On the Mailings tab, in the Start Mail merge group, choose Start Mail Merge, and then choose the kind of merge you want to run.
Screenshot of the Mailings tab in Word, showing the Start Mail Merge command and the list of available options for the type of merge you want to run.
3.   Choose Select Recipients > Use an Existing List.
Screenshot of the Mailings tab in Word, showing the Select Recipients command with the Use an Existing List option selected.
1.   Browse to your Excel spreadsheet, and then choose Open.
2.   If Word prompts you, choose Sheet1$ > OK.
Edit your mailing list
1.     Choose Edit Recipient List.
Screenshot of the Mailings tab in Word, showing the Edit Recipient List command as highlighted.
2.     In the Mail Merge Recipients dialog box, clear the check box next to the name of any person who you don't want to receive your mailing.
Select rows by checking the check box
Step 3: Insert a merge field
You can insert one or more mail merge fields that pull the information from your spreadsheet into your document.
To insert an address block for an envelope, a label, an email message, or a letter
1.   On the Mailings tab, in the Write & Insert Fields group, choose Address Block.
Insert Address Block merge field
2.   In the Insert Address Block dialog box, choose a format for the recipient's name as it will appear on the envelope.
Address block options
3.   Choose OK.
4.   Choose File > Save.
To insert a greeting line in an email message or a letter
1.   On the Mailings tab, in the Write & Insert Fields group, choose Greeting Line.
Screenshot of the Mailings tab in Word, showing the Greeting Line command as highlighted.
2.   In the Insert Greeting Line dialog box, do the following:
o    Under Greeting line format, change the salutation if necessary by choosing the greeting (Dear is the default), the format for the recipient name, and the ending punctuation (a comma is the default).
and
o    Under Greeting line for invalid recipient names, choose an option in the salutation list.
3.   Choose OK.
4.   Choose File > Save.
To insert data from your spreadsheet in an email message or a letter
1.   On the Mailings tab, in the Write & Insert Fields group, choose Insert Merge Field.
2.   In the Insert Merge Field dialog box, under Fields, choose a field name (column name in your spreadsheet), and then choose Insert.
3.   Repeat step 2 as needed, and choose Close when done.
4.   Choose File > Save.
For more information about adding fields from your spreadsheet to the merge document, see Insert mail merge fields. And if you're interested in learning more about options for setting up email message, see Email merge in Word.
Step 4: Preview and finish the mail merge
After you insert the merge fields you want, preview the results to confirm that the content is okay. and then you're ready to complete the merge process.
1.   On the Mailings tab, choose Preview Results.
Screenshot of the Mailings tab in Word, showing the Preview Results group.
2.   Choose the Next Next record button for mail merge preview results or Previous Previous record button for mail merge preview results record button to move through records in your data source and view how the records will appear in the document.
3.   In the Finish group, choose Finish & Merge, and choose Print Documents or Send E-mail Messages.
Screenshot of the Mailings tab in Word, showing the Finish & Merge command and its options.
Step 5: Save your mail merge
When you save the mail merge document, it stays connected to your data source. You can reuse the mail merge document for your next bulk mailing.
·         Open the mail merge document and choose Yes when Word prompts you to keep the connection.
See also
Resources: https://support.office.com/en-us/article/Mail-merge-using-an-Excel-spreadsheet-858c7d7f-5cc0-4ba1-9a7b-0a948fa3d7d3                

Martes, Nobyembre 22, 2016

15 Tips on how to stay safe online
01. Disable the Auto-Run feature in Windows.  This built-in Windows component allows silent programs to execute without your knowledge because auto-run grants them permission to initiate without obtaining active consent.
02. Always have an anti-virus program on your computer and keep it updated.  There are plenty of free or very inexpensive anti-virus programs available, so you have no excuse for not having one.  Make sure you set the program up to do a full scan at least once a week.
03. Do not turn off the Firewall options on your computer, even if a program claims the Firewall needs to be disabled for the program to work.  Firewall settings allow you set program-specific exceptions without disabling the protection altogether.
04. When choosing passwords for online sites or online accounts (bank accounts, Pay Pal, etc.), make sure you never use the same password for multiple sites, use a mixture of upper and lower case letters and numbers (and symbols if they are allowed), avoid using personal information (birth date, maiden name, social security number), never use a password of less than 10 characters, and combine words or create nonsensical ones.  The harder your password is for you to remember, the more difficult it will be for someone else to guess it!
05. Update the core components of your computer’s software regularly, or set the system to automatically find and download updates.  The most common example of this is Windows Update for Microsoft operating systems.
06. While it is tempting to download free movies, music, and software from torrent sites, it can also be very harmful to your computer.  Torrent content is generally unverified and frequently contains viruses or other harmful malware.
07. E-mail has become a common way for viruses, scams, and phishing activities to obtain information or compromise your computer.  When reading your e-mails, never click on an embedded link in the message unless you know the destination (you can find this out by hovering your mouse over the link).  This applies to messages from people you know, also, because most web-based e-mail accounts (Yahoo!, Gmail, etc.) can be compromised.
08. Disable Java (not JavaScript) in your internet browser.  Exploits through Java occur frequently, even though Java itself it almost never needed when using the internet.
09. While Internet Explorer is very popular, it lacks a feature included in Mozilla Firefox that makes Firefox a safer browser to use, particularly if you are susceptible to JavaScript threats.  Firefox has a NoScript add-on that blocks all JavaScript programs from sites that you have not approved.
10. Back up important data on your computer to an external drive or storage location (an online “cloud” or flash drive) regularly to prevent total loss in the event your computer is stricken with a virus or other harmful malware.
11. System recovery questions ask for basic information like your mother’s maiden name, the name of your hometown, or your pet’s name.  This information is also likely contained somewhere on your Facebook page.  When providing recovery responses, treat them like passwords and never provide actual information that can be freely found elsewhere on the internet.
12. Never open or run executable files directly from the internet.  Download them to your computer’s hard drive or an external storage device and perform a virus scan first.
13. Establish more than one e-mail address for multiple purposes.  For example, you could have one e-mail address known only to close friends and family members, another for online banking and financial transactions, and another for online gaming purposes.  This reduces the amount of potential spam, malware threats, and phishing risks you are exposed to.
14. If you have a supplemental firewall program such as Comodo or ZoneAlarm that asks for permission when an unknown program is attempting to download a file, connect to your computer, or execute a program, never allow the action unless you know what the program or file is first and are sure it is from a trusted source.
15. When using social media such as Facebook, be cautious about what personal information you share.  What you post on the internet is visible to everyone and can be used in a harmful or damaging way.  Another Facebook tip is to avoid accepting friend requests from people you don’t know personally.  While it may be “cool” to have 10,000 friends, how many of them are you positive you can trust with your personal information?
Protecting your sensitive or confidential information and keeping your computer or internet-enabled mobile device safe from unwanted intrusions is essential in our internet-driven society.  Follow the tips provided here and continue to educate yourself further about ways to stay secure while using the internet, regardless of what your online activities consist of or how you access the online world.  When it comes to internet security, an ounce of prevention truly is worth a pound of cure.








Privacy policy of facebook and twitter
Facebook Data Policy
Date of Last Revision: September 29, 2016
We give you the power to share as part of our mission to make the world more open and connected. This policy describes what information we collect and how it is used and shared. You can find additional tools and information at Privacy Basics.
As you review our policy, keep in mind that it applies to all Facebook brands, products and services that do not have a separate privacy policy or that link to this policy, which we call the “Facebook Services” or “Services.”
I. What kinds of information do we collect?
Depending on which Services you use, we collect different kinds of information from or about you.
§  Things you do and information you provide. We collect the content and other information you provide when you use our Services, including when you sign up for an account, create or share, and message or communicate with others. This can include information in or about the content you provide, such as the location of a photo or the date a file was created. We also collect information about how you use our Services, such as the types of content you view or engage with or the frequency and duration of your activities.
§  Things others do and information they provide. We also collect content and information that other people provide when they use our Services, including information about you, such as when they share a photo of you, send a message to you, or upload, sync or import your contact information.
§  Your networks and connections. We collect information about the people and groups you are connected to and how you interact with them, such as the people you communicate with the most or the groups you like to share with. We also collect contact information you provide if you upload, sync or import this information (such as an address book) from a device.
§  Information about payments. If you use our Services for purchases or financial transactions (like when you buy something on Facebook, make a purchase in a game, or make a donation), we collect information about the purchase or transaction. This includes your payment information, such as your credit or debit card number and other card information, and other account and authentication information, as well as billing, shipping and contact details.
§  Device information. We collect information from or about the computers, phones, or other devices where you install or access our Services, depending on the permissions you’ve granted. We may associate the information we collect from your different devices, which helps us provide consistent Services across your devices. Here are some examples of the information we collect:
§  Attributes such as the operating system, hardware version, device settings, file and software names and types, battery and signal strength, and device identifiers.
§  Device locations, including specific geographic locations, such as through GPS, Bluetooth, or WiFi signals.
§  Connection information such as the name of your mobile operator or ISP, browser type, language and time zone, mobile phone number and IP address.
§  Information from websites and apps that use our Services. We collect information when you visit or use third-party websites and apps that use our Services (like when they offer our Like button or Facebook Log In or use our measurement and advertising services). This includes information about the websites and apps you visit, your use of our Services on those websites and apps, as well as information the developer or publisher of the app or website provides to you or us.
§  Information from third-party partners. We receive information about you and your activities on and off Facebook from third-party partners, such as information from a partner when we jointly offer services or from an advertiser about your experiences or interactions with them.
§  Facebook companies. We receive information about you from companies that are owned or operated by Facebook, in accordance with their terms and policies. Learn more about these companies and their privacy policies.
II. How do we use this information?
We are passionate about creating engaging and customized experiences for people. We use all of the information we have to help us provide and support our Services. Here’s how:
§  Provide, improve and develop Services. We are able to deliver our Services, personalize content, and make suggestions for you by using this information to understand how you use and interact with our Services and the people or things you’re connected to and interested in on and off our Services.
We also use information we have to provide shortcuts and suggestions to you. For example, we are able to suggest that your friend tag you in a picture by comparing your friend's pictures to information we've put together from your profile pictures and the other photos in which you've been tagged. If this feature is enabled for you, you can control whether we suggest that another user tag you in a photo using the “Timeline and Tagging” settings.
When we have location information, we use it to tailor our Services for you and others, like helping you to check-in and find local events or offers in your area or tell your friends that you are nearby.
We conduct surveys and research, test features in development, and analyze the information we have to evaluate and improve products and services, develop new products or features, and conduct audits and troubleshooting activities.
§  Communicate with you. We use your information to send you marketing communications, communicate with you about our Services and let you know about our policies and terms. We also use your information to respond to you when you contact us.
§  Show and measure ads and services. We use the information we have to improve our advertising and measurement systems so we can show you relevant ads on and off our Services and measure the effectiveness and reach of ads and services. Learn more about advertising on our Services and how you can control how information about you is used to personalize the ads you see.
§  Promote safety and security. We use the information we have to help verify accounts and activity, and to promote safety and security on and off of our Services, such as by investigating suspicious activity or violations of our terms or policies. We work hard to protect your account using teams of engineers, automated systems, and advanced technology such as encryption and machine learning. We also offer easy-to-use security tools that add an extra layer of security to your account. For more information about promoting safety on Facebook, visit the Facebook Security Help Center.
We use cookies and similar technologies to provide and support our Services and each of the uses outlined and described in this section of our policy. Read our Cookie Policy to learn more.
III. How is this information shared?
Sharing On Our Services
People use our Services to connect and share with others. We make this possible by sharing your information in the following ways:
§  People you share and communicate with.
When you share and communicate using our Services, you choose the audience who can see what you share. For example, when you post on Facebook, you select the audience for the post, such as a customized group of individuals, all of your Friends, or members of a Group. Likewise, when you use Messenger, you also choose the people you send photos to or message.
Public information is any information you share with a public audience, as well as information in your Public Profile, or content you share on a Facebook Page or another public forum. Public information is available to anyone on or off our Services and can be seen or accessed through online search engines, APIs, and offline media, such as on TV.
In some cases, people you share and communicate with may download or re-share this content with others on and off our Services. When you comment on another person’s post or like their content on Facebook, that person decides the audience who can see your comment or like. If their audience is public, your comment will also be public.
§  People that see content others share about you. Other people may use our Services to share content about you with the audience they choose. For example, people may share a photo of you, mention or tag you at a location in a post, or share information about you that you shared with them. If you have concerns with someone’s post, social reporting is a way for people to quickly and easily ask for help from someone they trust. Learn More.
§  Apps, websites and third-party integrations on or using our Services. When you use third-party apps, websites or other services that use, or are integrated with, our Services, they may receive information about what you post or share. For example, when you play a game with your Facebook friends or use the Facebook Comment or Share button on a website, the game developer or website may get information about your activities in the game or receive a comment or link that you share from their website on Facebook. In addition, when you download or use such third-party services, they can access your Public Profile, which includes your username or user ID, your age range and country/language, your list of friends, as well as any information that you share with them. Information collected by these apps, websites or integrated services is subject to their own terms and policies.
Learn more about how you can control the information about you that you or others share with these apps and websites.
§  Sharing within Facebook companies. We share information we have about you within the family of companies that are part of Facebook. Learn more about our companies.
§  New owner. If the ownership or control of all or part of our Services or their assets changes, we may transfer your information to the new owner.
Sharing With Third-Party Partners and Customers
We work with third party companies who help us provide and improve our Services or who use advertising or related products, which makes it possible to operate our companies and provide free services to people around the world.
Here are the types of third parties we can share information with about you:
§  Advertising, Measurement and Analytics Services (Non-Personally Identifiable Information Only). We want our advertising to be as relevant and interesting as the other information you find on our Services. With this in mind, we use all of the information we have about you to show you relevant ads. We do not share information that personally identifies you (personally identifiable information is information like name or email address that can by itself be used to contact you or identifies who you are) with advertising, measurement or analytics partners unless you give us permission. We may provide these partners with information about the reach and effectiveness of their advertising without providing information that personally identifies you, or if we have aggregated the information so that it does not personally identify you. For example, we may tell an advertiser how its ads performed, or how many people viewed their ads or installed an app after seeing an ad, or provide non-personally identifying demographic information (such as 25 year old female, in Madrid, who likes software engineering) to these partners to help them understand their audience or customers, but only after the advertiser has agreed to abide by our advertiser guidelines.
Please review your advertising preferences to understand why you’re seeing a particular ad on Facebook. You can adjust your ad preferences if you want to control and manage your ad experience on Facebook.
§  Vendors, service providers and other partners. We transfer information to vendors, service providers, and other partners who globally support our business, such as providing technical infrastructure services, analyzing how our Services are used, measuring the effectiveness of ads and services, providing customer service, facilitating payments, or conducting academic research and surveys. These partners must adhere to strict confidentiality obligations in a way that is consistent with this Data Policy and the agreements we enter into with them.
IV. How can I manage or delete information about me?
You can manage the content and information you share when you use Facebook through the Activity Log tool. You can also download information associated with your Facebook account through our Download Your Information tool.
We store data for as long as it is necessary to provide products and services to you and others, including those described above. Information associated with your account will be kept until your account is deleted, unless we no longer need the data to provide products and services.
You can delete your account any time. When you delete your account, we delete things you have posted, such as your photos and status updates. If you do not want to delete your account, but want to temporarily stop using Facebook, you may deactivate your account instead. To learn more about deactivating or deleting your account, click here. Keep in mind that information that others have shared about you is not part of your account and will not be deleted when you delete your account.
V. How do we respond to legal requests or prevent harm?
We may access, preserve and share your information in response to a legal request (like a search warrant, court order or subpoena) if we have a good faith belief that the law requires us to do so. This may include responding to legal requests from jurisdictions outside of the United States where we have a good faith belief that the response is required by law in that jurisdiction, affects users in that jurisdiction, and is consistent with internationally recognized standards. We may also access, preserve and share information when we have a good faith belief it is necessary to: detect, prevent and address fraud and other illegal activity; to protect ourselves, you and others, including as part of investigations; or to prevent death or imminent bodily harm. For example, we may provide information to third-party partners about the reliability of your account to prevent fraud and abuse on and off of our Services. Information we receive about you, including financial transaction data related to purchases made with Facebook, may be accessed, processed and retained for an extended period of time when it is the subject of a legal request or obligation, governmental investigation, or investigations concerning possible violations of our terms or policies, or otherwise to prevent harm. We also may retain information from accounts disabled for violations of our terms for at least a year to prevent repeat abuse or other violations of our terms.
VI. How our global services operate
Facebook may share information internally within our family of companies or with third parties for purposes described in this policy. Information collected within the European Economic Area (“EEA”) may, for example, be transferred to countries outside of the EEA for the purposes as described in this policy. We utilize standard contract clauses approved by the European Commission, adopt other means under European Union law, and obtain your consent to legitimize data transfers from the EEA to the United States and other countries.
You can contact us using the information provided below with questions or concerns. We also may resolve disputes you have with us in connection with our privacy policies and practices through TRUSTe. You can contact TRUSTe through their website.
VII. How will we notify you of changes to this policy?
We’ll notify you before we make changes to this policy and give you the opportunity to review and comment on the revised policy before continuing to use our Services.
VIII. How to contact Facebook with questions
To learn more about how privacy works on Facebook, please check out Privacy Basics.
Resource:
https://www.facebook.com/full_data_use_policy
Twitter Data Policy
Our Services instantly connect people everywhere to what’s most meaningful to them. For example, any registered user of Twitter can send a Tweet, which is public by default, and can include a message of 140 characters or less and content like photos, videos, and links to other websites.
What you share on Twitter may be viewed all around the world instantly. You are what you Tweet!
This Privacy Policy describes how and when we collect, use and share your information across our websites, SMS, APIs, email notifications, applications, buttons, widgets, ads, commerce services, and our other covered services that link to this Policy (collectively, the “Services”), and from our partners and other third parties. For example, you send us information when you use our Services on the web, via SMS, or from an application such as Twitter for Mac, Twitter for Android or TweetDeck. When using any of our Services you consent to the collection, transfer, storage, disclosure, and use of your information as described in this Privacy Policy. This includes any information you choose to provide that is deemed sensitive under applicable law.
When this policy mentions “we” or “us,” it refers to the controller of your information under this policy. If you live in the United States, your information is controlled by Twitter, Inc., 1355 Market Street, Suite 900, San Francisco, CA 94103 U.S.A. If you live outside the United States, the data controller responsible for your information is Twitter International Company, an Irish company with its registered office at The Academy, 42 Pearse Street, Dublin 2, Ireland. Despite this, you alone control and are responsible for the posting of your Tweets and other content you submit through the Services, as provided in the Terms of Service and Twitter Rules.
Irrespective of which country you live in, you authorize us to transfer, store, and use your information in the United States, Ireland, and any other country where we operate. In some of these countries, the privacy and data protection laws and rules regarding when government authorities may access data may vary from those in the country where you live.
If you have any questions or comments about this Privacy Policy, please submit a request through our form, available at https://support.twitter.com/forms/privacy.
I
Effective: September 30, 2016

Thoughts or questions about this Privacy Policy? Please, let us know by contacting us here or writing to us at the appropriate address below.
For accounts based in the United States:
Twitter, Inc.
Attn: Privacy Policy Inquiry
1355 Market Street, Suite 900
San Francisco, CA 94103
For accounts outside the United States:
Twitter International Company
Attn: Privacy Policy Inquiry
The Academy, 42 Pearse Street
Dublin 2, Ireland

Resource: https://twitter.com/privacy?lang=en