1. On the File menu, point to New, and then click Distribution List.
2. In the Name box, type a name.
The distribution list is saved in your Contacts folder by the name you give it.
3. Click Select Members.
In the Show names from the list, click the address book that contains the e-mail addresses you want in your distribution list.
4. In the Type name or select from list box, type a name you want to include. In the list
below, select the name, and then click Add.
To add members who are not on the address books, click on Add
New and type in the details and click OK.
The list of members in the distribution list is displayed.
5. Click on Save and Close to exit.
There is another method of creating a distribution list. In this method, you use the New Entry button.
6. Then select the entry type box, click Private Address Book
Distribution List and then click OK.
7. In the Distribution List Name box, type a name for the group and click OK.
The limitation with this method is that you have to involve the administrator when adding names to the group.
8. Once this is done, the contact is copied to the Private Address Book
Distribution List box.
Repeat this process until you have all the names you want in your group in the Personal Distribution List.
9. Click OK.
Kavungya answered the question on May 17, 2019 at 10:21
- Write the procedure of Sending a Message using the Address Book or Distribution List(Solved)
Write the procedure of Sending a Message using the Address Book or Distribution List
Date posted: May 17, 2019. Answers (1)
- Give the procedure on how Search Engines find Web Pages.(Solved)
Give the procedure on how Search Engines find Web Pages.
Date posted: May 17, 2019. Answers (1)
- Give the procedure of locating information within a website.(Solved)
Give the procedure of locating information within a website.
Date posted: May 17, 2019. Answers (1)
- Outline the steps of Attaching files to email messages.(Solved)
Outline the steps of Attaching files to email messages.
Date posted: May 17, 2019. Answers (1)
- Describe Logs and Audit trails.(Solved)
Describe Logs and Audit trails.
Date posted: May 17, 2019. Answers (1)
- Describe Mirror Back-ups.(Solved)
Describe Mirror Back-ups.
Date posted: May 17, 2019. Answers (1)
- Describe Online Backup.(Solved)
Describe Online Backup.
Date posted: May 17, 2019. Answers (1)
- Define Remote Backup.(Solved)
Define Remote Backup.
Date posted: May 17, 2019. Answers (1)
- Define Offsite Backup.(Solved)
Define Offsite Backup.
Date posted: May 17, 2019. Answers (1)
- Define Full Backup.(Solved)
Define Full Backup.
Date posted: May 17, 2019. Answers (1)
- Define Incremental Backup.(Solved)
Define Incremental Backup.
Date posted: May 17, 2019. Answers (1)
- What is Differential Backup?(Solved)
What is Differential Backup?
Date posted: May 17, 2019. Answers (1)
- Define Local backup.(Solved)
Define Local backup.
Date posted: May 17, 2019. Answers (1)
- Describe the Protection of computers from Power Interruptions.(Solved)
Describe the Protection of computers from Power Interruptions.
Date posted: May 17, 2019. Answers (1)
- What is Biometric authentication?(Solved)
What is Biometric authentication?
Date posted: May 17, 2019. Answers (1)
- Define Token authentication?(Solved)
Define Token authentication?
Date posted: May 17, 2019. Answers (1)
- What is Password authentication?(Solved)
What is Password authentication?
Date posted: May 17, 2019. Answers (1)
- Define Dumpster Diving.(Solved)
Define Dumpster Diving.
Date posted: May 17, 2019. Answers (1)
- What is Wiretapping?(Solved)
What is Wiretapping?
Date posted: May 17, 2019. Answers (1)
- What is Eavesdropping on Emanations?(Solved)
What is Eavesdropping on Emanations?
Date posted: May 17, 2019. Answers (1)