1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
3 years ago
15

Advancements in technology that might be helpful for individuals who need accommodations to perform computer tasks include _____

.
A)voice-recognition software
B)laptops
C)touch screens
D)both a and c
Computers and Technology
2 answers:
Leviafan [203]3 years ago
7 0
<span> The answer would be D)both a and c  </span>
MrRissso [65]3 years ago
3 0
Hi!

I'm quite sure this is going to be A and C. People who are unable to properly sit at a desk, or hold a computer can be assisted with a touch screen. 

Voice-recognition software is important for people who may have trouble actually typing and spelling out words on their own. With the power of just their voice, they could operate a computer! =)
You might be interested in
"If possible, always bring print-outs of your slides for your audience
taurus [48]
Why do I need a ty for me a couple days to
4 0
3 years ago
Read 2 more answers
Crystal inc. is a multifaceted company that deals with the mining, cutting, and selling of diamonds. It gives distributors and s
Ostrovityanka [42]

Answer:C)Extranet

Explanation: Extranet is the network on private basis for sharing of the organizational information with the vendors, employees, customers,suppliers etc. It uses the internet service for the distribution of the data outside of the company in extended form.Electronic data interchange is used for exchanging of large amount of information.

Other options are incorrect because intranet is the internet service which works within enterprise, chaosnet is protocol for transmission of data in full duplex form and ethernet is the communication with the help of protocol in traditional manner.

5 0
4 years ago
Read one positive integer n. Then create an n X n two-dimensional array and write the code that stores integers from 1 to n2 as
marysya [2.9K]

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

    int n;

    Scanner input = new Scanner(System.in);

 System.out.print("Size of array: ");

 n = input.nextInt();

 int count = 1;

 int[][] arr = new int[n][n];

 for(int i = 0; i<n;i++){

     for(int j = 0; j<n;j++){

         arr[i][j] = count;

         count++;      }  }

 for(int i = 0; i<n;i++){

     for(int j = 0; j<n; j++){

         System.out.printf(arr[i][j]+" ");      }

     System.out.println();  } }}

Explanation:

This declares the size of the array

    int n;

    Scanner input = new Scanner(System.in);

This prompts the user for size of array

 System.out.print("Size of array: ");

This gets input for size of array

 n = input.nextInt();

This initializes the array element to 1

 int count = 1;

This creates a 2d array

 int[][] arr = new int[n][n];

This iterates through the rows

 for(int i = 0; i<n;i++){

This iterates through the columns

     for(int j = 0; j<n;j++){

This populates the array

         arr[i][j] = count;

         count++;      }  }

The following nested loop prints the array elements

 for(int i = 0; i<n;i++){

     for(int j = 0; j<n; j++){

         System.out.printf(arr[i][j]+" ");      }

     System.out.println();  } }}

8 0
3 years ago
7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
Stells [14]

Answer:

The concealment cipher.

Explanation:

A concealment cipher also known as null cipher can be defined as an obsolete encryption format that typically involves the mixture of plaintext with non-cipher elements. This ultimately implies that, the plaintext is hidden in another message through encryption.

The concealment cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem.

Basically, the concealment cipher is solely dependent on the clues of the physical factors that mainly affects the sender and receiver in a communication system.

7 0
3 years ago
Crystal used PowerPoint in a presentation to her bosses. She found some errors in the arrangement of her action buttons. She wan
vagabundo [1.1K]
What are the answers? Crystal most likely.....Guess: changed or edited the slide..?
6 0
4 years ago
Other questions:
  • When a structure satisfies all the properties of a relation except for the first item—in other words, some entries contain repea
    7·1 answer
  • What is basic statement made up of​
    10·2 answers
  • Why has the PCM sampling time beenset at 125 microseconds?
    11·1 answer
  • What is a software? 2 sentences please, I'll mark u as brailiest
    12·1 answer
  • Modern Computers compared to earlier computers are
    10·1 answer
  • Why people shouldnt get married​
    6·1 answer
  • Please please help I don’t understand this please.
    11·1 answer
  • You choose Option A for Overdraft Options. What would happen if you had $30 in your checking account and you tried to take out $
    12·1 answer
  • _____ use patterns to find solutions instead of using the if-then-else rules that expert systems use.
    13·1 answer
  • Help me with this someone hurry due in 8 mins
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!