1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
5

What does anyone who chooses to use speech recognition software need to do?

Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
4 0
D I believe. I’m not %100 percent sure.
You might be interested in
In testing you find that one of the tables in your database has multiple versions of one of the columns, and updating the inform
emmainna [20.7K]

Answer:

C. i think

Explanation:

C. is my answer........

5 0
3 years ago
List five applications of personal computers. do these applications depend on 32 bit or 64 bit processor?
Semenov [28]
For the list of application, either check in the book or come up with yourself.
All application not depend on the 32 bit or 64 bit processor. 
8 0
3 years ago
Muffet from undertale drawing
allochka39001 [22]

Answer:

:) thats amazing

Explanation:

7 0
3 years ago
Read 2 more answers
How do you write java
pantera1 [17]
Https://www.google.com/amp/m.wikihow.com/Write-Your-First-Program-in-Java%3Famp%3D1
7 0
3 years ago
Describe the attacks in wireless networks that are more serious com pared to wired network
Julli [10]

Answer:

Both types of attacks can be devastating.

Explanation:

Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Other questions:
  • Designing, producing, exhibiting, performing, writing, and publishing multimedia content including visual and performing arts an
    6·1 answer
  • In a word processing program, under which tab or menu option can you adjust the picture brightness?
    8·2 answers
  • PV = 11,000 AC = 6000 CV = 4,000. What is SV? What does this calculation tell you?
    6·1 answer
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
    13·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • A powerboat is about to cross paths with a sailboat under sail. What should the powerboat do
    5·1 answer
  • What does good time management mean​
    8·2 answers
  • What type of information is appropriate for headers and footers? Check all that apply.
    5·2 answers
  • your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!