1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
15

A _____ is an audio output device that converts text to speech.

Computers and Technology
1 answer:
lukranit [14]3 years ago
5 0
The answer is voice synthesizer
You might be interested in
Drag the system component on the left to the device or program that fits with the system component.
Strike441 [17]

Answer:

A. Back up software - Utility software

B. Printer - Device drivers

C. Camera - Firmware

D. Television - Firmware

E. Games console - Firmware

F. Antivirus software - Utility software

G. Disk Cleaner - Utility software

H. Video Card - Device drivers

Explanation:

Computer system components are the physical or hardware and software parts of the device. It is a combination of system software like utility software, device drivers and firmware, application software, and the hardware components and kernel.

4 0
3 years ago
Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
Anna007 [38]

#include <iostream>  

#include <iomanip>  

using namespace std;  

class temporary  

{  

public:  

void set(string, double, double);  

void print();  

double manipulate ();  

void get (string&, double&, double&);  

void setDescription(string);  

void setFirst(double);  

void setSecond(double);  

string getDescription() const;  

double getFirst () const;  

double getSecond () const;  

temporary(string = "", double = 0.0, double = 0.0);  

private:  

string description;  

double first;  

double second;  

};  

void temporary::set(string a, double dblA, double dblB)  

{  

description = a;  

first = dblA;  

second = dblB;  

}  

void temporary::print()  

{  

cout << "\nDescription: " << left << setw(20) << description << endl <<  

" first: " << fixed << setw(10) << setprecision(2) << first << endl <<  

" second: " << fixed << setw(10) << setprecision(2) << second << endl;  

}  

double temporary::manipulate()  

{  

return first / 3.0 + second / 4.0;  

}  

void temporary::get(string& strDesc, double& dblFirst, double& dblSecond)  

{  

strDesc = description;  

dblFirst = first;  

dblSecond = second;  

}  

temporary::temporary(string d, double a, double b) : description(d), first(a), second(b) {}  

void temporary::setFirst(double dblFirst){first = dblFirst;}  

void temporary::setSecond(double dblSecond){second = dblSecond;}  

void temporary::setDescription(string desc){description = desc;}  

string temporary::getDescription() const {return description;}  

double temporary::getFirst () const{return first;}  

double temporary::getSecond () const {return second;}  

int main()  

{  

cout << "temporary a;";  

temporary a;  

a.print();  

cout << "a.setFirst(3.0): ";  

a.setFirst(3.0);  

a.print();  

cout << "a.setSecond(4.5): ";  

a.setSecond(4.5);  

a.print();  

cout << "a.setDescription(\"Picture Frame\") ";  

a.setDescription("Picture Frame");  

a.print();  

cout << "a.print(): ";  

a.print();  

return 0;  

}

6 0
4 years ago
Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
-BARSIC- [3]

Answer:

Option B i.e., False.

Explanation:

The weakness, KRACK tricks a wifi access points to reuse an in-use encryption, enabling the intruder to decode and interpret data intended to remain encrypted. Wireless communication encrypts, that decrypt unencrypted wireless network activity and expose sensitive data.

So, the following scenario is false about the wireless attack.

6 0
3 years ago
Administrator access initiative brings together people from industry, disability organizations, government, and research labs fr
Mars2501 [29]

Answer:

False.

Explanation:

Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

It is one of the features of the World Wide Web Consortium (W3C) develiped in 1997 and is aimed at developing standards and support materials to assist in understanding and implementing accessibility for users with disabilities.

6 0
3 years ago
The _____ button allows you to choose whether you want to copy the values from the source area to the destination area with form
Gnoma [55]
<span>The copy button allows you to choose whether you want to copy the values from the source area to the destination area with formatting. </span>
6 0
4 years ago
Other questions:
  • Which of the following tasks requires software? A Writing a paper on the history of Aztec sun godsB Creating a photo collage for
    9·1 answer
  • Jordan has been asked to help his company find a way to allow all the workers to log on to computers securely but without using
    6·1 answer
  • A web application starts when a client sends _______ to a server?
    13·1 answer
  • What process does a system use to officially permit access to a file or a program CIS 502 ?
    11·1 answer
  • Mention<br>any<br>5<br>indicators of<br>happiness​
    11·2 answers
  • If you are parked on an incline with a manual transmission vehicle and your vehicle is facing downhill, you should put your vehi
    12·1 answer
  • Text and graphics that have been out of copied are stored in area called the _____
    15·2 answers
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • Why can't I log in to king.com?
    12·2 answers
  • If given program is executed, what will be output?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!