Answer:
Come up with a controversial topic, one that make your listeners think
Research the topic thoroughly that you have chosen
Understand the perspective of your audience. Keep your goal in mind. You are trying to persuade the audience to do or believe something .
Answer:
#include <iostream>
#include<string.h>
using namespace std;
void printCharacter(string name){
for(int i=0;name[i]!='\0';i++){
cout<<name[i]<<endl;
}
}
int main()
{
string name;
cout<<"enter the name: ";
cin>>name;
printCharacter(name);
}
Explanation:
first include the two libraries iostream for input/output and string library for using the string.
then, create the main function and declare the variable type string.
cout instruction is used o display the message on the screen.
cin is used to store the value in the name variable.
after that, call the function. The program control move to the the function. In the function for loop is used to print the character one by one until end of the name.
Answer:
C) speech recognition software.
Explanation:
Software that translates the sound of human voice into text is called a speech recognition software.
In Computer science, a speech recognition software is a voice technology application or program which enables the conversion of human voice such as spoken language to computer commands such as text through the use of speech recognition algorithms.
Some examples of speech recognition software are HTK, Kaldi, Voice navigator, Julius etc.
Arturo is attempting to protect the database (data) of an information system (IS).
<h3>What is an information system?</h3>
An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.
In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:
Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.
This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.
In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).
Read more on data here: brainly.com/question/25885448