1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
3 years ago
5

Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them

for printing. Which technology enables a computer to convert the written text to audio?
Computers and Technology
1 answer:
sasho [114]3 years ago
3 0

Answer:

Speech synthesis or text-to-speech (TTS) program

Explanation:

A speech synthesis program is a program can convert a written text to audio. The program can recognize the text and present it in audio format with a human voice. Speech synthesis program can be found in Microsoft Word. We can go Review tab and find the "Read Aloud" option. We can selectively highlight the text in Word and click "Read Aloud". This will trigger the text-to-speech conversion process and produce the audio output of the highlighted text in human voice.

You might be interested in
Emily wants to search online for cakes containing nuts. However, she wants to skip cakes that have raisins in them. Which option
Mandarinka [93]

Answer:

I believe the answer is C

Explanation:

6 0
3 years ago
Define reverse engineering in hacker context
bogdanovich [222]
Taking the product and taking it apart to insert a malicious process into it, then implement it into the world.

Hope this helps.
3 0
3 years ago
ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup
maxonik [38]

The command interface protocol that I would suggest to the IT administrator is Secure Shell (SSH).

<h3>What is a command interface protocol?</h3>

A command interface protocol can be defined as a standard protocol that is designed and developed to processes commands in the form of lines of text to a software program that is installed on a computer system.

<h3>The types of command interface protocol.</h3>

In Computer technology, there are different types of command interface protocol and these include:

  • SSL
  • TLS
  • SSH

SSH is an acronym for Secure Shell and it is a standard network protocol that gives a IT administrator a secure way to access data over an unsecured network, especially when backing up data.

Read more on SSH here: brainly.com/question/17147683

7 0
2 years ago
Next, Sue decides to embed a chart from Microsoft Word. She copies and pastes data from a table that she has already created in
antoniya [11.8K]

Answer:

Its D

Explanation:

On Edg

8 0
3 years ago
The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
Musya8 [376]

Answer:

A. set_union

Explanation:

The algorithm set_union is used to find the elements in one range of elements that do not appear in another range of elements.

4 0
3 years ago
Other questions:
  • What two different types of encryption can be used by ipsec during data transfer?​?
    5·1 answer
  • Call 334-399-4201 to annoyed my mom
    13·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap
    15·2 answers
  • Write a program that prompts the user to enter a Social Security number in the format ddd-dd-dddd, where d is a digit. The progr
    12·1 answer
  • Your one output statement should occupy two lines in your program
    13·1 answer
  • What are the advantages of using ICT jn our society?​
    8·2 answers
  • What is computer science ​
    5·1 answer
  • Nd the errors in the following sentences. Underline with a red colour for
    9·1 answer
  • At which layer of the osi model would a logical address be added during encapsulation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!