1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
3 years ago
14

How do you train a computer to recognize your voice?

Computers and Technology
2 answers:
ANTONII [103]3 years ago
7 0
The answer A, your welcome
Nikitich [7]3 years ago
4 0
B is the answer, it’s not a animal. Talking to it in general is not going to get it to recognize your voice
You might be interested in
When entering data into a cell, which keyboard key is used to remove characters to the left of the insertion point?
deff fn [24]
The backspace key is used for that
3 0
3 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
Mrs. Ferrar is an older woman with a limited income. Which programs and services may assist her with obtaining healthy meals and
Kitty [74]

The programs and services that may assist her with obtaining healthy meals and becoming more physically active are:

1. food stamps or SNAP

2. food banks

5. community parks

6. community gardens

<h3>What are food stamps?</h3>

A food stamps is known to be a kind of voucher that is often issued very cheap by the state for low income and it is often exchangeable for food.

Note that The programs and services that may assist her with obtaining healthy meals and becoming more physically active are:

1. food stamps or SNAP

2. food banks

5. community parks

6. community gardens

See options below

food stamps or SNAP

food banks

WIC

NSLP

community parks

community gardens

Learn more about food stamps from

brainly.com/question/1085704

#SPJ12

5 0
2 years ago
30 points Fill in the blanks,<br> Plz leave a explanation
Butoxors [25]

not all the question are showing type it out

7 0
3 years ago
Read 2 more answers
What are the Technical Skills do Penetration Testers need to have?
Alla [95]

1. Tester should understand the vulnerability of the system because by this skill it should be able to secure the system for the parts where the attacks can be done.

2. Understand the web technologies and communication techniques of them because the two way communication understanding is one of the most important skill a tester should have so that he/she should have a proper image of what the system doing and how it is doing it.

3. Ability yo code scripts and most importantly understand them because while testing there are many script code to be read and understand for any bug or error the system is facing.

5 0
3 years ago
Other questions:
  • What is the defining difference between computer security and information security?
    13·1 answer
  • What is media consumption ?
    12·2 answers
  • Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
    9·1 answer
  • What is labor and how does it relate to automobile!!!! NEED HELP PLEASEE
    13·1 answer
  • What is the purpose of each of the components (each shown with a leader and line) of the circuit shown in the diagram?
    15·1 answer
  • When can screen tips be useful
    10·2 answers
  • Hydraulic pressure is the same throughout the inside of a set of brake lines. What determines the amount of resulting mechanical
    7·1 answer
  • Please help me ASAP!
    14·2 answers
  • Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
    9·1 answer
  • Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!