1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
11

Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assista

nt recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin
Computers and Technology
1 answer:
DochEvi [55]3 years ago
5 0

Answer:

Speech synthesis

Explanation:

Synthesized speech is the technology of production of the speech of humans artificially. The technology can be made use of in hardware and software products such as a speech computer which is used to perform speech synthesis

Another implementation of the synthesized speech technology is the text-to-speech (TTS) systems that are used for the conversion of speech into written text as the words are dictated.

You might be interested in
Examples of domain names and usernames<br><br><br><br>​
svp [43]

Answer:

examples are:

com or .edu is a top-level domain name (TLD)

cornell.edu is a second-level domain name (SLD)

bigred.cornell.edu is a third-level or three-part domain name

project.bigred.cornell.edu is a fourth-level or four-part domain name

hope this helps you.

4 0
3 years ago
Scenario: The deputy incident commander will be replacing the current incident commander, who needs to attend to a family emerge
Flauer [41]

The current incident commander should: provide a transfer of command briefing to the new commander.

<h3>What is incident management?</h3>

Incident management can be defined as a strategic process through which a business organization (company) identifies, analyzes, and correct hazards and potential threats (problems), so as to ensure that normal service operation is restored as quickly as possible to its end users after a disruption, as well as to prevent a re-occurrence of these hazards in the future.

<h3>What is a command?</h3>

A command can be defined as a set of instruction which sets and provide the incident strategies, priorities, objectives, as well as possessing the overall responsibility for any incident.

In this scenario, we can infer and logically deduce that the current incident commander should provide a transfer of command briefing to the new commander because rank, grade, and seniority aren’t factors that are used to select an incident commander.

Read more on incident management here: brainly.com/question/11595883

#SPJ4

5 0
2 years ago
What is the best way to move up and down on a computer screen
Misha Larkins [42]

Answer: 1. Using your mouse or laptop trackpad, move your cursor to the scroll bar.

2. Then click and hold your mouse; you can now move the scroll bar up and down.

3. Release the mouse button once you reach the place on your screen you would like to go.

4 0
3 years ago
What are three requirements of information technology a. Accuracyb. _______________________________c. __________________________
Monica [59]

Answer:

1b. Accessibility  1c. Efficiency  1d. Relevance

2. $10 billion

3. False

4. All of them

5. Drone Delivery

Explanation:

1. Information technology is the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information and it must be accurate, accessible, efficient and relevant.

2. Every year about $10 billion is spent on SCM (supply chain management software).

3. supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end user while software are just virtual tools use in the day to day activities.

4. Every activity mention is creating a new demand for the radio-frequency identification technology.

5. Drone delivery

7 0
3 years ago
Hi!
baherus [9]

Answer:

Radius = 14 cm = 0.00014 km

Circumference = 2πr = 2 × 22/7 × 14/100000 = 0.00088 km

As it went thousand times , distance covered = 0.00088 × 1000 = 0.88 km

8 0
3 years ago
Other questions:
  • __________ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
    15·1 answer
  • ____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various
    5·1 answer
  • Identify characteristics of top-down programming design. Choose all that apply.
    13·1 answer
  • What is Boolean algebra
    14·2 answers
  • Consider the classes below: public class TestA { public static void main(String[] args) { int x = 2; int y = 20 int counter = 0;
    8·1 answer
  • Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
    9·1 answer
  • What is the syntax of an of if statement
    13·1 answer
  • The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemical
    6·2 answers
  • Top-down programming divides a very large or complex programming task into smaller, more manageable chunks.
    8·1 answer
  • Vẽ sơ đồ lắp đặt gồm 2 cầu chì, 1 ổ điện, 2 cực điều khiển 2 đèn mắc song song
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!