1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
2 years ago
5

akira has a mobility impairment that makes it difficult to type on a keyboard. what technology can she use to create written doc

uments without using a keyboard?
Computers and Technology
1 answer:
tatiyna2 years ago
4 0
Answer:

speech recognition software
You might be interested in
Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
forsale [732]

Answer is given below :

Explanation:

Minimize attack surface area:

  • This area is often open to attackers due to the addition of features. For example, an unwanted text box in a web application can lead to SQL attacks. This can lead to data loss of information and privacy.

Least privilege:

  • Make sure the business process requires at least some money from users such as CPU usage, memory, file systems. The higher the resource consumption the higher the risk.

Fail secured:

  • However, there are many ways an app can fail with its process. The exception always comes with the handler‌ to handle failed cases.

Security been as simple as much:

  • Always create a simple way to maintain security. Come up with a simple code, it will go faster and faster.  Otherwise it will take unnecessary confusion and time.
5 0
3 years ago
Assume that Publication is the root class of an inheritance tree. You want to form a linked list of different publications in th
Westkost [7]

The best way to create a linked list using PublListNode and Publication classes is the use of the PublListNode class contains the Publication class.

<h3>What is a root class?</h3>

A root class is known to be inherited and it is one that defines an interface and behavior that are specific to all objects in any given hierarchy.

Note that The best way to create a linked list using PublListNode and Publication classes is the use of the PublListNode class contains the Publication class.

See options below

A.

The PublListNode class contains the Publication class.

B.

The Publication class is derived from the PublListNode class.

C.

The PublListNode class is derived from the Publication class.

D.

The Publication class contains the PublListNode class.

Learn more about root class from

brainly.com/question/14551375

#SPJ1

5 0
2 years ago
A student has five college classes and has to complete reports or projects for each class. The student is in his sophomore year
Dimas [21]
D looks like the best way to organize your files
7 0
4 years ago
Read 2 more answers
Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
Ede4ka [16]

Answer:

which is free graphic software or use

Explanation:

3 0
3 years ago
Can somebody please help me with these few questions?
Sophie [7]

Answer:

Felicia is using an ethernet cord which is making the wifi go extreme slow plus she still has the wifi on , on the computer while ethernet is in

Explanation:

Felicia is using an ethernet cord which is making the wifi go extreme slow plus she still has the wifi on , on the computer while ethernet is in

4 0
2 years ago
Other questions:
  • "Server Manager will allow you to manage all roles and features installed on any server, and view the status of all your servers
    7·1 answer
  • Amanda, a project manager, conducted a team meeting consisting of testing and development team. She insisted on clear communicat
    11·1 answer
  • Which of these computers was marketed as a computer/game machine?
    15·2 answers
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • 1 megabyte is equal to 1024 gigabyte. True/False​
    11·2 answers
  • i got a set of headphones and when i plug them into my speakers the right side only works how do i fix the left side of them
    12·1 answer
  • A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
    9·1 answer
  • What is a project?
    5·2 answers
  • What is the meaning of FTTH
    9·2 answers
  • Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!