When your computer is configured to recognize ________ commands even handicapped people may use it.

a. written
b. typed
c. voice
d. mouse

Ans: c. voice

Computer Science & Information Technology

You might also like to view...

What security principles are violated in the Greek cell phone interception example?

What will be an ideal response?

Computer Science & Information Technology

After accepting a request packet on port 80, the firewall automatically allows the reply packet to pass. Which of the following terms BEST describes this firewall behavior?

A. Stateful inspection B. Intrusion detection C. Content filtering D. Passive fingerprinting

Computer Science & Information Technology