When your computer is configured to recognize ________ commands even handicapped people may use it.
a. written
b. typed
c. voice
d. mouse
Ans: c. voice
Computer Science & Information Technology
You might also like to view...
What security principles are violated in the Greek cell phone interception example?
What will be an ideal response?
Computer Science & Information Technology
After accepting a request packet on port 80, the firewall automatically allows the reply packet to pass. Which of the following terms BEST describes this firewall behavior?
A. Stateful inspection B. Intrusion detection C. Content filtering D. Passive fingerprinting
Computer Science & Information Technology