When your computer is configured to recognize ________ commands even handicapped people may use it.
a. written
b. typed
c. voice
d. mouse
Ans: c. voice
You might also like to view...
Match the following commands to the corresponding descriptions.
_____ 1. cp wc yyy _____ 2. cat cw >> xxx _____ 3. cat < xxx _____ 4. wc cw wc >> xxx _____ 5. cp i wc yyy _____ 6. ls *[a d] _____ 7. rm * _____ 8. ls .* _____ 9. ls [Aa]* _____ 10. mv xxx yyy a: deletes all the files in the current directory b: lists only the invisible files c: copies wc to yyy and asks for confirmation if yyy exists d: displays a file called xxx e: displays all the filenames that end with the letter a, b, c, or d f: copies wc to yyy g: displays all the filenames that begin with a or A h: copies wc to xxx i: counts the words and characters in wc and saves them in xxx j: renames the file named xxx to yyy
Describe some of the common protocols used to secure e-mail.
What will be an ideal response?
Slicer captions can be used to provide instructions to users
Indicate whether the statement is true or false
A library is a box that presents information or requires a response from the user
Indicate whether the statement is true or false