Tatiana has a hearing difference and has received a video from her friend through email. To understand what is said in the video, Tatiana can use:

A) a large print keyboard
B) a trackball
C) closed captioning
D) text to speech


PLEASE HURRY RUNNING OUT OF TIME!!

Answers

Answer 1
C) Closed Captioning

It can’t be A because that does not affect her hearing.

It can’t be B because it is unrelated to the prompt.

It can’t be D because there is not text!

Hope this helps ;)

Related Questions

What is the FaFASA4caster used for

Answers

Answer:

The FAFSA4caster is a free financial aid tool from the federal government that allows you to practice filling out the Free Application for Federal Student Aid (FAFSA) and estimate the financial aid you could receive based on student and family assets and income.

1. Function fileLength(), given to you, takes the name of a file as input and returns the length of the file:
>>> fileLength('gettsburg.txt')
Traceback (most recent call last):
File "", line 1, in
fileLength('gettsburg.txt')
File "C:\Users\eve\Documents\evelyn\241\Final Exam\2019 winter Final Exam.py", line 53, in fileLength
fsize = os.path.getsize(filename)
File "C:\Users\eve\AppData\Local\Programs\Python\Python37\lib\genericpath.py", line 50, in getsize
return os.stat(filename).st_size
FileNotFoundError: [WinError 2] The system cannot find the file specified: 'gettsburg.txt'
>>> fileLength('gettysburg.txt')
The size of gettysburg.txt is: 1464bytes.
>>>
As shown above, if the file cannot be found by the interpreter or if it cannot be read as a text file, an exception will be raised. Modify function fileLength() so that a friendly message is printed instead:
>>> fileLength('gettsburg.txt')
File gettsburg.txt not found
>>> fileLength('gettysburg.txt')
The size of gettysburg.txt is: 1464bytes.

Answers

The given code raises a FileNotFoundError if a file is not found, or if it cannot be read as a text file. In this question, you are asked to modify the fileLength() function so that a friendly message is printed instead of an exception is raised.

So, the code can be modified to catch any exceptions and print a friendly message. If the file exists, the size of the file is returned. A sample implementation is given below:def fileLength(filename):    try:        fsize = os.path.getsize(filename)    except FileNotFoundError:        print(f"File {filename} not found")        return    print(f"The size of {filename} is: {fsize} bytes.").

The above code will work as follows:If the specified file is not found, it will print “File not found” as follows:>>> fileLength('gettsburg.txt')File gettsburg.txt not foundIf the file is found, it will print the size of the file as follows:>>> fileLength('gettysburg.txt')The size of gettysburg.txt is: 1464 bytes.

To know more about function visit:

https://brainly.com/question/30721594

#SPJ11

3) The remove operation returns
a) an int representing the number of elements remaining in the list after the removal.
b) a boolean value indicating if the remove was successful or not.
c) the element that was removed.
d) a pointer to the list
e) The remove operation does not return any of these.

Answers

The remove operation returns option c) the element that was removed.

In many programming languages and libraries, the remove operation is used to delete an element from a list or a collection. When this operation is performed, it typically returns the element that has been removed from the list. This allows the programmer to know exactly which element was removed, and if needed, use it for further operations or record-keeping. The other options, such as returning an int, boolean value, pointer, or none of the above, do not accurately represent the typical behavior of the remove operation.

The correct answer is that the remove operation returns the element that was removed from the list.

To know more about libraries visit:

https://brainly.com/question/31517209

#SPJ11

Recommend a minimum of 3 relevant tips for people using computers at home, work or school or on their SmartPhone. (or manufacturing related tools)

Answers

The three relevant tips for individuals using computers at home, work, school, or on their smartphones are ensure regular data backup, practice strong cybersecurity habits, and maintain good ergonomics.

1)Ensure Regular Data Backup: It is crucial to regularly back up important data to prevent loss in case of hardware failure, accidental deletion, or malware attacks.

Utilize external hard drives, cloud storage solutions, or backup software to create redundant copies of essential files.

Automated backup systems can simplify this process and provide peace of mind.

2)Practice Strong Cybersecurity Habits: Protecting personal information and devices from cyber threats is essential.

Use strong, unique passwords for each online account, enable two-factor authentication when available, and regularly update software and operating systems to patch security vulnerabilities.

Be cautious while clicking on email attachments, downloading files, or visiting suspicious websites.

Utilize reputable antivirus and anti-malware software to protect against potential threats.

3)Maintain Good Ergonomics: Spending extended periods in front of a computer or smartphone can strain the body.

Practice good ergonomics by ensuring proper posture, positioning the monitor at eye level, using an ergonomic keyboard and mouse, and taking regular breaks to stretch and rest your eyes.

Adjust chair height, desk setup, and screen brightness to reduce the risk of musculoskeletal problems and eye strain.

For more questions on computers

https://brainly.com/question/24540334

#SPJ8

COMPUTER ACTIVITY

help guys thank you so much!!​

COMPUTER ACTIVITYhelp guys thank you so much!!

Answers

A type of flowchart called an Entity Relationship (ER) Diagram shows how "entities" like people, things, or ideas relate to each other in a system.

What exactly is a ER diagram?

A type of flowchart called an Entity Relationship (ER) Diagram shows how "entities" like people, things, or ideas relate to each other in a system. In the fields of software engineering, business information systems, education, and research, ER Diagrams are most frequently utilized for the design or debugging of relational databases. They use a defined set of symbols like rectangles, diamonds, ovals, and connecting lines to show how entities, relationships, and their characteristics are interconnected. They follow grammatical structure, using relationships as verbs and entities as nouns.

To learn more about databases visit :

https://brainly.com/question/6447559

#SPJ1

which one of the following statements updates the orderscopy table by changing the shipvia to 5 for orderid "10248"?
A. SET OrdersCopy
UPDATE ShipVia=5
Where OrderiD IN
(SELECT OrderiD
FROM OrdersCopy
WHERE OrderID=10248):
B. UPDATE ShipVia=5
SET Orders Copy
Where OrderID IN
(SELECT OrderiD
FROM OrdersCopy
WHERE OrderiD-10248):
C. UPDATE OrdersCopy
SET ShipVia = 5
Where OrderID IN
(SELECT OrderiD
FROM OrdersCopy
WHERE OrderID=10248):
D. UPDATE Orders Copy
SET ShipVia=5
Where OrderID IN
(SELECT OrderID
FROM OrdersCopy
WHERE OrderID 10258)

Answers

Answer:

C. UPDATE OrdersCopy

SET ShipVia = 5

Where OrderID IN

(SELECT OrderiD

FROM OrdersCopy

WHERE OrderID=10248):

Explanation: Answer A can be eliminated because the command to change a value is SET not UPDATE. Answer B can be eliminated because as previously stated UPDATE in not the command to change a value. Finally, we can eliminate answer D because it has an orderID of 10258.

Answer:

C. UPDATE OrdersCopy

SET ShipVia = 5

Where OrderID IN

(SELECT OrderiD

FROM OrdersCopy

WHERE OrderID=10248):

Explanation: Answer A can be eliminated because the command to change a value is SET not UPDATE. Answer B can be eliminated because as previously stated UPDATE in not the command to change a value. Finally, we can eliminate answer D because it has an orderID of 10258.

A switch to turn on or turn off a notification is located in the _____ app.

a. settings

b. customization

c. action center

d. personalization

Answers

The switch to turn on or turn off a notification is located in the personalization app.

In the personalization app, you can customize various settings to tailor your experience. One of these settings is the ability to control notifications. By accessing the app, you can locate a switch that allows you to turn on or turn off notifications according to your preference. This feature is particularly useful for managing the frequency and types of notifications you receive, ensuring that you only receive the ones that are relevant to you. By utilizing the personalization app, you can have greater control over your device's notifications and customize them to suit your needs.

The process of shaping an app's user experience (UX) through the use of customer data is known as app personalization. Instead of giving all users the same generic experience, you can design an app for a specific user with app personalization.

Know more about personalization app, here:

https://brainly.com/question/29910403

#SPJ11

A LAN is usually confined in a single building.
True
False

Answers

Answer:

true

Hope it helps.you

I use a Dell Precision T3500 with 24 GB of ram and an Intel Xeon X5690 with 3.47 GHz, and I wanted to know, would an RTX 3050 from nvidia work just fine with this computer?

Answers

Answer:

yes it would

Explanation:

as long as it's fast enough you'll be fine.

PLEASE HELP ME!!!!!! ITS FOR 100 POINTS AND BRAINLIEST!!!!!!!! NO ONE EVER WANTS TO ANSWER MY QUESTION!!! I JUST NEED SOMEONE TO EXPLAIN WHAT THEY'RE ASKING ME TO DO!!!!!!!!
Step 1: Read the Scenario
Because of the great work you’ve been doing for your department at running shoe company Runner Rush, your vice president has elected you to join an innovative cross-departmental team in your organization. The company is looking to launch a new shoe that enhances any runner’s speed. Management wants this new team to create an idea within a month. All the members of the team are alleviated of some of their regular job duties in order to join several meetings a week to brainstorm and design the new product.

Step 2: Develop a Month Plan
You have been appointed as the team leader. Develop a month plan that you will present to your teammates at the initial meeting. Focus on developing a strong team dynamic, setting goals, expectations, deadlines, and other elements that will lead the team to success. Make sure that your plan is easy to follow and clearly outlines all the required information.

Answers

Answer: my suggestion is to ask a teacher and do research like look up the best shoe companies and things like that

Explanation:

what is expected to eliminate the need for private ip addresses

Answers

Maybe a VPN? I can’t think of anything else

Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" answer?

Answers

Answer:

yes it can

Explanation:

Computers cannot evaluate an expression to be between true or false.

Expressions in computers are represented in boolean values; i.e. they can only take one of two values (either true or false, yes or no, 1 or 0, etc.)

Take for instance, the following expressions will be evaluated to true, because the expressions are true.

\(\mathbf{1 + 2 = 3}\).\(\mathbf{5>4}\).\(\mathbf{4 + 4 <10}\)

The following expressions will be evaluated to false, because the expressions are false.

\(\mathbf{1 + 2 > 3}\).\(\mathbf{5=4}\).\(\mathbf{4 + 4 >10}\)

The above highlights show that, a computer cannot evaluate expressions to another value other than true or false

Read more about computer expressions at:

https://brainly.com/question/17500565

BJP4 Self-Check 7.21: swapPairs

Write a method named swapPairs that accepts an array of strings as a parameter and switches the order of values in a pairwise fashion. Your method should switch the order of the first two values, then switch the order of the next two, switch the order of the next two, and so on.

PLEASE HELP DUE AT 11:59

Answers

Answer:

public static void swapPairs(ArrayList strList)

{

 for(int i = 0; i < strList.size() - 1; i += 2)

 {

  String temp1 = strList.get(i);

  String temp2 = strList.get(i + 1);

  strList.set(i, temp2);

  strList.set(i + 1, temp1);

 }

}

Explanation:

lafa elihle kakhulu poem​

Answers

I’m pretty sure it is Telgu

what is the function of the chipset on the motherboard

Answers

A chipset is an integrated circuit that connects the CPU to other hardware components such as memory and storage on the motherboard.

The chipset also determines the type and speed of memory supported by the motherboard. It is responsible for controlling the input/output operations on the motherboard and coordinating communication between the CPU and other peripherals.

Chipsets come in different varieties, each with varying capabilities. The Northbridge chipset is responsible for connecting the CPU to the memory and graphics card, while the Southbridge chipset provides connectivity options for peripherals such as USB ports and hard drives. Some modern chipsets integrate both Northbridge and Southbridge functionality into a single chip known as a system-on-chip (SoC).

In conclusion, the chipset is a crucial component of the motherboard, responsible for managing data transfer, controlling input/output operations, and coordinating communication between the CPU and other hardware components.

Know more about the chipset

https://brainly.com/question/29849490

#SPJ11

For which machine did Grace Murray Hopper first write computer programs?
O Analytical Engine
Mark I
O UNIVAC
O ENIAC

Answers

Grace Murray Hopper first wrote computer programs on the machine MARK I.

Grace Murray Hopper's full name is Grace Brewster Murray Hopper. She was born in 1906. Grace Murray Hopper was a computer explorer as well as a naval officer. She earned her master's degree and a PhD in mathematics from Yale. Grace Hopper has done many contributions regarding computer programming, software development and programming languages.

Grace Murray Hopper joined a team working on the IBM Automatic Sequence Controlled Calculator mostly known as MARK I. MARK I was the first electromechanical computer in the US. Hopper wrote calculations which are essential for the war. Hoper was one of the coders who wrote a 561 pages user manual for the machine MARK I. She died in 1992.

To know more about System Software:

https://brainly.com/question/28478310

Is there anything bigger than a yottabyte in byte units?

Answers

Answer:No

Explanation:a yottabyte is the largest known bye

Mark this brainliest!

given a prime int p find the minimal r for which such divisibility test is valid and output it

Answers

To clarify, it seems you are referring to a divisibility test using a specific prime number 'p'.


learn more about clarify   here :


https://brainly.com/question/30552898


#SPJ11

To find the minimal value of r for which a divisibility test is valid for a prime number p, we need to consider the concept of Fermat's little theorem.

According to Fermat's little theorem, if p is a prime number and a is any positive integer not divisible by p, then the remainder when a^(p-1) is divided by p will always be 1.

In this case, we are looking for the smallest value of r for which the divisibility test using Fermat's little theorem is valid. We can calculate this value using the formula r = p - 1.

Therefore, for a given prime number p, the minimal value of r for which the divisibility test is valid is r = p - 1.

Learn more about Fermat's little theorem here:

https://brainly.com/question/30761350

#SPJ11

How does the exponential growth of computing power help create new technologies? What are some ways that advancing technology could help solve global problems?

Answers

Answer:

Exponential growth of computing power, also known as Moore's Law, has profound effects on the development of new technologies. It enables advanced computing capabilities, which are integral to the creation of new technologies, products, and services. Here are a few ways in which the exponential growth of computing power helps to create new technologies:

1. Faster and More Efficient Processing: As computing power increases, it becomes easier to process large amounts of data more quickly, which leads to the development of more sophisticated algorithms and artificial intelligence (AI) systems. This translates into the ability to analyze and predict complex phenomena that were previously impossible using traditional methods.

2. Improved Connectivity: With more computing power, it is possible to improve network connectivity and optimize network performance, enabling better communication and collaboration.

3. New Product Development: Advancements in computing power make it easier to design, test, and manufacture new products, such as virtual reality and augmented reality devices, medical equipment, and more. This leads to more innovation and improved quality of life for individuals around the world.

4. Better Data and Decision-Making: More advanced computing power enables businesses and governments to use data more effectively and to make better decisions. This, in turn, can help to improve the overall quality of life and address social problems such as poverty, inequality, and climate change.

Given the above, advancing technology could help solve global problems in a number of ways, including but not limited to:

1. Climate Change Mitigation: Advanced computing power can help us to better understand climate change and may help us to develop more effective strategies for mitigating its impact. For example, AI systems and advanced analytics can help us to collect and analyze data on environmental factors, thereby enabling more effective strategies for protecting the environment.

2. Medical Research and Treatment: Advanced computing power can help us to better understand the causes of diseases and develop new treatments and therapies. For example, AI and machine learning can help us to identify patterns in complex medical data, which may lead to new insights into disease.

3. Disaster Response and Management: Advanced computing power can help us to better respond to natural disasters and other crises by enabling better coordination and communication. For example, advanced analytics and machine learning can help us to predict natural disasters and to develop more effective response plans.

4. Education and Economic Development: Advanced computing power can help us to provide education and training to individuals around the world, thereby enabling them to participate more fully in the global economy. This can help to reduce poverty, inequality, and other social problems.

Professionals in the information technology career cluster have basic to advanced knowledge of computers, proficiency in using productivity software, and .

Answers

Answer:

The answer is "Internet skills ".

Explanation:

Internet skills are needed to process and analyze which others generate or download. Online communication abilities should be used to construct, recognize, and exchange info on the Web.

Creating these capabilities would enable you to feel more positive while using new technology and complete things so quickly that's why the above choice is correct.

What is the name of tool

What is the name of tool

Answers

Answer:

bro the pic is hazy

Explanation:

but it is looking like octagon

hope it helps you

please mark me as brainlist

What is mark in in premiere pro

Answers

Markers are an often underutilized tool in the Premiere Pro CC toolbox. They are little colored tabs you can apply to both your timeline and your source clips to indicate important points in time with a color or note.

Because 802. 15. 1 uses fhss while 802. 11b/g uses direct sequence spread spectrum (dsss), there can be a conflict between devices. an ieee task group known as _____?

Answers

Because 802.15.1 uses FHSS while 802.11b/g uses Direct Sequence Spread Spectrum (DSSS), there can be a conflict between devices. An IEEE task group known as "802.15" addresses this issue by defining specifications for wireless personal area networks (WPANs) using FHSS.

802.15.1 (FHSS) and 802.11b/g (DSSS) use different spread spectrum techniques, there can be interference or conflicts between devices using these standards in close proximity. To address this issue, the IEEE 802.15.2 standard was developed. IEEE 802.15.2 provides coexistence mechanisms and guidelines for managing interference between devices operating in the 802.15.1 (FHSS) and 802.11b/g (DSSS) frequency bands.

Direct Sequence Spread Spectrum (DSSS) is a modulation technique used in wireless communication systems. It spreads the signal over a wide bandwidth by multiplying the data with a spreading code sequence. This process enhances the signal robustness against interference and improves resistance to multipath fading.

Learn more about IEEE at:

https://brainly.com/question/15040805

#SPJ11

Drag the right word to it’s definition

a set of instructions
written in code that
control the operation of a
computer or machine.

1. Program
2. Variable
3. Pseudocode

Answers

Answer:

Program

Explanation:

Program has a set of codes that can control a machine or computer. pseudo code is meant for humans to read not machines. A variable is likely to change

is this even possible

is this even possible

Answers

Answer:

yes

Explanation:

The fastest WPM was 216 wpm

Answer:

Yes it is

Explanation: Because the 96 is how fast you typed and the 100 is what words you typed correctly.

A(n) ________ begins whenever a character enters or exits the stage until the next entrance or exit.

Answers

A scene begins whenever a character enters or exits the stage until the next entrance or exit.

In theatrical performances, a scene refers to a specific section of a play or performance that begins when a character enters or exits the stage and continues until the next entrance or exit. It represents a distinct unit of action or dialogue within the overall structure of the play. Scenes are often used to divide the play into smaller segments, allowing for changes in location, time, or focus.

They help organize the flow of the narrative and contribute to the development of plot, character, and themes. By demarcating the beginning and end of a scene based on character entrances and exits, the audience is guided through the progression of the story and the interactions between the characters.

You can learn more about theatrical performances at

https://brainly.com/question/30562518

#SPJ11

The CPU is often called the
of the computer.

Answers

Answer:

Explanation:

Tower?

Answer:

Its often called the brains of a computer.

Explanation:

types of risks in entrepreneurship

Answers

strategic risk

financial risk

operational risk

compliance and regulatory risk

Business risk is a future possibility that may prevent you from achieving a business goal. The following are the common type of business risks.

Strategic Business Risk

Strategic risks result directly from operating within a specific industry at a specific time. To counteract strategic risks, you’ll need to put measures in place to constantly solicit feedback so changes will be detected early.

Legal Compliance Risk

Risks associated with compliance are those subject to the legislative or bureaucratic rules and regulations, or those associated with best practices for investment purposes.

Internal Operational Risks

Operational risks result from internal failures. That is, your business’s internal processes, people, or systems fail unexpectedly. Operational risks can also result from unforeseen external events such as transportation systems breaking down, or a supplier failing to deliver goods.

Reputational and Publicity Risks

Loss of a company’s reputation or community standing might result from product failures, lawsuits, or negative publicity. Reputations take time to build but can be lost in a day. In this era of social networking, a negative Twi tter posting by a customer can reduce earnings overnight.

The Quick Access Toolbar is typically
located in the top-right corner of the
window, above the ribbon.
True
False

Answers

Answer:

False

Explanation:

It is on the left

it is false hey a so it’s a

Any two differences between third and fourth generation of computer

Answers

Answer:

Third generation computer use integrated circuit(IC) and it was fast and reliable.

Forth generation computer micro computer were introduced and they were highly reliable and fast.

Third generation computers were developed in 1965 AD.They used (IC)integrated ciruit.
Forth generation computer were developed in 1971 AD.They used micropocessor.
Other Questions
Which of the following sentences does NOT have a first person point of view?A) After a silence, a voice suddenly called out: "I am Spartacus!"B) All of us recited the Pledge of Allegiance in unison.C) Call me Ishmael.D) I was self-appointed inspector of snowstorms and rainstorms. crossing a river a small motorboat in still water main- tains a speed of 20 miles per hour. in heading directly across a river (that is,perpendicular to the current) whose current is 3 miles per hour, find a vector representing the speed and direction of the motorboat. what is the true speed of the motorboat? what is its direction? Why did the writers of the Constitutiondesign threebranches of government?A. They wanted to maintain statepower.B. They wished to limit the power ofeach branch.C. They believed this would cause thegovernment to become toopowerful.D. They wanted to give each branchmore power. Solve the radical equation.Check all solutions to eliminate extraneous solutionsand do not include them in your answer.If your answer is not an integer then type it as adecimal rounded to the nearest hundredth.2x+3-x+2=0x=Check Find the selling price of a $7.50 agenda book with a 15% discount. according to calloway, approximately ________________ indigenous peoples served in the u.s. armed forces during world war ii. The smallest structural and functional unit in a multicellular organism is what? This is do tonight! Please help! Write a short definition as it relates to the Renaissance time period.Humanism -Secular -Patron -Mona Lisa -Perspective -The Prince -Vernacular -Usury - The strength of a magnetic field is measured in teslas. Is this true or false? the force that accelerates the orange and apple system featured in your textbook is actually supplied by the the table below gives the atomic number of elements w x and y and z.The the letters do not represent the actual symbols of the elements .W. X Y. Z9. 10. 11. 12which one of the element is less reactive explain . A healthcare provider asks a nurse to test a client for tinel's sign to diagnose carpal tunnel syndrome. what should the nurse do to perform this assessment? Each year Exxon-Mobil expends large amounts of funds for mechanical safety features throughout its worldwide operations Carla Ramos, a lead engineer for Mexico and central American operations, plans expenditures of $1 million now and each of the next 4 years just for the improvement of field-based pressure-release valves. Construct the cash flow diagram to find the equivalent value of these expenditures at the end of year 4, using a cost of capital estimate for safety-related funds of 12% per year. Pls help me Ill make u brainly When playing a game Emily had six more properties than Terry together they owned at least twenty of the properties. What is the smallest number of properties that Terry had Giving brainlyist to the first person with the correct and complete answer. What are four changes the mongol invasion brought to Russia? What file in the /proc directory contains a list of memory address ranges reserved for device use? What number should go in the space?Multiplying by 1.19 is the same as increasing by _____%. Does lobbying impact the government in a positive or negative way?