A microphone
. . . attached to a soundcard is used to capture speech
The signal is converted from analogue to digital
The digital signal is compared to a database of sounds
Voice recognition software may be used
lydiajane74 answered the question on July 1, 2018 at 16:57
- The university is a member of the Association for Computer Machinery (ACM).
Describe the role of the ACM.(Solved)
The university is a member of the Association for Computer Machinery (ACM).
Describe the role of the ACM.
Date posted: July 1, 2018. Answers (1)
- Apart from being inaccurate, identify four other ways in which the quality of information might be unsatisfactory.(Solved)
Apart from being inaccurate, identify four other ways in which the quality of information might be unsatisfactory.
Date posted: July 1, 2018. Answers (1)
- Describe the main features of CAD and CAM (Solved)
Describe the main features of CAD and CAM
Date posted: July 1, 2018. Answers (1)
- Explain why technical documentation would be required during software maintenance.(Solved)
Explain why technical documentation would be required during software maintenance.
Date posted: July 1, 2018. Answers (1)
- Identify four components you would expect to find in user documentation. (Solved)
Identify four components you would expect to find in user documentation.
Date posted: July 1, 2018. Answers (1)
- Describe the main features of a graphics CASE tool(Solved)
Describe the main features of a graphics CASE tool
Date posted: July 1, 2018. Answers (1)
- Describe the main features of the waterfall model(Solved)
Describe the main features of the waterfall model
Date posted: July 1, 2018. Answers (1)
- Describe the main features of real time transaction processing.(Solved)
Describe the main features of real time transaction processing.
Date posted: July 1, 2018. Answers (1)
- Evaluate the use of videoconferencing (Solved)
Evaluate the use of videoconferencing
Date posted: July 1, 2018. Answers (1)
- Describe how auditing software can detect unauthorised access and modification of data.(Solved)
Describe how auditing software can detect unauthorised access and modification of data.
Date posted: July 1, 2018. Answers (1)
- Describe the main features of the OSI model.(Solved)
Describe the main features of the OSI model.
Date posted: July 1, 2018. Answers (1)
- Explain what is meant by a client server network(Solved)
Explain what is meant by a client server network
Date posted: July 1, 2018. Answers (1)
- Identify two advantages of a distributed database over a centralised database(Solved)
Identify two advantages of a distributed database over a centralised database
Date posted: July 1, 2018. Answers (1)
- How can I obtain the file for an external MS-DOS command?(Solved)
How can I obtain the file for an external MS-DOS command?
Date posted: June 30, 2018. Answers (1)
- Give the aims of exploratory data analysis(Solved)
Give the aims of exploratory data analysis.
Date posted: June 25, 2018. Answers (1)
- Factors that might drive need for an executive support system in an organization. (Solved)
Factors that might drive need for an executive support system in an organization.
Date posted: June 22, 2018. Answers (1)
- Differntiate monolithic kernel and microkernel(Solved)
Differntiate monolithic kernel and microkernel
Date posted: June 18, 2018. Answers (1)
- Discuss the following terms in respect to Windows System Design • Operating system .Desktop.Usability.System user.Sticky note(Solved)
Discuss the following terms in respect
to Windows System Design.
• Operating system
.Desktop
.Usability
.System user
.Sticky note
Date posted: June 13, 2018. Answers (1)
- Discuss common approaches to user support systems(Solved)
Discuss common approaches to user
support systems
Date posted: June 13, 2018. Answers (1)
- Discuss golden rules of interface
design.(Solved)
Discuss golden rules of interface
design.
Date posted: June 13, 2018. Answers (1)