advantages and disadvantages of screen reading​

Answers

Answer 1
It can make ur eyes blind blind that’s a disadvantage
Answer 2

Answer:

Advantages:

1.) It allows a blind person to use the computer

2.) It allows a blind person to create a document using a word processor like MS Word

3.) With the help of a screen reader, blind musicians now use audio editing software to record, edit and save their songs for example

Disadvantages:

1.) Because visually impaired people only listen to a screen reader reading the text displayed on the screen, they don’t usually have the chance to know the correct spelling of a certain word especially when it’s not that common like medical terms etc. Sure they can make a screen reader to read character by character after they hear a word that they don’t know the spelling but I find it very time-consuming.

2.) Screen readers use a computer sounding voice and some people find this very boring. Some companies are doing their best to create speech synthesizers that can mimic how humans read a sentence; like the proper intonation, but so far I would say that even we see some big improvements for the past years, they are still far from achieving their goals.

Hope this helped!

Have a supercalifragilisticexpialidocious day!


Related Questions

2. True or False: You can create a network with two computers.
a. True
b. False

Answers

A computer network is a collection of connected computing devices that may or may not be able to communicate.
So I think yes its true

You can create a network with two (2) computers: a. True.

A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.

In Computer networking, a network design is also known as network architecture and it refers to an iterative process that involves the planning, topological design and implementation of a computer network infrastructure.

Basically, a network can be created by two (2) or more computer systems. Thus, a network designer can create a network with at least two (2) computers by connecting them together through a wired or wireless connection.

Read more on networks here: https://brainly.com/question/8808883

Which command could you use to change to the /usr directory using a relative pathname?

Answers

Answer:

To change directories, use the cd command. This command by itself will always return you to your home directory; moving to any other directory requires a pathname. You can use absolute or relative pathnames.

Explanation:

I hope it's help

The computer components that enables a computer to send and receive data, instructions or information from one or more computers or mobile device are

Answers

Answer:

communications device

Explanation:

What is beryllium oxide?

a potentially toxic chemical found in thermal grease used for the processor’s heatsink
a nontoxic chemical found in the glass of cathode ray tube monitors
a potentially toxic chemical found in the plastic used to make a computer case
a nontoxic chemical used in the manufacturing of computer batteries

Answers

Answer: a potentially toxic chemical found in thermal grease used for the processor’s heatsink

Explanation:

Exposure to Beryllium oxide can lead to it being inhaled which can cause irritations to the nose, lungs and throat. If this exposure is prolonged, a more serious condition known as Berylliosis which can lead to lung damage. This makes it a potentially toxic chemical.

Beryllium oxide is useful in electronic production due to it having good thermal conductivity whilst also possessing good insulation properties in relation to electricity. This enables it to be used as a filler in thermal grease.

Using Microsoft Word, write a 250-word essay on the fading of home telephone use with the advent of recent technology, and share your personal experiences with this change. Provide at least two references using APA format.

Answers

this is something you should pay for bro. shame on you. I’m telling your mom.

All cells in row 2 through 5 are referred as 2:5 true or false

Answers

Answer:TRUE

Explanation:

BRAINLIEST PLSSSSSSSSSSSSSSSSSSS

Who is responsible for maintaining, monitoring, and analyzing database security at the back end?
The
works on the back end and is responsible for maintaining, monitoring, and analyzing database security
database.

Answers

Answer:

Install and maintain the performance of database servers.

Develop processes for optimizing database security.

Set and maintain database standards.

Manage database access.

Performance tuning of database systems.

Install, upgrade, and manage database applications.

More items...

Explanation:

In what ways can you modify the location of the neutral point?
O Change the size of the wing.
Change the size of the horizontal stabilizer.
O Change the position of the wing.
All of the above.

Answers

Answer:

The answer is "All of the above".

Explanation:

In the temperature over which transition atoms get thermoelectric energy of zero, which is between cold junction level as well as the equivalent inversion value. The Adjustments to wing length, the change in horizontal stabilizer size, as well as, the change in fullback spot will alter the neutral point position.

how does coved-19 effect in how mangers make decisions?
Please help I need a lot of words ​

Answers

Answer:

the pandemic has caused many managers hard time as to where they might have to lower a pay check of fire someone and they don't get a good result out of that or their business go under

Explanation:

A user purchased a new smart home device with embedded software and connected the device to a home network. The user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?
A. A vulnerability in the device's software is exploited to gain unauthorized access to other devices on the user's home network.
B. A vulnerability in the device's software is exploited to install software that reveals the user's password to an unauthorized individual
C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.
D. The user's account is sent an overwhelming number of messages in an attempt to disrupt service on the user's home network.

Answers

Answer:

C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm account password by clicking on a link in the e-mail and entering password on the resulting page.

Explanation:

Phishing attack is a cyber atttack in which user is sent an email which he thinks is useful. When the user open the email and does as instructed in the email his account gets locked. His personal information is haccked and then rannsom is demanded to release that information. The hacckers usually steal credit card information and bank details of the user which are misused.

Place the steps in order for manually creating a New Contact Group
Save and close
Click New Contact Group.
Name the group
Add members.

Answers

Click new

Add members

Name the group

Save and close

Answer:

Click New Contact Group

Name the Group

Add Members

Save and Close

Explanation:

edge 2021

List 4 types of Data in excel

Answers

Answer:

four types of data in Excel are;

IntegerBoolean Character String

Why has information visualization become a centerpiece in business intelligence and analytics? Is there a difference between information visualization and visual analytics?

Answers

Answer:

explanation below

Explanation:

Information visualization helps in making and distributing  business information that are profitable and this is the reason why it has  become a centerpiece in business intelligence and analytics. It has also become very important in rapidly understanding difficult information.

Information visualization lays emphasis on data that is abstract, which is, data with no agreed-upon depiction. Examples of this are the financial data, statistics and text. Visual analytics, on its own, lays emphasis on analytical reasoning about data and then puts together the computational analysis techniques with interactive visualization.

does the following code return a string or a number def of() return 3

Answers

Answer:

The system cannot find the path specified.

Explanation:

please give brain thx! :D

good luck!

Given the following class: Create a class MyGenerator that can be used in the below main method.
class Random{
public static void main(String [] args){
perform(new MyGenerator());
}
private static abstract class Generator {
protected abstract double getRandom();
}
public static void perform(T g){
System.out.println(g.getRandom());
}
}

Answers

Answer:

Explanation:

The below code shows the complete code for the project. we have used Math.random() as a means of generating a random double value in the getRandom() method since it is not specified.

class Random {

          [tex]\ \ \ \ \ \ \ \ \mathbf{ public \ static \ void \ main \ (String[] \ args) \ \ \{}[/tex]

               perform(new MyGenerator());

       }  

           [tex]\mathbf{private \ static \ abstract \ class \ Generator \{ \ }[/tex]

                  [tex]\mathbf{ \ protected \ abstract \ double \ getRandom();}[/tex]

       }  

       public static <T extends Generator> void perform(T g) {

               [tex]\mathbf{System.out.println(g.getRandom());}[/tex]

       }  

       // MyGenerator class inherited from Generator

       public static class MyGenerator extends Generator {

               // implementing abstract method getRandom() of Generator class

               [tex]\mathbf{Override}[/tex]

               [tex]\mathbf{protected \ double \ getRandom() \{ }[/tex]

                       //returning a single double value between 0.0 and 1.0

                       [tex]\mathbf{return \ Math.random();}[/tex]

               }

       }

}

/*OUTPUT (will be random)*/

0.53296649765

What are two valid assignee options, when configuring case assignment rules?

a. User
b. Queue
c. Case team
d. Public Group

Answers

Answer:

a. User

b. Queue

Explanation:

Cases can be created manually or automatically. The case assignment rules assign cases regardless of how the case was created. It is used to determine how cases are assigned to users or put into a queue.

Why did they removed the watch video button to view answers?​

Answers

Answer:

Umm I’m not sure

Explanation:

All of the following are true about data science and big data except: a.Digital data is growing at the rate of 2.5 quintillion bytes per day b.Data scientists use skills in data management, statistics, and software development c.No digital data is stored in traditional databases d.Data science involves preparing, manipulating, and analyzing large amounts of digital data

Answers

Answer:

Option C

Explanation:

All of the following are true about data science and big data except No digital data is stored in traditional databases

Reason -

Data generated in current time is of large size and is also complicated. Traditional data bases such as SQL databases etc. are not capable to store  data that is changing at a fast pace and has huge volume, veracity, variety and velocity. But big data platforms such as Hadoop can store big data and process it speedily and easily.

computing to your daily life.
3. Research the trend of BYOD in workplaces. Compare the advantages to any potential disadvantages.
Do you think more companies should adopt this policy? Why or why not?

Answers

Answer:

The explanation of the scenario would be described in the description paragraph below.

Explanation:

BYOD focuses on bringing smart equipment to that same position during which staff members work in that industry, such as connectivity to the corporation's information, technologies, and so forth. Everything just is becoming more and more widely known throughout traditional working environments

Advantage:

Whenever a corporation would be associated with the BYOD entire organization, this should greatly reduce the cost including its machines as individuals don't have to consider buying the others. Throughout relation to the purchase of their whole machines, staff members are significantly more likely to do just that.

Disadvantage:

As top executives use their work computers, and it is also indeed very harder to monitor data protection throughout their handheld device, this makes Security another of the greatest drawbacks including its BYOD programs.

Throughout my personal view, bringing your someone else's target demographic wouldn't have been acknowledged by the corporations. After all, although the corporation is following a client set of policies that the customer should be doing the project for the service provider as well as the corporation has to save another customer from either the worker because several employees want to initiate their organization.

In this assignment, you will use the Microsoft Threat Modeling Tool (TMT-2016).
You are a security analysts at a large university. Your CIO has asked you to draft a threat model for the university Single Sign-On (SSO) system. You are to do this in the Microsoft Threat Modeling tool. The SSO system is used by Faculty, Administration, and Students to access the following University systems:
System Faculty Admin Students
Email Y Y Y
BlackBoard Y Y Y
Finance N Y Y *
Curriculum Development Y Y N
*(To pay tuition)
Given Assumptions:
Different roles require different permissions. (For example, a faculty member needs to see all student grades but a student should only see their own grade.)
Faculty and administrative staff have access to the applications from both internal workstations and remote systems using a VPN connection; students will not be using a VPN for their remote access, but must use an encrypted channel (SSL/TLS) – you can decide how this is implemented
You can create some of your own additional assumptions, as long as they are fully explained
Further Assignment instructions:
The Microsoft Threat Modeling Tool (TMT-2016) should be downloaded and installed on your own computer. File is linked below. If you are using a Mac computer, you will need to create a VM running Windows 8.1 or 10 to install TMT-2016.
Your model should cover the entire STRIDE model (which is the default analysis method in TMT-2016) – you need to explain and address all six types/categories of threats.
Within the completed threat model, you must show mitigations (with justifications) for at least 20% of the identified threats.
The data flow diagram created in TMT-2016 should show all necessary elements/components, including Trust Boundaries, with appropriate data flow connections – be sure to modify the Attributes within the Element Properties to include security settings that will reduce the risks/threats. (Take advantage of the Overview and Example of using TM-2016 in the reference documents below – it takes you through the necessary steps.)

Answers

Answer:

yes yes yes yes yes yes yes

which wireless technology does the fire alarm system use? ​

Answers

Wireless fire alarm systems get the signal from detectors to the control panel, which is transmitted by radio frequency. The heat detectors have thermistors that sense the heat in order for the alarm to go off. I hope this helps you out!

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts. Which of the following features makes this possible?

a. It used TCP as the underlying protocol.
b. It uses community string that is transmitted in clear text.
c. It is susceptible to sniffing.
d. It is used by all network devices on the market.

Answers

Answer:

b. It uses community string that is transmitted in clear text.

d. It is used by all network devices on the market.

Explanation:

SNMP is an acronym for Simple Network Management Protocol and it is a standard protocol which allows network administrators to manage network devices and client computers remotely.

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

The SNMP agent on a network device such as a router authenticates any SNMP Get requests that are being received from the network management software (NMS) using either the read-write or read-only community string.

The features which makes this possible are;

I. It uses community string that is transmitted in clear text.

II. It is used by all network devices on the market.

Follow the directions below to submit Assignment 2:
Create a Java program.
The class name for the program should be 'DecimalFloor'.
In the main method you should perform the following:
Create a Scanner object.
Input a decimal /double value using the Scanner object.
Convert the input decimal/double value to an integer value (this will drop the decimal from the decimal/double value input).
Output the decimal/double value input.
Output the double/decimal value after converting the integer value back to a decimal value.
Pseudo flowchart for the assignment program:
Create a Scanner object using the Scanner class found in the java.util package.
Output a prompt asking the using to input a decimal value.
Accept the input value into a variable capable of holding decimal values.
Convert the decimal value to an integer value. This will drop all the decimal positions to the right of the decimal.
Covert the integer value to a double value.
Output the initial decimal value input.
Output the double value from step 5.

Answers

Answer:

Explanation:

The following code is written in Java and performs every action requested in the question. Instead of converting back and forth it saves the decimal/double value in one variable and the integer value in another variable so both can easily be accessed and printed.

import java.util.Scanner;

public class DecimalFloor {

   public static void main(String args[]) {

       //Ask for input and place into variable decimalValue

       Scanner in = new Scanner(System.in);

       System.out.println("Input decimal value:");

       double decimalValue = in.nextDouble();

       //Rounding down decimalValue to integer

       int integerValue = (int) Math.floor(decimalValue);

       //Print both integerValue and decimalValue

       System.out.println(integerValue);

       System.out.println(decimalValue);

   }

}

Which of the following statements adds 21 days to the date in the dueDate variable below? var dueDate = new Date();?

a. dueDate = dueDate + 21;
b. dueDate = dueDate.getDate() + 21;
c. dueDate.setDate(21);
d. dueDate.setDate( dueDate.getDate() + 21 );

Answers

Answer:

dueDate.setDate(dueDate.getDate() + 21);

Explanation:

Given

The following declaration (in JavaScript):

var dueDate = new Date();

Required

Add 21 days to dueDate

Assume the date object is [mydate], the syntax to add [n] number of days to [mydate] in JavaScript is:

[mydate].setDate([mydate].getDate() + n);

In this question:

The variable is dueDate and the number of days is 21

Going by:

[mydate].setDate([mydate].getDate() + n);

The correct option is:

dueDate.setDate(dueDate.getDate() + 21);

Linette works in software development. She usually starts her day by meeting with the project manager to discuss the overall progress of the software. After that, she holds a meeting with the team of developers to hand out work based on upcoming deadlines and then goes on to help with overall development problems. Linette tries to end each day by sending an encouraging email to her team to remind them how appreciated they are. What is MOST likely Linette's job title?

A. Project Manager
B. Systems Designer
C. Lead Developer
D. Quality Assurance Specialist

Answers

Answer:

C

Explanation:

Lead developer.

The cost to ship a package is a flat fee of 75 cents plus 25 cents per pound. 1. Declare a const named CENTS_PER_POUND and initialize with 25. 2. Get the shipping weight from user input storing the weight into shipWeightPounds. 3. Using FLAT_FEE_CENTS and CENTS_PER_POUND constants, assign shipCostCents with the cost of shipping a package weighing shipWeightPounds.

#include
using namespace std;

int main() {
int shipWeightPounds;
int shipCostCents = 0;
const int FLAT_FEE_CENTS = 75;

/* Your solution goes here */

cout << "Weight(lb): " << shipWeightPounds;
cout << ", Flat fee(cents): " << FLAT_FEE_CENTS;
cout << ", Cents per lb: " << CENTS_PER_POUND;
cout << ", Shipping cost(cents): " << shipCostCents << endl;

return 0;
}

Answers

Answer:

Replace /* Your solution goes here */

with

const int CENTS_PER_POUND = 25;

cout << "Weight(lb): ";

cin >> shipWeightPounds;

shipCostCents = FLAT_FEE_CENTS + CENTS_PER_POUND * shipWeightPounds;

Explanation:

This line declares and initializes CENTS_PER_POUND as constant integer to 25

const int CENTS_PER_POUND = 25;

This line prompts user for weight of shipment

cout << "Weight(lb): ";

This line gets weight from the user

cin >> shipWeightPounds;

This line calculates the cost of shipment

shipCostCents = FLAT_FEE_CENTS + CENTS_PER_POUND * shipWeightPounds;

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

So we can see that in the attached image we find the code that corresponds to the answer to this question.

Are analyzing the code informed in the question we can say that:

This line declares and initializes CENTS_PER_POUND as continual number to 25, the code that we have is:

const int CENTS_PER_POUND = 25;

cout << "Weight(lb): ";

cin >> shipWeightPounds;

shipCostCents = FLAT_FEE_CENTS + CENTS_PER_POUND * shipWeightPounds;

See more about computer at brainly.com/question/950632

Write the function max_int_in_list that takes a list of ints and returns the biggest int in the list. You can assume that the list has at least one int in it. A call to this function would look like:

my_list = [5, 2, -5, 10, 23, -21]
biggest_int = max_int_in_list(my_list)
# biggest_int is now 23
Do not use the built-in function max in your program!

Hint: The highest number in the list might be negative! Make sure your function correctly handles that case.

Answers

# your function should return the maximum value in `my_list`

def max_int_in_list(my_list):

   highest = my_list[0]

   

   for num in my_list:

       if num > highest:

           highest = num

       return highest

       

       

my_list = [5, 2, -5, 10, 23, -21]

biggest_int = max_int_in_list(my_list)

print (biggest_int)

Explanation:

What are the Edhesive 3.4 lesson practice answers

Answers

Answer:

import time

# Input yellow #

yellow = input("Enter yellow: ")

# If yellow #

if yellow == "yellow":

print("Correct")

else:

print("Nope")

Explanation:

PLEASE HELP IN A HURRY

Answers

I’m pretty sure that it’s the third one

Chang investigates ways to improve the interactivity of computer hardware. His job title is best described as ✓ Computer and Information Research Scientist. Shay writes programs to make operating systems easier for people to use. Her job title is best described as ✓ Software Developer, Systems Software.
Dayna writes code for computer programs that allow people to communicate with each other. Her job title is best described as ✓ Software Developer, Applications​

Answers

Answer:

B, D, C

Explanation:

got it right

Answer:

b d c

Explanation:

Other Questions
How does Madison define faction? What are some examples of factions today? What describes the likelihood that a given event will occur ?A. Probability B. PercentageC. GenotypeD. Phenotype Diego Rivera died of heart failure on November 24, 1952. Rivera is known as one of the most influential and talented painters of the time. His work continues to create controversy, conversation, and admiration in the United States, Mexico, and all over the world.Read the passage above with prosody and identify where you would pause in the passage above. anwers plzzzzzzzzzzzzzzzzzzzzzzzzzzzz The Mayo Clinic did a study where they found that endorphins that are released upon exercise have an impact on mild cases of depression andanxiety. Is it true or false Helppppp (THE MANHO STREET) After arranging the terms in descending powers of a variable, select the opposite of the polynomial.9 - 12n2 + 4n3 - 7n4 n3 + 12 n2 + 7 n + 9-4 n3 - 12 n2 + 7 n - 94 n3 - 12 n2 - 7 n + 9-4 n3 + 12 n2 + 7 n - 9 what is the slope and y-intercept for the line y = -2x The following procedures were recently installed by Raspberry Creek Company: After necessary approvals have been obtained for the payment of a voucher, the treasurer signs and mails the check. The treasurer then stamps the voucher and supporting documentation as paid and returns the voucher and supporting documentation to the accounts payable clerk for filing. The accounts payable clerk prepares a voucher for each disbursement. The voucher along with the supporting documentation is forwarded to the treasurer's office for approval. Along with petty cash expense receipts for postage, office supplies, etc., several postdated employee checks are in the petty cash fund. At the end of the day, cash register clerks are required to use their own funds to make up any cash shortages in their registers. At the end of each day, all cash receipts are placed in the bank's night depository. At the end of each day, an accounting clerk compares the duplicate copy of the daily cash deposit slip with the deposit receipt obtained from the bank. All mail is opened by the mail clerk, who forwards all cash remittances to the cashier. The cashier prepares a listing of the cash receipts and forwards a copy of the list to the accounts receivable clerk for recording in the accounts. The bank reconciliation is prepared by the cashier, who works under the supervision of the treasurer.Required:Indicate whether each of the procedures of internal control over cash represents (1) A strength or (2) A weakness. For each weakness, indicate why it exists. 1.Which statement accurately compares the military strategies of the North and South at the Battle of Fort Sumter?A.The North wanted to hold the fort until it could receive supplies, while the South wanted to capture the fort from the North with force.B.The North wanted to launch a bombardment of Charleston from the fort, while the South wanted to defend civilians from Northern bombs.C.The North hoped the battle would convince the South to return to the Union while the South hoped the battle would convince Texas to join the Confederacy.D.The North planned to use the fort as a naval base in the heart of the Confederacy, while the South planned to use the base to launch blockade runners2.Which statement best describes the strategies of the North and South during the blockade of Charleston during the Civil War?A.The North wanted to keep out slave ships from Africa, and the South wanted to ship cotton to Europe.B.The North sought to prevent all imports and exports, and the South wanted to import weapons and supplies from EuropeC.The North wanted to prevent only weapons imports, and the South wanted to export products as usual.DThe North decided to focus its blockade just on Charleston, and the South wanted to launch blockade runners to take down enemy ships3.Which statement accurately compares the military strategies of the North and South regarding control of the Mississippi River during the Civil War?A.The North sought use of the river to ship freed slaves to Northern cities, while the South wanted to use the river to ship cotton to Northern cities.B.The North sought control of the river to ship grain, while the South wanted control of the river to launch attacks on the city of St. Louis.C.The North wanted control of the river to divide the South in two, while the South wanted use of the river to keep the Confederacy strong.D.The North wanted the river as a source for fresh water for its troops, while the South wanted to use the river only for transportation4.After Robert Smalls escaped to the Union army, how did he play an important role in the outcome of the war?A.He traveled to Europe and convinced England and France to remain neutral in the war.B.He became an influential voice in convincing Lincoln to recruit black soldiers for the war effort.C.He returned to the Charleston area repeatedly to capture other Confederate ships for the Union navy,D.He moved to Canada and encouraged other escaped slaves to do the same in case of Confederate victory5.What was the strategy behind the development of the Hunley submarine?A.It was developed as payback for the blockade on the South, and used to lead a surprise attack on port cities in the North.B.It was used to secretly deliver soldiers from the South into Northern territory by way of the Mississippi River.C.It was developed with the goal of breaking through the Union blockade surrounding the port cities of South Carolina.D.It was created as a threat to the Union forces, but was never meant to be used in battle due to lack of success in testing In which way are photosynthesis and cellular respiration different?APhotosynthesis used carbon dioxide, while cellular respiration produces carbon dioxideBCellular respiration stores ATP, while photosynthesis releases ATPCCellular respiration produces oxygen, while photosynthesis uses oxygenDPhotosynthesis releases energy, while cellular respiration stores energy 17 1/2% as a decimal Find the unknown side length x. Write your answer in simplest radical form.A.35B.40C.45D.48Please select the best answer from the choices providedABCD The length of a rectangle is 4 meters less than 2 times the width of the perimeter is 40 meters. Find the width. Solve the problem that involves computing expected values in a game of chance. A numbers game run by many state governments allows a player to select a three-digit number from 000 to 999. There are 1000 such numbers. A bet of the $1 is placed on a number. If the number is selected the player wins $100 if any other number is selected the player wins nothing find the expected value for the game A) -$0.10B)$0.90C)-$0.90D)$0.10 Solve the equation f/21=24 Nicky wants to surround a painting 5 inches by 11 inches with a frame that is w inches wide. Write a quadratic function A in standard form to represent the combined area A of the picture and the frame.A(w) = w2 + w + Simplify(10^-2/10^3)^-1a-100,000B 1/-10 C1/10D 100,000 If f(x) = 1/9x-2, what is f-1 (x)? Please help me the answers with an x next to them are wrong, and its not the other way around please help!!