填空题Dragon Dictate is the software which is used to help the disabled in library use.____

填空题
Dragon Dictate is the software which is used to help the disabled in library use.____

参考解析

解析:
由题干中关键词“Dragon Dictate”可定位至G段。由本段可知,该软件是专门为残疾人(people with disabilities)设计的,可以通过语音识别系统进行注册。故匹配段落为G段。

相关考题:

The Internet is a(66)network of networks which interconnects(67)ranging from the simplest personal computers to the most sophisticated mainframes and supercomputers. This network of networks is used for an extraordinary range of purposes - long distance collaborations, retrieving free software and documents,(68)library catalogs,(69)in t6 supercomputers - the list of current Internet activities and(70)is large and the range of possible future applications is as unlimited as our imagination.A.worldwideB.abroadC.largeD.extensive

Which command returns a list of commands in which a given keyword is used throughout the Junos hierarchies?() A. help topicB. help referenceC. help aproposD. help tip

Which CLI command is used to upgrade a Juniper router?() A.load packageB.load override terminalC.request system software addD.request system software upgrade

Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?() A. Spam blockerB. Anti-VirusC. Anti SpywareD. Anti adware

Black-box and white-box testing method ale often used in software testing phase, in which, the white-box is mainly used to test software's(73).A.external function of a programB.reasonableness of structureC.internal logic of a programD.correctness of a program

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the ( 请作答此空) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. functional requirements功能需求B. nonfunctional requirements非功能需求C. system constraint系统约束D. system operational environment系统运行环境

Which statement about Frame Relay is not true?()A、Static mapping is used when the remote router does not support Inverse ARP.B、Frame Relay Inverse ARP requires LMI capability to construct an address to the DLCI mapping tableon the router.C、Frame Relay Inverse ARP is disabled by default in Cisco IOS Software for all protocols that areenabled on the physical interface.D、Inverse ARP does not work when LMI is disabled.E、Frame Relay provides forward and backward congestion notification messages

On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled

NAS, SAN, and Tape library are MOST commonly used for which of the following?()A、System paging fileB、Virtual memoryC、GPU processingD、Backup and file storage

A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()A、Has there been any recent loss of data?B、How many tape drives are in the Library?C、What tape technology is currently being used?D、What software is being used for restoring the data?

Performance monitoring of a poorly performing system indicates a high level of CPU usage. Which tool can be used to help identify which processes are using excessive CPU resources?()A、sarB、topasC、iostatD、vmstat

Which command returns a list of commands in which a given keyword is used throughout the Junos hierarchies?()A、help topicB、help referenceC、help aproposD、help tip

Which three port states are used by RSTP 802.1w?()A、ListeningB、LearningC、ForwardingD、BlockingE、DiscardingF、Disabled

Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()A、Spam blockerB、Anti-VirusC、Anti SpywareD、Anti adware

Which of the following commands should be used to obtain information about the software packages available on the installation media?()A、 lsattrB、 inutocC、 installpD、 lsresource

Which of the following resources help ensure hardware and software compatibility with IBM System x and BladeCenter servers?()A、IBM Configuration and Option GuideB、IBM System SalesC、IBM ServerProvenD、IBM Techline Web site

Which fastpath would be used to go directly to commit applied software?()A、 smit commitB、 smit installC、 smit softwareD、 smit verify_install

Which of the following commands should be used to obtain information about the installed software?()A、 smit systemB、 smit installpC、 smit licensesD、 smit list_software

What IBM resource is a search engine used to match hardware and software requirements to help you maximize your sales opportunities? ()A、IBM Solutions and Options GuideB、IBM Configuration and Options GuideC、IBM Sizing GuidesD、IBM Server Proven

Which of the following commands can be used to obtain information about the installed software?()A、 lslpp -LB、 uname -sC、 oslevel -qD、 installp -p

Which component of the SGA stores parsed SQL statements is used for process sharing?()A、Buffer cache B、Redo log buffer C、Private SQL area D、Library cache E、Row cache

You are developing a Windows Presentation Foundation (WPF) application The application is for commercial use and requires a valid license key to be entered. You create a project type of Class Library code to validate license keys You need to ensure that the user enters a valid license key during installation of the software. Which deployment should reference the class library?()A、Click OnceB、Setup ProjectC、XBAPD、XCopy

单选题Which fastpath would be used to go directly to commit applied software?()A smit commitB smit installC smit softwareD smit verify_install

填空题Dragon Dictate is the software which is used to help the disabled in library use.____

单选题Which of the following commands should be used to obtain information about the software packages available on the installation media?()A lsattrB inutocC installpD lsresource

单选题Which of the following commands can be used to obtain information about the installed software?()A lslpp -LB uname -sC oslevel -qD installp -p

单选题Which of the following commands should be used to obtain information about the installed software?()A smit systemB smit installpC smit licensesD smit list_software

单选题Library computers on the ground floor _____.Ahelp students with their field experimentsBcontain software essential for schoolworkCare for those who want to access the wi-fiDare mostly used for filling out application forms