网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

英译中:Voice recognition


参考答案

更多 “ 英译中:Voice recognition” 相关考题
考题 Recognition is the process of incorporating in the balance sheet or income statement an item that meet the definition of an element and satisfies the recognition criteria.() 此题为判断题(对,错)。

考题 In John Whitehead's opinion, which statement is true?A.Face recognition technology may interfere with people's privacy.B.Face recognition technology may enhance the country's constant surveillance.C.Face recognition technology can be used in the same way wiretaps are used.D.Face recognition technology can be used after its threat has been removed.

考题 What is this passage mainly about?A.Disadvantage of face recognition technology.B.Purposes of face recognition technology.C.Controversial face recognition technology.D.Effect of face recognition technology.

考题 Use active voice rather than passive voice in your personal statement.()

考题 哪位 帮我翻译一下: Because speech is the most convenient form of communication, in the future we want essentially natural conversations with computers. The primary point of contact will be a simple device that will act as our window on the world. You will simply talk to it. The device will be permanently connected to the Internet and will beep relevant information up to you as it comes in.Just how quickly people will adapt to a voice-based Internet world is uncertain. Many believe that, initially at least, we will need similar conventions for the voice to those we use at present on screen: click, back, forward, and so on. But soon you will undoubtedly be able to interact by voice with all those IT-based services you currently connect with over the Internet by means of a keyboard. This will help the Internet serve the entire population, not just techno-freaks.Changes like this will encompass the whole world. Because English is the language of science, it will probably remain the language in which the technology is most advanced, but most speech-recognition techniques are transferable to other language provided there is sufficient motivation to undertake the work..

考题 Refertotheexhibit.TheLCFSoftballLeagueisestablishingvoice-mailgroupstomoreefficientlysendmessagesforraindelaysandotherimportantmatters.IftheorganizationcheckstheIntegratedMessagingbox,membersofthisgroupwillbeallowedwhatIMAP-enabledprivilege?()A.e-mailandvoice-mailmessageintegrationB.voice-mailandinstantmessageintegrationC.email,voice-mailandinstantmessageintegrationD.voice-mailmessagesmaybesentbyemailE.voice-mailmessagesmaybereceivedbyemail

考题 共用题干 第二篇Credit Card Only Works When Spoken ToA credit card that will not work unless it hears its owner's voice could become an important weapon in the fight against fraud(欺骗).The card requires users to give a spoken password that it recognizes using a built-in voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using someone else's credit card details to buy goods online.A model built by engineers at Beepcard in Santa Monica,California,represents the first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip into a standard-sized credit card.They are not quite there yet:the card is the length and width of an ordinary credit card, but it is still about three times as thick.The company now plans to make it thinner.The voice card is based on an earlier Beepcard technology designed to prevent fraud in online transactions.This earlier card has no microphone,but has a built-in loudspeaker that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an online server.By verifying(证实)that the signal matches the card details,the server can establish that the user is not simply keying in a credit card number but actually has the card to hand. The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.This prevents fraudsters recording the beeps, noting the card details and then playing back the audible ID when they key in the details later.But this earlier technology cannot prevent fraudulent use of stolen cards.The new one can.The new voice card also identifies itself by its ID squawk,but it will not do this until it has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use the card because even if they knew the password they would have to be able to copy the owner's voice with a high degree of accuracy.The challenge for Beepcard has been to develop voice-recognition and audio circuitry that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximizebattery life,the electronics are only switched on when the card is being used.Pressing a button on the card's surface prompts it to utter "Say your password" in female voice.If the voice-recognition software proves that the password is authentic(真实的),it sends its IDsquawk which the server then identifies,allowing the transaction to proceed.What can we learn from the last paragraph about the voice card?A:Only female voice passwords could be recognized.B:Further improvement should be made to extend battery life.C:There is no!imit to its application.D:Female customers like to use it.

考题 共用题干 第二篇Credit Card Only Works When Spoken ToA credit card that will not work unless it hears its owner's voice could become an important weapon in the fight against fraud(欺骗).The card requires users to give a spoken password that it recognizes using a built-in voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using someone else's credit card details to buy goods online.A model built by engineers at Beepcard in Santa Monica,California,represents the first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip into a standard-sized credit card.They are not quite there yet:the card is the length and width of an ordinary credit card, but it is still about three times as thick.The company now plans to make it thinner.The voice card is based on an earlier Beepcard technology designed to prevent fraud in online transactions.This earlier card has no microphone,but has a built-in loudspeaker that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an online server.By verifying(证实)that the signal matches the card details,the server can establish that the user is not simply keying in a credit card number but actually has the card to hand. The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.This prevents fraudsters recording the beeps, noting the card details and then playing back the audible ID when they key in the details later.But this earlier technology cannot prevent fraudulent use of stolen cards.The new one can.The new voice card also identifies itself by its ID squawk,but it will not do this until it has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use the card because even if they knew the password they would have to be able to copy the owner's voice with a high degree of accuracy.The challenge for Beepcard has been to develop voice-recognition and audio circuitry that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximizebattery life,the electronics are only switched on when the card is being used.Pressing a button on the card's surface prompts it to utter "Say your password" in female voice.If the voice-recognition software proves that the password is authentic(真实的),it sends its IDsquawk which the server then identifies,allowing the transaction to proceed.What is the problem with the model card?A:It is too large.B:It is too thick.C:It can't be used in online transactions.D:It doesn't have a loudspeaker.

考题 共用题干 第二篇Credit Card Only Works When Spoken ToA credit card that will not work unless it hears its owner's voice could become an important weapon in the fight against fraud(欺骗).The card requires users to give a spoken password that it recognizes using a built-in voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using someone else's credit card details to buy goods online.A model built by engineers at Beepcard in Santa Monica,California,represents the first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip into a standard-sized credit card.They are not quite there yet:the card is the length and width of an ordinary credit card, but it is still about three times as thick.The company now plans to make it thinner.The voice card is based on an earlier Beepcard technology designed to prevent fraud in online transactions.This earlier card has no microphone,but has a built-in loudspeaker that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an online server.By verifying(证实)that the signal matches the card details,the server can establish that the user is not simply keying in a credit card number but actually has the card to hand. The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.This prevents fraudsters recording the beeps, noting the card details and then playing back the audible ID when they key in the details later.But this earlier technology cannot prevent fraudulent use of stolen cards.The new one can.The new voice card also identifies itself by its ID squawk,but it will not do this until it has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use the card because even if they knew the password they would have to be able to copy the owner's voice with a high degree of accuracy.The challenge for Beepcard has been to develop voice-recognition and audio circuitry that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximizebattery life,the electronics are only switched on when the card is being used.Pressing a button on the card's surface prompts it to utter "Say your password" in female voice.If the voice-recognition software proves that the password is authentic(真实的),it sends its IDsquawk which the server then identifies,allowing the transaction to proceed.What is the advantage of the new voice card?A:It recognizes only its owner's spoken password.B:It doesn't need to work with an on!mne server.C:It requires less ID information.D:It has a playback function.

考题 共用题干 第二篇Credit Card Only Works When Spoken ToA credit card that will not work unless it hears its owner's voice could become an important weapon in the fight against fraud(欺骗).The card requires users to give a spoken password that it recognizes using a built-in voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using someone else's credit card details to buy goods online.A model built by engineers at Beepcard in Santa Monica,California,represents the first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip into a standard-sized credit card.They are not quite there yet:the card is the length and width of an ordinary credit card, but it is still about three times as thick.The company now plans to make it thinner.The voice card is based on an earlier Beepcard technology designed to prevent fraud in online transactions.This earlier card has no microphone,but has a built-in loudspeaker that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an online server.By verifying(证实)that the signal matches the card details,the server can establish that the user is not simply keying in a credit card number but actually has the card to hand. The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.This prevents fraudsters recording the beeps, noting the card details and then playing back the audible ID when they key in the details later.But this earlier technology cannot prevent fraudulent use of stolen cards.The new one can.The new voice card also identifies itself by its ID squawk,but it will not do this until it has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use the card because even if they knew the password they would have to be able to copy the owner's voice with a high degree of accuracy.The challenge for Beepcard has been to develop voice-recognition and audio circuitry that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximizebattery life,the electronics are only switched on when the card is being used.Pressing a button on the card's surface prompts it to utter "Say your password" in female voice.If the voice-recognition software proves that the password is authentic(真实的),it sends its IDsquawk which the server then identifies,allowing the transaction to proceed.Which of the following statements about the earlier card is true?A:Its owner can change the ID code freely.B:lts user does not need to key in the ID number.C:It can record its user's spoken password.D:It still can be used by someone else after being stolen.

考题 共用题干 第二篇Credit Card Only Works When Spoken ToA credit card that will not work unless it hears its owner's voice could become an important weapon in the fight against fraud(欺骗).The card requires users to give a spoken password that it recognizes using a built-in voice-recognition chip.The idea is to prevent thieves using a stolen card or fraudsters using someone else's credit card details to buy goods online.A model built by engineers at Beepcard in Santa Monica,California,represents the first attempt to pack a microphone,a loudspeaker,a battery and a voice-recognition chip into a standard-sized credit card.They are not quite there yet:the card is the length and width of an ordinary credit card, but it is still about three times as thick.The company now plans to make it thinner.The voice card is based on an earlier Beepcard technology designed to prevent fraud in online transactions.This earlier card has no microphone,but has a built-in loudspeaker that it uses to " squawk"(发出叫声)a voice ID signal via a computer's microphone to an online server.By verifying(证实)that the signal matches the card details,the server can establish that the user is not simply keying in a credit card number but actually has the card to hand. The ID code changes each time the card is used in a pre-ordered sequence that only the server knows.This prevents fraudsters recording the beeps, noting the card details and then playing back the audible ID when they key in the details later.But this earlier technology cannot prevent fraudulent use of stolen cards.The new one can.The new voice card also identifies itself by its ID squawk,but it will not do this until it has verified the legitimate(合法的)user's spoken password. Thieves will be unable to use the card because even if they knew the password they would have to be able to copy the owner's voice with a high degree of accuracy.The challenge for Beepcard has been to develop voice-recognition and audio circuitry that can be powered by a mini battery embedded(嵌入的)in a credit card. To maximizebattery life,the electronics are only switched on when the card is being used.Pressing a button on the card's surface prompts it to utter "Say your password" in female voice.If the voice-recognition software proves that the password is authentic(真实的),it sends its IDsquawk which the server then identifies,allowing the transaction to proceed.The voice credit card is an important invention becauseA:it can be made cost-effectively.B:it can leave voice messages.C:it makes online shopping easy.D:it makes fraud difficult.

考题 You have a good voice.()AThank youBNot at allCJust so soDMy voice isn't good

考题 Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

考题 Which two statements about voice VLANs are correct?()A、Voice VLANs eliminate the need for QoS configurationB、Voice VLANs are used on trunk links to eliminate the need for QoS CoS markingsC、Voice VLANs are mainly used to reduce the number of access switch ports that are used in the networkD、Voice VLANs can be configured to forward existing CoS priorities or override themE、Voice VLANs are mainly used between access layer switches and distribution layer switchesF、Voice VLANs can be configured on Layer 2 ports only

考题 You have a good voice.()A、Thank youB、Not at allC、Just so soD、My voice isn't good

考题 Which two statements are true about voice packets in a LAN? (Choose two.)  ()A、 Voice traffic data flow involves large volumes of large packets.B、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.C、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.D、 Voice packets are very sensitive to delay and jitter.E、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.

考题 What does the interface subcommand switchport voice vlan 222 indicate?()A、The port is configured for both data and voice traffic.B、The port is fully dedicated to forwarding voice traffic.C、The port will operate as an FXS telephony port.D、Voice traffic will be redirected to VLAN 222.

考题 You have configured voice VLANs on Catalyst switch R1.  Which two statements are true about the  operation of voice VLANs on this device? ()A、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port.B、 Enabling voice VLANs enables the switch to create multiple queues for traffic that is entering a  port.C、 When voice VLANs are configured on a trunk link, UplinkFast must also be enabled.D、 Voice VLANs are configured to enable the switch to forward frames marked with the proper  CoS values over separate physical links.E、 Enabling voice VLANs enables the switch to forward frames with a specific 802.1P marking.

考题 Which two statements are true about voice VLANs?()A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch portsB、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesC、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneD、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandE、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portF、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

考题 Which two statements are true about the configuration of voice VLANs?()A、Static secure MAC addresses can be configured in conjunction with voice VLANs.B、PortFast is automatically enabled when voice VLANs are configured.C、PortFast must be manually configured when voice VLANs are configured.D、Voice VLANs are typically configured on uplink ports.E、Voice VLANs are typically configured on access ports.

考题 Which statement is true about voice VLANs? ()A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B、The voice VLAN feature is enabled by default.C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D、The default CoS value is 1 for incoming voice and data traffic.

考题 Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

考题 Which two statements correctly identify factors to consider when Configuring WAN QoS?()A、Voice Traffic uses Assured ForwardingB、Voice Signaling traffic uses Assured ForwardingC、Voice Signaling traffic uses priority queuingD、Voice Traffic uses priority queuingE、Voice signaling traffic should use priority queuing with Assured Forwarding

考题 Voice quality is bad due to high delay and jitter on a link. Which two actions will improve the quality  of voice calls?()A、Increase the queue size of the voice class.B、Guarantee bandwidth during congestion to the voice class with a bandwidth command.C、Increase the tx-ring of the egress interface.D、Implement LLQ for the voice class.E、Decrease the rx-ring of the egress interface.F、Decrease the queue size of the voice class.

考题 多选题Voice quality is bad due to high delay and jitter on a link. Which two actions will improve the quality  of voice calls?()AIncrease the queue size of the voice class.BGuarantee bandwidth during congestion to the voice class with a bandwidth command.CIncrease the tx-ring of the egress interface.DImplement LLQ for the voice class.EDecrease the rx-ring of the egress interface.FDecrease the queue size of the voice class.

考题 名词解释题英译中:Voice recognition

考题 名词解释题cell recognition (细胞识别)