Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Advantage of Notepad’s Text-to-Audio Feature

computer_that_talks_400.jpgSome people talk to their computers, but not like they would speak to another human being. We coax it into doing it what we want, or we curse it out when it doesn’t. A day may come when artificial intelligence has progressed so far that we won’t be able to distinguish a computerized conversation from a normal one; but it is not this day. Until that glorious day comes, we’ll have to settle for these two methods to interact verbally with your PC.

My Notepad Sure Has a Big Mouth
We bet you didn’t know that the Windows Operating System has a tool installed on its Notepad that allows it to convert text to audio. However, this feature isn’t available without a little tinkering on your part. It requires a bit of programming, but infusing life into your Notepad is as easy as copying some text and slapping it on the page.

It’s Alive!
First, you want to open Notepad. Copy and paste this text into Notepad:

Dim msg, sapi
msg=InputBox("Enter your text for Conversation | Tool by Irshad (http://pctricksonline.blogspot.com)","PC Hacks Text-To-Audio Converter")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Go to File > Save As, and make sure that the file type reads text_audio.vbs. Afterward, close the note and open the text_audio.vbs file. A magic little box will appear on your screen. Type your text into the box and pat yourself on the back; you’ve just breathed life into an inanimate object (sort of). Fun things to type into this include, but are not limited to, “Help! I’ve been turned into a computer,” “Look at me. I’m a computer programmer,” and “Kneel before me, humans!”

That’s Not What I Said
If you don’t want to try your hand at programming Notepad to breathe life into your PC, you could always try using Google Voice Search. This is a standard Google Chrome feature, and is very easy to use. You simply go to Google’s homepage and click on the microphone icon to the right of the Google search bar. Then, you speak into your microphone and Google will search for it. The more the app is used, the more accurate it becomes. You might want to consider turning Safe Search on if you are afraid of what you might accidentally search for. You never know what you might find on the Internet.

“Smart” Phones
For those who want a simpler experience, there are always the apps offered for smartphones. Apple offers Siri for iOS, and Android has Google Now. It’s better than the magic 8-ball, we suppose, and you shouldn’t get too bored talking to them. Just remember, nothing is better than actual human interaction.

These technologies are just a taste of what’s to come over the next few years. Technology advancement is growing at an alarming rate, so keep your eyes peeled for other great interactive programs. What are your favorite interactive apps, and why? Share it with us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Virtualization Gadgets Saving Money Holiday Social Media Tech Term Chrome Managed Service Automation Microsoft Office Managed IT Services Computers Artificial Intelligence Facebook Operating System Cybercrime Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Health Internet of Things Alert Remote Spam Office 365 Telephone Systems Covid-19 Information Information Technology Managed Service Provider Bandwidth Router Social Engineering Recovery Mobility Employer-Employee Relationship BDR Mobile Computing Remote Monitoring Password Application Money Encryption App History Applications Data Breach Big Data Law Enforcement Human Resources Remote Computing How To Managed IT Mobile Office Apps Blockchain Data Storage Paperless Office Patch Management Office Tips Training VPN Government Private Cloud Flexibility Marketing Mouse HaaS WiFi IT solutions Bring Your Own Device Entertainment Data Management Website Work/Life Balance Budget Vulnerability Windows 7 Word Wireless Google Drive Infrastructure Voice over Internet Protocol Gmail Servers Settings Avoiding Downtime Two-factor Authentication Data Security Apple Save Time Social User Error Cleaning Meetings Vendor USB Managed Services Staff Display Software as a Service Telephone System Conferencing End of Support Risk Management Machine Learning Hacker Scam Education Physical Security Connectivity Remote Work Safety Employee/Employer Relationship The Internet of Things HIPAA Lithium-ion battery Sports Redundancy RMM Keyboard Vendor Management Firewall Data Protection Virtual Reality Solid State Drive Computer Accessories Wireless Technology Samsung How to Downtime Procurement Net Neutrality Comparison Network Congestion Workplace Strategy Value eWaste Help Desk Data storage CES Printing Spam Blocking Electronic Medical Records Automobile Printer Bluetooth Business Technology Content Management Computing Infrastructure Access Control Hiring/Firing Wearable Technology Going Green Managed Services Provider Retail Virtual Assistant Hard Drives Instant Messaging Authentication Database Robot Excel IT Consultant Battery Remote Workers Biometrics Shadow IT Virtual Desktop Legal Business Intelligence Processor Update Humor Audit Internet Exlporer Worker DDoS IT Management Hard Drive Google Docs Botnet PDF Identity Theft SharePoint IT Plan Computing Proactive IT Customer Service Unsupported Software Best Practice Augmented Reality Environment YouTube Charger Fraud Fax Server Black Market Digital Signage Compliance Remote Worker OneNote Virus Computer Care SaaS Cryptocurrency Current Events Unified Threat Management Document Management Telephony AI Root Cause Analysis Cache IT Infrastructure Amazon Web Services Bing Music IaaS Maintenance Managing Stress FinTech HBO Safe Mode Knowledge Criminal Files Social Network Hosted Computing Skype GDPR Bloatware Data loss Wireless Internet Cameras Chromecast Investment Online Shopping Troubleshooting Employees Outlook File Sharing Tablets Employee/Employer Relationships Leadership Colocation Inventory Uninterrupted Power Supply ISP Specifications Windows 365 Start Menu Camera Entrepreneur Video Conferencing Screen Mirroring Wire ROI Loyalty Evernote Shortcuts Books Travel Shortcut Sales Frequently Asked Questions Monitor Bitcoin Cost Management Personal Windows 10s Cryptomining Millennials Point of Sale Mobile Printers Social Networking Supply Chain Management Cast Smart Office Printer Server Wireless Charging Streaming Media Emergency Monitoring Tip of the week Reputation Batteries webinar Virtual Private Network Digitize Public Cloud Tech Support Employer Employee Relationship Workforce Content Windows 8.1 Professional Services Running Cable Techology Laptop Windows Server 2008 R2 Assessment Cables Customer relationships Windows Server 2008 Memory Customers Email Best Practices Tools Project Management IT Assessment Nanotechnology Manufacturing Telecommuting Audiobook Touchpad Television Cortana Managed IT Service Digital Signature Security Cameras Computer Tips Virtual CIO Warranty Advertising OneDrive Biometric Security Politics Peripheral HVAC Science Public Computer Google Apps Using Data Analysis Notifications Transportation Digital Security Cameras Regulations Administrator Consultant Copiers Computer Fan Devices 5G Rootkit Distributed Denial of Service Customer Relationship Management Quick Tip Enterprise Content Management Analytics Relocation Workers Accountants Smartwatch Benefits Ergonomics MSP Analyitcs Microchip Programming Best Available Development FENG Thought Leadership OLED Credit Cards WIndows 7 Video Games PCI DSS Password Management Virtual Machine IBM Password Manager Fiber Optics Employee Smart Technology Multi-Factor Security Worker Commute 2FA Flash Experience Search Engine Messaging Twitter Cabling Antivirus Scalability Policy Software Tips NIST Windows 8 Hypervisor Supercomputer Business Mangement Trend Micro Emails Smart Tech Trending IT service Business Owner Dark mode Sync SMS Addiction NarrowBand Default App Amazon User Search Procedure Tablet PowerPoint Saving Time Recycling Windows Media Player iPhone Shopping Netflix Practices Google Search Two Factor Authentication Domains dark theme Wiring

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code