1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
2 years ago
5

how do you make a 3d project im a huge programer and I need to know how to do it or all I do will be considered retro gaming

Computers and Technology
1 answer:
aivan3 [116]2 years ago
6 0
Bacon, go to the bacon! WORSHIP THE BACON!!!!!!!
You might be interested in
Explain how it is possible for a sequence of packets transmitted through a wide area network to arrive at their destination in a
dalvyx [7]

Answer:

- Different route paths, due to dynamic routing in WAN.

- Local area networks have one or very few paths to destination and does not require dynamic routing.

Explanation:

A wide area network is a network that covers a large geographical area. It goes beyond the private local area network, with more routing paths and network intermediate devices. The router is an essential tool for routing packets between devices. It requires a routing path, learnt statically or dynamically to work.

There are mainly two types of route paths, they are, static routes and dynamic routes.

The dynamic routes are used mainly in WAN. Sometimes, there can be multiple path to a destination, the router determines the best path to send the packets. It sends the sequenced packets through all available path and they arrive at the destination depending on the path used, the packets arrive in an out -of-order fashion in the destination and a rearranged.

5 0
2 years ago
Looking for similarities between concepts or problems is referred to as
cestrela7 [59]

Pattern recognition is used  for similarities between concepts or problems in an algorithm.

What is meant by pattern recognition?

Pattern recognition is a data analysis method that uses machine learning algorithms to automatically recognize patterns and regularities in data. This data can be anything from text and images to sounds or other definable qualities. Pattern recognition systems can recognize familiar patterns quickly and accurately.

An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes (for example, determine whether a given email is "spam" or "non-spam").

Therefore, Pattern recognition is used.

To know more about Pattern recognition from the given link

brainly.com/question/28427592

#SPJ1

3 0
9 months ago
If you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information. Pleas
Alik [6]

A source can be either primary or secondary. The statement that if you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information is false. A primary source provides direct or firsthand  experience, while a secondary source of information describes or analyzes the primary source. In this case, when the dentist is interviewed she is considered as primary source because she is speaking about herself and her experience.


6 0
3 years ago
Read 2 more answers
Once you resize a photograph, it cannot be returned to its original size. TRUE or FALSE
VladimirAG [237]
I believe the answer is false

8 0
2 years ago
Which is the primary use of a word processor? create, edit, format, and print text-based documents maintain a database of record
qaws [65]
<span>Which is the primary use of a word processor? 
</span>
create, edit, format, and print text-based documents

------------------------------------------------------------------------------------------------

Hope This Helps :)

P.S
If you could mark me as brainiest that would be great! :D
3 0
2 years ago
Other questions:
  • Sahil is making a graphic novel in which the villain plans to reduce the rate at which energy is released from the Sun. The vill
    7·2 answers
  • In programming, what is a floating-point number?<br>​
    7·1 answer
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • Generate the requested sets using only set builder notation and the provided sets. Some problems may require you to build one or
    15·1 answer
  • When using Regedit to browse through the registry, the key that is highlighted is the ________, and its value entries are visibl
    5·1 answer
  • The Receiver recognizes the sounds the Sender is making and transforms them into words and ideas in his own mind. What is this
    5·1 answer
  • Project manager George is defining project management to his team. How should he define project management in one sentence?
    7·1 answer
  • Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: ha
    10·2 answers
  • Write a program to enter length of a square and print area of square.<br>(class 8)​
    9·2 answers
  • How to edit slides into video.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!