1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
3 years ago
15

The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.

Computers and Technology
2 answers:
MissTica3 years ago
5 0
This statement is (True)
Andrews [41]3 years ago
4 0

Answer:

True

Explanation:

     3D Modeling is the process of creating a 3-dimensional object through specific programs for this. With this technique, you can simulate objects, scenarios, and characters in animated or static scenes. Its application is intended for various areas such as cinema, games, architecture and illustrations.

You might be interested in
Which of these monitor connector types is the oldest and least desirable to use?
ella [17]

Answer:

DVI is the oldest out of the four.

Explanation:

DVI and VGA are the oldest, but DVI is oldest and least desirable to use since it is outdated.

5 0
3 years ago
Read 2 more answers
Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
Cerrena [4.2K]

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

8 0
3 years ago
You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
Alekssandra [29.7K]

Answer:

Make use of hash tables

Explanation:

The appropriate thing to use for this should be a hash table.

A Hash Table can be described as a data structure which stores data in an associative manner. In a hash table, data is stored in an array format, where each data value has its own unique index value. Access of data becomes very fast if we know the index of the desired data. So we can perform Hashing on ISBN Number since its unique and based on the Hash Function w ecan store the Information record.

There is no requirement for printing the file in order - HashTables dont store the data in order of insertions, so no problems with that

It becomes a data structure in which insertion and search operations are very fast irrespective of the size of the data. So Querying books details can be fast and searching will take less time.

It can also be pointed out that it wont be too expensive for Hardware implemtation as HashTables stores data based on Hash Functions and memory consumption is also optimal which reduces memory wastages.

7 0
3 years ago
You need to create the directory /var/oracle/database/9i. only the directory /var currently exists. from the root of the filesys
egoroff_w [7]
To create a directory, you can use the command mkdir. Below is an example:

mkdir /var/oracle/database/9i
3 0
4 years ago
An investigator responsible for tracking e-mail communication would begin by locating what
Ainat [17]
Email headers contains information about email
6 0
3 years ago
Other questions:
  • What is the outlined area called?
    6·1 answer
  • Henry bought a new card for capturing television on his computer. When he finished going through the packaging, though, he found
    5·1 answer
  • A disadvantage of using an arithmetic mean to summarize a set of data is that __________.
    13·1 answer
  • What do financial planning skills ultimately enable an individual to do?
    10·2 answers
  • I was killed <br><br> යඞ <br><br> what do i do
    10·1 answer
  • In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be cu
    5·1 answer
  • Ou have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit en
    14·1 answer
  • I WILL GIVE THE CROWN IF CORRECT
    5·2 answers
  • How to square a number in java.
    15·1 answer
  • How serious are the risks to your computer security?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!