1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
6

Which of the following was the first full-length film to be done completely in 3-D imaging

Computers and Technology
2 answers:
motikmotik3 years ago
6 0
Toy story I believe is the answer
Ghella [55]3 years ago
4 0

Answer: toy story

Explanation:Toy Story (1995) is the first completely computer-generated, animated feature film. The visuals were entirely generated from computers. creating a wonderfully-realistic 3-D world with lighting, shading, and textures.

You might be interested in
How to add bullet points in google slides??
Anettt [7]
<span>Open a document or presentation.Add or select a text box.<span>On the toolbar, click Bulleted list  or Numbered list .<span>Note: If you don't see the option, click More.</span></span>To change the style of the bullets or numbers, click the dropdown arrow next to the icons in the toolbar</span>
6 0
4 years ago
Read 2 more answers
1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
Ira Lisetskai [31]

Answer:

c

Explanation:

It preloads the apps and softwares that you use most into thr memory so that they can boot up faster.But it consumes more ram.

5 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Which processor is better for madvr
nadya68 [22]

Answer:

The i5.

Explanation:

It has a lower clock speed, but you do note that you have more cores, same with the cache memory.

8 0
4 years ago
What imbalance is fixed by a single right rotation?
slega [8]

Answer:

It balances a tree when a long path exist in the left subtree of the left of the root.

Explanation:

Rotation is an operation which is performed on the binary tree which changes the structure of the binary tree but it does not interfere with the order of elements.

A single right rotation strategy is basically for re balancing the tree.When there is along path which exists in the left subtree of the left of the root.

3 0
3 years ago
Other questions:
  • A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification
    15·1 answer
  • Wharton professor Jerry Wind "believe[s] that digital networks are the key differentiator, [and] enable new forms of sharing, di
    9·1 answer
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • What is the most important external issue when using social media in emergency management?
    6·1 answer
  • By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memori
    6·1 answer
  • While you work on the customer’s printer, he continues chatting about his network and problems he’s been experiencing. One compl
    14·2 answers
  • A computer reads a sequence from top to bottom and left to right.
    13·1 answer
  • MODS ONLY answer this, I have something for you. I'm reporting this to make it easier
    14·1 answer
  • A column does not consist of
    10·1 answer
  • I<br> What is a Watermark?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!