1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
9

Which describes the third step in visual character development

Computers and Technology
2 answers:
allsm [11]3 years ago
5 0

I would say 3-D model!!!! not 100% sure but this sounds most correct!

katrin2010 [14]3 years ago
4 0

Answer: creating a 3D model of the character.

Explanation:

3D modeling is a technique in computer graphics for producing a 3D digital representation of an object.

A special software is used to manipulate points in virtual space(called vertices) to form a mesh. MESH is a collection of vertices that form an object.

3D objects can be generated automatically or manually by deforming the mesh, or manipulating vertices.

3D models are used for a variety of mediums including video games, MOVIES, architecture, illustration, engineering, and commercial advertising.

You might be interested in
ASAP BRAINLIEST!!!
Andre45 [30]

Answer:

closed sounds right, dobt take my word for it doe

8 0
3 years ago
_____ interviews rely on scenarios and reflections to evaluate an applicant’s skill set.
ra1l [238]
I think its behavioral
4 0
3 years ago
Read 2 more answers
Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What
Mamont248 [21]

Answer:

Harley-Davidson Motor Company

Explanation:

Harley-Davidson produces and sells custom-made, touring as well as cruiser motorcycles that feature elegant styling,  modern innovative design, and high quality performance with the ability to customize to ones taste.  Harley-Davidson moved 95% of their x86 server workloads to virtualized environments utilizing VMware infrastructures as of 2018. They report to have being able to have higher system availability, effective and simple disaster recovery capabilities, improved operation efficiencies, and cloud-ready infrastructure. One of the major challenges of virtualization is Security, Virtual systems can easily get compromised.

8 0
3 years ago
The pseudoinstructions that are available in an assembly language programming environment usually found in the Select one: a. CP
mafiozo [28]

Answer:

b

Explanation:

CPU manual provides guides to use a CPU.

Assembler manual provides guide on how to use an assembler and so is the case for compiler.

For a particular machine, it set of instructinos are available with the programmer.

6 0
3 years ago
An audit trail is a record of how a transaction was handled from input through processing and output
Nostrana [21]

The answer is : True.  An audit trail is a record of how a transaction was handled from input through processing and output.  An audit trail is the evidence, such as purchase orders and invoices, that a financial transaction actually occurred.

6 0
3 years ago
Other questions:
  • Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
    12·1 answer
  • That is Entrepreneur ? ?<br>​
    8·1 answer
  • What is <br> central vision
    12·2 answers
  • What is the voltage drop across R4 in the diagram shown above?
    13·1 answer
  • Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
    6·1 answer
  • public interface Displayable { void display(); } public class Picture implements Displayable { private int size; public void inc
    14·1 answer
  • What are the routes through with Virus transmitted into computer<br>system?​
    15·1 answer
  • What is the minimum number of bits you would need to represent a number on a 0 to 10 scale
    15·1 answer
  • Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.
    9·1 answer
  • How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private go
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!