1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
12

What are the three modes of the 3D transform manipulator

Computers and Technology
1 answer:
MrMuchimi3 years ago
4 0
The 3D transform manipulator is used to transform any object in a 3D scene and has three transform operation modes.
1. Translation mode<span>- allows mouse controlled translation in 3D view.</span>
2. Rotation mode - allows mouse controlled rotation in 3D view.
3. Scale mode - allows mouse controlled scaling in 3D view.
All these modes can be accessed on the Transform Orientation menu.



You might be interested in
On a wireless network use _____ to ensure that only authorized client computers are able to access the wireless network.
grigory [225]

Answer:

That

your answer

MAC address filtering

5 0
3 years ago
The type of operating system best suited to controlling a massive multiplayer online game is _____.
Nina [5.8K]

Answer:

Distributed

Explanation:

5 0
3 years ago
Started: Sep 28 at 1:45p 5 Quiz Instructions les 1 pts Question 1 Computer Hardware can consist of what​
Furkat [3]

Answer:

t

Explanation:

8 0
3 years ago
John typed 545 words in 35 minutes, what is his typing speed
Katarina [22]

Answer: 545 words per 35 mins

Explanation:

4 0
3 years ago
Read 2 more answers
• what command-line utility can you use to assign the correct dns server ip address
Lilit [14]
On A Windows machine, you can use the netsh command.
<span>netsh interface ip set dns name="Local Area Connection" static 208.67.222.222

All the steps below means you have access to the router via Telnet or physical access  and it already has a valid configuration (except the DNS)
On a Cisco Router is:
</span><span>Step 1:  <span>enable 
</span></span><span>Step 2: <span>configure <span>terminal 
</span></span></span><span>Step 3: <span>Do one of the following: <span><span>ip domain name name
                                                       </span><span><span>ip domain list </span><span>name
</span></span></span></span></span><span>Step 4 : Device(config)# ip name-server 172.16.1.111 172.16.1.2</span>
5 0
3 years ago
Other questions:
  • If your address is 10 B Street, what are the first three bytes in ASCII
    12·1 answer
  • Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
    9·1 answer
  • How do you screen shot and copy paste the screenshot from chrome book
    11·2 answers
  • In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not inc
    10·1 answer
  • The first numerical control machine tool was demonstrated in 1952 in the United States at the Massachusetts Institute of Technol
    14·1 answer
  • Which of the following is NOT a valid name for a function?
    5·1 answer
  • Is a defense of a political position an argument
    7·1 answer
  • A drive is small enough to be carried in one's pocket.
    6·1 answer
  • When right-clicking an object, a ____ menu appears, which contains frequently used commands related to the object.
    7·1 answer
  • An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!