1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sliva [168]
3 years ago
9

3. By default, Blender® remembers your last 32 actions and allows you to undo them one at a time by pressing CTRL+Z. (1 point)

Computers and Technology
1 answer:
Setler [38]3 years ago
3 0
Answers:

(3) True
(4) Num Lock

Explanations:
(3) To undo any task in most of the softwares including Blender, CTRL + Z is used. If you want to double check, go to preference ->  Input -> Search for undo. You would see CTRL + Z shortcut there for one time undo (as shown in the picture 1 attached.) Hence (TRUE).

(4) As in blender, during the scene creation, the designers usually use top, left, right or bottom view. Blender has the built-in keys set for those views. As you can see in the second image that the Top view is set to NumPad 7 (likewise others set to other numbers). In order to use the those numpad numbers, you must turn on the NumLock! Hence NumLock is the answer.

You might be interested in
Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when man
GrogVix [38]

Answer:

Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.

Explanation:

Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.

4 0
3 years ago
The data selected to create a table must include
Novay_Z [31]

The column names and data types.

4 0
3 years ago
Read 2 more answers
Can someone please tell me what I’m doing wrong ? Please and it’s due on Thursday!!
liberstina [14]

Answer:

Sure. In Unit test 5, it's looking for 1 instead of 0. You are returning 0 instead of 1.

0 requires 1 digit to express it and should therefore return 1.

In line 6, change the 0 to a 1.

8 0
2 years ago
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the
GarryVolchara [31]

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

3 0
3 years ago
Which of the following input devices responds to pressure ?
Bumek [7]

Answer:

Touch screen. It responds to pressure of your finger

4 0
3 years ago
Read 2 more answers
Other questions:
  • Connected contacts require___ to open.
    11·1 answer
  • In project integration management, project ______ and _______ are intertwined and inseparable activities
    14·1 answer
  • To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated b
    11·2 answers
  • Markup is best defined as
    11·1 answer
  • With arbitrary code execution, the ________________ launches ("spawns") a command shell from which instructions can then be issu
    11·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • My computer just fried anybody know why it did that?
    14·2 answers
  • Tennis players are not allowed to swear when they are playing in Wimbledon
    6·2 answers
  • Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter.
    6·1 answer
  • The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!