1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
5

Which of these is the function of a modeler?

Computers and Technology
2 answers:
Liono4ka [1.6K]3 years ago
5 0

Answer:

Create 3D assets from sketches

Explanation:

A modeler Job is to model all of the 3D/2D assets needed to obtain the final result wanted by the developers. The modeler creates the assets from sketches or images provided to him according to the theme.

Zanzabum3 years ago
4 0
B, create 3D assets from sketches

in video game references, modelers are pretty much paid by developers to bring they’re games to life up to date with current life
You might be interested in
Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
babymother [125]
<span>Conflict of IP address in the computers. when computer are networked each computer is given a unique IP address. If two computers have the same IP there will be conflict which lead to failure in sending and receiving data within the network. It can be resolved by checking the IP addresses of each computer and correcting it.</span>
3 0
3 years ago
Read 2 more answers
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
2 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
NNADVOKAT [17]

The Windows Operating System is an operating system used on most Wintel PCs throughout the world.

E) is an operating system used on most Wintel PCs throughout the world.

<u>Explanation:</u>

An operating system can be defined as a system software whose main function is to act as an interface between the user and the computer.  It performs different administrative elements of a PC and gives a graphical UI to the client with the goal that they can impart to the PC.  

Wintel is a PC exchange industry term for PCs dependent on the Intel chip and one of the Windows working frameworks from Microsoft. In the zone of work area and smart phones, Windows is commonly above 70% in many markets and at 78% all inclusive, Apple's macOS at around 14%, Google's ChromeOS at about 3% (in North America) and Linux at around 2%.  

The term Wintel PCs originate from the mix of two words: Windows and Intel, which allude to the PCs that work on the Windows Operating System and use Intel Processors.

6 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Other questions:
  • When you sort a cell range using a to z or z to a, what is rearranged?
    5·1 answer
  • The layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formattin
    13·1 answer
  • If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?
    10·2 answers
  • What does the acronym GIF stand for? Graphics Interface Format Graphics Interchange Format Going Into Files Gathering Informatio
    12·2 answers
  • According to the author, there are five hedging strategies organizations can pursue. One of them is: Select one: a. commit with
    5·1 answer
  • Types of operating systems
    5·2 answers
  • How to stay organized in an online school?
    7·1 answer
  • If you have configured your prompt so that it does not show your working directory, you can use the ____ command to verify in wh
    15·1 answer
  • What is HTML? Write some future of HTML.<br>follow for follow ​
    15·2 answers
  • Answer all of the questions,
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!