1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
8

Blender questions

Computers and Technology
2 answers:
Fiesta28 [93]3 years ago
5 0

Answer:

1. Public project

2. true

3. True

4. Simple

5. The info header

6. How to navigate in the space and how to interact with objects

7. Mesh

8. Toolboxes

9. True

10. Keyboard Shortcut

11.Num Lock

12. False

13.False

14. the polygon viewing on the default screen

15. The standard layout used for new files

WARNING

This was the correct answers for 3-D Computer Modeling A Unit 5 Quiz on Connections Academy

Not sure if answers and questions differ for people this was just my quiz answers

Hope it helps y’all

Tamiku [17]3 years ago
4 0
<span>14. A mesh represents a(n) _____ object if its faces enclose a positive and finite amount of space. (1 point)

odd

connected

simple

convex



15. Which of the following is the 3-D view port? (1 point)

the standard layout used for new files

the polygon viewing on the default screen

straight line segments connecting two vertices

a single static image in 3-D

The answer for number 1, should be:
SOLID
</span><span>A mesh represents a solid object if its faces enclose a positive and finite amount of space
</span>
The answer for the second question is:
a single static image in 3-D
You might be interested in
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
4 years ago
A Windows computer is experiencing a problem accessing the Internet. The network patch cable and network interface card have bee
Svet_ta [14]

Answer:

The next step to consider is updating the system's network settings

Explanation:

The next step after testing and verifying that the network patch cable and network interface card are working is to update the network settings to recent configurations.

Updating the system's network include settings of network adapter, LAN / Wi-Fi and TCP/IP.

Looking into your network settings is one of steps of effectively troubleshooting a system's network.

Few settings you could update are

1. LAN settings

2. TCP/IP network protocol properties

3. Network adapter settings

4. Internet connection

Effectively, updating the network settings is the next step. Few things to take note of when updating the network settings are

1. Create Standard Configurations for Device Classifications

2. Maintain the Current and Previous Network Configurations

3. Keep Track of Changes

4. Lastly, Document Network Changes

8 0
4 years ago
Is it just me or is brainly not working right now? I am trying to add friends and it won't let me!
frutty [35]

Answer:

Yes

Explanation:

You are right well I think because same thing happened to me

6 0
4 years ago
Read 2 more answers
What is the basic similarities and difference between the three project life cycles model? ​
MAVERICK [17]

Answer:

Project life cycle is the time taken to complete a project, from start to finish.

The three project life cycles model include the following:

  • Predictive
  • Iterative and Incremental
  • Adaptive

Explanation:

Predictive project life cycles model: In this stage, the three major constraints of the project which are the scope, time and cost are analyzed ahead of time and this analysis is well detailed and the detailed scope of the project is done right from the start of the project.

Iterative and Incremental life cycles model: In this iterative and incremental model, the project is again split into stages that can be sequential or overlapping and at the first iteration of the project, the scope is determined ahead of time.

Adaptive life cycles model: Also in this stage, the project is split up into phases but because these phases are more rapid and ever changing unlike the other models, the processes within the scope can work in parallel.

Similarities

  • They make use of high level planning.
  • They are sequential and overlapping.
  • They make use of high level scope.

Differences

  • The predictive life cycle model makes use of a detailed scope at the beginning of a project while the other models make use of detailed scope only for each phase.
  • In predictive life cycle model, the product is well understood, in other models, the projects are complex and not easily understood.
  • There is periodic customer involvement in predictive and interative life cycle model while the customer involvement in the adaptive model, the customer model is continuous.

3 0
3 years ago
During this project, you will prepare a short business report. You will accomplish the following during this section of the proj
german

Answer:

I can't tell you mine because that would be plagiarism but here's some ideas

Title Page. Every business report should feature a title page. ...

Summary. ...

Table of Contents. ...

Introduction. ...

Methods and Findings. ...

Conclusions and Recommendations. ...

References. ...

Appendices (If Applicable)

Explanation: Hope this helps:)

3 0
3 years ago
Other questions:
  • What would be the desired output of a home security system?
    6·1 answer
  • What kinds of variables are accessible from outside of the class?
    8·1 answer
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • A call center company wants to implement a domain policy primarily for its shift workers. The call center has large groups with
    11·1 answer
  • Meaning of page break​
    8·1 answer
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • List three ways security could be improved for taking the prepared deposit monies to the bank?​
    11·1 answer
  • So im new how exactly does this point system work???​
    6·1 answer
  • "what is the common information listed under the ip section of pdu details as compared to the information listed under the osi m
    7·1 answer
  • What is ?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!