1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
3 years ago
15

Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hol

d down the Ctrl key and the middle mouse button . III. Use the mouse scroll wheel to zoom in and out of the model.
Computers and Technology
1 answer:
evablogger [386]3 years ago
8 0

Answer:

II and III are correct

Explanation:

The software that the question is referring to here is the computer-aided design (CAD) software called Inventor by Autodesk.

I. Hold the middle mouse button to rotate the model on the screen. False

This will pan the model instead of rotating.

II. To pan the model, hold down the Ctrl key and the middle mouse button. True

Some versions need you to hold down the ctrl key and the middle mouse button to pan, while others is just the middle mouse button then you drag the mouse around. The middle mouse is the scroll wheel on most mice today. You basically, just hold down the scroll wheel as you move the mouse to pan the model.

III. Use the mouse scroll wheel to zoom in and out of the model. True

To zoom in or out, one will need to rotate the mouse scroll wheel forward to zoom in and backward to zoom out.

 

You might be interested in
Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
Gnoma [55]
The answer is A it provided a shell for Ms-DOS
8 0
3 years ago
Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys
Alinara [238K]

Answer:

Check the explanation

Explanation:

To solve the above question.

The two valid classes are:

1. Patron_identity

2. Books

Class generalization can be between Books and Patrol_identity to create a new superclass for All The Books that this patron has ever checked out.

Two valid associations can be between:

1.Patron_identity and books

2.Books and library catalogue

8 0
3 years ago
A record is a specific piece of information state true or false​
Alex787 [66]

Explanation:

<h3> I think it is False</h3>

hope it's help

5 0
2 years ago
A table of contents does not _____ automatically [customize table of contents]
anyanavicka [17]

Answer:

update

Explanation:

a table of contents does not update itself automatically.

5 0
2 years ago
Create and apply a CSS class named YellowBackground that selects a yellow background. Apply the class to your HTML file’s body t
masha68 [24]

Here is an HTML example with the CSS class defined inline:

<!doctype html>

<html>

 <head>

   <style>

  .YellowBackground {

 background-color : yellow;

  }

</style>

   

   </head>

 

   <body class="YellowBackground">

       <h1>A yellow background</h1>

   </body>

</html>

6 0
3 years ago
Other questions:
  • What can web designers use to control the individual web page layouts for all of the pages on a website?
    7·1 answer
  • What is the correct process for inserting a blank worksheet in Google sheets
    12·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • If none of the contacts of a manual switch change status when the operator is activated, what is the most probable cause?
    9·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • What are the most commonly found items in the trash according to the Municipal Solid Waste report?
    12·2 answers
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • What is cyber security ???​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!