1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
14

What kinds of objects might benefit from the use of the Loop Cut and Slide tool, and why? In your own words, how does edge loop

manipulation “work?”
Computers and Technology
1 answer:
mrs_skeptik [129]3 years ago
4 0
Answer: it doesn’t. The demons are coming
You might be interested in
Write a function writel that will write the length of a side of a square. If only one argument is passed to the function, it is
Levart [38]

def writel(length, file_name = ""):

   if file_name!="":

       f = open(file_name, "w")

       f.write(str(length))

       f.close()

   else:

       print(str(length))

writel(3, "FileName.txt")

I hope this helps!

Remember, you must have the file created prior to running this program. Best of luck.

7 0
3 years ago
alex needs to email his graduation certificate to a prospective employer. he has only physical copies of the certificate. what d
svlad2 [7]
He should use a scanner, which would convert an image into an electronic file.
7 0
2 years ago
Select the components of a search engine.
Assoli18 [71]

Answer:

C because whatever a search engine is it will need a search form to do its job, so C (maybe d)

7 0
4 years ago
Read 2 more answers
Is a computer an input output or storage
Effectus [21]

Answer:

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

6 0
3 years ago
These are pictorial images displayed on a computer screen​
Mrrafil [7]

Answerthats nice

(: -With Star

Explanation:

3 0
2 years ago
Other questions:
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • It is always better to run over and give more information when you are giving a presentation versus quitting on time. true false
    15·2 answers
  • What is transmission control protocol?
    9·2 answers
  • The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
    15·1 answer
  • How much memory will be occupied by black and white image​
    8·2 answers
  • Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received
    12·1 answer
  • Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
    13·1 answer
  • User name ideas for ro blox? I'm changing mine and I dont know what I want. No numbers or underscores!
    10·2 answers
  • 12. Why is it so important to pay attention to your digital reputation?
    14·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!