1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
8

Which of the following operations would best allow you to place 3D building models at their proper height on the terrain (e.g.,

the terrain is 900 ft above sea level and you want buildings to sit on the terrain, not float above or below it)?
A) Extruding
B) Offsetting
C) Applying Base Heights
D) Using Vertical Exaggeration
Computers and Technology
1 answer:
arsen [322]3 years ago
5 0

Answer:

The answer is "Option C"

Explanation:

Base heights are related to it as measurements of height or z-values as they are extracted by mathematics which serves to define the ground of that same world. Once applying a datatype, it can be any entire amount, that will become the level of the function in meters beyond the ground, and wrong choices can be described as follows:

  • In option A, It is a part of extra dimensions object, that's why it is wrong.
  • In option B, It wrong because the offset tool allows the quick and easy offsetting of the lines.
  • In option D, It emphasizes the recovery charts, that's why it is incorrect.
You might be interested in
Which one of the following downloads and uploads files to and from a server? A. Client B. Internet protocol C. Server D. Worksta
earnstyle [38]
The answer is A. Client request and receive files to and from a server.
5 0
2 years ago
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
This graph shows both a reflection and a
Tpy6a [65]

Answer:

y=-3x-×-1 I think it's answer is it

6 0
3 years ago
Read 2 more answers
You can access various sites on WWW by using hyperlinks or by?
wlad13 [49]
You can access various sites on WWW by using hyperlinks or by?

Answer is: A following directions on-screen
5 0
2 years ago
Read 2 more answers
Write a program that has a conversation with the user. The program must ask for both strings and numbers as input. The program m
konstantin123 [22]

Answer:

yo im sorry eat my cookie

Explanation

doorkoeeworkwoeroewkrwerewrwe

5 0
3 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • The Spinning Jenny reduced the number of workers necessary to _______. a.remove cotton seeds from fibers b.pump water from the m
    7·1 answer
  • The quality of a language that allows a programmer to express a computation clearly, correctly, concisely, and quickly is called
    7·1 answer
  • Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.
    10·1 answer
  • The icon below represents the ____________.
    8·1 answer
  • A large institution, such as a bank, may have thousands of transactions to process in which no user interaction is required; whi
    5·2 answers
  • My speaker on my phone is not working, when I try and play music and videos the sound dosen't work. However my alarm works. Can
    9·2 answers
  • Why when I put a question in the search bar it says something went wrong?
    9·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • How do you copy a file​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!