Blender questions6. In the default 3-D view, which of the following changes depending on what actions are being carried out on the screen, and acts as the roadmap? (1 point)

the pivot point

the toolbar area

the view editor

the info header



7. You cannot use the manipulator widget to translate, define, rotate, or scale an object. (1 point)

true

false

Answers

Answer 1
Answer: Blender questions
6. In the default 3-D view, which of the following changes depending on what actions are being carried out on the screen, and acts as the roadmap? (1 point)

the pivot point

the toolbar area

the view editor

the info header

The correct answer is:

the pivot point

7. You cannot use the manipulator widget to translate, define, rotate, or scale an object. (1 point)

true

false

The correct answer is:
false
The Transformation manipulator widgets allow mouse controlled translation, rotation and scaling in the3D View.

Related Questions

Is printer an input device​
Find the basic period and basic frequency of the function g(t)=8cos(10πt)+sin(15πt)
What is the earliest version of the present day Internet?
Gabby needs to perform regular computer maintenace . whats should she do
The utilization of a subset of the performance equation as a performance metric is a pitfall. To illustrate this, assume the following two processors. P1 has a clock rate of 4 GHz, average CPI of 0.9, and requires the execution of 5.0E9 instructions. P2 has a clock rate of 3 GHz, an average CPI of 0.75, and requi res the execution of 1.0E9 instructions. One usual fallacy is to consider the computer with the largest clock rate as having the largest performance. Check if this is true for P1 and P2.

What subnet mask or CIDR notation would be required to maximize the host counts while still meeting the following requirements: 192.168.228.0 255.255.255.128 Required Networks: 2 Required Hosts: 20

Answers

Answer:

192.168.228.0 255.255.255.224

Explanation:

192.168.228.0 255.255.255.128

subnet mask: defines the host and the network part of a ip

CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip

For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25

To have atleast 20 hosts

20 ≤ (2^x) -2

x ≈5

with 5 host bits, we have 2^5-2 = 30 hosts per subnet

and 2^3 = 8 subnets

To get the subnet mask, we have 3 network bits

1110000 to base 10 = 2^7 + 2^6 +2^5= 224

192.168.228.0 255.255.255.224

Suppose that each country completely specializes in the production of the good in which it has a comparative advantage, producing only that good. Inthis case, the country that produces rye will produce million bushels per week, and the country that produces jeans will produce

million pairs per week.

Answers

Answer:

In  this case, the country that produces rye will produce 24 million bushels per week, and the country that produces jeans will produce 64  million pairs per week.

Explanation:

Total labor hour = 4 million hour

Number of bushes produce in 1 hour = 6

⇒total bushes produce = 6*4 = 24 million

∴ we get

The country that produces rye will produce 24 million bushels per week

Now,

Total labor hour = 4 million hour

Number of pairs produce in 1 hour = 16

⇒total bushes produce = 16*4 = 64 million

∴ we get

The country that produces jeans will produce 64  million pairs per week.

For additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to:___________.

Answers

Answer:

Identify any program or services that you do not need.

Explanation:

As a network administrator, one of the preventive measures that could be adopted to complement your security system or architecture is to identify all the software applications or services that you do not need in an organization. This is because some of these programs might be a spyware, rootkit or compromised software which are used to gain unauthorized access to the network system. Also, you should identify the unused or unwanted programs or services in order to prevent redundancy and to optimize the performance of critical machines or processes in the organization's network.

Hence, for additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to identify any programs or services that you don’t need.

Write an algorithm which gets a number N, and prints all the natural numbers less than or equal N. 3.

Answers

Answer:

Algorithm:

1.Create a variable N.

2.Read the value of N from user.

3.for i=1 to N.

 3.1 Print value of i.

4.end program.

Implementation in C++:

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter value of N:";

// read the value of N

cin>>N;

cout<<"Natural number from 1 to "<<N<<" are:";

for(int i=1;i<=N;i++)

{

// print the numbers

   cout<<i<<" ";

}

return 0;

}

Output:

Enter value of N:6                                                                                                        

Natural number from 1 to 6 are:1 2 3 4 5 6

Originally, Java was used to create similar apps as what other language?Perl
Python
CSS
Javascript

Answers

Originally, Java was used to create similar apps as other languages, which as python. The correct option is b.

What are computer languages?

The computer languages are Java and Python is in their conversion; the Java compiler converts Java source code into an intermediate code known as bytecode, whereas the Python interpreter converts Python source code into machine code line by line.

Curly braces are used in Java to define the beginning and end of each function and class definition, whereas indentation is used in Python to separate code into separate blocks.

Multiple inheritances is done partially through interfaces in Java, whereas Python continues to support both solitary and multiple inheritances.

Therefore, the correct option is b. Python.

To learn more about computer languages, refer to the below link:

brainly.com/question/14523217

#SPJ2

Answer:

Python

Explanation:

Took the test

Write a program that declares variables named init1, init2, and init3, to hold your three initials. Display the three initials with a period following each one, as in J.M.F.

Answers

Answer:

Written in Python

init1 = input("initials 1: ")

init2 = input("initials 2: ")

init3 = input("initials 3 ")

print(init1+"."+init2+"."+init3)

Explanation:

This line prompts user for init1 and gets the input

init1 = input("initials 1: ")

This line prompts user for init2 and gets the input

init2 = input("initials 2: ")

This line prompts user for init3 and gets the input

init3 = input("initials 3 ")

This line prints out the required output

print(init1+"."+init2+"."+init3)