The animation industry is solely reliant on 3-D modeling and 3-D virtualization to create the animated movies in the cinemas.True or false?

Answers

Answer 1
Answer: the answer is false       
Answer 2
Answer: false some people hand draw stuff as well

Related Questions

You can use Facebook's Live Feed tool to broadcast content as you post it, true or false?
16. In Microsoft Word, when you highlight existing text you want to replace, you are in
Which of the following statements about computer graphics formats is true? A. Unlike word processing programs, computer graphics formats can be interchanged on most systems. B. You may need a utility program to convert graphics to a format compatible with your software. C. Computer graphics formats are universally compatible with any graphic design software. D. Graphics formats can't be converted to different formats.
Ports on the motherboard can be disabled or enabled in ____ setup. RAM Firmware Northbridge BIOS
When pointed over text within a paragraph, the cursor takes the shape of a/an

With "read" function, which one of the following statements is NOT correct? a.If the read is successful, the number of bytes read is returned. b.If the end of file is encountered, 0 is returned. c.The number of bytes actually read is always same as the amount requested for a successful read.d.The read operation starts at the file's current offset.e.Before a successful return, the offset is incremented by the number of bytes actually read

Answers

Answer:

a. If the read is successful, the number of bytes read is returned.

b. If the end of file is encountered, 0 is returned.

Explanation:

A read function is one of the functions used in computer programming. A read function is used to read an information or data that was written before into a file.

If any portion of a regular file before to the end of file has not been written and the end of file is encountered the read function will return the bytes with value 0.

If read function has read some data successfully, it returns the number of bytes it read.

13. The Save As command is useful if you want to copy an open document and A. give the copy a new name.
B. remain in the original document.
C. delete the original document.
D. link it to the original document.

Answers

the answer would be A because when you first press Save As you are creating it then you would just press save every time you have tweaked it but if you wanted to shop that you had tweaked it (for example) then you would press Save As. I may be entirely wrong so don't just use my answer!!
A. give the copy a new name

Complete the sentence. ____ Is the study and use of very small technology units

Answers

Answer:

nanotechnology

Explanation:

I just took the test

Answer:

Nanotechnology

Explanation:

- Nano means small; nanotechnology is small technology.

edge 2022

Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the process method may throw one of several exceptions. Write some code that invokes the process method provided by the object associated with processor and arrange matters so that your code causes any exception thrown by process to be ignored. Hint: use the catch (Exception ex) and do nothing under the catch clause.

Answers

Answer:

Following are the code to the given question:

try//defining a try block

{

processor.process();//defining an object processor that calls process method

}

catch(Exception e)//defining a catch block

{

}

Explanation:

In this question, the 'Try' and 'catch' block is used in which both the keywords are used to represent exceptions managed during runtime due to information or code errors. This try box was its code block which includes errors. A message queue catches the block errors and examines these.

In the try block, a method "process" is used which is create the object processor that calls the method.

You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are hired several programmers to craft the code that is the backbone of your new web sales system. However, you are concerned that while the new code functions well, it might not be secure. You begin to review the code, systems design, and services architecture to track down issues and concerns. Which of the following do you hope to find in order to prevent to protect against XSS?A. Input Validation
B. Defensive coding
C. Allowing script input
D. Escaping metacharacters

Answers

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

Limiting the amount of personal information available to others includes reducing your ______________ footprint

Answers

The blank should be filled with "digital"