What are inverse kinematics? How are they used? Be sure to define all relevant terms in your answer.

What will be an ideal response?

In Flash, you can use inverse kinematics to animate one or more objects in relation to each other. Inverse kinematics is an animation method used to create bone structures. A bone is a link from one symbol instance to another or from one interior part of a shape to another. When one bone moves, the other bones move in relation to it. With inverse kinematics, you can easily create complex animations and natural movement. For example, you can create character animation in which the arms and legs of a body are connected to each other with bones. When a bone in one part of the character moves, the other bones move accordingly without you defining every single movement. You specify only the start and end positions of an object by positioning its bones. A chain of bones is called an armature. Bones can be added to connect one symbol instance to another, or they can be added to the interior of a shape object so you can move or animate parts of the shape without having to draw the shape multiple times. When you add bones to a symbol instance or to a shape, the instance or shape and its armature are moved to a new layer called a pose layer.

Computer Science & Information Technology

You might also like to view...

What must you do before you can create a crosstab query that references more than one table?

A) Make sure the relationships have been properly created in the Relationships window. B) Run an append query to combine the records from the various tables. C) Run a make table query and use that as the source for the crosstab query. D) Create a select query which includes the fields from the various tables you want included in the crosstab query.

Computer Science & Information Technology

__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

A. Availability B. System Integrity C. Privacy D. Data Integrity

Computer Science & Information Technology