Graphics
 

Adobe InDesign CS5 : Splitting Paths

11/19/2011 11:35:26 AM
The Scissors tool on the Tools panel allows you to split an open path into two paths or open a closed path. If you just want to open a closed path, you can also use the Open Path button on the Pathfinder panel or the same command on the Paths submenu. You can split a path at an anchor point or in the middle of a segment. The Scissors tool creates two points, one on top of the other. You can use the Direct Selection tool to move one point away from the other. If a path contains text, you cannot split it into two segments.

Split a Path

Select the Direct Selection tool on the Tools panel.

Select the object with the path that you want to split.

Select the Scissors tool on the Tools panel.

Click the object’s path where you want to split it.

If you click on a closed path, it turns into an open path. If you click on an open path, it splits it into two paths.

If you click a line segment, two endpoints appear, one on top of the other.

To move the endpoints, select the Direct Selection tool, and then drag the selected endpoint to display the endpoint below it.

Open a Closed Path

Select the Direct Selection tool on the Tools panel.

Select the anchor point or segment where you want to open a closed path.

Select the Pathfinder panel.

  • Click the Window menu, point to Object & Layout, and then click Pathfinder.

Click the Open Path button on the panel.

The closed path turns into an open path.

To move the endpoints, select the Direct Selection tool, and then drag the selected endpoint to display the endpoint below it.


You can reverse the direction of a path. Select the Direct Selection tool, select the path you want to reverse, and then click the Reverse button on the Pathfinder panel, or click the Object menu, point to Paths, and then click Reverse Path.

 
Others
 
- Adobe Flash Catalyst CS5 : Using design-time data (part 2) - Add and remove elements in the repeated item
- Adobe Flash Catalyst CS5 : Using design-time data (part 1) - Replace design-time images & Edit design-time text
- Adobe Flash Catalyst CS5 : Setting data list properties
- Adobe Illustrator CS5 : Learning the Truth About Transparency (part 2)
- Adobe Illustrator CS5 : Learning the Truth About Transparency (part 1) - Understanding Transparency Flattening
- Dreamweaver CS5 : Using Dreamweaver Templates - Adding Content to Template Documents
- Dreamweaver CS5 : Using Dreamweaver Templates - Using Editable Regions
- Adobe Photoshop CS5 : Fixing Depth-of-Field Problems
- Adobe Photoshop CS5 : Using the Dodge and Burn Tools
- QuarkXPress 8 : Combining type and graphics
- QuarkXPress 8 : Fine-tuning typography
- Adobe After Effects CS5 : Curves: Gamma and Contrast
- Adobe After Effects CS5 : Levels: Histograms and Channels
- Adobe Fireworks CS5 : Adjusting tonal range & Using the Align panel
- Adobe Fireworks CS5 : Importing images & Distortion-free bitmap scaling
- CorelDraw 10 : Naming a Web Page
- CorelDraw 10 : Adding a Page Background
- Adobe Flash Professional CS5 : Sampling and Switching Fills and Strokes (part 2)
- Adobe Flash Professional CS5 : Sampling and Switching Fills and Strokes (part 1)
- Adobe InDesign CS5 : Adding and Deleting Anchor Points
 
 
Most View
 
- Windows 8 : Sharing and Securing with User Accounts - Creating and Managing User Accounts (part 6) - Navigating through user account pages
- SQL Server 2012 : Normal Forms (part 1) - First Normal Form
- Windows Server 2008 : Filtering GPOs by Modifying Permissions
- Microsoft Lync Server 2013 : Lync Online and Hybrid Deployments - Configuring Directory Synchronization (part 1)
- Diagnosing SQL Server 2012 Using Extended Events : Viewing Data Captured by Extended Events (part 3) - Querying a Ring Buffer Using T-SQL
- Windows 8 for Business : Features Exclusive to Windows 8 Enterprise,Windows RT and Business
- Microsoft Lync Server 2013 : Mac Client - Audio, Video Calls and Conferencing
- Windows Phone 8 : Walking Through the Bookshop Sample Application (part 3) - Design-Time Data
- SQL Server 2012 : Delivering A SQL Server Health Check (part 8)
- Windows 7 : BitLocker (part 1) - How to Use BitLocker with TPM Hardware
 
 
Top 10
 
- Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 1) - Protecting Against Web Beaconing
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 2) - Encrypting Communications Between Outlook and Exchange , Blocking Attachments
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 1) - Outlook Anywhere
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 3) - Keeping Up with Security Patches and Updates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 2) - Utilizing Security Templates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 1) - Windows Server 2003 Security Improvements , Windows Vista Security Improvements
- Securing an Exchange Server 2007 Environment : Client-Level Secured Messaging - Exchange Server 2007 Client-Level Security Enhancements