1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
12

Let’s say you are given the task of retouching a famous model’s photograph. To what extent will you retouch the image? In your o

pinion, what ethical issues should be the red line when it comes to the retouching of images?
Computers and Technology
2 answers:
Kobotan [32]3 years ago
8 0

Answer:

Retouch as long as it closely to her in person. Ethical would be hair,eyes, kin, size color would be a ethical issue

Explanation:

on Plato Bc im right

Bogdan [553]3 years ago
3 0

Retouching a photograph, specially that of a famous model, is somewhat a touchy issue since there are no boundaries defined for it and when you think you are just doing your job right, people might still be offended with their image being manipulated in so many ways. In my opinion, the main purpose of retouching is to improve a photograph, which may include color correction, improving the clarity, clearing out any distractions or noise and since in this case we have a model's photo so we might just need to enhance  the features or perfecting the skin, which may include changing the color tone of the skin or to shrink or enhance the physical aspects accordingly, just to make a photograph the best version of it.

As a re-toucher, one must have the responsibility to acknowledge that no matter how hard you have tried to make the image look better, there will be people who still might judge your efforts as demeaning. So its solely in your hand how you act and edit different pictures of different subjects differently.

You might be interested in
Write your own accessor and mutator method for the Rectangle class instance variables. You should create the following methods:
frozen [14]

Answer:

Public int getHeight(){

return height;

}

public int getWidht(){

return widht;

}

public int setHeight(int change){

height = change;

}

public int setWidht(int change){

widht = change;

}

public int getPerimeter(){

int perimeter = 2 ( getWidht() + getHeight ());

return perimeter;

If the width is 10 and height 4, the perimeter should be 28.

Explanation:

An accessor in Java is a method that is used to get the value of an object variable. The program above has three accessor methods, getHeight, getWidht and getPerimeter.

Mutators are methods that is used to change of mutate the value of object variables. They are denoted or identified by the set prefix in their names. From the class code, the mutator are setHeight and setWidht.

7 0
3 years ago
Adam has to write a paper where the margins need to be set to these measurements: Left: 1.5" Right: 4" Bottom: 1" Top: 1"
Sholpan [36]

In Microsoft Word, he should go to Page Layout and then to Margins.

8 0
4 years ago
When pasting a circle drawn by the presentation software drawing tool into a spreadsheet, that circle will go into the selected
puteri [66]

False.

When you copy an object/image or insert it manually into an Excel spreadsheet cell, what will happen is that the object will lie on a separate layer and it will float on the sheet independently from the cell. If you want it embedded inside the cell, you can either resize both the picture and adjust the cell or merge the cells.  


3 0
3 years ago
Read 2 more answers
You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows so
creativ13 [48]

Answer:

a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.

Explanation:

This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.

Hope this helps!

5 0
3 years ago
Match the Internet protocol with its purpose.
Maksim231197 [3]

Answer:

News: enables you to access newsgroups

http:// enables transfer of hypertext documents

ftp:// enables you to download from and upload to a remote computer

file:// loads a local file from your computer

mailto: loads the browser's e-mail screen to send an e-mail message

4 0
3 years ago
Other questions:
  • 8.14 Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O devi
    7·1 answer
  • BITS wants to store information about the supervisors, including their supervisor number and the relationship to consultants. Su
    15·1 answer
  • Write a program that implement a bubble sort ?
    5·1 answer
  • The ____ of a variable is the location in memory where it’s value is stored. A. Value B. Address C. Data type D. Number
    8·1 answer
  • If you tap or click the increase font size button too many times and make the font size too big, you can tap or click the _____
    9·1 answer
  • My PC won't output any data does anyone have any ideas​
    9·1 answer
  • A compressed audio file format developed by the Moving Picture Experts Group is called
    15·1 answer
  • Help me guys plssssss​
    10·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
  • The lost boy gave the correct
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!