1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
3 years ago
7

Loretta is shooting her product separately. She plans to integrate it into the main advertisement later on. What should Loretta

do?
A make the edges of the object, blurry to make the product look like it's part of the scene

b. adjust the lighting of the photograph to match the overall lighting of the image
zoom in on the product and blur out the background with directed lighting

c. zoom in on the product and blur the out the background with directed lighting

d. make the product's background different so it stands out in the main advertisement​
Computers and Technology
1 answer:
Vikki [24]3 years ago
6 0

Answer:

A make the edges of the object, blurry to make the product look like it's part of the scene

Explanation:

It must be ensured that the object should fit into the scene. If this is not ensured, it is certainly going to look quite awkward in the main advertisement. The other options are not ensuring this requirement, which is what is required. Hence, the correct option is unanimously the option mentioned in the Answer section.

You might be interested in
Which of the following is a disadvantage of using face-to-face communication over other communication channels? A) There is lag
Tems11 [23]

Answer:

Option B is correct.

Explanation:

The drawback to choosing face-to-face contact across certain platforms of interactions is that it is always impracticable to plan a schedule for face-to-face conversation because mostly the time of both participants should not be the same, sometime the one person wait for the other person or the other person wait for 1st one.

  • The following problems occur through the internet, the system configuration or the browsers, application configuration.
  • So, the following are the reasons that describe the other options are not appropriate according to the scenario.
7 0
3 years ago
Effective feedback should focus on the behavior, not the person.<br><br> True<br> False
Aleonysh [2.5K]
Your answer is False my fellow samurai
5 0
3 years ago
Read 2 more answers
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
2 years ago
Read 2 more answers
Does an android tablet have a hard drive
Kisachek [45]
No, it uses flash menory
3 0
3 years ago
What is the Difference between CUI and GUI
Fynjy0 [20]

Hi there!


GUI Means Graphical user interface


CUI means  Controlled Unclassified Information


Theres the difference they are completely different from each other.


PLEASE MARK BRAINLIEST

-WeasuLL

7 0
3 years ago
Read 2 more answers
Other questions:
  • give two main reasons that should be considered when preparing and deploying a functional restoral scenario.
    5·1 answer
  • Why should spain go to Africa ​
    15·1 answer
  • In gaming, "rendering" refers to:
    12·2 answers
  • Is downloading like installing?
    13·1 answer
  • What is a scholary or systemic investigation or injury about a subject?
    14·1 answer
  • It is impossible to use a computer without a mouse. Is this statement true or false?
    10·1 answer
  • _____the measuring instrument is not necssery​
    10·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • Is it true that if the user log out the computer will turn off automatically​
    9·2 answers
  • Most cell phones and tablets have solid-state storage drives. internal hard disk drives. internal cloud storage. external hard d
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!