SlideShare a Scribd company logo
HOW DID YOU
ATTRACT/ADDRESS
YOUR AUDIENCE ?
We attracted our
                                          audience by making
                                          sure our film had a
                                          stroyline that the
                                          majority of teens
                                          would be able to
                                          address to teenagers.

The fonts we used, was also
another way to attract our
                                The music we used was a more of a
audience were bold, colourful
                                happy and enjoyable song which went
and large.
                                well with the theme of our film.
The different type of characters are film
                                     includes may also attract our teens, and may
                                     also address to them. Since they may have
                                     similar characteristics.



The genre could increase the
audience we attract as most teens
especially females as they usually
enjoy ‘teen ROMCOMS’

More Related Content

Similar to Audiences

Question two
Question twoQuestion two
Question twofordn1
 
PRODUCTION: Genre conventions
PRODUCTION: Genre conventionsPRODUCTION: Genre conventions
PRODUCTION: Genre conventions
backstageA2media
 
How did we attract our target audience?
How did we attract our target audience?How did we attract our target audience?
How did we attract our target audience?
daniellefreemang
 
How did we attract our target audience?
How did we attract our target audience?How did we attract our target audience?
How did we attract our target audience?daniellefreemang
 
Creative Critical Reflection 2
Creative Critical Reflection 2Creative Critical Reflection 2
Creative Critical Reflection 2
MaryamH24
 
Q.5 evaluation media
Q.5 evaluation mediaQ.5 evaluation media
Q.5 evaluation mediagiuttari123
 
Thriller eval q5
Thriller eval q5Thriller eval q5
Thriller eval q5sturner31
 
Evaluation question 1 media
Evaluation question 1 mediaEvaluation question 1 media
Evaluation question 1 medianaomi2016
 
Evaluation question five
Evaluation question fiveEvaluation question five
Evaluation question fiveChloe Phillips
 
Q.5 evaluation media
Q.5 evaluation mediaQ.5 evaluation media
Q.5 evaluation mediagiuttari123
 
Evaluation audience
Evaluation audienceEvaluation audience
Evaluation audienceweirdone419
 
Powerpoint evaluation
Powerpoint evaluationPowerpoint evaluation
Powerpoint evaluationguest9be7824
 
Powerpoint evaluation
Powerpoint evaluationPowerpoint evaluation
Powerpoint evaluationguest9be7824
 
Media Evaluation
Media Evaluation Media Evaluation
Media Evaluation
raytraina123
 
Media Evaluation
Media Evaluation Media Evaluation
Media Evaluation
raytraina123
 
Media evaluation
Media evaluationMedia evaluation
Media evaluationpradanayar
 

Similar to Audiences (20)

Question two
Question twoQuestion two
Question two
 
PRODUCTION: Genre conventions
PRODUCTION: Genre conventionsPRODUCTION: Genre conventions
PRODUCTION: Genre conventions
 
Audiences (q3)
Audiences (q3)Audiences (q3)
Audiences (q3)
 
How did we attract our target audience?
How did we attract our target audience?How did we attract our target audience?
How did we attract our target audience?
 
How did we attract our target audience?
How did we attract our target audience?How did we attract our target audience?
How did we attract our target audience?
 
Creative Critical Reflection 2
Creative Critical Reflection 2Creative Critical Reflection 2
Creative Critical Reflection 2
 
Q.5 evaluation media
Q.5 evaluation mediaQ.5 evaluation media
Q.5 evaluation media
 
Thriller eval q5
Thriller eval q5Thriller eval q5
Thriller eval q5
 
Evaluation question 1 media
Evaluation question 1 mediaEvaluation question 1 media
Evaluation question 1 media
 
Evaluation question five
Evaluation question fiveEvaluation question five
Evaluation question five
 
Q.5 evaluation media
Q.5 evaluation mediaQ.5 evaluation media
Q.5 evaluation media
 
Question 1
Question 1Question 1
Question 1
 
Evaluation audience
Evaluation audienceEvaluation audience
Evaluation audience
 
Media
MediaMedia
Media
 
Powerpoint evaluation
Powerpoint evaluationPowerpoint evaluation
Powerpoint evaluation
 
Ppc evaluation
Ppc evaluationPpc evaluation
Ppc evaluation
 
Powerpoint evaluation
Powerpoint evaluationPowerpoint evaluation
Powerpoint evaluation
 
Media Evaluation
Media Evaluation Media Evaluation
Media Evaluation
 
Media Evaluation
Media Evaluation Media Evaluation
Media Evaluation
 
Media evaluation
Media evaluationMedia evaluation
Media evaluation
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Audiences

  • 2. We attracted our audience by making sure our film had a stroyline that the majority of teens would be able to address to teenagers. The fonts we used, was also another way to attract our The music we used was a more of a audience were bold, colourful happy and enjoyable song which went and large. well with the theme of our film.
  • 3. The different type of characters are film includes may also attract our teens, and may also address to them. Since they may have similar characteristics. The genre could increase the audience we attract as most teens especially females as they usually enjoy ‘teen ROMCOMS’