SlideShare a Scribd company logo
1 of 2
ROLES AND CHARACTERS:<br /> Leon Thomas<br />Our group decided to select me as the main character and therefore the stalker of the second character because as I am tall, I would stand out more. In other words, I have the stature that suits a paedophile/stalker that is mentally unwell. This is most famously recognizable through the clothes Horatio (the main characters name) wears. <br /> Jemima Luscombe<br />As a group we selected Jemima to play the role `Mia Charles` who Horatio has a `crush` on. We believed that Jemima was the most suitable female for this role in our group, because she possesses the characteristics and features of a typical teenage girl who is into gossip, fashion etc. Therefore, older and taller men idolize her because of this. <br /> Apple Mac<br />This is the Apple Mac that we are going to use in the scene where Horatio is writing an article on Mia. On the top right of this picture, we hope to include a photograph of Mia, to demonstrate Horatio`s obsessive feeling towards her.<br />  Media Suite<br />In our film, the Media Suite is going to act as the Newsroom where Horatio writes the article on Mia. As you can see in the picture, there are a numerous amount of Apple Macs, one of which Horatio uses to type up the article on the `Graveney Express`. <br /> Welham Road<br /> <br />Graveney School is Welham Road, and this road is included in the film because this is the location where we witness the main character `buckling` whilst stalking Mia. Whilst buckling two other characters poke fun of him. <br />
Our Groups Roles And Characters

More Related Content

More from Leon Thomas

Powerpoint version of question two
Powerpoint version of question twoPowerpoint version of question two
Powerpoint version of question two
Leon Thomas
 
Social group question (1)
Social group question (1)Social group question (1)
Social group question (1)
Leon Thomas
 
Question three who would be the audience for your media product
Question three  who would be the audience for your media product Question three  who would be the audience for your media product
Question three who would be the audience for your media product
Leon Thomas
 
Question three who would be the audience for your media product
Question three  who would be the audience for your media product Question three  who would be the audience for your media product
Question three who would be the audience for your media product
Leon Thomas
 
Powerpoint version of question two
Powerpoint version of question twoPowerpoint version of question two
Powerpoint version of question two
Leon Thomas
 
Progression from it to the full product
Progression from it to the full product Progression from it to the full product
Progression from it to the full product
Leon Thomas
 
Bbfc classification for psychological thrillers
Bbfc classification for psychological thrillersBbfc classification for psychological thrillers
Bbfc classification for psychological thrillers
Leon Thomas
 
Film Schedule For Our Film
Film Schedule For Our FilmFilm Schedule For Our Film
Film Schedule For Our Film
Leon Thomas
 
Neurosis The Script
Neurosis  The ScriptNeurosis  The Script
Neurosis The Script
Leon Thomas
 
Film Schedule For Our Film
Film Schedule For Our FilmFilm Schedule For Our Film
Film Schedule For Our Film
Leon Thomas
 
Neurosis The Script
Neurosis  The ScriptNeurosis  The Script
Neurosis The Script
Leon Thomas
 
Neurosis The Script
Neurosis  The ScriptNeurosis  The Script
Neurosis The Script
Leon Thomas
 

More from Leon Thomas (20)

The works
The worksThe works
The works
 
The works
The worksThe works
The works
 
Question four
Question fourQuestion four
Question four
 
Question four
Question fourQuestion four
Question four
 
Powerpoint version of question two
Powerpoint version of question twoPowerpoint version of question two
Powerpoint version of question two
 
Social group question (1)
Social group question (1)Social group question (1)
Social group question (1)
 
Question four
Question fourQuestion four
Question four
 
Question three who would be the audience for your media product
Question three  who would be the audience for your media product Question three  who would be the audience for your media product
Question three who would be the audience for your media product
 
Question four
Question fourQuestion four
Question four
 
Question three who would be the audience for your media product
Question three  who would be the audience for your media product Question three  who would be the audience for your media product
Question three who would be the audience for your media product
 
Powerpoint version of question two
Powerpoint version of question twoPowerpoint version of question two
Powerpoint version of question two
 
Question 1
Question 1Question 1
Question 1
 
Progression from it to the full product
Progression from it to the full product Progression from it to the full product
Progression from it to the full product
 
Bbfc classification for psychological thrillers
Bbfc classification for psychological thrillersBbfc classification for psychological thrillers
Bbfc classification for psychological thrillers
 
Neurosis
NeurosisNeurosis
Neurosis
 
Film Schedule For Our Film
Film Schedule For Our FilmFilm Schedule For Our Film
Film Schedule For Our Film
 
Neurosis The Script
Neurosis  The ScriptNeurosis  The Script
Neurosis The Script
 
Film Schedule For Our Film
Film Schedule For Our FilmFilm Schedule For Our Film
Film Schedule For Our Film
 
Neurosis The Script
Neurosis  The ScriptNeurosis  The Script
Neurosis The Script
 
Neurosis The Script
Neurosis  The ScriptNeurosis  The Script
Neurosis The Script
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 

Our Groups Roles And Characters

  • 1. ROLES AND CHARACTERS:<br /> Leon Thomas<br />Our group decided to select me as the main character and therefore the stalker of the second character because as I am tall, I would stand out more. In other words, I have the stature that suits a paedophile/stalker that is mentally unwell. This is most famously recognizable through the clothes Horatio (the main characters name) wears. <br /> Jemima Luscombe<br />As a group we selected Jemima to play the role `Mia Charles` who Horatio has a `crush` on. We believed that Jemima was the most suitable female for this role in our group, because she possesses the characteristics and features of a typical teenage girl who is into gossip, fashion etc. Therefore, older and taller men idolize her because of this. <br /> Apple Mac<br />This is the Apple Mac that we are going to use in the scene where Horatio is writing an article on Mia. On the top right of this picture, we hope to include a photograph of Mia, to demonstrate Horatio`s obsessive feeling towards her.<br /> Media Suite<br />In our film, the Media Suite is going to act as the Newsroom where Horatio writes the article on Mia. As you can see in the picture, there are a numerous amount of Apple Macs, one of which Horatio uses to type up the article on the `Graveney Express`. <br /> Welham Road<br /> <br />Graveney School is Welham Road, and this road is included in the film because this is the location where we witness the main character `buckling` whilst stalking Mia. Whilst buckling two other characters poke fun of him. <br />