SlideShare a Scribd company logo
Prop and costume list

    Lisa , Chloe , Troy
Props


                   What will be used on the
                   girlfriend by the gangsters.




 The note which the
 gangsters will write to John.
Costume

More Related Content

Viewers also liked

Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3
IOSR Journals
 
J o b s new sky 1 unit 36
J o b s new sky 1 unit 36J o b s new sky 1 unit 36
J o b s new sky 1 unit 36
Aleksandra Nikolic
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
IOSR Journals
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
The Digital Marketing Trifecta
The Digital Marketing TrifectaThe Digital Marketing Trifecta
The Digital Marketing Trifecta
Beth McEnery
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot Detection
IOSR Journals
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
IOSR Journals
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
IOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parser
IOSR Journals
 
An Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsAn Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its Applications
IOSR Journals
 
C0561419
C0561419C0561419
C0561419
IOSR Journals
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
IOSR Journals
 
M0566672
M0566672M0566672
M0566672
IOSR Journals
 
Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...
IOSR Journals
 
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
IOSR Journals
 
How To Create Your Own Info Product
How To Create Your Own Info ProductHow To Create Your Own Info Product
How To Create Your Own Info Product
believe52
 
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
IOSR Journals
 
J0427985
J0427985J0427985
J0427985
IOSR Journals
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
IOSR Journals
 

Viewers also liked (20)

Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3
 
J o b s new sky 1 unit 36
J o b s new sky 1 unit 36J o b s new sky 1 unit 36
J o b s new sky 1 unit 36
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
The Digital Marketing Trifecta
The Digital Marketing TrifectaThe Digital Marketing Trifecta
The Digital Marketing Trifecta
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot Detection
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parser
 
An Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsAn Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its Applications
 
C0561419
C0561419C0561419
C0561419
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
M0566672
M0566672M0566672
M0566672
 
Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...
 
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
 
How To Create Your Own Info Product
How To Create Your Own Info ProductHow To Create Your Own Info Product
How To Create Your Own Info Product
 
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
 
J0427985
J0427985J0427985
J0427985
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 

More from lisadors

Looking back at your preliminary task, what
Looking back at your preliminary task, whatLooking back at your preliminary task, what
Looking back at your preliminary task, what
lisadors
 
Censorship media research
Censorship media researchCensorship media research
Censorship media research
lisadors
 
Recee
ReceeRecee
Recee
lisadors
 
Recee
ReceeRecee
Recee
lisadors
 
Character profile
Character profileCharacter profile
Character profile
lisadors
 
Codes and conventions for chosen genre
Codes and conventions for chosen genreCodes and conventions for chosen genre
Codes and conventions for chosen genrelisadors
 

More from lisadors (6)

Looking back at your preliminary task, what
Looking back at your preliminary task, whatLooking back at your preliminary task, what
Looking back at your preliminary task, what
 
Censorship media research
Censorship media researchCensorship media research
Censorship media research
 
Recee
ReceeRecee
Recee
 
Recee
ReceeRecee
Recee
 
Character profile
Character profileCharacter profile
Character profile
 
Codes and conventions for chosen genre
Codes and conventions for chosen genreCodes and conventions for chosen genre
Codes and conventions for chosen genre
 

Costume

  • 1. Prop and costume list Lisa , Chloe , Troy
  • 2. Props What will be used on the girlfriend by the gangsters. The note which the gangsters will write to John.