SlideShare a Scribd company logo
From our target audience research we conducted we found out that we
would use two mercenaries against two terrorists and a civilian hostage in
the storyline to make it more tense “anyone one could win” scenario.
To make our film as attractive and authentic as possible to certain social
groups we used weapons for each faction, this was aimed to give the
film a more serious, tense feel as both factions are armed and ready to
kill.
To get the best out of our film we wanted the characters to look the part to
attract a bigger audience, we had two mercenaries who basically wore gear like
balaclavas, scarves and dark jackets to look like they were lone wolves. Our
terrorists effectively wore the same but were more free in what they wore e.g.
bandanas or sunglasses to make them looks as in character as possible

More Related Content

Viewers also liked

สุขศึกษา
สุขศึกษาสุขศึกษา
สุขศึกษาikwanz
 
Bullying
BullyingBullying
Bullying
marelyne_s
 
11_4
11_411_4
Sop presentatie
Sop presentatieSop presentatie
Sop presentatieKhlim Genk
 
Critical Study2
Critical Study2Critical Study2
Critical Study2
Kinneh Mahmoud
 
Office location photos
Office location photosOffice location photos
Office location photoskylelabrache
 
Presentation1 cesm
Presentation1 cesmPresentation1 cesm
Presentation1 cesm
Devavrata Singh
 
Port of Halifax presentation
Port of Halifax presentation Port of Halifax presentation
Port of Halifax presentation
Halifax_Gateway
 
Two sides of diversity
Two sides of diversityTwo sides of diversity
Two sides of diversity
vinayak_cades
 
Arlekino (Harlequin)
 Arlekino (Harlequin) Arlekino (Harlequin)
Arlekino (Harlequin)
Makala (D)
 
Lady - masquerade, A Love for Fashion:Dita Omuri Art.
 Lady -  masquerade, A Love for Fashion:Dita Omuri Art. Lady -  masquerade, A Love for Fashion:Dita Omuri Art.
Lady - masquerade, A Love for Fashion:Dita Omuri Art.
Makala (D)
 

Viewers also liked (12)

สุขศึกษา
สุขศึกษาสุขศึกษา
สุขศึกษา
 
Bullying
BullyingBullying
Bullying
 
11_4
11_411_4
11_4
 
Sop presentatie
Sop presentatieSop presentatie
Sop presentatie
 
Critical Study2
Critical Study2Critical Study2
Critical Study2
 
Office location photos
Office location photosOffice location photos
Office location photos
 
Presentation1 cesm
Presentation1 cesmPresentation1 cesm
Presentation1 cesm
 
Kohus
KohusKohus
Kohus
 
Port of Halifax presentation
Port of Halifax presentation Port of Halifax presentation
Port of Halifax presentation
 
Two sides of diversity
Two sides of diversityTwo sides of diversity
Two sides of diversity
 
Arlekino (Harlequin)
 Arlekino (Harlequin) Arlekino (Harlequin)
Arlekino (Harlequin)
 
Lady - masquerade, A Love for Fashion:Dita Omuri Art.
 Lady -  masquerade, A Love for Fashion:Dita Omuri Art. Lady -  masquerade, A Love for Fashion:Dita Omuri Art.
Lady - masquerade, A Love for Fashion:Dita Omuri Art.
 

Similar to Evaluation question 2

Evaluation q1
Evaluation q1Evaluation q1
Evaluation q1
JonoGaymaster
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
george2v
 
How does your media product use, develop
How does your media product use, developHow does your media product use, develop
How does your media product use, develop
MLGVirus
 
Creative critical reflection task one.pdf
Creative critical reflection task one.pdfCreative critical reflection task one.pdf
Creative critical reflection task one.pdf
naomiabberley
 
Media evaluation question 2
Media evaluation question 2Media evaluation question 2
Media evaluation question 2
sophieordidgemedia
 
Powerpoint evalutation of fate
Powerpoint evalutation of fatePowerpoint evalutation of fate
Powerpoint evalutation of fate
jamesoz12345
 
Media Studies Horror Evaluation.
Media Studies Horror Evaluation.Media Studies Horror Evaluation.
Media Studies Horror Evaluation.
Nahed1992
 
Sarah Evaluation Q1
Sarah Evaluation Q1Sarah Evaluation Q1
Sarah Evaluation Q1
guest53c632
 
Thriller Planning: Character characteristics and costume
Thriller Planning: Character characteristics and costumeThriller Planning: Character characteristics and costume
Thriller Planning: Character characteristics and costume
seanbicklemedia
 
Media questions 1 7 jessica spiteri
Media questions 1 7 jessica spiteriMedia questions 1 7 jessica spiteri
Media questions 1 7 jessica spiteri
JessicaSpiteri12
 
Media evaluation
Media evaluationMedia evaluation
Media evaluation
DanniG_x
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
benmyers18
 
Thriller evaluation
Thriller evaluationThriller evaluation
Thriller evaluation
Lauren Quinn
 
Q1 conventions in my thriller
Q1   conventions in my thrillerQ1   conventions in my thriller
Q1 conventions in my thriller
JDCArmory
 
Evaluation Q1,2,3,6
Evaluation Q1,2,3,6Evaluation Q1,2,3,6
Evaluation Q1,2,3,6
JoeyPease
 
Alice100
Alice100Alice100
Alice100
05alicerenee
 
Mes planning
Mes planningMes planning
Mes planning
rhsmediastudies
 
Mood board- Thriller Opening Sequence
Mood board- Thriller Opening Sequence Mood board- Thriller Opening Sequence
Mood board- Thriller Opening Sequence
kanda11821
 
Media
MediaMedia
Eval task 1 version
Eval task 1 versionEval task 1 version
Eval task 1 version
LewisBoulle
 

Similar to Evaluation question 2 (20)

Evaluation q1
Evaluation q1Evaluation q1
Evaluation q1
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
How does your media product use, develop
How does your media product use, developHow does your media product use, develop
How does your media product use, develop
 
Creative critical reflection task one.pdf
Creative critical reflection task one.pdfCreative critical reflection task one.pdf
Creative critical reflection task one.pdf
 
Media evaluation question 2
Media evaluation question 2Media evaluation question 2
Media evaluation question 2
 
Powerpoint evalutation of fate
Powerpoint evalutation of fatePowerpoint evalutation of fate
Powerpoint evalutation of fate
 
Media Studies Horror Evaluation.
Media Studies Horror Evaluation.Media Studies Horror Evaluation.
Media Studies Horror Evaluation.
 
Sarah Evaluation Q1
Sarah Evaluation Q1Sarah Evaluation Q1
Sarah Evaluation Q1
 
Thriller Planning: Character characteristics and costume
Thriller Planning: Character characteristics and costumeThriller Planning: Character characteristics and costume
Thriller Planning: Character characteristics and costume
 
Media questions 1 7 jessica spiteri
Media questions 1 7 jessica spiteriMedia questions 1 7 jessica spiteri
Media questions 1 7 jessica spiteri
 
Media evaluation
Media evaluationMedia evaluation
Media evaluation
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Thriller evaluation
Thriller evaluationThriller evaluation
Thriller evaluation
 
Q1 conventions in my thriller
Q1   conventions in my thrillerQ1   conventions in my thriller
Q1 conventions in my thriller
 
Evaluation Q1,2,3,6
Evaluation Q1,2,3,6Evaluation Q1,2,3,6
Evaluation Q1,2,3,6
 
Alice100
Alice100Alice100
Alice100
 
Mes planning
Mes planningMes planning
Mes planning
 
Mood board- Thriller Opening Sequence
Mood board- Thriller Opening Sequence Mood board- Thriller Opening Sequence
Mood board- Thriller Opening Sequence
 
Media
MediaMedia
Media
 
Eval task 1 version
Eval task 1 versionEval task 1 version
Eval task 1 version
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Evaluation question 2

  • 1.
  • 2. From our target audience research we conducted we found out that we would use two mercenaries against two terrorists and a civilian hostage in the storyline to make it more tense “anyone one could win” scenario.
  • 3. To make our film as attractive and authentic as possible to certain social groups we used weapons for each faction, this was aimed to give the film a more serious, tense feel as both factions are armed and ready to kill.
  • 4. To get the best out of our film we wanted the characters to look the part to attract a bigger audience, we had two mercenaries who basically wore gear like balaclavas, scarves and dark jackets to look like they were lone wolves. Our terrorists effectively wore the same but were more free in what they wore e.g. bandanas or sunglasses to make them looks as in character as possible