SlideShare a Scribd company logo
Little Blues & The Magic Sweets
                                                       These represent the
                                                       bullies in the fairytale,
                                                       These bullies are
                                                       portray the ‘pretty
The way                                                girls’, the victim is the
                                                       not so pretty one, she
little red
                                                       represents little blues
riding hood
has the
uniqueness
of using the
colour ‘red’,
my fairytale
uses the
colour
‘blue’.




                          These are just ‘sayings’
                          to help you understand
                          the moral of the fairytale
Cinderella is the victim and
This should                       also the ‘goody’ in the fairytale   We can link
explain and justify               and similarly is the same thing     the ugly
how and why I                     with little blue.                   duckling to
have made my                                                          little blues
choice when it                                                        in my
came to putting                                                       fairytale
certain elements
into my fairytale, I
have linked it to
classic fairytales
such as Cinderella
and the ugly
duckling.


                                                                      Most fairytales
                                                                      have folklore,
                                                                      witches,
                                                                      goblins, fairy
                                                                      etc. Cinderella
                                                                      has a fairy
                                                                      godmother,
                                                                      similarly my
                                                                      fairytale has a
                                                                      old women that
                                                                      gives my
                                                                      character
                                                                      magic sweets,
                                                                      so she plays a
                                                                      similar rule like
                                                                      the Cinderella
                                                                      fairytale

        Cinderellas evil
        step-sisters are
        similar characters to
        the bullies in my
        fairytale, both
        similarly the villains.
Presentation

More Related Content

Viewers also liked

Better Together: Reimagining Social Media content Through Student Collaboration
Better Together: Reimagining Social Media content Through Student CollaborationBetter Together: Reimagining Social Media content Through Student Collaboration
Better Together: Reimagining Social Media content Through Student Collaboration
Jessica Hagman
 
Atelier D creating a Virtual Design Studio
Atelier D creating a Virtual Design StudioAtelier D creating a Virtual Design Studio
Atelier D creating a Virtual Design Studio
georgyh
 
Robert lepage
Robert lepageRobert lepage
Robert lepage
imanshafi
 
Alao Presentation
Alao PresentationAlao Presentation
Alao Presentation
Jessica Hagman
 
Feedback
FeedbackFeedback
Feedback
imanshafi
 
Calendar etiquettetechtip
Calendar etiquettetechtipCalendar etiquettetechtip
Calendar etiquettetechtip
Jessica Hagman
 
Focus on Finals Study Session
Focus on Finals Study SessionFocus on Finals Study Session
Focus on Finals Study Session
Jessica Hagman
 
Connecting Your Community with Local Content via Social Media: The Margaret B...
Connecting Your Community with Local Content via Social Media: The Margaret B...Connecting Your Community with Local Content via Social Media: The Margaret B...
Connecting Your Community with Local Content via Social Media: The Margaret B...
Jessica Hagman
 

Viewers also liked (8)

Better Together: Reimagining Social Media content Through Student Collaboration
Better Together: Reimagining Social Media content Through Student CollaborationBetter Together: Reimagining Social Media content Through Student Collaboration
Better Together: Reimagining Social Media content Through Student Collaboration
 
Atelier D creating a Virtual Design Studio
Atelier D creating a Virtual Design StudioAtelier D creating a Virtual Design Studio
Atelier D creating a Virtual Design Studio
 
Robert lepage
Robert lepageRobert lepage
Robert lepage
 
Alao Presentation
Alao PresentationAlao Presentation
Alao Presentation
 
Feedback
FeedbackFeedback
Feedback
 
Calendar etiquettetechtip
Calendar etiquettetechtipCalendar etiquettetechtip
Calendar etiquettetechtip
 
Focus on Finals Study Session
Focus on Finals Study SessionFocus on Finals Study Session
Focus on Finals Study Session
 
Connecting Your Community with Local Content via Social Media: The Margaret B...
Connecting Your Community with Local Content via Social Media: The Margaret B...Connecting Your Community with Local Content via Social Media: The Margaret B...
Connecting Your Community with Local Content via Social Media: The Margaret B...
 

More from imanshafi

Doc1
Doc1Doc1
Doc1
imanshafi
 
Doc1
Doc1Doc1
Doc1
imanshafi
 
Doc1
Doc1Doc1
Doc1
imanshafi
 
Film Review
Film ReviewFilm Review
Film Review
imanshafi
 
Doc1
Doc1Doc1
Doc1
imanshafi
 
Call sheet
Call sheetCall sheet
Call sheet
imanshafi
 
Location recce
Location recceLocation recce
Location recceimanshafi
 
Shooting schedule
Shooting scheduleShooting schedule
Shooting schedule
imanshafi
 
Opening Sequences Of 3 Fantasy Genre Films
Opening Sequences Of 3 Fantasy Genre FilmsOpening Sequences Of 3 Fantasy Genre Films
Opening Sequences Of 3 Fantasy Genre Films
imanshafi
 

More from imanshafi (9)

Doc1
Doc1Doc1
Doc1
 
Doc1
Doc1Doc1
Doc1
 
Doc1
Doc1Doc1
Doc1
 
Film Review
Film ReviewFilm Review
Film Review
 
Doc1
Doc1Doc1
Doc1
 
Call sheet
Call sheetCall sheet
Call sheet
 
Location recce
Location recceLocation recce
Location recce
 
Shooting schedule
Shooting scheduleShooting schedule
Shooting schedule
 
Opening Sequences Of 3 Fantasy Genre Films
Opening Sequences Of 3 Fantasy Genre FilmsOpening Sequences Of 3 Fantasy Genre Films
Opening Sequences Of 3 Fantasy Genre Films
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Presentation

  • 1. Little Blues & The Magic Sweets These represent the bullies in the fairytale, These bullies are portray the ‘pretty The way girls’, the victim is the not so pretty one, she little red represents little blues riding hood has the uniqueness of using the colour ‘red’, my fairytale uses the colour ‘blue’. These are just ‘sayings’ to help you understand the moral of the fairytale
  • 2. Cinderella is the victim and This should also the ‘goody’ in the fairytale We can link explain and justify and similarly is the same thing the ugly how and why I with little blue. duckling to have made my little blues choice when it in my came to putting fairytale certain elements into my fairytale, I have linked it to classic fairytales such as Cinderella and the ugly duckling. Most fairytales have folklore, witches, goblins, fairy etc. Cinderella has a fairy godmother, similarly my fairytale has a old women that gives my character magic sweets, so she plays a similar rule like the Cinderella fairytale Cinderellas evil step-sisters are similar characters to the bullies in my fairytale, both similarly the villains.