SlideShare a Scribd company logo
Task 2
Star Image ,[object Object],Direct Address
The Music Video The point of our music video was to create a star image in The Escape we wanted the audience to see the hard work done in the band to create a mise en scene that they are together this would open up more chance of selling the star We also wanted her to be the star as a lead female singer to portray her independence as a women and her battle through life as the concept shows she is always fighting
Target audience ,[object Object],[object Object],[object Object],[object Object],[object Object]
Rebellion ,[object Object]
Youthfulness ,[object Object],[object Object]
Sexual magnetism ,[object Object]
Costume ,[object Object],In the tunnel where she has a spy looked to her to create a sense of purpose what she needs to do Where as in the prison she has a more sexual look to her that she has been beaten down ,[object Object]
Locations  ,[object Object],when she is in the tunnel she has that spy look about her quite similar to destiny child's look where they are portraying a Charlie angels style look she is in the prison she became some sex object as she is dressed in her bare clothes in gaffe tape but as she is breaking out of prison this suggests she is strong and that not many people escape form prison ,[object Object]
Organic Or Synthetic  ,[object Object],In L.E.S Artistes she is naturally a synthetic performer of the song
Incoherent  ,[object Object],[object Object]
Album Cover - Back Black and white feel to give it a authentic feel to the case people want to purchase it as it looks old.
Album Cover - Front The image of the bars represents she is going to escape and that it deals with there name escape to connect both together with her face staring at you
Poster We have a line of dates of gigs our fans can go to during the Tour of the escape The bands name in the biggest font makes them the centre point and has highest status. We also include supporting acts that want to back the artist up as they believe in her and get more audience Our record label  Logos including to show the importance of the artist and what they might hold including our record label

More Related Content

What's hot

Digipak analysis
Digipak analysis Digipak analysis
Digipak analysis veevee1231
 
Question 1: Media Product Evaluation
Question 1: Media Product EvaluationQuestion 1: Media Product Evaluation
Question 1: Media Product Evaluation
lauracoggin
 
Description of your target audience
Description of your target audienceDescription of your target audience
Description of your target audience
BradleyBarnes16
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
james219
 
Petra Collins - Research
Petra Collins - ResearchPetra Collins - Research
Petra Collins - Research
James Greaves
 
Description of your target audience
Description of your target audienceDescription of your target audience
Description of your target audience
BradleyBarnes16
 
Media studies Evaluation : how we attracted the audience
Media studies  Evaluation : how we attracted the audienceMedia studies  Evaluation : how we attracted the audience
Media studies Evaluation : how we attracted the audienceDaniel Buja
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
james219
 
Katy perry advert analysis
Katy perry advert analysisKaty perry advert analysis
Katy perry advert analysis
naomi_pierce
 
Ellie Goulding digi pac Analysis
Ellie Goulding digi pac AnalysisEllie Goulding digi pac Analysis
Ellie Goulding digi pac Analysis
zincrecords
 
Audience profiling
Audience profilingAudience profiling
Audience profiling
Alice Western
 
Ellie goulding digi pak analysis
Ellie goulding digi pak analysisEllie goulding digi pak analysis
Ellie goulding digi pak analysis
zincrecords
 
Audience of my productions
Audience of my productionsAudience of my productions
Audience of my productions
jjjjordan3
 
Kanye West artist case study
Kanye West artist case studyKanye West artist case study
Kanye West artist case study
Tolani Onanuga
 
Lana del rey advert analysis
Lana del rey advert analysisLana del rey advert analysis
Lana del rey advert analysis
naomi_pierce
 
Textual analysis of my music video
Textual analysis of my music videoTextual analysis of my music video
Textual analysis of my music videoshannoncammish
 
Video analysis
Video analysisVideo analysis
Video analysis
brookemayo
 

What's hot (18)

Digipak analysis
Digipak analysis Digipak analysis
Digipak analysis
 
Question 1: Media Product Evaluation
Question 1: Media Product EvaluationQuestion 1: Media Product Evaluation
Question 1: Media Product Evaluation
 
Description of your target audience
Description of your target audienceDescription of your target audience
Description of your target audience
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Petra Collins - Research
Petra Collins - ResearchPetra Collins - Research
Petra Collins - Research
 
Description of your target audience
Description of your target audienceDescription of your target audience
Description of your target audience
 
Media studies Evaluation : how we attracted the audience
Media studies  Evaluation : how we attracted the audienceMedia studies  Evaluation : how we attracted the audience
Media studies Evaluation : how we attracted the audience
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Katy perry advert analysis
Katy perry advert analysisKaty perry advert analysis
Katy perry advert analysis
 
Ellie Goulding digi pac Analysis
Ellie Goulding digi pac AnalysisEllie Goulding digi pac Analysis
Ellie Goulding digi pac Analysis
 
Audience profiling
Audience profilingAudience profiling
Audience profiling
 
Ellie goulding digi pak analysis
Ellie goulding digi pak analysisEllie goulding digi pak analysis
Ellie goulding digi pak analysis
 
Audience of my productions
Audience of my productionsAudience of my productions
Audience of my productions
 
Media Blog Task 2
Media Blog Task 2Media Blog Task 2
Media Blog Task 2
 
Kanye West artist case study
Kanye West artist case studyKanye West artist case study
Kanye West artist case study
 
Lana del rey advert analysis
Lana del rey advert analysisLana del rey advert analysis
Lana del rey advert analysis
 
Textual analysis of my music video
Textual analysis of my music videoTextual analysis of my music video
Textual analysis of my music video
 
Video analysis
Video analysisVideo analysis
Video analysis
 

Viewers also liked

Rest
RestRest
Rest
school
 
E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?
E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?
E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?
JLMB
 
Question parlementaire les abus du pro deo
Question parlementaire  les abus du pro deoQuestion parlementaire  les abus du pro deo
Question parlementaire les abus du pro deo
JLMB
 
Turquie : appel pour la défense des avocats membres du CHD
Turquie : appel pour la défense des avocats membres du CHDTurquie : appel pour la défense des avocats membres du CHD
Turquie : appel pour la défense des avocats membres du CHD
JLMB
 
L'OBFG propose des amendements pour le proje
L'OBFG propose des amendements pour le projeL'OBFG propose des amendements pour le proje
L'OBFG propose des amendements pour le projeJLMB
 
Conference de presse sur le projet de revision de la constitution du burundi
Conference de presse sur le projet  de revision de la constitution du burundiConference de presse sur le projet  de revision de la constitution du burundi
Conference de presse sur le projet de revision de la constitution du burundi
JLMB
 

Viewers also liked (7)

Rest
RestRest
Rest
 
\Task 2
\Task 2\Task 2
\Task 2
 
E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?
E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?
E. de Lamaze - Faut-il élargir le droit d'accès à un avocat ?
 
Question parlementaire les abus du pro deo
Question parlementaire  les abus du pro deoQuestion parlementaire  les abus du pro deo
Question parlementaire les abus du pro deo
 
Turquie : appel pour la défense des avocats membres du CHD
Turquie : appel pour la défense des avocats membres du CHDTurquie : appel pour la défense des avocats membres du CHD
Turquie : appel pour la défense des avocats membres du CHD
 
L'OBFG propose des amendements pour le proje
L'OBFG propose des amendements pour le projeL'OBFG propose des amendements pour le proje
L'OBFG propose des amendements pour le proje
 
Conference de presse sur le projet de revision de la constitution du burundi
Conference de presse sur le projet  de revision de la constitution du burundiConference de presse sur le projet  de revision de la constitution du burundi
Conference de presse sur le projet de revision de la constitution du burundi
 

Similar to Task 2

Evaluation Question 1
Evaluation Question 1Evaluation Question 1
Evaluation Question 1
William Brook
 
5. audience
5. audience5. audience
5. audience
MishaLing-Marriott
 
Pitch presentation
Pitch presentationPitch presentation
Pitch presentation
rhsmediastudies
 
A2 media evaluation
A2 media evaluationA2 media evaluation
A2 media evaluationEmmamavis
 
Evaluation Question 1B
Evaluation Question 1BEvaluation Question 1B
Evaluation Question 1B
Elora Elora
 
Richard dyer star theory 1979
Richard dyer   star theory 1979Richard dyer   star theory 1979
Richard dyer star theory 1979
Alice Culham
 
Evaluation Of Media Coursework
Evaluation Of Media CourseworkEvaluation Of Media Coursework
Evaluation Of Media CourseworkChesky02
 
Evaluation of media coursework
Evaluation of media courseworkEvaluation of media coursework
Evaluation of media courseworkChesky02
 
Task 2 Powerpoint Presentation:
Task 2 Powerpoint Presentation:Task 2 Powerpoint Presentation:
Task 2 Powerpoint Presentation:hurtwoodhousemedia
 
Evaluation Question 02
Evaluation Question 02Evaluation Question 02
Evaluation Question 02
visitor567
 
How does your media product represent particular social
How does your media product represent particular socialHow does your media product represent particular social
How does your media product represent particular socialArlette Bokete
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
29046grace
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
29104zoe
 

Similar to Task 2 (20)

Blog Task2
Blog Task2Blog Task2
Blog Task2
 
Blog 2
Blog 2Blog 2
Blog 2
 
Evaluation Question 1
Evaluation Question 1Evaluation Question 1
Evaluation Question 1
 
5. audience
5. audience5. audience
5. audience
 
Pitch presentation
Pitch presentationPitch presentation
Pitch presentation
 
A2 media evaluation
A2 media evaluationA2 media evaluation
A2 media evaluation
 
Evaluation Question 1B
Evaluation Question 1BEvaluation Question 1B
Evaluation Question 1B
 
Richard dyer star theory 1979
Richard dyer   star theory 1979Richard dyer   star theory 1979
Richard dyer star theory 1979
 
Task 2
Task 2Task 2
Task 2
 
Task 1
Task 1Task 1
Task 1
 
Evaluation Of Media Coursework
Evaluation Of Media CourseworkEvaluation Of Media Coursework
Evaluation Of Media Coursework
 
Research
ResearchResearch
Research
 
Evaluation of media coursework
Evaluation of media courseworkEvaluation of media coursework
Evaluation of media coursework
 
Research
ResearchResearch
Research
 
Task 2 Powerpoint Presentation:
Task 2 Powerpoint Presentation:Task 2 Powerpoint Presentation:
Task 2 Powerpoint Presentation:
 
Evaluation Question 02
Evaluation Question 02Evaluation Question 02
Evaluation Question 02
 
How does your media product represent particular social
How does your media product represent particular socialHow does your media product represent particular social
How does your media product represent particular social
 
Task 1
Task 1Task 1
Task 1
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
 
Evaluation question 1
Evaluation question 1Evaluation question 1
Evaluation question 1
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Task 2

  • 2.
  • 3. The Music Video The point of our music video was to create a star image in The Escape we wanted the audience to see the hard work done in the band to create a mise en scene that they are together this would open up more chance of selling the star We also wanted her to be the star as a lead female singer to portray her independence as a women and her battle through life as the concept shows she is always fighting
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Album Cover - Back Black and white feel to give it a authentic feel to the case people want to purchase it as it looks old.
  • 13. Album Cover - Front The image of the bars represents she is going to escape and that it deals with there name escape to connect both together with her face staring at you
  • 14. Poster We have a line of dates of gigs our fans can go to during the Tour of the escape The bands name in the biggest font makes them the centre point and has highest status. We also include supporting acts that want to back the artist up as they believe in her and get more audience Our record label Logos including to show the importance of the artist and what they might hold including our record label