SlideShare uma empresa Scribd logo
1 de 3
Prop and costume list

    Lisa , Chloe , Troy
Props


                   What will be used on the
                   girlfriend by the gangsters.




 The note which the
 gangsters will write to John.
Costume

Mais conteúdo relacionado

Destaque

Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3IOSR Journals
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...IOSR Journals
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
The Digital Marketing Trifecta
The Digital Marketing TrifectaThe Digital Marketing Trifecta
The Digital Marketing TrifectaBeth McEnery
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserIOSR Journals
 
An Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsAn Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsIOSR Journals
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceIOSR Journals
 
Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...IOSR Journals
 
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...IOSR Journals
 
How To Create Your Own Info Product
How To Create Your Own Info ProductHow To Create Your Own Info Product
How To Create Your Own Info Productbelieve52
 
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...IOSR Journals
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementIOSR Journals
 

Destaque (20)

Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3
 
J o b s new sky 1 unit 36
J o b s new sky 1 unit 36J o b s new sky 1 unit 36
J o b s new sky 1 unit 36
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
The Digital Marketing Trifecta
The Digital Marketing TrifectaThe Digital Marketing Trifecta
The Digital Marketing Trifecta
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot Detection
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parser
 
An Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsAn Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its Applications
 
C0561419
C0561419C0561419
C0561419
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
M0566672
M0566672M0566672
M0566672
 
Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...
 
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
 
How To Create Your Own Info Product
How To Create Your Own Info ProductHow To Create Your Own Info Product
How To Create Your Own Info Product
 
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...Investigation on Using Fractal Geometry for Classification of Partial Dischar...
Investigation on Using Fractal Geometry for Classification of Partial Dischar...
 
J0427985
J0427985J0427985
J0427985
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 

Mais de lisadors

Looking back at your preliminary task, what
Looking back at your preliminary task, whatLooking back at your preliminary task, what
Looking back at your preliminary task, whatlisadors
 
Censorship media research
Censorship media researchCensorship media research
Censorship media researchlisadors
 
Character profile
Character profileCharacter profile
Character profilelisadors
 
Codes and conventions for chosen genre
Codes and conventions for chosen genreCodes and conventions for chosen genre
Codes and conventions for chosen genrelisadors
 

Mais de lisadors (6)

Looking back at your preliminary task, what
Looking back at your preliminary task, whatLooking back at your preliminary task, what
Looking back at your preliminary task, what
 
Censorship media research
Censorship media researchCensorship media research
Censorship media research
 
Recee
ReceeRecee
Recee
 
Recee
ReceeRecee
Recee
 
Character profile
Character profileCharacter profile
Character profile
 
Codes and conventions for chosen genre
Codes and conventions for chosen genreCodes and conventions for chosen genre
Codes and conventions for chosen genre
 

Costume

  • 1. Prop and costume list Lisa , Chloe , Troy
  • 2. Props What will be used on the girlfriend by the gangsters. The note which the gangsters will write to John.