2.
3.
4.
5.
6.
This is the order in which we was thinking to choose our opening in, the numbers illustrate the order we would want to choose, but in the real thing it would obviously be shown in more depth.1. Shows the hackers codes and the way in which he would access peoples personal information and get through to their cameras to stalk them.
2.This picture shows the camera from the computer in which the hacker would watch and stalk people to find out stuff about them that he could use to capture them.
3. This would be a shot of the hackers hands, this would build up tension within the audience as its the first part of the hacker they have seen.
4. This shows the hacker getting into the CCTV and hacking into a whole class room, this shows that the hacker can access everything.
5. A close up on the hacker, this yet again builds tension as they have seen part of the hackers face, this represents the weird way in which he looks and acts.
6. An over the shoulder shot of the hacker as he closes the computer screen and walks away, leaves the opening on a cliff hanger and makes people want to watch more.
No comments:
Post a Comment