• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  • Level: GCSE
  • Subject: ICT
  • Word count: 2641

Leaflet design for Finding Nemo.

Extracts from this document...


Analysis Problem The manager of the well-known cinema Showcase has approached me. He has explained to me that the leaflets produced for his cinema are lacking in quality. There is a film about to be shown at his cinema and I have been offered to design and produce a leaflet advertising this film. This leaflet must be suitable to the target audience, must appeal to people, must attract people to this cinema and be really eye catching to passers-by. What's the film? The film that I will be researching and developing a leaflet for, is Finding Nemo. The story behind this computer-generated masterpiece revolves around the retrieval of a missing loved one. A tiny clown fish named Nemo is literally plucked from his home in the Great Barrier Reef and imprisoned in a Sydney dentist's aquarium, forcing his overprotective father to overcome his fear of the unknown and come and rescue him. This film is based to children with its computer generated graphics and cute characters, but also appeals highly to adults with its 'older generation' humour and real-time situations. The film is for both sexes. The film also appeals to all types of people, as it is not directed at a certain group. This film is for all. Layout of report For the layout of my report, I will keep it simple but effective. All the writing will be in comic sans, and in size 14. The titles will also be in comic sans but in bold and underlined. ...read more.


The film is based in the sea and it shows even the simplest change to the writing style can make quite a difference. The flyer is bold, simple but enough, and extremely eye-catching. It is a very well designed and good quality flyer. My only change would be to add a bit more writing, as it doesn't enable future watchers to know anything about the film. There is big font showing the title and when the film is released. This is good as it shows quickly and easily what and when the film is, which is perfect for a poster. This poster would appeal to the target audience as its big, bold and full of colour, just what little kids want to see. It also has humour for the adults, shown by the picture. I will be using research number 1. leaflet. This is because is explains the film well, and is an actual and reliable review done by a professional critic. I will not be using picture number 2., as it only shows one of the characters, which isn't the main one, and doesn't show enough detail. I will be using pictures 3 and 4, as they show a good level of detail and show a good selection of the main characters. Programme Advantages Disadvantages Word * Many formatting tools to help create neat presentation. * A good spell checker so everything is spelt correctly. * Tools to produce text and graphics on the page enabling easy formatting. ...read more.


If you save it 3 or 4 times, then even if something does go wrong, nothing will be lost as the work will of only just been saved into my password-protected computer. This is my screen dump of my coursework folder. It shows the path to my folder and were I save my work into. I can't stress enough how important it is to save my work at least 3 times per lesson as things can go wrong when you least expect or want them to. Health and safety There are 3 main problems Virus Protection. A virus is a programme that is written for one reason, to affect a computer in a harmful way. Viruses make copies of themselves; therefore adding to the harmful affect they have on a computer and computer system. Viruses move from computer system to computer system encrypting the files and damaging the software and system. My work is protected by Sophos. This scans everything on the schools network and deletes every single virus that it comes across. It is updated every day to scan for new viruses and anything harmful that enters the computer. Every computer needs a virus protection system as if there is no firewall (a wall blocking harmful programmes entering the computer) harmful programmes can destroy your files and stop the computer working altogether. A virus detector is a must. Questionnaire 1. Does my design leaflet contain sufficient information to advertise the film to its full potential? If not, what information needs to be added? 2. Is the layout of the leaflet presented in a style that is easy to understand? If not then what can be done to make it easier? 3. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Data Protection Act

    1.2.2 What new rights will the public have? Individuals already have a 'subject access right' under the Data Protection Act 1998 to access their own information held on computer and in some paper files. The Freedom of Information Act will extend this right to allow access to all types of information they hold, whether personal or non- personal.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    kept confidential, secure from the use of others and the Act has generally been very effective for the whole of the Leyton community. The legislation protects the whole community living in or outside the Leyton area. With the act in place; the individuals living in Leyton have more secure data storage in organisations they may be registered with.

  1. Privacy and Data Protection: IT Law

    The current debate on state and federal level: comprehensive laws or self-regulation? There has been significant debate in the US in recent years about the development of privacy laws covering the private sector.45 The private sector seems to maintain that self-regulation is sufficient and that no general law should

  2. Assets table - recording the copyright information on the logos and pictures I used.

    image S N/A A picture of fair deals (word) Photo shopped image merged with another this is to make an image mine and to avoid some copy rites issues that may occur. I have cropped the image and made it bigger this is to make it more visible for the target audience and to get rid of the irrelevant text.

  1. Legal Aspects of Using Information Technology

    Penalty is a maximum fine of �2000 and a six month prison sentence * Computer fraud and blackmail- unauthorised access with a further criminal intent. The penalty is an unlimited fine and a maximum of five year prison sentence * Viruses- unauthorised modification of computer material (e.g. programs or data).

  2. File management and standard ways of working.

    to be put in place to protect data where ever you keep the data apart from on the computer. For human threats the limits that should be taken is to limit the amount of access to any data that should have, usernames, passwords and firewalls on to stop anyone from hacking into files that they don't illegally have access to.

  1. Data Protection Issues – Compliance Within Computing Organisations, The Causes, Effects and Consequences.

    More shall be said of this later in the employment section. vii. Securely protected by appropriate technical and organisational measures To defeat unauthorised access to sensitive data, appropriate suitable and sustainable security measures must be in place at all times.

  2. Right of privacy under Hong Kong's current laws

    Ordinance (PD(P)O). The PD(P)O protects a person's personal data9 subjected to six Data Protection Principles (DPPs)10, which state the requirements on the collection, accuracy, use, disclosure and security of personal data against interference with private, family home life and physical freedom, disclosure of embarrassing private facts like name and identity and interference or misuse of correspondence and private communications.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work