Nt1310 Unit 4

Improved Essays
Response / Analysis 3
Directions:
READ the Directions. Answer the question(s) below in 500-750 words. Enter your answer onto this document; once you are done, upload this document to D2L. Do NOT change the font, font size, or margins. Margins are set at 1” right, 1” left, 1” top, and 1” bottom. Font is Calibri and font size is 12.
Be sure to SAVE your document before uploading it. Upload documents as either Word files (.docx or .doc) or a Rich Text Format (.rtf file).
USE THIS DOCUMENT!!!
1. Define:
a. Historical world (historical reality) The reality that is processed, selected, ordered and interpreted by nonfiction television programs.
b. Social actor “Real” people as used in nonfiction television programs; people “performing” according
…show more content…
Watch a narrative-based series or serial. Identify the program and where you watched it. If you watched it on TV, provide the network or station name and airtime. If you streamed the program, name the streaming platform (Hulu, Netflix, etc.) and the device you streamed it from (laptop, Roku, Apple TV, etc.) a. The program that I watched is 24 Live Another Day episode (6:00pm-7:00 pm) and it is a serial. I watched 24 on Amazon Prime via Play Station 3. 3. Once you have watched the program, give 3 to 4l instances of a way in which an actor or actors creates performance using vocal, facial, gesture, or corporeal (the body) techniques. Refer to pages 65-71 of your book. Be specific.

There were a plethora of examples used in this episode of 24, which the actors used to build performance.
a. In the beginning of the show, Margot Al-Hazari (Michelle Fairley) was talking to Ian Al- Hazari (Liam Garrigan) about an unexpected and important phone call that she had received from the president. The president agreed to turn himself in to Margot Al-Hazari and Ian Al- Hazari only if they would destroy missiles that they had planted. As Margot and Ian were discussing whether they should believe the presidents offer, Margot kept raising her eyebrows and had a worried facial expression through this conversation, which showed facial performance. This indicated that Margot was unsure about her next move instead of being a confident
…show more content…
Towards the beginning of the episode Jack Bauer (Kiefer Sutherland) and president James Heller (William Devane) were discussing about the possible events that would take place that night. President Heller is certain that he is going to go see Margot Al-Hazari and Jack Bauer is very hesitant. President Heller announces to Jack that he has been diagnosed with Alzheimer’s and that he intends on resigning as the president. Jack then tells the president that it isn’t just about himself. James Heller then raises the volume of his voice to the point where he is screaming at Jack that he is doing this for the people who have died and will die from the attacks caused by the Al-Hazari’s, which shows vocal perfomance. This indicates that President Heller was very confident in the decision that he is about that he wants Jack to back him

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Lab

    • 1594 Words
    • 7 Pages

    My group had been given a specific task to investigate according to the lab manual1. We were employed by the Environmental Protection Agency as chemists. Our task is to identify an unknown compound that was found in a nearby landfill. In this laboratory, the unknown compound was given to us by our TA. The main goal of this experiment was to correctly identify the unknown compound.…

    • 1594 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Lab 2

    • 458 Words
    • 2 Pages

    On January 29th, we conducted lab 2 which involved learning the basic tools of Dartfish and how to publish Dartfish videos to our own mediabook. The first step in the lab involved going to dartfish.tv and looking at the “3302 Class Resources folder and downloading the video trim file. I then opened the Dartfish software and as a class we reviewed some of the various resources in the software like the different screen options such as split screen or mosaic mode and different tools such as analyzing angle and distance of the video. I learned how to transfer the downloaded video from the computer library to the tray. It’s important to note that you can delete videos from your tray and it will still be on the computer’s library.…

    • 458 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    “(We have) more to do for the young woman in East St. Louis, and thousands more like her, who has the grades, has the drive, has the will, but doesn’t have the money to go to college (Obama, para 6).” Interestingly, he follows this statement with an attempt to dissatisfy one of the commonplace arguments against liberal policies. Mr. Obama says that these people do not ‘expect that government will solve all of their problems,’ but that they are willing to work hard in order to achieve their dreams. This seems to solidify Obama’s ethos with the audience, especially when combined with the specific scenarios that he uses to exemplify the need for his policies. The middle section of the speech is dedicated to the 2004 Presidential Election.…

    • 838 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    He talks about the Watergate scandal, the oil crisis, energy, and others. Carter uses a warning tone to try and help the people understand the severity of the issues that have been occurring. One example of his warning tone is when he states the following, "This is not a message of happiness or reassurance, but it is the truth it is a warning. " Carter uses the truth to open their eyes and to warn them, make them aware of the situation. Another way Carter warns them is by metaphorically saying, "We were sure that ours was a nation of the ballot, not the bullet, until the murders of John Kennedy and Robert Kennedy and…

    • 1417 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Many performance pieces are characterized by audience interaction that tip toes the line of…

    • 1260 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Role Play Reflective Essay

    • 1302 Words
    • 6 Pages

    Before we attended the tutorial workshop, we were asked to watch a TV episode and comment the emotions that have happened in the show. I have picked up the TV programme that I have watched recently, which is ‘Suits’ Season 5. ‘Suits’ is a drama that is involved different lawyers in the organisation, what they are currently struggling with and their conflicts…

    • 1302 Words
    • 6 Pages
    Superior Essays