Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Project 7

See attached.

Senior Dog Sanctuary

Five years ago, a nonprofit senior dog sanctuary opened on the outskirts of a small town. The mission of this sanctuary is to provide a safe haven for senior dogs. The sanctuary has a strong social media following, but it is not well-known within the local community. To increase the local visibility of this organization, the client needs a poster that will be distributed throughout the community.

Directions

For your chosen client, you will be required to create two deliverables: a call-to-action poster, in both color and grayscale, and a client presentation. However, for this milestone, you will create only the call-to-action poster.

Choose one of the two clients and, using Adobe Illustrator, create a poster that conveys the message described by your chosen client. Refer to the design brief from your chosen client, located in the “Supporting Materials” section below, to inform your design. Make sure to use all the copy included in the design brief as well as at least one image or graphic from the Image and Graphic Bank resource, also linked below. These components should be displayed in a way that clearly communicates the call-to-action message.

Specifically, you must address the following criteria:

Part One: Color Poster
Create an 11” x 17” color poster using Adobe Illustrator.

1. Apply the
 principle of emphasis to convey a clear call-to-action message. You must include all the copy from the relevant design brief document. Consider the following questions to guide your work:

· Is the call to action the focal point of the poster? Consider the positioning and size of the copy.

· Did you use the elements of design to emphasize the call to action? Consider the usage of line and shape.

2. Implement the 
principle of hierarchy in the design. Consider the following questions to guide your work:

· Does the organization of components help guide the eye of the viewer? Consider organizing the components according to their level of importance: primary, secondary, and equivalent.

· Consider scale, contrast, space, alignment, and shape.

3.
Select typography that conveys the appropriate call-to-action message. Consider the following question to guide your work:

·
Is your choice of font appropriate for the intended message?

4. Include 
design and visual elements in your poster. Include the following details in your work:

D. You must incorporate the elements of line, shape, and space.

D. You must include at least one image or graphic from the Image and Graphic Bank resource and include attribution. Consider using Photoshop if you wish to edit your image or graphic.

5.
Apply typography that is readable and legible. Typography must be in black and/or white. Consider the following questions to guide your work:

· Are the fonts readable?

· Are the letters legible?

6. Apply the 
principle of alignment for readability.

7. Create a 
balanced poster design. Consider the following questions to guide your work:

· Is the look of your poster cohesive?

· Does your poster have an asymmetric or symmetric layout?

8. Apply a 
color palette that supports the call-to-action message to the grayscale poster. Consider the following questions to guide your work:

· Is your color palette harmonious? Consider the inclusion of complementary, analogous, and/or monochromatic color combinations.

· Did you use colors that allow for visual contrast? Consider the hue, saturation, and/or intensity of the colors.

9. Save the 
color poster as a PDF.

Part Two: Grayscale Poster
Convert the RAW color file from Part One into grayscale.

1. Save the color poster from Part One as a 
grayscale PDF.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

problem

Research problems due 9/18 Please follow the instructions carefully for your research problem. Your argument and research input will significantly impact your grade. Ensure that you check for AI-generated content and plagiarism before submitting your paper. AI-generated content should not exceed 10%, and content from external sources should be limited

co task 6

Topic-bitcoin Task 6 Objective: To apply systems thinking principles to analyze a blockchain network and understand its key components, interactions, and dynamics. Assignment Tasks: Select a Blockchain Network: Choose a specific blockchain network or cryptocurrency project to analyze. You can select well-known networks like Bitcoin, Ethereum, or any other blockchain

CO Task 5

In this homework, we explore Naïve Bayes, K-Nearest Neighbors, and Support Vector Machine models. 1) (50 points) Use “credit_Dataset.arff” dataset and apply the Naïve Bayes, K-Nearest Neighbors, and Support Vector Machine technique using the WEKA tool in 2 different settings, including: a. 10 fold-cross validation. b. 80% training. Write a

PhD thesis

I need a comprehensive PhD thesis developed on the topic of “Emotion-Aware Artificial Intelligence and Sustainable Consumer Behavior: A Neuro-AI Marketing Framework for Continuous Green Consumption.”

Co project

· Comprehensive Literature Review: Require a more comprehensive survey of existing approaches. · Comparative Study: Expect more detailed benchmarking of at least 8 to 10 machine learning models. · Additional Experiments: · Conduct feature selection or dimensionality reduction as an extra step. · Explore ensemble methods or advanced techniques beyond

AI

Did AI take place the Software Engineers, HR consultants and Data Entry Jobs?

Data visualization 4 part 2

Follow the attached instructions to complete this work. Unit 4 Assignment Directions: Time Series In this assignment, you will perform a time series analysis in Tableau. · Choose a dataset to analyze based on the requirements provided.   · Once you’ve selected your time series, build a forecast to predict future

Computer Science CG Assignment 8 presentation

Follow the attach instruction to complete this work. Note: Make sure it aligns with Rubric Unit 8 Assignment 2 Directions: Final Presentation Purpose With this presentation, you will gain valuable experience demonstrating your expertise in cybersecurity governance by presenting as a CISO to a hypothetical professional audience.  Directions Begin by incorporating

Computer Science CG assignment 8

Follow the attached assignment to complete the work. Note: Follow Rubric Unit 8 Assignment 1 Directions: Presentation Rehearsal Purpose The rehearsal is your first run-through of your talk. Use the opportunity to de-bug any technical issues with lighting, positioning, and recording. You will not be graded on technical or artistic

Computer Science CG assignment 7 Outline

 Follow the attached document to complete this work Unit 7 Assignment 1 Directions: Professional Presentation Outline Purpose This assignment allows you time to review your research from previous units and organize your thoughts in an outline format. Plan on changing your paper and presentation based on feedback on this outline.  Directions

Computer Science CG assignment 6 ,

Follow the attached direction to complete this work. Note: Make sure it Aligns with Rubric Unit 6 Assignment 2 Directions: Timothy Brown vs. the SEC Purpose The Securities and Exchanges Commission (SEC) is a key US federal agency that regulates financial reporting. In this paper, you will explore how the

Microsoft 365Tenant to Tenant Migration Solution

A smooth tenant-to-tenant migration requires more than just moving mailboxes—it demands precision, security, and planning. With the MailsDaddy Cross-Tenant Migration Service, IT teams can execute a flawless cross-tenant mailbox migration that covers emails, attachments, calendars, contacts, and OneDrive data. It’s built for businesses of every size, ensuring the entire Office

CO Data 3

DECISION TREES for Risk Assessment One of the great advantages of decision trees is their  interpretability. The rules learnt for classification are easy for a person to follow, unlike the opaque “black box” of many other methods, such as neural networks. We demonstrate the utility of this using a  German

Computer Science Homework 1

MMIS 671 Homework 1. Constrained Optimization Problems A company produces 3 types of cables: A, B, and C. In-house production costs per foot of cables A, B, and C are $6, $8, and $10, respectively. The production process requires 5 resources: Drawing, Annealing, Stranding, Extrusion, and Assembly. For each resource,

MIMT

  Task 2.4 — Executing the Payload After decrypting and executing the transferred file, it generates a unique hash tied to your GTID. What’s the hash?