Thursday, December 26, 2019

Communication Is A Vital Weapon Of American Politics

Communication is a vital weapon in American politics. Our leaders have won and lost our favor with organized speech since before the signing of the declaration of independence. With a well written speech, and a practiced delivery, one man can change the views of our entire country. No one has done this more successfully than Ronald Reagan. When Ronald Reagan gave the televised speech A Time for Choosing for the Barry Goldwater Campaign in 1964, he changed the way that American campaign speeches would be given forever. According to critics, his performance is â€Å"the most effective† of its kind, prompting comparisons to William Jennings Bryan as a great American speaker and earning him the title of â€Å"The Great Communicator.† Despite the wide acclaim, the speech did not work as Goldwater lost the election by a cavernous margin. So, why was his speech considered a success if the candidate it was supposed to bolster did not even win the election? While many explanatio ns are offered about the success of this speech by scholars, this paper will focus on the most widely supported school of thought, â€Å"The Teflon President†. More formally, this paper will argue that Reagan solidifies his identity as â€Å"The Great Communicator† during his A Time for Choosing speech, by using unprecedented rhetorical strategies in order to create and unify an audience around his new conservative populism. This paper will first provide historical context for the speech, then the paper will address theShow MoreRelatedA Brief Note On The American Civil War1521 Words   |  7 PagesAstorga Mrs. V History 101 19 April 2017 Civil War The American Civil War, that took place from 1861 to 1865, marked one of the most important changes in American history, it was fought between the Union and the Confederate States of America. A total of even southern states that left the Union to form their own country in order to protect the institution of slavery. The Civil War transformed the country’s economy, politics, women, African Americans, along with major breakthroughs in technology. The warRead MoreInternational Affairs During The Cold War1733 Words   |  7 Pagesquestion about who the enemy was. The threat was evident and the necessary response was unambiguous. It didn’t take coercion for the United States to rouse the population into backing a war necessary to preserve our freedom, our democracy, and the American way our life. Throughout the Cold War, the assertion of good, the concept and practice of capitalism and democracy, versus evil, the spread of communism, was clearly divided and unequivocal. The World Summary material provided for this course indicatesRead MoreThe United States And Saudi Arabia1459 Words   |  6 Pagesparties, yet it has also led to ever deepening U.S. involvement in regional politics. Despite that the United States is currently the greatest producer of petroleum, supplying approximately 14021 thousand barrels per day, they retain presence in the Middle East as part of their national interest to maintain strategic power and influence in the energy-rich region while strengthening trade and their alliances. Initially, American movement in the Middle East were governed by classical military considerations:Read MoreThe End Of The Cold War1694 Words   |  7 Pagessalient questions by scholars and policy makers about the relevance of nuclear weapons in the world. In his article, ‘learning to love the bomb’ Jonathan Tepperman calls president Obama’s plan to rid the world off nuclear weapons wrong, dreamy, unrealistic and a big mistake. I found this article interesting as it seems rather paradoxical as he implies that the world would be much more dangerous without nuclear weapons. In this paper, I will analyse and criticise Tepperman article. Before gettingRead MoreThe Cuban Missile Crisis The World On The Edge Of Its Seat1315 Words   |  6 Pagessignificant role in international politics, and its effects can still be seen today. The Cuban Missile Crisis is significant to current international relations because it proved the importance of the need for information, and the importance of taking risks. The history of the Cuban Missile Crisis is traced from both post-World War II negotiations and the Cuban Revolution. After the end of World War II, the Yalta Conference marked a turning point in Soviet-American relations (Appleby 760). This isRead MoreFalse Truths, Life, Liberty, And The Pursuit Of Happiness1538 Words   |  7 Pages False Truths Life, liberty and the pursuit of happiness. The motto and the foundation of American democracy. If life, liberty, and the pursuit of happiness are the key to a long and stable governing power, then, would non-vitality, imprisonment, and censorship do the same? George Orwell’s, 1984, a bleak, yet compelling novel answers this question. In this dystopian version of 1984, asides from discos and neon leggings, Oceania, a mega-continentRead MoreSocial Media Is A Bitter Sweet Gift Essay1515 Words   |  7 PagesThe 21st century has witnessed some of the greatest development in the field of social media up to this point. The creation of social network sites (SNS) such as Facebook, Twitter, and Youtube has established a crucial platform for communication and connection between different parts of the globe. In the past few years, SNS has not only been used to share our personal experiences with friends and families but has become an important platform for political discussions. Wi th the exponential increaseRead More The Role of Business in Foreign Policy Essay1651 Words   |  7 PagesThroughout the course of American history, business-related interests have played a predominant role in influencing foreign policy. Foreign policy determines how America conducts its relations with other countries. It is designed to further certain goals such as security and trade. More importantly foreign policy seeks to ensure America’s security and defense and its ability to protect America’s national interests around the world. National interests that shape foreign policy covers a wide rangeRead MoreEssay about The Causes of the Cold War1683 Words   |  7 Pagesreactions. For example, both the U.S and the orthodox historians failed to take into account the legitimate security of the USSR and also the revisionists failed to realise that the soviets behaviour would obviously have caused shifts in American policy. Many other theorists believe that the Second World War was the major contributor to the Cold war as the conflict it brought practically wiped out the balance of power that had previously existed. This was because, beforeRead MoreCauses of War: Systemic vs. Domestic1777 Words   |  8 Pages The purpose of this essay is to inform on the similarities and differences between systemic and domestic causes of war. According to World Politics by Jeffry Frieden, David Lake, and Kenneth Schultz, systemic causes deal with states that are unitary actors and their interactions with one another. It can deal with a state’s position within international organizations and also their relationships with other states. In contract, domestic causes of war pertain specifically to what goes on internally

Wednesday, December 18, 2019

Allegories In William Goldings Lord Of The Flies - 885 Words

In 1923, psychologist Sigmund Freud revolutionized his field with his model of the human psyche. According to his model, the mind is divided into three aspects: the id, ego, and superego. William Golding’s allegorical novel, Lord of the Flies, employs these three aspects of the psyche through intricate characterization representing the concepts of id, ego, and superego. Lord of the Flies tells the story of a group of young British boys who are stranded on an island in the South Pacific. They become trapped when their plane is shot down while trying to escape their country during World War II. A choirboy named Jack is shown as the leader of the savages and encourages them to embrace their barbarity. As the novel progresses, the inner evil†¦show more content†¦This further demonstrates Jack’s parallels to the concept of â€Å"ID,† thus allowing Golding to emphasize the psychological allegory of the novel. Jack’s desire to kill is not the only detail that Golding utilizes to compare him to the â€Å"ID†. Throughout the entirety of the story, Jack is apathetic towards the heinous actions of the boys. After Piggy’s death at the hands of Jack’s sadistic henchman, Roger, Jack shows no remorse towards the abominable action that had just occurred: â€Å"Suddenly Jack bounded out from the tribe and began screaming wildly. ‘See? See? That’s what you’ll get! I meant that! There isn’t a tribe for you anymore!†(Golding 181). Jack’s refusal to acknowledge the reality of the situation demonstrates his disregard for the logic and reason. Moreover, as the â€Å"ID,† he only acts on his instinctual, animalistic impulses; he is fully lethargic towards the rational side of the mind. Furthermore, Golding implements this specific dialogue to convey Jack’s connection to the â€Å"ID,† employing this detail to addition ally portray Jack’s primitive inclinations. Here, Jack is acting instinctually and to satisfy his own lust for malice. Thus, the psychological allegory is continually emphasized through Jack’s recurring similarities to the â€Å"ID.† Acting with no regard to possible repercussions is a key characteristic of the â€Å"ID.† In Lord of the Flies, Jack continually ignores the probable aftermath of his actions in order to satisfy his needs at thatShow MoreRelatedAn Allegory of Sigmund Freud’s Psychoanalysis Theory in William Golding’s Lord of the Flies936 Words   |  4 PagesAustrian psychologist, once said that â€Å"the ego is not master in its own house.† The novelLord of the Flies, written by William Golding, is an allegory for Sigmund Freud’s theory on the superego, the ego, and the id, and the constant struggle between the three psyches, which leads to a man becomingcrazy. The three characters in the novel which represent the three psyches are; the Lord of the Flies, Ralph, and Simon. The island that the boys are stranded on can be interpreted as the mind of the manRead MoreLord of the Flies by William Golding1585 Words   |  7 Pages Lord of the Flies by William Golding is a fictional novel highlighting natural characteristics of man kind. The Book was created during the post World War II period. Before creating this novel, William had experience in the navy where he learned of the nature of mankind. The introduction of the book portrays a plane crash where a large group of boys are stranded on an island. Here they grow in character and human instincts such as leadership, brutality, and survival are displayedRead MoreLord Of The Flies : Representation Of Violence And War1611 Words   |  7 PagesLord Of The Flies: Representation Of Violence and War Dietrich Bonhoeffer, a German theologian, states that â€Å" The ultimate test of a moral society is the kind of world that it leaves to its children.† In William Golding’s Lord Of The Flies, societal topics run rampant throughout the text with Golding’s use of individuals to represent different aspects of society. Many writers view the Lord Of The Flies as an allegory, as societal topics such as politics make appearances throughout the text. InRead MoreLord of the Flies: World War IIs Impact Essay1064 Words   |  5 PagesLord of the Flies: World War II’s Impact Lord of the Flies by William Golding was influenced strongly by his experiences as a naval officer during World War II. Golding’s wartime service gave him a darker and more realistic look on life, and contributed to the novel’s imagery. As Golding described, World War II woke him up from his falsified beliefs about human nature by showing him the true human condition (â€Å"Lord of the Flies,† Novels 175). Lord of the Flies, as Golding explained, is â€Å"an attemptRead More Use of Allegory and Symbols in William Goldgings Lord of the Flies 1346 Words   |  6 PagesUse of Allegory and Symbols in William Goldgings Lord of the Flies   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   William Goldings Lord of the Flies allegorically shows the good and evil that co-exists in every human being.   Each character and symbol renders this possible by what it represents.   Ralph and Jack allegorically represent opposing political forces: Jack as the dictator or fascist and Ralph as the prototype of a democratic leader.   The island represents the archetypal garden and the conch shell represents power.   GoldingRead MoreThe Hangmans Horror: Roger, Sadism, and Psychopathy in Lord of the Flies1506 Words   |  7 Pagesin all men and first-hand experience with savagery and violence in World War II, William Golding used Lord of the Flies as not only a historical allegory and a pulpit from which to address the darkness in all men, but also as a metaphor and a example that no one is exempt from human nature. Golding’s characters in Lord of the Flies reflect this idea greatly, but none more so than Roger. Throughout Lord of the Flies, Golding uses the character o f Roger to show the follies of mankind and the abilityRead MoreThe Human Tendency Towards War Exemplified in William Golding’s Lord of the Flies695 Words   |  3 Pagesborn evil, and without a good leader, everything will turn into chaos. William Golding’s Lord of the Flies rightly gives examples on Hobbes’ viewpoint. Throughout the story, it shows the process in which the boys slowly loses their civilized self and turn into savages, how the boys would do anything just for survival or just purely entertainment. William Golding shows the innate evilness within humans by employing religious allegory as by using events, characters, and settings that relates to the BibleRead MoreWilliam Goldings View of Humanity1383 Words   |  6 PagesWilliam Goldings View of Humanity Taking a post at the Maidstone Grammar School for boys and joining the Royal Navy, gave Golding his understanding of boys and cynical view of the war. William Golding says, the theme (of the book) is an attempt to trace back the defects of society to the defects of human nature... Goldings view of humanity is clearly displayed throughout Lord of the Flies. Through the constant symbolism we are made aware of Goldings pessimism towardsRead MoreLord of the Flies Nature of Man1726 Words   |  7 PagesLord of the Flies: The Nature of Man William Golding’s Lord of the Flies is a gritty allegory of adolescence, innocence, and the unspoken side of human nature. Countless social issues are portrayed, however one of the most reoccurring is the nature of man. Throughout the novel there is an ever-present focus on the loss of innocence amongst the boys, shown by the deterioration of social skills and their retrogression into a barbaric form of society. Also portrayed is the juxtaposition of a cruelRead MoreSummary Of Lord Of The Flies 1186 Words   |  5 PagesAlex Nguyen Mrs. Black, Period 5 26 May 2016 An Island of Savagery Lord of the Flies by William Golding is a book set during World War 2 about a group of young boys having to fend for themselves on an island with no signs of civilization. Within the novel, there are many different themes, most conveying the ingrained evil within all human beings and the malevolent complexions of humanity. As the story advances, Golding manifests the continuous conversion of the boys from being civilized and methodical

Tuesday, December 10, 2019

Quality Challenges Cyber Physical Systems -Myassignmenthelp.Com

Question: Discuss About The Quality Challenges Cyber Physical Systems? Answer: Introduction Cyber security can be considered to be used interchangeably for mainly information security, in which the latter takes into account the role of human in process of security whilst the former deems this as a supplementary management and also, centre person has a prospective target. Nevertheless, this kind of conversation on cyber security has significant implication since it stresses on the ethical aspects of the community on the whole. In a bid to deal with this specific issue of cyber security, diverse frameworks as well as models are designed. The current study also initiates the notions of cyber security from the dimension of its framework, workforce as well as information associated to shielding personal information in the computer. Project Objective The primary objective of this study is to conduct an assessment of literature on diverse issues associated to cybersecurity encountered by contemporary companies owing to the reputation of the internet along with internet-based services. The researcher intends to analyse diverse firms and the cyber-attacks encountered by these firms to comprehend the influence of cybercrimes (Massey 2017). Again, the secondary aim is to deliver a variety of suggestions that can be used by firms to address the threats of cybersecurity. Scope of the project In the current study, the researcher intends to analytically review the influence of the internet as well as other online services on the function of firms and comprehend the alterations in their functions to evaluate their susceptibility towards threats of cyber crime. In addition to this, the researcher also needs to assess diverse cyber threat, along with online risks encountered by corporations in current years (Monostori 2014). Different theories along with professional advice explained in the section on review of literature can help in understanding the aims of the study. Review of literature Cyber security mainly upon care that diverse individuals can get and conclusions that they arrive at whilst they arrange, handle and use systems along with Internet. Efforts are put to discover solutions for particularly cyber security analysis challenge and diverse structures are also constructed. Nevertheless, the structure faces diverse intricacies even though it was initially working at the time of development (Wan et al. 2014). The limitations draw from different aspects, namely, emerging technologies along with facility restrictions. As rightly indicated by Ruchkin et al. (2016), progression of the internet in the past decade has augmented overall utilization of the internet based services in various corporations. Several corporations utilize infrastructure founded on internet to deliver the services as this makes it seamless for organizations to reach out to global audience. In place of large firms, internet use has essentially become substantially accepted among individuals, business entrepreneurs along with small corporations. As suggested by Taylor et al. (2014), individuals make use of internet for the purpose of connecting as well as sharing with friends and families. This also delivers business opportunities to various business entrepreneurs together with small corporations to expand the business operations. In addition to this, both business concerns along with people upload various sensitive along with personal data on particularly the internet that makes them the potential target for cyber attacks. Majo rity of cyber crimes are undertaken by individuals who have admittance to the internet as well as computer as inadequacy of security dimensions can make it seamless for them to target various innocent individuals. According to Elmaghraby and Losavio (2014), there are different hackers that undertake various cybercrime for the purpose of collecting personal data of individuals along with corporations in order to acquire an unfair advantage. In addition to this, popularity of the internet has made it seamless for them. Particularly, there are various causes owing to which cyber attacks has augmented in the last decade. Harel et al. (2017) illustrated that social media sites can be regarded as one of the primary reasons for individuals susceptibility to cybercrime. Reports suggest that there are over and above 2.9 million active users on multiple social media platforms. However, together with popularity of the social media stages, the cybercrimes risk has developed thoroughly. Hackers also target the social media takes into account and corporations to acquire sensitive data. Majority of the corporations namely the PlayStation, Yahoo as well as HBO had also encountered cybercrimes that led to loss of important data. Robinson et al. (2015) suggests that mobile banking can be considered to be another important ground that contributes to enhancement of the total number of cyber crimes on particular individuals as well as firms. This is mainly because this presents the chance to acquire unfair benefit. During the year 2017, approximately 44% of the entire globes population utilizes smart phone and this enhances the overall internet based services. Utilization of online banking services namely PayPal, online shopping and use of mobile wallet has enhanced cyber security threats. Mishna et al. (2015) mentioned that in case of online banking, individuals have the need to share financial data on basically the online stages of banks. Several instances of the challenges encountered by corporations as regards online security include DDoS also known as Distributed Denial of Service attack. This happens mainly over a server and enhances the traffic of these kinds of server. Instances contain BBC, DYN, election campaign conducted by Donald Trump and five different Russian banks. In addition to this, Internet of Things (IOT) is also observed to develop at a fast space, let us say, smart home appliances have become popular among developed markets (Broy and Schmidt 2014). IoTs devices linked through single network led to risk of security. Research Questions/Hypothesis -Primary Questions -What are fundamentally the critical issues faced in the cyber security? -What are the factors affecting the cyber security? Secondary Questions -What are the challenges that are encountered majority of the time in the organizations? -What are the proper security measures against the cyber security threats? Research Design and Methodology The current research makes use of survey mechanism for the purpose of identification of diverse cyber security concerns along with experiment method for development of the framework. The current research study is associated to the cyber security management with reference to firm operating in Australia. In the current study, both primary as well as secondary data is acquired to discover the significance of network security and detection of intrusion system. In this case, primary data is gathered by means of survey method whilst secondary data is acquired from various published together with non-published data (Bogdan 2015). Primary Data: This current study can be acquired by means of survey method. Essentially, this data is basically unique in nature. Fundamentally, this data will be acquired by way of distributing the formulated questionnaire and getting the same filled by the respective respondents for the current purpose. In this case, the learner aims to use online questionnaire for the present purpose (Sha and Zeadally 2015). Sample Design: Sample design can be regarded as particular plans that can be designed by acquired samples from a selected population (Johnson 2015). In a bid to serve this specific purpose of the subject of the research, the learner intends to select a total of 30 sample units. In this case, the learner intends to utilize the sampling technique of purposive sampling along with convenience sampling. For the purpose of the present study, the population that the learner intends to select include various firms operating in different sectors in Australia. Therefore, in this case, the learner presents the sampling frame that consists of 30 industrial units in Australia. Essentially, the parameter of interest for the current study is ascertaining the challenges of cyber security in selected industrial units in Australia. Selection of respondent: The learner intends to select respondents of the current study that are operating in the industrial units in Australia and having over and above 2 years of work experience. In addition to this, the learner also intends to select the ones working in the IT or the IT security division of the firms (Mangharam et al. 2016). The researcher intends to send the questionnaire via mail to the selected respondents with request for reply. Questionnaire Questionnaire is primarily meant for the purpose of acquiring specific information regarding cyber challenges encountered by firm, different aspects of the cyber threats, primary factors contributing to the threats of cyber security (Massey 2017). In addition to this, the current study also intends to contain questions that can specifically help in gathering knowledge regarding different dimensions of cyber challenges, various instances of the cyber security threats in firms and the suggestions from the standpoint from their standpoint to combat this issue. Secondary Data The learner also intends to make use of secondary data that can be utilized for the purpose of studying the cyber security. This secondary data can be utilized to discover specific features, themes of the cyber crime, threats, and dimensions of measuring security measures to protect the security. Essentially, this secondary data can be obtained from various reputed academic journals, prior research articles, official websites as well as product documentation (Massey 2017). The current study has the intention to utilize both qualitative as well as quantitative research strategy in this regard. -Qualitative Research- The learner has the intention to utilize focus on in-depth interviews as well as carry out assessment of documents for different categories of themes. Essentially, the researcher has the intent to carry out a subjective study in this regards and describe the problem otherwise the conditions from the viewpoint of the ones experiencing the same. In this case, no statistical tests necessarily will be used in this regard. The methods of analysis marketing can be used in this study include the discourse analysis, case study analysis, observation and thematic analysis (Taylor et al. 2014). In this case, the discourse analysis takes in process of material coding, assessment of structure together with various assertions together with recognition of diverse dimensions of cyber security. -Quantitative Research- The learner also intends to present surveys as well as assess the available records for specifically numerical information. In this case, the learner has the intent to use deductive procedure and can be said to be justified as this can help in testing various pre-specified themes, constructs as well as hypotheses that can help in making up the theory (Sha and Zeadally 2015). In this case, statistical tests necessarily will be used in this regard namely descriptive as well as interpretive statistics. Research Limitations The current research primarily refers to cyber security, challenges associated to cyber security along with mechanisms that can avert the attack. However, the study does not focus on proper methods of companys security management (Sha and Zeadally 2015). Again, administrators of the corporation can undertake actions for different security management in 30 industrial units in Australia. Therefore, it might become difficult to generalise the conclusions drawn from the study. Time Schedule Main Activities 1st Month 2nd Month 3rd Month 4th and 5thMonth 6th, 7thMonth 8th, 9th and 10th Month Introducing current topic to be selected under consideration Ascertainment of objective of the project Ascertainment of scope of the project Assessment of literature Development of research questions Development of research design and research methodology Specification of research limitation Conclusion The current study helps in comprehending different studies from the standpoint of security and cybercrime. The current research proposal helps in understanding the research objective of conducting an analysis of literature on diverse issues associated to cybersecurity encountered by contemporary companies. The above study presents in detail general suggestions regarding the way to secure the system the way any kind of authenticated protocol can be used to defend the system intrinsically. References Bogdan, P., 2015, March. A cyber-physical systems approach to personalized medicine: challenges and opportunities for noc-based multicore platforms. InProceedings of the 2015 Design, Automation Test in Europe Conference Exhibition(pp. 253-258). EDA Consortium. Broy, M. and Schmidt, A., 2014. Challenges in engineering cyber-psychology systems.Computer,47(2), pp.70-72. Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), pp.491-497. Harel, Y., Gal, I.B. and Elovici, Y., 2017. Cyber Security and the Role of Intelligent Systems in Addressing its Challenges.ACM Transactions on Intelligent Systems and Technology (TIST),8(4), p.49. Johnson, T.A. ed., 2015.Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press. Mangharam, R., Abbas, H., Behl, M., Jang, K., Pajic, M. and Jiang, Z., 2016, January. Three challenges in cyber-physical systems. InCommunication Systems and Networks (COMSNETS), 2016 8th International Conference on(pp. 1-8). IEEE. Massey, D., 2017, November. Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems. InProceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense(pp. 39-39). ACM. Mishna, F., Bogo, M. and Sawyer, J.L., 2015. Cyber counseling: Illuminating benefits and challenges.Clinical Social Work Journal,43(2), pp.169-178. Monostori, L., 2014. Cyber-physical production systems: roots, expectations and RD challenges.Procedia Cirp,17, pp.9-13. Robinson, M., Jones, K. and Janicke, H., 2015. Cyber warfare: Issues and challenges.CConclusionchkin, I., Samuel, S., Schmerl, B., Rico, A. and Garlan, D., 2016, December. Challenges in physical modeling for adaptation of cyber-physical systems. InInternet of Things (WF-IoT), 2016 IEEE 3rd World Forum on(pp. 210-215). IEEE. Sha, K. and Zeadally, S., 2015. Data quality challenges in cyber-physical systems.Journal of Data and Information management (JDIQ),6(2-3), p.8. Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014.Digital crime and digital terrorism. Prentice Hall Press. Wan, J., Zhang, D., Zhao, S., Yang, L. and Lloret, J., 2014. Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions.IEEE Communications Magazine,52(8), pp.106-113.

Monday, December 2, 2019

Narrative Essays - WWE Hall Of Fame, , Term Papers

Narrative The entire gymnasium was silent. Every single person in the gym was standing at this moment, with his or her eyes fixated on the small, skinny girl, whose figure duplicated that of the microphone she was holding. Hearing her voice reminded me the birds that chirped and sang ever so delightfully to awaken me each and every morning. As I stood on the end line with my team, my eyes scanned the horizon. Seeing the bleachers filled to capacity made me realize how lucky I really was. I had tingles going through my body, like it was Christmas morning or something, as everyone anxiously awaited the game to begin. This is what high school dreams are made of. As the crowd sat silently, the players slowly huddled around. This is the moment that the team had dreaded all season long, and it has happened only two plays into the match. An aerial view would show the circle of players gathered around a fallen man, number nine. This would be a long match if this superstar did not return to the game, he had worked himself into becoming the heart and soul of this team, in that he was main driving force of inspiration each match. Just by watching him you could see that everyday he was giving 110% and nothing less. He was a prime example of someone who loves the game they play. As he lay there screaming in pain and grabbing his ankle as if he had a healing touch, nobody knew what to do but stand there and watch. The entire arena was completely silent, even the opposing teams fans didn't know what to do. The kid that everyone called miller- time, who was wearing a cut volleyball on his head and had his extremely large gut painted red and white, the teams school colors, paused in midst of his wild behavior. See this was an unfortunate tragedy that you think only happens in movies. But the reality of the matter was that this was real, maybe even a little too real. It seemed as though time had stopped as if a higher being took the remote control and hit the pause button so they could get another beer and go relieve themselves in the bathroom. At this time everyone was watching carefully, as if there lottery numbers were being read and they were only one number away from the jackpot, to the simple tests that the trainer on duty was performing on the fallen comrade. But each movement only brought about more pain. See let me explain why this was such a bad thing that number nine had gone down to an ankle injury. This was the 1999 State Volleyball Championship. The match had only just begun. In volleyball there are matches, each match consists of a set of games. Each game is up to fifteen points. The first team to win the best out of five games is the winner. Number nine who was only a junior had in fact become the most dominant player in the state as a junior on a team, whose roster was completely dominated by older, bigger senior. The team also has a very impressive history for winning; they had won the championship the last two years, and had won it eight times in the last eleven years. Also the team had gone undefeated for the past two seasons prior to this one. But this season was already different, in that the team had already lost a game this season. But what makes the story even more unbelievable is that the team who had beaten them in the season, Minnachaug Regional High School of west ern Massachusetts, was the team who they were playing in this state championship match. But during the regular season match, number nine didn't even get off the bench, he hadn't developed or proved himself as a capable player yet, so the coach went with one of the senior members who had done their sitting the prior season during that state championship run. The crowd began to clap politely as his coach and a fellow teammate carried off number nine. You could tell he was in excruciating pain by the