Premium Essay

MAC-10: Personal Narrative

Submitted By
Words 905
Pages 4
There are quite a few firearms that could of been used in this situation, but I am suggesting it could have been the MAC-10 machine pistol. This gun has a high fire rate and is effective at close range, therefore being able to eliminate multiple targets at once with little accuracy needed. Combine this firearm with the optimal accessories and it could of fitted this scenario exactly. The MAC-10 most likely would have been fitted with a two-stage suppressor either designed by Sionics [1] or sound suppressor by Wellbell [2]; it may have also had an empty shell/cartridge collector [3]. The MAC-10 may have also been fitted with a foldable stock and/or strap, both to increase accuracy. The ammunition used in this firearm would have been a 9x19mm Parabellum or .45 ACP depending on what the gun was chambered for, both are typical pistol or machine pistol ammunition.

The MAC-10 has many …show more content…
Closer inspection of the bullets either in the people or walls would of given a better idea to which cartridge was used. The loud altercation was most probably an argument between the 4 people involved, the 3 dead and one man leaving the scene. The bullets did not perforate any of the victim’s bodies; this means the bullets were most likely unjacketed or semi-jacketed; both make a large permanent cavity, although the semi jacketed makes a larger temporary cavity than the unjacketed [7]. Both types of bullet have high impact deformation, although unjacketed does deform slightly more than unjacketed. If the bullets used were unjacketed, they would of most likely would of “mushroomed” and been stripped to the core on impact. The semi-jacketed bullets are also more accurate than unjacketed [7]. Police use Jacketed Hollow Points (JHPs) to reduce collateral damage [8]; the shooter may have been able to get hold of some of

Similar Documents

Free Essay

Checklist - Research Methd

...weaknesses. It will also consider the importance of observation within practice and research. An observation involves watching someone and dealing with what they do rather than what they say they do (Gillham, 2008: 1). It allows the observer to directly see and hear what’s happening (Mac Naughton and Hughes, 2008: 157). In terms of children it allows us to tune into them (Fawcett, 1996: 3) and understand what they already know. There are many different observational techniques, these include: narrative observation, time sampling, event sampling, anecdotal and diary records, checklists and rating scales (Bentzen, 2000: 84). For the purpose of this essay, only a few of these techniques will be expanded on. One observational technique which may be used to understand child development is a checklist. These are regularly used within schools to record children’s individual progress (Sharman et al, 2007: 5).They also aid practitioners in picking up on the presence or absence of specific behaviour (The Goodheart-Willcox Co 2009:59). Another type of technique which may be used is event sampling. This technique measures the child’s behaviour when facing different events. When carrying out event sampling Gillham (2008: 10) states that observation is key, if it is disrupted then events may be missed. A third type of technique is time sampling. This involves splitting up an observation and recording the different behaviours a child displays...

Words: 761 - Pages: 4

Free Essay

Compare and Contrast the Ways in Which Csi and the X Factor Attract Audiences?

...within their genres, and generally within the TV industry. The Uses and Gratifications theory can be applied to both these texts to show how they attract audience using the 4 stages. Firstly, personal identity, as X Factor is a contestant based show, and the people start the show as average everyday people, and this is connoted in their interview before their audition where they talk about their current life, and have very casual dress codes in a public and busy mise-en-scene. As the show progresses some of these contestants start to turn into ‘celebrities’ by gaining publicity, and this is connoted due to their change in dress codes, which is now smart and classy compared to casual before. Also connoted through their confidence, as at the start they are very nervous and modest, and as the competition progresses, depending on good results a person will gain self-confidence and gain more and more fans. An example of contestants that used the X Factor as a way to gain fame is One Direction who have toured the UK and America and succeeded heavily in both. This way of gaining fame could relate to the ‘American Dream’ ideology and the idea that normal people (the contestants) can be rich and famous because of the X Factor. Similarly, the CSI franchise can appeal to its audience through personal identity due to the way it uses realism in crime scene investigation. The heavy...

Words: 1523 - Pages: 7

Free Essay

Google Drive vs Dropbox

...Google Drive vs. Dropbox Inc. ENGL101-1402A-03 April 23, 2014 Google Drive vs. Dropbox Inc. Being in college or any higher learning institute is a task all in itself. It doesn’t really matter what level we're at whether it’s undergraduate or going for our masters or doctorate. Being a student of any sort usually consumes our life and most of our time. Take for example, the essay. Whether it’s for research, compare and contrast, problem and solution or your standard narrative essay, we often are utilizing various files and resources to complete our required tasks. Many of us already have jobs and families that consume our lives, and that can take away from our academic responsibilities. This can be a difficult thing to juggle, but what if you could have your files, content, personal documents, movies, and etc. everywhere and accessible all the time. I am talking about cloud storage and its limitless potential to make our lives as seamless as possible. There are two really big names in the cloud storage industry such as Google’s Drive, and Dropbox file storage but which one is for you? Both Google Drive and Dropbox make excellent choices for cloud storage, but deciding which is best depends on your lifestyle, your finances, and your preference in features. Of the many services and apps that Google provides, Drive is arguably the best service it provides, well outside of Gmail. Having a Google account automatically gives you 15GB of free cloud storage. All of Google’s services...

Words: 983 - Pages: 4

Premium Essay

Apple - the Company

...GURU NANAK KHALSA COLLEGE OF ARTS, SCIENCE & COMMERCE APPLE INC. APPLE INC. formerly Apple Computer, Inc., is a multinational corporation that creates consumer electronics, computer software, and commercial servers Under the supervision of: Sameer Velankar   Index Serial No. Particulars Page No. 1. Introduction 2. History 3 Management Board Steve Jobs 4. Apple Products 5. Apple’s comeback 6. Small Solutions & Alternatives 7. i Products 8. Acquisitions 9. SWOT Analysis 10. SWOT Analysis Conclusion & Recommendation 11. Strategic Management the Steve Jobs Way 12. PORTER’S Five Forces 13. Microsoft, Apple & Google 14. Fundamental Analysis 15. Financial History 16. Graph Analysis 17. Case Study: Apple’s lawsuit on Samsung, what happened? 18. The components of the lawsuit 19. Bibliography Apple Computer, Inc. The idea fell from a tree, literally. Steve Jobs had returned from visiting a commune like place in Oregon located in an apple or hard. Apple co-founder and jobs pals, Steve Wozniak ,picked him up from the airport. On the drive home, Jobs simply said “ I came up with a name for our company- Apple”. Wozniak said they could have tried to come up with more technical sounding names but their vision was to make computers approachable. Apple fits perfectly. INTRODUCTION APPLE INC.. , formerly Apple Computer, Inc., is a multinational corporation...

Words: 24374 - Pages: 98

Premium Essay

Xuynya

...became the CEO of the company and be started surprising relations with Microsoft by developing a Macintosh version of office software. Apple also took cost saving measures like streamlining the product line, production of printers. Steve Jobs brought Apples' focus on two concepts of consumer series with the prefix “I” for internet like iMac, iBook laptop and professional with prefix “power” such as PowerMac desktop and PowerBook laptop series. Under Jobs, Apple again becomes the innovator of computer market. His leadership leads the company to USB and Fire wire ports, introduction of iPod and iTunes website put Apple in the digital computing age. AZIZI MRAMBAS SENKUKU TP 027030 HUMAN ASPECTS APPLE CURRENT SCENERIO A scenario is a narrative, which most commonly describes foreseeable interactions of user roles...

Words: 5675 - Pages: 23

Free Essay

Research

...017. Index Terms: Branching Storyline, Game, Game Development, High School Students, Ren’Py Visual Novel Engine, Story-driven, Visual Novel, ———————————————————— 1 INTRODUCTION In this past decade, computers revolutionized the way of living. Computers make our work faster, more reliable and more accurate. Computers can be in different form like mobile phone, tablet PC, or in the form of desktop computer. Computers help us in numerous ways; communication, transportation, education, entertainment and many more. While computers have entered millions of families in most countries, computer games also became increasingly popular and the main entertainment during leisure time among family members [9]. Today, there many kinds of games from personal computer games like Plants vs. Zombies and Angry Birds to local area network games like Warcraft III, and Counter-Strike up to online games like Special Forces and Audition. And it really becomes...

Words: 4991 - Pages: 20

Free Essay

The Fiftieth Gate

...public events” where memory is defined as “the faculty by which events are recalled or kept in mind”. Thus history and memory interrelate as history can be seen as the contextual justification for memory. “The Fiftieth Gate” is a poignant interweaving of history and memory. The text follows protagonist, Mark Baker an historian, son of Holocaust survivors Genia and Yossl (Joe), on an historical journey through memory, to uncover the origins of his past and act as a catalyst for future generations to also connect with their history. Mark Baker’s journey through history and memory is also executed through his conventional ideas that memory is biased and less valid than history. There are numerous references to the discrepancies between the personal memories of his parents and the documented history Mark as an historian believes. In this way it is apparent that Mark is on a quest for verification, “my facts from the past are different”. This displays the flaw Mark traditionally notes in memory and his need for historical evidence. As responders accompany Mark on his journey, they also encounter the complexity of simultaneously being a son and an historian. This attested via the following when Mark collates his parent’s memories with documented historical evidence “His was a past written on a page…mother couldn’t point to anyone”. This quote represents the way Mark requires documented evidence, history. This is because he believed his father’s memories only when had had evidence...

Words: 23607 - Pages: 95

Premium Essay

Presentation Secret of Steve Jobs

...The Presentation Secrets of Steve Jobs How to Be Insanely Great in Front of Any Audience Carmine Gallo Columnist, Businessweek.com New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2010 by Carmine Gallo. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-163675-9 MHID: 0-07-163675-7 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-163608-7, MHID: 0-07-163608-0. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at bulksales@mcgraw-hill.com. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work...

Words: 72152 - Pages: 289

Premium Essay

Film Essay

...history, for today’s student to master. “Someone should write a film version of Harold Bloom’s The Western Canon,” a writer from The Independent suggested, and “the person who should write it,” he said, looking at me, “is you.” I looked to Walter, who replied, “If you write it, I’ll publish it.” And the die was cast. Faber offered a contract, and I set to work. Following the Bloom model I decided it should be an elitist canon, not populist, raising the bar so high that only a handful of films would pass over. I proceeded to compile a list of essential films, attempting, as best I could, to separate personal favorites from those movies that artistically defined film history. Compiling was the easy part—then came the first dilemma: why was I selecting these films? What were my criteria? What is a canon? It is, by definition, based on criteria that transcend taste, personal and popular. The more I pondered this, the more I realized how ignorant I was. How could I formulate a film...

Words: 11026 - Pages: 45

Premium Essay

Bullying

...BULLYING BOYS: AN EXAMINATION OF HEGEMONIC MASCULINITY IN THE PLAYGROUND Dr L Trickett1 ABSTRACT Violence between young men, particularly resulting from the emergence of a so called ‘gun and knife culture’, is currently subject to extensive media coverage in UK2. Alongside this there has been increased anxiety about both the scale and impact of bullying in schools (Cawson et al, 2002; Tyler, 2002). These issues form part of a more generalised concern about men and boys in Britain often referred to as a ‘crisis of masculinity’ (see Clare, 2000). This article examines findings from research with male respondents about their relationship with hegemonic masculinity (Connell, 1987, 1989, 1995, 2005) and bullying whilst at school and makes suggestions as to what can be done to tackle abusive behaviour amongst boys and young men. 1 Dr Loretta Tricket is a Senior Lecturer and researcher with the Nottingham Law School, Nottingham Trent University, UK. 2 See Lockhart, G; McClory, J and Qvortrup, M. (2007) Gun and Knife Crime in Great Britain, Policy Exchange, Research Note. Knife crime is a fact of life for teenagers (Bryony Gardon, telegraph.co.uk, 31 May 2008). 2 Introduction This article is in five parts. Part One outlines the theoretical background to the research. Part Two describes the methodology and the participants. Part Three discusses different types of bullying and the factors that were associated with them. Part Four discusses resistance...

Words: 13647 - Pages: 55

Premium Essay

Ssassaassasasaasassasasasasasasa

...fax (519) 6613882; e-mail cases@ivey.uwo.ca. Copyright © 2005, Northeastern University, College of Business Administration Version: (A) 2005-11-07 Nick Drake, Global Media manager (Global Media Group) for adidas, arrived at the company’s headquarters to present a bold new marketing strategy, based around mobile phones. “We call it the Brand in the Hand,” he told the senior marketing executives who had gathered to present their strategy for the upcoming year. The Global Media Group had been arguing that mobile marketing was the surest, and perhaps only, way for adidas to break free from the advertising clutter and fragmentation of traditional media. “Mobile is the most personal medium available,” Drake explained. “People run their whole lives off of mobile. It’s business, it’s personal, it’s information gathering. It’s on 24/7. With mobile, you have the customer’s complete attention.” The Global Media Group...

Words: 3499 - Pages: 14

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...

Words: 52755 - Pages: 212

Premium Essay

Apple Financial Report

...APPLE INC FORMReport) 10-K (Annual Filed 12/05/97 for the Period Ending 09/26/97 Address Telephone CIK Symbol SIC Code Industry Sector Fiscal Year ONE INFINITE LOOP CUPERTINO, CA 95014 (408) 996-1010 0000320193 AAPL 3571 - Electronic Computers Computer Hardware Technology 09/30 http://www.edgar-online.com © Copyright 2011, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 FORM 10-K (MARK ONE) /X/ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE FISCAL YEAR ENDED SEPTEMBER 26, 1997 OR / / TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE TRANSITION PERIOD FROM TO COMMISSION FILE NUMBER 0-10030 APPLE COMPUTER, INC. (EXACT NAME OF REGISTRANT AS SPECIFIED IN ITS CHARTER) CALIFORNIA (STATE OR OTHER JURISDICTION OF INCORPORATION OR ORGANIZATION) 1 Infinite Loop Cupertino, California (ADDRESS OF PRINCIPAL EXECUTIVE OFFICES) 942404110 (I.R.S. EMPLOYER IDENTIFICATION NO.) 95014 (ZIP CODE) REGISTRANT'S TELEPHONE NUMBER, INCLUDING AREA CODE: (408) 996-1010 Securities registered pursuant to Section 12(b) of the Act: None Securities registered pursuant to Section 12(g) of the Act: Common Stock, no par value Common Share Purchase Rights (Titles of classes) Indicate by check mark whether the Registrant (1) has filed all reports...

Words: 88700 - Pages: 355

Premium Essay

Public Affairs

...LAGOS STATE UNIVERSITY ADEBOLA ADEGUNWA SCHOOL OF COMMUNICATION MASTER IN COMMUNICATION STUDIES MSC 1 TAKE HOME EXAMINATION TITLED (ETHICAL THEORY CRITICISM) COURSE MAC 851 APPROACHES TO THE STUDY OF MASS COMMUNICATION LECTURER MR. JIMMY KAYODE WRITTEN BY AKIYODE ESTHER OLADUNNI MATRIC NO 01/09/AV/4018 TABLE OF CONTENT INTRODUCTION DEFINITION ETHICAL PRINCIPLES • BENEFICENCE • LEAST HARM • RESPECT FOR AUTONOMY • JUSTICE ETHICAL THEORIES • DEONTOLOGY • UTILITARIASM • RIGHTS • CASUIST • VIRTUE VIEW OR NOTABLE SCHOLARS • PLATO ABSOLUTION • ARISOTLE: EUDEMONISM • ST. THOMAS AQUINESS – NATURAL LAW • IMMANUEL KANT: DEONTOLOGY • JOHN STUART MILL – UTILITARISM • JOHN RAWLS – CONGRATURIANISM • TOM REGAN: RIGHTS THEORY (BONUS THEORY ) • TENTATIVE COMPARISON (TABLE & GRAPH) • CRITICISM AGAINST DEONTOLOGY: “ “ UTILITARIANISM “ “ RIGHTS “ “ CASUIST “ “ VIRTUE • CONCLUSION • REFERENCES CRITICISMS OF ETHICAL THEORIES INTRODUCTION The art of critiquing is basically to appraise a work i.e articles, write-ups, novels etc. Critiquing does not aim to condemn or castigate a paper but to seek the flaws, identify the various meanings, put up better explanations on the subject, seek the weaknesses and strengths and give opinions to enhance the quality...

Words: 3492 - Pages: 14

Premium Essay

Diacap

...Department of Defense INSTRUCTION NUMBER 8510.01 November 28, 2007 ASD(NII)/DoD CIO SUBJECT: References: DoD Information Assurance Certification and Accreditation Process (DIACAP) (a) Subchapter III of Chapter 35 of title 44, United States Code, “Federal Information Security Management Act (FISMA) of 2002” (b) DoD Directive 8500.01E, “Information Assurance (IA),” October 24, 2002 (c) DoD Directive 8100.1, “Global Information Grid (GIG) Overarching Policy,” September 19, 2002 (d) DoD Instruction 8500.2, “Information Assurance (IA) Implementation,” February 6, 2003 (e) through (ab), see Enclosure 1 1. PURPOSE This Instruction: 1.1. Implements References (a), (b), (c), and (d) by establishing the DIACAP for authorizing the operation of DoD Information Systems (ISs). 1.2. Cancels DoD Instruction (DoDI) 5200.40; DoD 8510.1-M; and ASD(NII)/DoD CIO memorandum, “Interim Department of Defense (DoD) Information Assurance (IA) Certification and Accreditation (C&A) Process Guidance” (References (e), (f), and (g)). 1.3. Establishes or continues the following positions, panels, and working groups to implement the DIACAP: the Senior Information Assurance Officer (SIAO), the Principal Accrediting Authority (PAA), the Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel, the IA Senior Leadership (IASL), the Defense (previously DISN) IA Security Accreditation Working Group (DSAWG), and the DIACAP Technical Advisory Group (TAG). 1.4. Establishes a C&A process...

Words: 16882 - Pages: 68