Premium Essay

One Time

In:

Submitted By alantep
Words 271
Pages 2
June 3, 2013
To Whom It May Concern;
The purpose of this letter is to serve as a recommendation letter for Alante Peterson. He has been on my caseload since the beginning of the 2012-2013 school year here at Kent Meridian High School.
Three words that I would use to describe Alante are motivated, committed and loyal. I’ve actually had the privileged of working with Alante for the past 3 years; one as a KM student and the other two as a student at Evergreen High School, in where he was involved in a mentorship program called P.A.L. I served as the lead mentor for this program. Even back then, Alante had a certain flare and commitment about himself that everyone noticed.
This commitment lead to academic success and translated to Alante’s participation on our school’s basketball team. If the truth be known, our basketball team is not the most winning of teams in the district/league. However, Alante has been committed and loyal to his teammates and has continuously shown true Royal pride in his work ethic and team pride. This commitment has paid off because this year our basketball team made it to the playoffs. Alante was instrumental in making this success a reality.
This motivation, commitment and loyalty are characteristics of a very deserving young man who will be an asset to any institution. I whole-heartedly give Alante my recommendation and urge you to give this deserving student an opportunity to make his life and the lives of his family better.
Sincerely,
Kendrick Glover
Counselor
Kendrick.Glover@kent.k12.wa.us

Similar Documents

Free Essay

One Step at a Time

...One Step At A Time Haven’t you ever noticed how things were so much easier when we were in kindergarten? You could go up to someone, share their chocolate milk, and immediately become best friends. When you were angry, you could just scream and stomp your foot but try and do that now and you’re sure to get some stares. If you liked that little girl or boy you sat next to, and they offer to share their crayons, you are in heaven. If you are angry at someone, you could threaten not to be their friend, and they’d immediately say sorry. There was no “start thinking about your future” thing either. You didn't get grounded or have your phone taken away from you, you just got a minute in the bad kid chair and that was it. Back then, life wasn't looming over you like a hawk. As we grow older, the pressure just builds up on us. We are expected to do the best we can to accomplish a lot of things like having high grades in school and being a dean’s lister when we reach college, and when we graduate, we are expected to land a good job immediately. And because of these, we tend to rush things and do them all at the same time. Maybe that’s why old people are so worn down. People always try to make something out of everything. They ask questions such as “Why does the sky have to be blue because of gases in the atmosphere?” and “why can't it simply be blue?” Then there are times that we ask the question “Why can’t be things be easier for just a little while?” It's true that we do need...

Words: 491 - Pages: 2

Free Essay

One Day at the Time

...shotgunned, knifed, and mangled kids writhing on gurneys outside the operating rooms. Ambulance sirens shrieked and squad car lights reddened the cool nights, flashing against the hospital walls: gray-red, gray-red. On slow nights I would lock the door of the administration office, search the reference library for a book on female anatomy and, with my feet propped on the desk, leaf through the illustrations, smoking my cigarette. I was seventeen. One night my eye was caught by a familiar-looking word on the spine of a book The title was 450 X&Y of C~~EW Hirtmy in Pictzms. On the cover were black-and-white photos: Padre Hidalgo exhorting Mexican peasants to revolt against the Spanish dictators; Anglo vigilantes hanging two Mexicans from a tree; a young Mexican woman with rifle and ammunition belts crisscrossing her breast; Cisar Chavez and field workers marching for fair wages; Chicano railroad workers laying creosote ties; Chicanas laboring at machines in textile factories; Chicanas picketing and hoisting boycott signs. From the time I was seven, teachers had been punishing 0 4 + WORKING INTHE DARK me for not knowing my lessons by making me stick my nose in a circle chalked on the blackboard. Ashamed of not understanding and fearful of asking questions, I dropped out of school in the ninth grade. At seventeen I still didn’t know how to read, but those pictures confirmed my identity. I stole the book that night, stashing it for safety under the slopsink until I got off work...

Words: 3437 - Pages: 14

Free Essay

The Paper Times One

...Case Study: Tyco international fraud Tyco Background Tyco International has operations in over 100 countries and claims to be the world's largest maker and servicer of electrical and electronic components; the largest designer and maker of undersea telecommunications systems; the larger maker of fire protection systems and electronic security services; the largest maker of specialty valves; and a major player in the disposable medical products, plastics. Edward Breen, who replaced kozlowski removed nine members of Tyco’s international board, and adhesives markets. Since 1986, Tyco has claimed over 40 major acquisitions as well as many minor acquisitions. How the Fraud Happened According to the Tyco Fraud Information Center, an internal investigation concluded that there were accounting errors, but that there was no systematic fraud problem at Tyco. So, what did happen? Tyco's former CEO Dennis Kozlowski, former CFO Mark Swartz, and former General Counsel Mark Belnick were accused of giving themselves interest-free or very low interest loans (sometimes disguised as bonuses) that were never approved by the Tyco board or repaid. Some of these "loans" were part of a "Key Employee Loan" program the company offered. They were also accused of selling their company stock without telling investors, which is a requirement under SEC rules. Koslowski, Swartz, and Belnick stole $600 million dollars from Tyco International through their unapproved bonuses, loans, and extravagant "company"...

Words: 4682 - Pages: 19

Free Essay

The Time of One and Two

...To Sir with love Author – E. R. Braithwaite 1. About the book - To Sir, With Love is a 1959 autobiographical novel by E. R. Braithwaite set in the East End of London. The novel is based on true events concerned with Braithwaite taking up a teaching post in a school there. The novel was made into a British film by James Clavell in 1967. In the novel, "To Sir with Love", various human characteristics are portrayed. Throughout the story, the idea that humans are able to adapt and change their way of thinking seems to be demonstrated. In the novel both, the teacher Braithwaite as well as his students, goes through many changes. These changes lead to a change in their way of thinking about each other. The novel shows the ability to adapt to the world around one's self as a very important trait. In the story, Braithwaite begins with a set of preconceived notions about his students. But later, he finds that they are the total opposites of his initial ideas. Braithwaite helps them to break out of the pattern of intolerance and roughness into which society had placed them. They began to respect themselves as well as the others. In short, both the teacher and his students change their way of thinking and do not get stuck in their original set of preconceived notions about each other. 2. Summary – To Sir, with Love is an incredibly inspirational story. E. R. Braithwaite, the author of this memoir, encapsulates the shame and hatred of prejudices and racism. The journey...

Words: 930 - Pages: 4

Premium Essay

One Day at a Time

...conversation about sports. I figured that the idea of me talking about something unofficial instead of school matters would cause more of a response from bystanders. I got very lucky because although the library is never too busy, there was a good amount of people there this specific day. As I walked in, laughing about my experience in shooting free-throws, heads started turning in my direction. Not giving any effort to lower my voice, I observed one person give me a dirty look and whisper to her friend who she was sitting with. Right away the friend looked at me and just shook her head as if she was disgusted with me. I noticed that they were sitting in far corner so I slowly walked towards the water fountain continuing my conversation. As I got close to their table, I could tell they were getting irritated. However I wanted to see if they would simply ask me to be quite or if they were going to make comments about my phone usage under their breath. I honestly didn't think they were going to say anything to me, and sure enough they didn't. However, one of the girls mumbled under her breath, "I guess he doesn't understand this is a library." At this point, I figured I had observed enough, and ended my phone conversation. I then apologized for being a distraction, and made my way...

Words: 330 - Pages: 2

Premium Essay

One-Time Benefit Arrangement

...accounting changes associated with the communication date and timing of the plan. Accounting for the One-Time Termination Benefits In accordance with the Financial Accounting Standards Board’s (FASB) ASC 420, Rump should recognize and measure the amount of one-time termination benefits at fair value on the date that the terms of the plan have been communicated to employees. Even though the plan was approved on December 27, 2005, the entity’s communication with employees on December 31, 2005 creates the obligation to provide termination benefits. The journal entry would include a debit to “Restructuring/Severance Expense” and a credit to “Liability for Termination Benefits”. The total costs recognized should be reasonably estimated and will be dependent upon how many terminated employees voluntarily sign a waiver of any right to legal action. All eligible employees must sign the waiver no later than January 31, 2006 and are allowed to leave at any time after December 31, 2005. Rump should report the effects of recognizing the termination benefits in Income from Continuing Operations before income tax in the 2005 and 2006 financial statements. In periods subsequent to the initial measurement and recognition on December 31, 2005, Rump should monitor any changes in either the timing or amount of the expected termination benefit cash flows. Changes due to the passage of time shall be...

Words: 821 - Pages: 4

Free Essay

Quality One Call at a Time

...RUNNING HEAD: Quality One Call at a Time Quality One Call at a Time May 30, 2006 Quality scores in many call centers are on the decline. The main goal of a call center is to provide excellent customer service while delivering accurate information in a timely manner. “Fast is fine, but accuracy is everything.” Wyatt Earp. Wyatt Earp may not have said this quote in reference to managing quality at call centers, but it carries the same relevance. Management at call centers tends to focus on other issues instead of the accuracy of the information that the CSR is relaying to the customer. Thus value is misplaced and the quality at call centers starts to head on a downward path. One issue that could drive quality scores down is ineffective training. At a call center here in Jacksonville, management decided to pull CSRs out of training after the second day to answer calls because the queue was high. This interrupted the training process and added days to the training schedule. The trainer manager was powerless to prevent this from happening. This happened 6 times over the course of the proposed three-week training calendar. Call center trainers must ensure that their trainees’ learning is not hindered by management’s goal to reduce queue times. The constant yo-yo handling of the CSRs resulted in training not being delivered on all topics, which resulted in low quality scores. This has not been a high topic of focus for most call center management staff. ...

Words: 836 - Pages: 4

Free Essay

Access Control Mechanism

...Access control through two-Factor Authentication Access Maintaining data security has become more of a challenge, it is tough to anticipate attacks and prevent all the loopholes in software’s providing security. Verizon in their 2013 Data Breach Investigation Report stated that “Almost 80 percent of the attacks could have been prevented by using something other than single-factor username-password.” Two –factor authentication (2FA) when applied is one the best ways to secure your accounts online. It is basically a system that implements multiple factors for a verification process. This authentication stems from the principle of “Something the user knows” this could be a username, phone number, password or a personal question and “Something the user has” this would include a one-time passcode, key generator or a smart card. The verification process is similar to the process you would experience at an airport ticket counter. Your ticket when presented at the security acts as your identification and your photo id like the state-id or a passport through your photo would verify that it is you. Two-way authentication is a method of overcoming the problems associated with the single authentication process, when used efficiently it provides the following benefits. * Improved security: Since this authentication process is a 2 fold approach it ensures that even if a user’s password is compromised the hacker will be denied access until they provide the correct second element...

Words: 799 - Pages: 4

Free Essay

Zimmerman Telegram

...I would have done couple of things differently. Even though the Choctaw Codetalkers and Enigma Encryption Device were direct results of the failure of Zimmerman Telegram, the latter was used by the United States during the same period of World War 1. It is important to note here that there was already an encryption method which must have been ignored by the Germans. The One-Time Pad was already in use before the start of World War 1. This encryption method according to Nicholas G. McDonald in his Research Review explained that the one-time pad encryption algorithm was invented in the early 1900's, and has since been proven as unbreakable. The one time algorithm is derived from a previous cipher called Vernam Cipher, named after Gilbert Vernam. The Vernam Cipher was a cipher that combined a message with a key read from a paper tape or pad. The Vernam Cipher was not unbreakable until Joseph Mauborgne recognized that if the key was completely random the cryptanalytic difficultly would be equal to attempting every possible key. Another point worthy of mention is the mistake of sending the entire message in one transaction. As an Intelligence Officer I would have broken the message in shorter telegrams. The chances of intercepting all of the messages would have been very slim. McDonald, N. 2009 Past, Present, and Future Methods of Cryptography and Data Encryption: A Research Review University of...

Words: 276 - Pages: 2

Free Essay

Keylogging

...challenging, considering that various kinds of root kits reside in PCs (Personal Computers) to observe user’s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users’ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements. Index Terms—Authentication, Smartphone, Malicious code, Keylogger, I. INTRODUCTION Threats against electronic and financial services can be classified into two major classes: credential stealing and channel breaking attacks [20]. Credentials such as users’ identifiers, passwords...

Words: 12707 - Pages: 51

Free Essay

Alternative to Two Factor Authentication

...A good alternative to two factor authentication would be something like the FortiGate Series. This is a series that consist of hardware firewalls designed to protect computer networks from abuse basically. They will reside between the network they are protecting and an external network like the internet. This FortiGate Series will span the full range of network environments, from the small office and home office to the service provider, offering cost-effective systems for any application. They can detect and eliminate damaging, content-based threats from email and Web traffic such as viruses, worms, intrusions, and inappropriate Web content in real-time without degrading network performance, which is something I would be looking for. In addition to it providing application-level protection, the FortiGate Series can deliver a full range of network-level services which include firewall, Virtual Private Network, intrusion prevention and traffic shaping in a dedicated, easily managed platform. The FortiGate series provides a NAT/route mode that will apply security features between two or more different networks and a transparent mode that applies security features at any point in a network, which is a huge plus. A FortiGate unit will consist of a hardware box and the custom firewall software FortiOS, A separate administrator console will be used to perform system administration. This firewall can operate either alone or as part of a firewall cluster in order to provide a high...

Words: 594 - Pages: 3

Premium Essay

Security Authentication

...Securing and Protecting Information Authentication is a very common aspect of today's technology world. Anyone that uses a computer or mobile device has most likely used some form of it when logging into school accounts, shopping online, using social media, or accessing systems at work. What most individuals do not realize is that there are differing forms of authentication and ways it is used. Additionally, most people will not have any idea what is going on behind the scenes during authentication. He or she only knows that a login ID and password are required to gain access to the system. What is Authentication? The authentication process and other considerations affect the entire design and development for information systems. This and other preventative measures are used for securing data over a variety of systems. In order to learn about the authentication process, first it must be understood what security authentication is. The commonly accepted definition of security authentication is, according to “The business Of Authentication” (n.d.) “…the process of determining if a user or identity is who they claim to be. Authentication is accomplished using something the user knows (e.g. password), something the user has (e.g. security token) or something of the user (e.g. biometric) (para. 1). The important terms here are something the user has and something the user knows. In early authentication processes like automated teller machines (ATM), this idea was used...

Words: 1455 - Pages: 6

Premium Essay

Protecting Society: One Shot at a Time

...Katie Kostorowski Mrs. Stroup Honors Language Arts 14 March 2015 Protecting Society: One Shot at a Time Measles, a disease that once was thought to be practically extinct in America, is unfortunately again on the rise. In the year 2000, national leaders in the United States declared that measles had been eliminated within the country, however, from January 1, 2014 to August 29, 2014, there were 592 Measles cases in the United States (Koplowitz 1). The Centers for Disease Control and Prevention have attributed these cases to parents refusing to have their children vaccinated. Within the past two months, there have been 102 cases of measles reported in 14 states (Grady 1). Vaccinations have proven to be extremely effective. After receiving two doses of the measles vaccination, 97% of people are immune to this disease (“For Health Care Professionals” 2). It is completely unacceptable to have an outbreak of a disease that is almost completely preventable and was eliminated from the United States 15 years ago. In order to protect citizens against communicable diseases, it should be mandatory for almost everyone to receive vaccinations. There are two types of immunizations: active and passive. The more common of the two is the active immunization, which stimulates the body’s immune system to fabricate a defense against a disease-causing microorganism (“Immunization” 1). The first recorded active immunization was Edward Jenner’s use of the cowpox virus to produce immunity...

Words: 1427 - Pages: 6

Free Essay

Nothing

...Hey friends, We know there is a lot of excitement in the community surrounding the Lollipop updates for the One, and for good reason. We are just as excited as you are. We never intended to keep you waiting. Unfortunately, we ran into some unexpected roadblocks. First, there was an unforeseen OS signing issue, which has recently been resolved. Our camera module had stability issues on Lollipop, and we had to rebuild it for compatibility. Several other crucial drivers, including our Wi-Fi drivers, also needed to be updated to work flawlessly with the upgrade. Admittedly, it took a little more time than we had planned, but we only release updates that we are proud of; that means refusing to take shortcuts or deliver sub-par experiences. With all of that in mind, here are the official release dates for Android Lollipop on the OnePlus One: CM 12S: The official OTA update for the OnePlus One will be released on or before March 30, 2015 OxygenOS: The official release of our own Lollipop-based ROM will be available for download on or before March 27, 2015 To show you how serious we are about this commitment to our community, we are prepared to put our money where our mouth is. If we miss either one of these deadlines, we will give away five (5) 64GB OnePlus One devices to our fans. Reply to this thread to be eligible. It’s our little way of saying thank you for being patient and for joining us on our journey to create amazing, user-driven experiences. Never...

Words: 265 - Pages: 2

Free Essay

Jbjmdc

...Valerie / Torn (02:55) 7. Shot In The Dark (1:27) 8. Dance Dance Dance 9. We Can Work It Out (2:15) 10. Help (2:12) 11. Can’t Buy Me Love (2:08) 12. A Hard Days Night (2:34) 13. Innocent 14. Christmases When You Were Mine" 15. Safe sounds Ringtone 1. Come in with the rain 2. fearless 3. You’re Not Alone 4. Worldwide 5. Time Of Our Life 6. This Is Our Someday 7. Superstar 8. Stuck 9. Paralyzed 10. Nothing No Matters 11. No Idea 12. Intermission 13. If I Ruled The World 14. I Know You Know 15. Elevate 16. Cover Girl 17. Count On You 18. Better With You 19. Any Kind Of Guy 20. All Over Again 21. Gotta Find You 22. SOS 23. Be Alright 24. Christmas Love 25. Common Denominator 26. Down To Earth 27. Fa La La Acapella 28. One Time Acapella 29. Hummingbird Heartbeat 30. Part Of Me 31. We will Not Grow 32. Always Be My Baby 33. The Lazy Song 34. Call Me Maybe 35. Waiting Outside The Lines 36. Barricade 37. Mean Girls 38. One Thing Acoustic 39. Another World 40. Everything About You 41. Forever Young 42. I Want 43. Na Na Na 44. Mary song 45. 46. Stay beautiful huhuhi 47. The outside 48. Today was a fairy tale 49. Youre not sorry 50. ------------------------------------------------- You're doggies are turned in the zombie apocalypse! What do you do...

Words: 386 - Pages: 2