Free Essay

Lockdown

In: Other Topics

Submitted By GELILA
Words 975
Pages 4
Characters
Diana-Psycho and poster
Raeesah-student #1 and poster
Quinton-student #2 and poster
Julie-Filming and narration (for trailer), police
Anujah- student #3
Notes:
Le scénario diffère légèrement de l'histoire. Les cris perçants peuvent probablement être trouvés sur Internet, mais nous pouvons les enregistrer et être ensuite ajouté au film. La narration peut être enregistrée aussi. Le nom du caractère(personnage) de chacun est leur nom propre. Le narrateur signifie seulement dans la caravane. J'AI UNE IDÉE PENDANT LE DÉBUT DE LA CARAVANE!!! Narrateur : Quatre étudiants ont pris au piège à une école toute seule. Aucun enseignant, non plus après les règles(autorités) et non plus de devoirs.

Scene 1
La scène 1 Étudiants laisse(quitte) la bibliothèque après le travail tard. Ils essayent d'ouvrir la porte, mais il est fermé.

Raeesah : Qu'est-ce qui se passe ?
Anujah : je ne peux pas ouvrir la porte.
Daniel : que voulez-vous dire ? Le pas(l'étape) de côté et me laisse essayer.

Séjours de porte fermés.
Raeesah : Bien, c'est vraiment mystérieux.
Daniel : qui se soucie ?
Anujah : je tombe au bureau(aux fonctions).

Scene 2
Bureau sombre, porte fermée.
Anujah : Salut. Est quelqu'un ici ?
Silence.
Raeesah : j'appelle 911. Il n'y a aucune réception ici.
Daniel : c'est mystérieux. J'obtiens toujours la réception.
Anujah : qu'allons-nous faire ? Nous n'avons aucune alimentation, aucun endroit(place) pour ne dormir, aucune eau.
Daniel : (interrompt) Nous avons les fontaines d'eau.
Anujah : les fontaines d'eau sont désagréables.
Raeesah : Calmer-vous. Nous devrons attendre jusqu'au matin et aider ensuite viendra sûrement .
Scene 3
Daniel : je parie M. Chow a l'alimentation dans sa salle de classe. Pourquoi ne font pas nous allons obtiennent certains ?
Raeesah : ce serait faux. Nous ne pouvons pas voler de M. Chow! Droit Anujah ?
Anujah : à ce point, je ne me soucie pas vraiment . J'ai faim, donc je suis d'accord avec Daniel.
Scene 4:
Les étudiants cherchent l'alimentation, l'essai dans le bureau de l'enseignant Daniel : j'avais raison!
Raeesah : Ouais, ouais.
Anujah : Passez-moi certains.
Narrateur : Mais qu'arrive quand quelque chose va terriblement mal ? Les étudiants s'installent(s'apaisent) et se préparent à dormir.
Scene 5:
Daniel : Comment nous endormons-nous ?
Anujah : je ne peux pas dormir; c'est trop effrayant à cette école.
Raeesah : Effrayant ?
Anujah : Ouais, j'ai envie de(je ressemble à) je suis observé.
Daniel : Vous êtes sont un tel bébé. Vérifions les appareils photo(les caméras) de surveillance.
Va à l'ordinateur, vérifie des appareils photo(des caméras), voit quelque chose.
Scene 6:
Anujah : (semble suffisant) j'étais complètement juste. Admettez-le!
Daniel : c'était un écureuil.
Anujah : n'Était pas.
Daniel : Était aussi.
Raeesah (interrompt) Fermé! Cela n'a pas d'importance; les portes sont fermées, donc ils ne peuvent pas entrer, quoi qu'il était.
Scène 7
Étudiants étant assis sur bureaux, ennuyés.
Anujah : Ma soeur m'a dit qu'il y avait un enseignant fou qui a une fois enseigné ici.
Raeesah : Vraiment ?
Daniel : Ouais j'en ai entendu parler. Un certain enseignant a essayé d'accrocher ses étudiants dans sa salle de classe après qu'ils ont sauté sa classe.
Raeesah : Vous rigolez.
Anujah : l'enseignant même est allé à cette école quand elle était notre âge.
Examinez l'annuaire.
Anujah : Il elle y a "la Mallory Jenkins".
Raeesah : Bien, maintenant je suis vraiment devenu dingue.
Daniel : ne vous inquiétez pas; ils l'ont fermée à clef à l'hôpital pour crazies comme elle.
Anujah : Mais et si elle est là-bas ?
Anujah : (semble suffisant) j'étais complètement juste. Admettez-le!
Daniel : c'était un écureuil.
Anujah : n'Était pas.
Daniel : Était aussi.
Raeesah (interrompt) Fermé! Cela n'a pas d'importance; les portes sont fermées, donc ils ne peuvent pas entrer, quoi qu'il était.
Scène 8 :
Narrateur : Ce qui arrivera quand les étudiants doivent voler de leurs propres ailes contre l'inconnu ?
Raeesah et Anujah reviennent de la recherche de l'eau embouteillée, mais Daniel n'est pas là.
Raeesah : Maintenant je suis inquiété.
Diana : Recherche de votre petit ami ? Ne vous inquiétez pas bientôt que vous le joindrez(rejoindrez).
Raeesah : Ce qui vous lui faites! ?!
Diana : Allez le regard(l'apparence) dans la cage d'escalier.
Daniel sur raison(terre), sang sur visage, mort.
Anujah et cri perçant de Raeesah.
Diana : Il a essayé d'appeler la police du bureau(des fonctions), mais on ne permet pas aux étudiants de faire irruption dans le bureau(les fonctions). Donc il a été puni.
Raeesah : Vous êtes fous! Que faites-vous à l'école ?
Diana : Vous verrez. Maintenant soyez de bons étudiants sont le séjour dans votre salle de classe
Scène 9 -
Anujah : qu'allons-nous faire ?
Raeesah : Évidemment pas restent dans la salle de classe.
Anujah : Pourquoi pas ? Peut-être nous serons sûrs.
Raeesah : parce qu'elle nous veut à. Nous devons sortir d'ici!
Anujah : Comment ?
Raeesah : un ami m'a parlé d'une porte secrète dans la salle de travail française. C'est une sortie de secours les constructeurs mis dans par erreur.
Anujah : Allons-y !
Scene 10
Marche à pied dans hall.
Raeesah : je parie je peux obtenir la réception de téléphone portable dans la salle de toilette.
Anujah : juste sortons d'ici.
Raeesah : je veux essayer.
Raeesah marche dans la salle de toilette. Après 5 minutes(procès-verbal).
Anujah : (ouvre porte). Raeesah ? Raeesah ?
Anujah : qu'avez-vous fait à Raeesah ? Diana : Oh rien...
La scène 11 Anujah est dans la salle de travail. Voit la porte et commence à fonctionner(courir).
La scène 12 Police arrive. Narrator:The la police arrivent après un appel frénétique d'Anujah.
Julie : (la Prise de Diana de la porte) Vous êtes arrêtés sur deux comptes de meurtre, l'enlèvement, la tentative de meurtre et planifie de faire sauter l'école avec des bombes.
Diana : je serais arrivé loin avec cela sans vous me mêlant des enfants!
Julie : Ouais, ouais. Continuez à marcher psychopathe. Je vous renvoie à où vous appartenez.

Similar Documents

Free Essay

Lockdown

...Lockdown By Walter Dean Myers Year of Publication: 2010 Setting: Juvenile Facility Overview: This book is mainly about a young man named Reese that really wants to change his life around. Reese is being moved from a juvenile jail to a real jail. He has many different problems going on while he is in the juvenile center. Reese gets involved in a fight with his friend Toon and gets put in a bad situation. Reese is given a second chance and promises to turn his life around. At the beginning of the book, Reese, a 14 year old boy has already spent twenty-two months in Progress, a juvenile facility for troubled youths. Reese really wants to get out, and some of the authorities have noticed his potential. Reese spends his first day in a pilot work-release program. His job is to do whatever is asked of him at Evergreen nursing home. When Reese gets to Progress after his day of work, he finds out from his friend Play that one of Progress’s bullies, Diego is planning on jumping his friend Toon. Usually, Diego’s makes threats but doesn't follow through, but this time they are worried because a serious gang member named Cobo has been sent to Progress before he goes to an adult facility. Reese does not want to just stand and watch while Toon is beaten up, but he knows that if he wants to get out of there, that he cannot get into a fight. The next morning, when the guards walk through and calls roll, Toon’s doesn't answer, and he shows up at breakfast with bruises and cuts...

Words: 894 - Pages: 4

Free Essay

Eda 555 Liability

...stakeholders? It includes everyone from parents, teachers, counselors, custodians, paraprofessionals, administrators, and even the cafeteria staff. Throughout the year Del Castillo Elementary practices various emergency procedures to assert them safety of our students. With practicing these emergency procedures we get to see firsthand if the students and staff knows what to do in case a real life emergency occurs. We currently practice fire drills, soft lockdown, hard lockdown, and shelter in place. Teachers are also aware that their classroom doors must be locked once instructional time starts and it must remained locked until the last student exits the classroom. During a fire drill each teacher is assigned to a certain area they must walk their students to but, a teacher must not forget to take their student emergency cards with them in case they cannot go back into the classroom students’ phone numbers are readily available with them to access parent information. Fire drills are scheduled once every six weeks. Lockdowns are procedures that are held to protect our students and the rest of the stakeholders either from a harmful suspect...

Words: 857 - Pages: 4

Free Essay

Student

...University of Cincinnati Clermont College Fall Semester 2015 Course Title: Business Analytics I Course #: BANA2081 Online Course: Therefore, there is neither a classroom nor a specific day/time. Course Facilitator: Dr. Barry Smith Work Phone: 307-251-2029 (No texting please!) Office Location: Casper, Wyoming Office Hours: Usually online from 7:30 to 9:30 pm MT daily. It does vary as I am on during the day, as well as later on some days. Email: smith4bw@ucmail.uc.edu (I check throughout the day so please feel free to email me any questions you may have in class.) Skype: doctorwho1971 (If you choose this option please state you are my student and the class name and section or I will not accept invitation.) Faculty Service Center: (513)732-5335 Electronic Communication This is an online course which uses Blackboard linked to MyMathLab. Course Description: This course develops fundamental knowledge and skills for applying statistics to business decision making. Topics include descriptive statistics, probability distributions, confidence intervals and hypothesis testing and the use of computer software for statistical applications. Learning Outcomes: The successful Business Analytics I student should be able to: 1) Organize and summarize data using appropriate descriptive statistics and graphical methods. 2) Understand the concept of probability and to be able to calculate......

Words: 1249 - Pages: 5

Premium Essay

The Crisis Communication Plan of Massachusetts General Hospital

...The Crisis Communication Plan of Massachusetts General Hospital Introduction to the Plan All organizations have possibility of encountering a crisis. When a crisis strikes, an organization could protect he organization’s reputation and unite its employee to realize its mission by effective and timely communication. The key to effective communication in a crisis is proactive preparation. With a specific instruction in hand, employees are able to effectively respond to the related issues. To the public, we are always proud of our excellent services. In 2015, U.S. News & World Report named our Massachusetts General Hospital (MGH) the top hospital in the nation based on our quality of care, patient safety and reputation in 16 clinical specialties. For a hospital, there is nothing more important than trust. Therefore, we need a crisis communication plan to prepare all members for the crises to maintain the public and stakeholder trust. This guide is designed for our MGH members to develop and adopt a practical tool for planning appropriate measures. The guide helps them to be better prepared to face the wide range of emergencies that may occur in an organization. Given the complexity of Massachusetts General Hospital’s business, I make the scale of crises that would take place in Boston. Crisis Inventory for Massachusetts General Hospital External crises Type | Description | Happened Before | Probability | Impact | Natural Disaster | Hurricane,Snow...

Words: 2812 - Pages: 12

Premium Essay

Talent Management Syllabus

...computer, o microphone, and o digital camera (often integrated into your computer for this class. It is important that you ensure that you are technologically ready to use Blackboard in your online classes. To check If you are using the proper technology (operating systems, etc.). Please click on the Test your Browser on the right side of your Blackboard entry page. • Respondus LockDown Browser for Online Exams This course requires the use of LockDown Browser for taking online exams. The LockDown Browser software prevents a user from accessing other applications or going to other websites during an exam. This tool makes it possible for students to take online exams from any location, and at times that are convenient. It also creates a fair testing environment for everyone in the course. You will need to download and install LockDown Browser to your computer and use it to take quizzes and exams (instead of using your normal browser). The download URL for PCs and MACs is: http://www.respondus.com/lockdown/information.pl?ID=177837148 Note: Do not download a copy of LockDown Browser from elsewhere on the Internet; those versions will not work at our...

Words: 3506 - Pages: 15

Free Essay

Cmns 251

...To: Director of UFV Subject: UFV ``zombie preparedness`` The purpose of this report is to investigate the preparedness of the UFV campus if an emergency were to occur. This will highlight areas that function well, as well as areas that we investigated and had concerns about. There is a level of reasonableness that goes into safety but accidents are not planned and in an emergency situation they are the risk of one is higher. An example of a emergency could be a fire, earthquake, power outage, flood, or threat. The purpose of addressing these concerns is to help prevent unnecessary accidents for staff and student. The building our team looked at was the Library and upper study hall by the library. Building Features The buildings were built to a certain level of safety and it is important to address the positives that already exist. * Sprinklers cover all area of floor space so fires would struggle to spread * Building maps located throughout the school that highlight exits and fire extinguishers * Easily spotted and accessible fire extinguishers * Stairs have added tread to avoid slipping for normal walking or emergency evacuation * Light fixtures have protective cover, so glass will never fall from ceiling Safety Oversights The following include safety concerns that arose concern when considering what could happen in an emergency situation when accidents happen. * When the building was first designed all the chair in the upper study by......

Words: 755 - Pages: 4

Premium Essay

Bam Wham Decoy Own No Rights!!!!

...IT Security Policy I.T. SECURITY POLICY Copyright © Ruskwig – Ruskwig provides you with the right to copy and amend this document for your own use – You may not resell, ask for donations for, or otherwise transfer for value the document. Page 1 IT Security Policy TABLE OF CONTENTS 1. POLICY STATEMENT .......................................................................................................... 3 2. VIRUS PROTECTION ........................................................................................................... 5 3. PHYSICAL SECURITY OF COMPUTER EQUIPMENT ....................................................... 7 3.1. DEFINITIONS................................................................................................................. 7 3.2. CATEGORIES OF RISK ................................................................................................ 8 3.3. REQUIRED PHYSICAL SECURITY .............................................................................. 9 3.4. COMPUTER SUITE ..................................................................................................... 14 4. ACCESS CONTROL ........................................................................................................... 15 5. LAN SECURITY .................................................................................................................. 17 6. SERVER SPECIFIC SECURITY ............................................................

Words: 6035 - Pages: 25

Premium Essay

Treatment of Prisioners

...Running head: ETHICAL TREATMENT OF PRISONERS 1 Ethical treatment of prisoners Jacqueline Arnold SOC120 Instructor Mark Cohen November 1, 2012 ETHICAL TREATMENT OF PRISONERS 2 The ethical treatment of prisoners, there are millions of people in prison all over the United States, but the ethical treatment of the prisoners’ rights must be analyzed. As a society, have we done all we can regarding the treatment of prisoners? Alternatively, can we say we have made prison an easy way of life that is no longer a punishment for some? Utilitarianism is the belief those moral rules should be choices made by a society to promote the happiness of its members. (Mosser, 2010). In February 2010, the House of Delegates approved a set of Criminal Justice Standards on Treatment of Prisoners. The term “prison” means a correctional facility holding primarily prisoners sentenced to a term of at least one year. In the terms of a “prisoner” means any person incarcerated in a correctional facility. The argument could be is that prisoners are being treated good, but some say that they are not being treated like prisoners. However, when you think back many years ago, prisoners did not have any rights. The wardens run the prison as they saw fit. As for the prisoners in the day, they would be taken out and beaten, whipped, and even killed. But with the the ethical treatment of prisoners today, includes a humane and......

Words: 1592 - Pages: 7

Premium Essay

Applications Project

...Junior High Grades 6-8 Protocol for Natural Disaster: Tornado Tyson Lee March 3, 2013 Information about the Protocol Living in Mississippi, there are many tornadoes that hit this area. Mississippi has on average, 29 tornadoes per year. One of nature’s most violent acts is a tornado. Tornadoes can cause enough devastation to tear through a neighborhood and demolish it and they can cause fatalities. At times, a tornado can develop so quickly that advance warning can be too little too late. When preparing for a tornado, schools need to be aware of tornado watches and warnings. The National Weather Service issues a warning when conditions are favorable for the development of a tornado and a warning is issued when a tornado has been detected. In the school, there should be someone that will be monitoring the weather radio for potential bad weather. There should also be a plan and provisions set in the school for during school hours, after school hours, and any school related activities. During school hours, there need to be a procedure for relaying this information to all faculty, staff, and students. In order to make sure that all faculty, staff, and students are prepared, in the event of a real tornado, is to have a severe weather safety plan in effect where everyone can take cover within a minute. It is important to do this with regular tornado drills. This allows for all persons to be prepared in the event of a real tornado. The......

Words: 2313 - Pages: 10

Premium Essay

Wefrqf

...IT Security Policy I.T. SECURITY POLICY Copyright © Ruskwig – Ruskwig provides you with the right to copy and amend this document for your own use – You may not resell, ask for donations for, or otherwise transfer for value the document. Page 1 IT Security Policy TABLE OF CONTENTS 1. POLICY STATEMENT .......................................................................................................... 3 2. VIRUS PROTECTION ........................................................................................................... 5 3. PHYSICAL SECURITY OF COMPUTER EQUIPMENT ....................................................... 7 3.1. DEFINITIONS................................................................................................................. 7 3.2. CATEGORIES OF RISK ................................................................................................ 8 3.3. REQUIRED PHYSICAL SECURITY .............................................................................. 9 3.4. COMPUTER SUITE ..................................................................................................... 14 4. ACCESS CONTROL ........................................................................................................... 15 5. LAN SECURITY .................................................................................................................. 17 6. SERVER SPECIFIC SECURITY ............................................................

Words: 6035 - Pages: 25

Premium Essay

Internal

...Laura Rough Draft How Cell Phones Have Changed Our Life Socially? (Patricia Seybold) “A lot of people think that the new economy is all about the internet. I think that it's being fueled by the internet - as well as by cell phones, digital assistants, and the like - but that it's really about customers.” Cellphones has changed us socially in many different ways, video chat, and text messaging, and keeping contact through different social networks wirelessly. Cell phones have changed the way people socially interact with each other. Nowadays, anyone anywhere can just pick up their cell phone and call each other at any time of the day or night. (Stewart 1). In the past when there were just house phones around, people could use the excuse “Sorry I wasn’t home to answer your call” but now, with the emerging of cell phones, people will get a hold of you somehow. Cell phones are considered to be your own personal property while house phones are considered to be used for the family. Cell phones depend on satellite and signal, which means anyone, can take their cell phones anywhere they choose, while house phones depend on the wires in the house which limits anyone from using it outside of the house. (Stewart 1). For example, someone could be on their house phone and their little brother could be eavesdropping on the conversation. No one would want that, would they? On the other hand, cell phones are more personal and most of them have Wi-Fi which leads them to be......

Words: 1137 - Pages: 5

Premium Essay

Malware

...MALWARE PROJECT ROOT KIT A root kit refers to a specialized set of programs normally used by crackers in order to subvert control of an operating system of a computer system. A rootkit enables breaking in security of a computer system and gaining root access for various operating systems such as Unix, Linux, Solaris, Microsoft Windows, Mac OS etc. A root kit is a set of tools used by a hacker to infiltrate a computer system without the knowledge or consent of the system's owner. These tools help the intruder gain access to the system in order to perform malicious activities at a later date without being detected. WHAT MAKES IT DIFFERENT FROM A VIRUS? Most often, rootkits are used to control and not to destroy. Of course, this control could be used to delete data files, but it can also be used for more nefarious purposes. More importantly, rootkits run at the same privilege levels as most antivirus programs. This makes them that much harder to remove as the computer cannot decide on which program has a greater authority to shut down the other. DETECTING AND PREVENTING ROOTKITS One issue with rootkits is that they are constantly updated; even with all sorts of computer security protocols programmed every day to specifically eliminate rootkits, people who program them continue to develop and update the rootkit, or make new ones. It doesn’t mean, though, that they cannot be prevented. Methods through which RootKits can be prevented are: * Anti-virus software.......

Words: 1362 - Pages: 6

Premium Essay

Gchjb C M Vhb V V

...being said, I do not think that teachers should just be handed a class roster, name tag, and a gun on the first day of school. Instead, they should be psychologically analyzed, trained, and tested before handling the gun. If a teacher fails to meet the requirements needed to obtain the gun, the board could simply not let that specific teacher have one or replace him with someone who can meet the requirements. It will also be best if the gun is locked in a secret compartment that is student-proof but also easily accessible in case of emergency. To ensure extra security, an alarm could go off anytime a teacher opens the compartment that holds the gun so that everyone else in the school knows there is danger and can put their classrooms under lockdown. Allowing only security officers to carry weapons is what we’ve been doing in the past and read any newspaper to see how well that turned out. The “norm” threatens the safety of students. It’s time for a change in school safety and the change should start with armed...

Words: 287 - Pages: 2

Free Essay

Prison Environment

...and custody by the following: the civil service department, which makes the rules for employees, employee organizations, and unions, which represent their member's interests, rehabilitation advocates, such as those sponsoring particular behavioral science, educational, or religious interventions inside the prison. Prison environment changes can be in the rational and economic view, in which material rewards controls are provided in the direction people are in need of it. Some secure custody methods include counting inmates to know their whereabouts, having a double gate to control the traffic into the prison, control of contraband, searches of the inmate’s clothes to a full body cavity search, shakedowns of their area and having them on lockdown. The prison environment affects secure custody in many ways. Secure custody can improve by hiring guards who are capable and trained to do their job, the prisons are in need of...

Words: 330 - Pages: 2

Free Essay

Prison Environment

...Title Name Class Instructor Date Prison Environment A prison environment is a place where inmates are physically confined and deprived of a range of personal freedoms. It is a cold and unfeeling place to be. There are many levels of conflict and tension (Foster, 2006). The prison environment influences the institutional management and custody by the growing population and the gangs within the facility. Overcrowding aggravates the natural conflicts that rely within the prisons walls which then escalate violence. When working with criminals on an ongoing basis it may cause corruption to occur with some of the inmates within the institution that ends up allowing drugs and weapons into the facility degrading its performance. The internal environment of a prisons primary influence towards management and custody include the following: the inmate social culture, the prisons physical environment, and prison staff culture. Then the external environment interacts with the internal environment that also influences management and custody by the following: the civil service department, which makes the rules for employees, employee organizations, and unions, which represent their member's interests, rehabilitation advocates, such as those sponsoring particular behavioral science, educational, or religious interventions inside the prison. Prison......

Words: 384 - Pages: 2