Thursday, October 31, 2019

The Book of Kells and its influence on the State of Arizona Research Paper

The Book of Kells and its influence on the State of Arizona - Research Paper Example It contains full pages of extraneous decoration for the canon tables; symbols and text of the evangelists Matthew (the Man), Mark (the Lion), Luke (the Calf) and John (the Eagle); the opening words of the Gospels; the Virgin and Child; a portrait of Christ, and complex narrative scenes such as the earliest to survive in gospel manuscripts which corresponds the arrest of Christ and his temptation by the Devil. The word Christ has been abbreviated with letters Chi Rho in medieval manuscripts and Chi Rho page is the most famous page in medieval art which introduces Matthew’s account of the nascence. However, the book is not a full copy of the Vulgate and contains a number of variations from the Vulgate and also some uncorrected errors. It is assumed that around 30 folios of the text had been lost in the medieval and early modern periods and some pages are deteriorated.3 According to experts, the handwriting differs throughout the text therefore the artwork seemed to have produced by at least three different artists.4 Today the manuscript contains 340 folios with 330 by 250mm dimensions, and scriptures are written with a range of pigments including yellow, red, green, purple and black. The manuscript is believed to have created by Celtic monks in year 800, but the date and origin of the book has been a controversial issue. The widely accepted belief is that the text creation might have started at Iona from where it was brought to Abbey of Kells, when Vikings invaded the island of Iona, where the artwork might have been continued to be undertaken. The text was revered at Kells as a souvenir of Saint Columba throughout the medieval periods. The Book of Kells is the considered to be one of the finest manuscripts and described as â€Å"the chief treasure of the Western world†. The Annals of Ulster record stealth of the book in year 1006 and that it discovered again after many years, stripped off its ornate gold. Around 1653, the Book of Kells was sent to Dublin, Ireland for safety concerns and after few years it was brought to Trinity College, Dublin where it has been on display in library over there. The text has been bound in four volumes, since 1953, of which two volumes can commonly be seen in library, one opened to display a major decorated page, and the other to show two pages of script.5 A quote of Sir Edward Sullivan demonstrates the concept of how mind-bending the artwork of The Book of Kells: "The finest draftsmen of the entire world have tried to recreate the Chi-Rho page, and have failed." Anyone in today's modern world could not recreate it as it takes an ineffable artist working in the Middle Ages to create something.6 However, in 1951, the first facsimile of the Book of Kells was produced by a Swiss publisher, Urs Graf Verlag Bern, in black-and-white photographs and color reproductions as well. Second facsimile in full color was produced in 1974 by photographers Thames and Hudson in Dublin, and included all the full-p age detailed illustrations and also an ornamentation representative section in the manuscript. In the 1980s, Faksimile-Verlag Luzern produced with permission from Trinity College,

Tuesday, October 29, 2019

Masters of science in I.T. progam Personal Statement

Masters of science in I.T. progam - Personal Statement Example After doing a lot of background research and soul searching, I have made a decision to pursue a Master of Science in Information Technology (MSIT) at the Endicott College. Soon after graduating with a degree in criminal justice, I worked closely with individuals who were experts in the field of information technology. My experience with these colleagues woke me up to the fact that the world faces a lot of challenges in relation to information technology and security. My interest in the field of information technology has continued to grow ever since. It is this interest, my great passion for new technologies, and my desire to see the world get more secure that informed that ideally informed my decision to pursue a Master of Science in Information Technology. With the current knowledge and experience I have in IT, I am confident that I am geared toward success in this course. Among the numerous colleges and universities that offer MSIT, I chose the Endicott College for a number of reasons. A research on the college reveals that the academic staffs of the university are highly trained and experienced and are drawn from different professional backgrounds. The college also has the kind of resources that are invaluable to students learning online including an e-library and resource database. The Endicott College MSIT offers the flexibility that I need as I continue working and gaining more experience. I particularly like the fact that I will be able to choose elective courses that are aligned to my specific areas of interest as I take my course at Endicott College. I am confident therefore that the college will see me develop in my career path, equipping me with skills and knowledge to solve complex problems, manage projects, and develop and work with information systems. Upon graduating with my Master degree from Endicott College, I hope to work with a reputable organization in the U.S. to gain more experience in

Sunday, October 27, 2019

Binary Input Output System

Binary Input Output System Task 1 Motherboard Name: Abit IS7-E Intel 865PE 800MHz FSB The biggest and most important circuit board of a computer system. The many components on a motherboard, they are CPU(socket),memory slots, HDD controllers and other socket and slots. Binary input Output System(BIOS),memory, mass storage interfaces, parallel and serial ports, controllers and expansion slots. It handles all memory, system resources and the processor. Power supply Name:600Watt power supply Provided through a power supply unit(PSU) to the computer. It perform (AC) current (110 or 220 V) to direct current(DC) 5V,12V,3.3V. Continuous 5power input is required for the proper Functioning of the system which can be provided through a direct power supply. Surge suppressors, power conditioners and Uninterruptible Power Supply (UPS) are commonly used for regulating the power input to the computer. Two type of power supply ATX power supply (24pin power supply) CPU Name: Intel P4 2.4GHz 512K HT 800MHz FSB Manages the processing and logical operations of a computer system. The two main components of a process or are the Arithmetic Logic Unit(ALU) and the Control Unit(CU).The ALU handles asthmatic and logical operation. The CUCU decodes and executes the memory instructions, processor is also commonly know as microprocessor or Central Processing Unit(CPU). Memory modules Name:DDR2 SDRAM (1GB) Storage space in the computer where digital data is stored. The main physical memory is called Random Access Memory(RAM) which allows data to read and written into it. Speed 800MHz, Pin 240. Storage devices Name: 3.5† Hard disk Drive (ATA) Maxtor 120GB 7200RPM ATA Main Storage devices is hardware device and Store information are permanently store information on a PC. Haft Disk controller pin40 Hard Drive Controllers device Circuitry that is responsible for the managing transmission of data from the computer to the hard drive and vice-versa. Display Devices Name:21† LCD Monitor Machine, which displays the data and information being entered, retrieved and the results of the processed data from the system. Some commonly used display devices are monitor, liquid Crystal Display (LCD) panel and touch screen. Adapter Cards Name: Hercules ATI Randeon9800XT 256MB Circuit in a computer system, which support a particular device. Video adapters are used to support graphics monitor. Network adaptors allow a computer to communicate with another computer. Also called expansion board, add-ons, add- ins or cards. Ports Names- RJ-4s LAN Purpose-To connect the system board and to be used input devices Characteristics-PS 2 -USB -Wireless Task-1(ii) Serial Serial ports are usually called communication port comport etc. Generally one computer can accept up to 4 serial ports (com1, com2, com3 and com4). Parallel Parallel ports must be used eight lines of wire and they can transfer the data as by the rate of eight bits in one time. So, they are only used one data line and their transference rate are five or ten times faster Fire wire The fire wire is the fire wire connector and plug most commonly used with PCs. Task-1(iii) CMOS(Complementary Metal Oxide Semiconductor) CMOS are used very less amount of power and does not generate a high amount of heat also, as it uses both the negative and positive polarity. This features makes it usable in computer system. Basic Input Output System Pre-integrated software which determines the actions of a computer which it can perform without accessing the disk. Present in the ROM chip and contains code for various functions and devices. Post Error Code 1 short beep Normal POST system is ok 2 short beeps POST Error error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem 1 long, 1 short beep System board problem 1 long, 2 short beeps Display adapter problem (MDA, CGA) 1 long, 3 short beeps Enhanced Graphics Adapter (EGA) 3 long beeps 3270 keyboard card The errors found in BIOS that occur during the post time can be distinguished into two. (i) Non-fatal error Normally, error message can be shown on Monitor Screen such as error which can do boot set up continuously on the compute is graded as non-fatal error. (ii) Fatal error The error which cannot continue boot setup and entirely stops and make a series of beep-code sound. Depending on the BIOS, these short beep – code help the operator distinguish the fault affecting on which part of the machine. Task 2 Task-2(i) The most popular type of motherboards is AT-style motherboard and ATX-style motherboard. Advanced Technology (AT) :The older form factor standard derived from PC-XT and PC-AT specifications. Advanced Technology Extended (ATX): A newer form factor standard that has been introduced to overcome problems found in the AT-style designs. The main components of a motherboard are the CU and its chipset, the system clock, the ROM , BIOS, the RAM, the system bus with expansion slots, jumpers and DIP, power supply connections and communication ports like the serial, parallel, USB and infrared ports. Industry Standard Architecture (ISA) bus. This Architecture was originally used in the IBM PC/XT and PC/AT. It is a very old technology used for connecting peripheral device. Task 2 (ii) Advanced BIOS Features This category displays the amount of memory detected by the BIOS. The value of the base (or conventional)memory is typically 640K or more memory installed on the main board. The value of the extended memory is the amount of memory located above 1MB in the main board. Fig.1 Standard CMOS Features The Standard CMOS setup screens from various BIOS manufactures all provide the same basic information .They can be used to set the system clock/calendar, establish disk-drive parameters and video display type, and specify which types of errors will halt the system during the POST. Fig. 2 Task- 2 (iii) a Print technologies Impact technologies( Dot-matrix printer) Non- Impact technologies(ink-jet, Laser printer) Ink-jet printer An inkjet printer is a non-impact printer that uses droplets of ink to create image on the paper. Inkjet printer is popular for home user due to its ability to print color. It is cheaper than laser printer but expensive to maintain. Inkjet’s cartridges need to replace frequently and special coated paper is required for high quality photo out. Task-2(iii)b Common Printer Problems When a printer has been out of paper, or had a paper jam, or some other condition that keeps it from giving output for several minutes, the lpq command ceases to indicate the particular condition, and simply shows it as stalled(n sec), with n>>1000. So if you see this message, you need to go to the printer itself and find out what is wrong. On the other hand, when a condition has been corrected, the lpq command may continue to report the condition for about a minute more; so a warning like No paper tray when the paper has just been reloaded can usually be ignored. You can likewise ignore the warning No daemon present when a job has just been submitted after the queue was empty. Task3 Network cable A Network is a collection of computers linked to one another allowing information and resources to be shared between them. A network is setup by connecting the various computers through the cables, connectors and connectivity devices such as hubs or switches along with which necessary protocols for enable communication between them are implemented. Any computer can access a network directly by using a network adapter expansion card also known as Network Interface card(NIC) and a network cable. Types of cable are Coaxial cable: Contains a central wire which is insulated and on top of which there is a braided wire. Coaxial cables can carry more data and are less prone to interference. Plenum cable: Has an outer shield made of Teflon which is a fire repellant and which does not produce poisonous fumes when burnt. Unshielded Twisted Pair (UTP)cable: Two cables and switched wires so that the noises of the two separate wire that are cover in a shield of foil, so that data transmission is safer. Connectors : Some Commonly connectors in a network Are: BNC, RJ-45,AUI, ST/SC and IDC/UDC. (ii) Five different technologies are 1. ASDL 2. Wi Max 3. IP Star 4. PSIN (dial up) 5. ISDN (digital) 1.ADSL Asymmetric DSL (ADSL) works by splitting the phone line into two frequency ranges. The frequencies below 4KHz are reserved for voice, and the range above that is used for data. This makes it possible to use the line for phone calls and data network access at the same time. This type of DSL is called asymmetric because more bandwidth is reserved for receiving data than for sending data. Asymmetric variations include ADSL standards facilitates interoperability between all standard forms of ADSL. Strengths The internet connection can remain open while the phone line is used for voice calls.DSL service employs phone wires between the home and the telephone switching center. Weakness ADSL works by splitting the phone line into two frequency ranges. The frequencies below 4 V Hz are reserved for voice, and the range above that is used for data.DSL service is not available in all locations. 2. Wi Max Wi Fi is used by wireless LANs. Strength : Mobile PC might be connected to printers, scanners or voice over IP headset. Laptop user would wirelessly connect to a digital project. Weakness: To extend broadband wireless connectivity to new locations and over longer distances. 3. IP Star Strength: can access from everywhere. Low Noise Block (LNB) removes the noise and convert into digital signal. Weakness: Weak signal is limited power available in orbit satellites tend to broadcast on very lower power. Extremely high cost between$100 to$ 600 million to build . 4. PSIN (dial up) As the distance between terminals increases ,it soon becomes impractical to use dedicated cabling to carry data .Fortunately ,a very extensive communications network is already in existence :the public telephone network. Strengths The world’s largest communications network is the public telephone system. When computers use this network to communicate with each other it is referred to as dial-up networking (DUP). Weakness Must wait for certain time to convert digital to analog and transmit ion is not binary but analog, so signal may weakness at certain point need exchange to pump up. 5. ISDN (digital Line) ISDN service offers high-speed access to the ,public telephone system. ISDN service requires digital modems. Strengths The fastest, most expensive ISDN service is broadband ISDN. This level of service provides extremely high transfer rates (up to 622Mbps) over coaxial or fiber-optic cabling. Weakness Two wire system is expended in four wire system thought a network terminator. Task-3(3) 5 Networking capabilities of Windows XP -Wireless Firewall -Offline Offer Remote Assistance Remote Desktop Task 4 Task 4(i) 10 Windows XP system files HAL.DLL: Hardware abstraction layer (HAL) driver that holds information specific to the CPU that the OS is running on. SMSS.EXE: A file that contains information to carry out pre -start functions such as running in boot time version of CHKDSK called AUTOCHTC. SMSS.EXE: A file that contains information to carry out pre -start functions such as running in boot time version of CHKDSK called AUTOCHTC. BOOT.INI: A text file that contains the boot loader menu that is displayed on the startup screen. BOOT SECT.DOS: Responsible for loading the operating system other than the default operating Ntoskrnl.exe: Executive and kernel, executive and kernel with support for Physical Address. Ntkrnlpa.exe: Extension (PAE), which allows addressing of more than 4 gigabytes(GB) of physical memory. User32.dll: Core Win32 subsystem DLLs. Test -4 (ii) ( Fig. 1 ) Microsoft Management Console Some of the windows 2000/XP management consoles are not loaded when the operating system is installed. However, they are available for installation from the Windows2000/XP CDs. These consoles are referred to as snap-ins. In addition to using the Control Panel, you can access all the installed MMCs by typing selecting Start, Programs, Administrative Tools, or by tying MMC in the Start, Run dialog box. The MMC is a flexible tool that enables you to add snap-in tools(utilities) to create custom management consoles that can be saved and used at any time .Extended discussions of these tools are presented throughout the remainder of the text as they apply to managing and troubleshooting the operating system. ( Fig. 2 ) Event Viewer System events include items such as successful and failed Windows computer startups ,as well as successful loading of device drivers. Likewise, application events include information about how the system’s applications are performing. Not all Windows applications generate events that the Event Viewer will log. Security events are produced by user actions such as logons and logoffs, file and folder accesses, and creation of new Active Directory accounts. Task Manager To start Task Manager, take any of the following actions: Press CTRL+ALT+DELETE, and then click Task Manager. Press CTRL+SHIFT+ESC. Right-click an empty area of the taskbar, and then click Task Manager. Task-4(iii) Interactively install a Plug and Play device You can use this procedure to install a device that is not currently plugged into the computer, and for which a device driver is not currently staged in the driver store. If a device driver is staged in the driver store, then it is installed with no interaction required by the user, and the Found New Hardware dialog box does not appear. To install a Plug and Play device interactively when you plug it in Plug the new device into the computer. In the Found New Hardware dialog box, select one of the following: Locate and install driver software. Selecting this option begins the installation process. For more information, see Additional considerations in this topic. Ask me again later. The device is not installed and no configuration change is made to your computer. If the device is still plugged in the next time you log on to the computer, then this dialog box appears again. Dont show this message again for this device. Selecting this option configures the Plug and Play service to not install the driver for this device, and does not make the device functional. To complete the installation of the device driver, you must detach the device and reattach it. Task 5 BIOS is a collection of programmes written in low-level language (mostly assembly language) and it has to carry out the functions necessary for computing the boot during the period between point of the computer power to the starting point of the operation system. There are many thousands of individual error messages; some are more common than others because there are only a few different BIOS companies that are used by the majority of PCs out there today. However, since the exact wording of an error message can be changed by the manufacturer of each system or motherboard, there are a lot of variations. The common problem of error codes and message from the boot sequence are CMOS battery failed CMOS checksum error – Default lobed . Task-5(ii) The following utilities will help you troubleshoot the most common causes of system problem 1. Microsoft Management Console 2. Disk Defragmenter 3. Control Panel 1. Microsoft Management Console Microsoft Management Console (MMC) hosts administrative tools that you can use to administer networks, computers, services, and other system components. For help with specific tasks. For general background information. For information about accessibility features. For problem-solving instructions. 2. Disk Defragmenter Disk Defragmenter is a system utility for analyzing local volumes and locating and consolidating fragmented files and folders. You can also defragment disks from a command line using the defrag command. Before defragmenting files or folders. For tips about using Disk Defragmenter. For help with specific tasks. For general background information. For problem-solving instructions. 3.Control Panel The Windows XP Control Panel, also offers some additional features and functionality not in previous Windows 9x and NT/2000 versions. In Windows XP, the Control Panel options is included directly on the Start menu instead of a submenu. Under the native Windows XP version of the Control Panel, the applets are organized into nine related categories. The view that display the Control Panel items is referred into as the Category view. Reference Web Reference www.pchell.com http://img80.imageshack.us/img80/1634/ddkx48pb02yf2.jpg www.computerhope.com/issues/ch000980.htm www.articlesbase.com/communication-articles/wireless-broadband-how-to-improve-the-signal-strength-in-your-home-589595.html Book Reference (1)Fundamentals of Hardware and Operating Systems(Operating System Technologies) (2)Fundamentals of Hardware and Operating Systems(Hardware Service Technician) (3)Tease’s Practical Guide for Computer Hardware Peripherals

Friday, October 25, 2019

The Advantage of School Uniforms Essay -- Arguement Argumentative Pers

Did you know that as many as twenty-five percent of the nation?s pubic elementary, middle, and junior high schools have successfully implemented a school uniform policy? (Isaacson, 1998) School uniforms greatly benefit both the students and faculty by creating an atmosphere in which the students are able to get the most out of their education. I believe that all students should wear school uniforms regardless of whether or not the school is public. Below are clear-cut arguments in favor of school uniforms. First, one of the chief benefits of school uniforms is their ability to make schools safer. Studies have shown that they help to reduce gang influences. (Isaacson, 1998) Many gang members wear particular types of colors and clothes to signify their membership to a certain gang. With every student wearing the same articles of clothing, gang members will not be able to establish a rivalry within the school. Uniforms also minimize violence by reducing some sources of conflict. A Long Beach Superintendent stated the first year that the uniforms had been implemented into his school, crimes decreased by thirty-six percent, school violence by fifty-one percent, and vandalism to the school dropped eighteen percent. (US Dept. of Ed., 1996) Uniforms will also make it easier for trespassers to be identified. (Ryan & Cooper, 2000) These trespassers will stick out like a soar thumb because they will not have on a uniform like everyone else. Identifying and properly escorting the...

Thursday, October 24, 2019

Discuss the writers use of the supernatural Essay

The two stories resemble each other with the idea they communicate with the reader, that people should respect the supernatural. In the Withered Arm, Thomas Hardy develops why we should fear and respect the supernatural by showing that by mocking Gertrude about her medicines and counter curses, Farmer Lodge ended up with a dead son and a dead wife. He also ended up selling all his land because he could not endure staying in the village with everyone gossiping about him. Also by keeping the tempo of the story fast and building up to all the supernatural events keeps us tense. In the Monkey’s Paw, Sergeant Major Morris warns the White family about the consequences of the wishes the paw grants. However the White family do not take heed of the warning and take advantage of the paw and in doing so, they end up with their son dead, Mrs. White acting senselessly to try and bring back her son and Mr. White having to wish his son back to the grave. The author is trying to tell us that if you do not respect the supernatural and take advantage of it, you will feel its wrath. The two stories are alike in other ways. Both stories involve young innocent people suffering. In the Monkey’s Paw Herbert died for his family’s foolishness. Whilst in the Withered Arm it was Rhoda’s and Farmer Lodge’s son that was innocently sent to the gallows. Another similarity is that people that were selfish earlier on in the stories are punished in the end. Mr. White is self-seeking at the start of the Monkey’s Paw and does not take Sergeant Major Morris’ advice and his son dies as a result. In the Withered Arm Farmer Lodge is punished for his negligence shown to his son and his failure to accept the responsibility for his son. The consequence for this is the eventual hanging of his only son. Also both stories have ironic twists. In the Monkey’s Paw the family wishes for two hundred pounds and after the money doesn’t appear straight away, Herbert says â€Å"Well I don’t see the money, and I bet I never shall. † The wish eventually does come true and the money is handed over to the family but only as an insurance payout for Herbert’s death at the factory. So the irony is that Herbert will never actually see the money. In the Withered Arm the ironic twist is that when Gertrude was waiting for a hanging she got so desperate that she used to pray for a hanging â€Å"O Lord, hang some guilty or innocent person soon! † It turned out her prayers were answered but the man seen to be in the wrong turned out to be Farmer Lodges’ and Rhoda Brooks’ son but it seemed the boy was wrongfully charged with arson. At the hanging, Farmer Lodge and Rhoda were present in the crowd and once Gertrude had realized the hung man must be their son, she entered a sense of shock. This proved too much for her and she died. The irony is that she prayed for a man to be hung, so that she could cure herself but the man in the end was her husband’s son and this did the opposite of curing her and the shock of it all ended her life. In conclusion, the writers use the supernatural to show the reader that if you ridicule the supernatural, it will backfire on you and you will feel the consequences greatly. Also they try and make you scared of the supernatural by making the paranormal events happen to normal people. Meaning it could have been you instead.

Wednesday, October 23, 2019

An Encounter That Changed My Life Essay

It’s been three years since that ghastly night, it shaped me into what I am now, not being comfortable around the countless people in the street had become a part of me, from a simple walk from my work place to my house makes me unusually un-ease knowing that even though you might have done nothing wrong, there might be someone out to get you. Somebody should have told her, right at the beginning of her life, that she would die so young, so that she could live her life to the full and knowing that her life would end in an abrupt way, but watching it happen, right in front of me changed everything in my life, it changed how I felt about people and left me traumatized. Amy and I where co-workers at the same bank and it was a typical cold night in London. When we left the staff party the streets where already abandoned, looking at my watch, time had passed and it was already nearly 2 o’clock in the morning. Looking at the street the city lights stand out like a busy constellation of streets and houses, quiet but beautiful. It’s impossible to make sense of, except for the main strip which is a single mound of coloured, noisy light. I like that the lights don’t seem to get dimmer as they get farther away. They only get smaller and smaller until they slip behind the bends at the end of the road. It was a rare sight, even though I lived there, I had never admired the beauty of the muted main street and was lost in its marvel. Walking to my car, I almost didn’t realise I was there, lost in my own thoughts I had remained silent all throughout the walk, as if I was scared that I might have disturbed the city’s slumber. Read more:  A Book That Changed My Life I said bye to Amy as she got into her car, and I crossed the road and got into mine and put my seatbelt on and was ready to leave. Everything was still so silent but among the silence an approaching sound of a car that got louder and louder every second, I hadn’t given it any notice until I heard a piercing sound as it passed by Amy’s car, a bullet. Everything happened so quickly I didn’t even get a glimpse of the car; the one that passed had already left my sight. I looked at Amy’s car and the window was shattered and she was nowhere to be seen, I was so shocked my whole body started shaking and as I  fumbled with my seatbelt I opened my car door and rushed to her car, and there she lay, on both seats with blood dripping from her head I opened her car door with panicked hands and grabbed hers and checked for her pulse, and to my great dismay, I felt nothing but the shivers of my own hand. I started shouting but all of my efforts were to no avail. Everything I did to help was of no avail. Nothing worked. I rummaged in my pocket looking for my mobile phone and dialled 911 and explained everything and within minutes, the scene was covered by police officers and first aiders. I was still trembling as one of the police officers took me aside and asked me what happened and I explained in every detail to what had happened and he told me to go home and get some rest, but I knew trying to sleep will be futile. I knew that I wouldn’t sleep that night, nor several nights after that, I was distressed. It wasn’t until months later that they caught the killer and explained Amy’s tragedy to the world and the truth was bloodcurdling. The killer was nothing else than her stalker, he had never talked to Amy, neither did he have any reason to do so, he had once saw her and after that he had spent years researching her, for no reason at all, only that he was jealous of her in way’s only he understood. Everything was so terrifying, he had sites, all her private information and also pictures of Amy all stocked up in his flat. The stalker was so caught up to her he had desires to murder her. This was the horrible fact, Amy was dead and I saw it all unfold in front of my eyes and remained helpless to her death. This encounter had affected me in way’s I couldn’t even believe, for a whole year I was afraid of getting into my car again I was shell-shocked of what had happened. I still had sleepless nights, thinking about the whole scene over and over in my mind, always helpless and knowing that I did nothing to save her, a shadow of guilt lay on me for several months I blamed myself of what happened to Amy, trusting people had become harder for me, knowing that what happened to Amy can happen to myself, the event had left me babbled and everything just got harder and harder. The trauma got heavier and heavier on my shoulders including the guilt that I had given myself. This event showed me, how life can be taken away in a second even by a man who didn’t ever  speak to you. The truth was horrifying. Now, three years later, I started getting over the traumatic event but still everything had changed in me, always observing the crowds, always in fear of what might happen next knowing that all it takes is a bullet and death will follow. This encounter with this stalker had changed me and reformed me into a completely different man; this encounter completely changed my life.