Agent 13 Research Paper

Improved Essays
Did you know that Wonder Women was made of clay by her mother, and was brought to life by Greek gods? I want to be a superhero to fight crime and keep citizen’s safe. My superhero’s name is Agent 13, and I work all over the world to save people. I came up with the name Agent 13 because I wanted to be a spy and work worldwide to solve crime. I grew up watching Spiderman, and I wanted to be like him. For example, Spider man has abilities to fight crime and fly around the city. As a superhero, Agent 13 will have the abilities to fly, use x-ray vision, and super strength to move rocks.
Agent 13 remember using her abilities to fly across Asia on a top secret mission. Agent 13 top secret mission is to save a group of people missing in Susukino,

Related Documents

  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 922 Words
    • 4 Pages

    MidTerm Exam Question 1 Cloud computing is open space where you can place all our music and videos at one place. We can listen to the music, play video games and watch videos from anywhere and not necessarily connect to the computer. So, after turning off computer we can listen to music and watch videos through other device. Question 2 (c)…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It's now August and it's been roughly two months since Steve woke up from his frozen slumber, and his relationship with Agent Carter continues to grow and evolve. The their best to spend as much time with each other as they can, but Steve is now back in the Army serving under Colonel Phillips training the Howling Commandos and the Army Battalion Raiding Team or BRT at Camp Lehigh. In addition, the Strategic Science Reserve helps support logistics, intelligence, and technical expertise for the BRT they deploy to finish Hydra and any enemy they encounter. Although Camp Lehigh might be on the border of New Jersey and the state of New York, Steve always managed to make it to the city and spend time with Peggy when they are both off of work.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Superpowers or no super powers, a hero doesn’t always have to be a god-like person. A hero can be an everyday person just like you and me. Just like beowulf and Thor, a hero is someone who steps up when the time is right and does what needs to be done. Everyone has a different definition of a…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Sydney McMurray Mrs. Mihalik Honors English 9 1 December 2017 “Fight The Power” Seventy percent of the world’s population is made up of people of ethnicity. Caucasians are a minority when compared to the rest of the world. So why is it that groups of people speak out about “white supremacy”? The color of a person’s skin creates a fantastical division of power.…

    • 872 Words
    • 4 Pages
    Decent Essays