Free Essay

Hggh

In: English and Literature

Submitted By clairyreys21
Words 356
Pages 2
Most if not all, I believe, are familiar with the saying, “All good things must come to an end.” Human nature would cause us to frown when something good finally ends. But I remember an author say, “Every ending is also a beginning. We just don’t know it at the time.” It is with great privilege, that I lead this turnover ceremony, filled not with sadness for the ending of my term, nor with regrets for the things I have failed to do in my position, but only hopeful of the next and many other generations of leaders to come. I would like to take this opportunity to thank my fellow students for entrusting me to your care. I thank the teachers for the utmost support and guidance for the past year. Surely, the successes of the student council government are not only to the merit of the members, but also to all of you. I understand that a year of leadership could never be enough to address every student’s concern. As I turnover this Key of Responsibility, I also am turning over the many student issues and concerns that I have failed to address before. Receive this key and do not deem this as a burden or a cross to carry, for leadership is a privilege of the few. But remember, that it is a privilege that will cause you hardships; it is not for the faint of heart. Contrary to what you may see, the real key of responsibility is intangible. It is not a mere prop to accessorize this program. Therefore, to the next leaders and members of the Student Council Government 2016-2017, take this key of responsibility with utmost commitment and dedication to serve. To all of my fellow students, I believe that you, as well, are receiving a key of responsibility – a responsibility to cooperate, and work with the council in directing and fulfilling its goals.
There is a reason why a mass of students is called a student body; and that’s because we all are entrusted with duties that will allow our school to animate and grow.…...

Similar Documents

Free Essay

Killing Lizards

...bnfg njn.k kjhnl;j ;lkj lkj lkj kjn jn jkhnk. j kmn kj lkj kjl klj klj nb yg gf jh jh jhb jh h jh kjhkjhk jhkjhkj kjhkhkjh hkh poi p ;ik p;i k jhjioj oipoi jh ij i p jjkio ok ;okjklj;lo o uiuj kj m mkj k l klk j jk l l kl kj j l k jk k jk jh gyf axw s c e rv fhg uj jk hk k lk lkl l ;/ ' ;'l j ;l ;ljk klj jh jkh g jkguygh jhg ghjk hggh jhg hg hg ikujl; jkl jkl lk jlk jklj mnm kn k k jkj jk j kj o jo jo j hjk hk k jhkj kj kj k jkj k k jk jk jk jk jk j kj kj k jk jk j kj kj kj k jk j kj kj k jjk j kj kj kj k jkj jjk j k jk jk j kj kj k j k jkk jk j kj kj jk k kj jk jk jk jk jk jk jk jk jk jk jk jk jk jk jk jk jkjk jk jk jk jk jkjk jk jk jkjk jkjkjk jjk jk jkjk jk jk jkjk jkjk jk jk jkjk jkjk kj kj kj jk kj jk jk jk jk jk jk jk jk jk jk jk jk jk jkk jjk jk jk jk j joi oi oi o io io io io io iouiuo ouoi ouioiuoiu oiu o iuoiu oiu oiu oi u oiuio uio u iou iou oiu iou iu oiu iou io u iou iu iou iu i io imo io o oio kll jkl k jkk j k ;l...

Words: 281 - Pages: 2

Premium Essay

Research

...fairly simple encryption technique. A monoalphabetic substitution-based cipher replaces a character or group of characters with a different character or group of characters. Consider the following simple example. Each letter in the plaintext row maps onto the letter below it in the ciphertext row. Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z Ciphertext: P O I U Y T R E W Q L K J H G F D S A M N Z V C X B This ciphertext simply corresponds to the letters on a keyboard, scanning right to left, top to bottom. To send a message using this encoding scheme, each plaintext letter of the message is replaced with the ciphertext character directly below it. Thus, the message how about lunch at noon would encode to EGVPO GNMKN HIEPM HGGH A space has been placed after every five ciphertext characters to help disguise obvious patterns. This example is monoalphabetic because one alphabetic string was used to encode the plaintext. It is a substitution-based cipher because one character of ciphertext was substituted for one character of plaintext. Polyalphabetic Substitution-Based Ciphers The polyalphabetic substitution-based cipher is similar to the monoalphabetic cipher, but it uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string. Possibly the earliest example of a polyalphabetic cipher is the Vigenère cipher, devised by Blaise de Vigenère in 1586. For the Vigenère cipher, a 26 × 26 matrix of characters is created, as shown in Table......

Words: 234459 - Pages: 938