• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Prisoner.

Extracts from this document...


THE PRISONER Bang! Bang! The person dropped to the floor like a stone, like he was top heavy the problem was he slid down the wall leaving a red mark or stripe down the middle of the wall as he fell. You may want to know why he was shot but that is too gory for me to tell to you in this story. O.K. O.K. I will tell you the story. It goes back to 1882 when the prisoner George Andrews escaped from a top secret prison in north west London (not very secret anymore huh) and Will and Data were called to recapture him. He escaped on 2nd April 1992 under mysterious circumstances and they were hot on the trail they had followed him to the East End of London. It was 10:30 in the morning and Will and Data were in their hotel room when they heard a shot in the street and so they rushed down the stairs. Then he came out into the street and there was a large crowd forming so will walked up to the crowd and saw a man on the floor so he walked up to him. He hesitated then he bent down and put his fingers on his neck and said data this is George Andrews and he's dead. ...read more.


We went barking up the wrong tree" he laughed "But he's dead" I exclaimed "No it was his brother who was shot" he answered. Then he pulled out an old newspaper cutting, which had the Andrews brothers in it, and they looked like two peas in a pod exactly identical. Then Will said "That's where I made the mistake and his brothers almost probably still alive and it was probably a fake death. So that he could rush off and out of the spotlight and I figured it out because of the bullet in the cigarette tin. I suppose that if I looked at the area where he was we would find another bullet in the wall. Why don't we go and see if my theory is correct? Come on then we are going to look at that wall. When we got there there was only a small crowd looking at the crime scene but not many people so Will bent down and walked under the crime scene banner. Then he began to examine the wall for the bullet. Then around ten minutes later he gave a cry of satisfaction as he pulled out a scalpel and began to cut the bullet out of the wall. ...read more.


When they got there they walked in and Will said "Computer carry on program" and went up to the door as the police officer kicked the door down. Then he turned around and said "Where is he" he was behind a box and was waiting with a gun when they walked in he shot up and said "Don't move or ill shoot" and walked around the room pointing it at them. Then Data pulled out a gun and shot him in the leg and he dropped to the floor and shot his gun and the bullet hit the mirror and it smashed into smithereens on the floor. Then the police officer rushed in and pulled out his handcuffs and handcuffed him up on the floor. When they had done this the police officer took him outside and put him in a car and drove off. Will and Data went back to their hotel and Will said "Computer end program" and went out of the holodeck and into the corridor of the ship. Then Will said "So when shall we do this again then?" and Data replied "Never that was hell next time well go canoeing or something that was boring". So Will went back up to the bridge and said "Data lay in a course for starbase 66 warp 3 engage" and that is where we leave them until the next time they get themselves into trouble. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    then carbon dioxide gas is let out of air vents in the ceiling of the computer rooms as each temperature sensor goes off to warn about a fire. This facility is turned off for routine fire alarms and is only activated when the temperature is way above normal body heat

  2. Signal Theory

    Advantages of using synchronous transmission are that lower overhead and more data can be transmitted and data transmission rates are also faster. The drawbacks of using synchronous transmission is obviously more prone to problems, it is more expensive and more complex.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    EDpw: TEdit; EDnewpw: TEdit; BTsave: TButton; BTclear: TButton; EDnewpw1: TEdit; Label1: TLabel; Label2: TLabel; Label3: TLabel; Label4: TLabel; BTclose: TButton; procedure BTsaveClick(Sender: TObject); procedure BTclearClick(Sender: TObject); procedure BTcloseClick(Sender: TObject); private { Private declarations } public { Public declarations } end; var FormPassword: TFormPassword; implementation {$R *.dfm} procedure TFormPassword.BTsaveClick(Sender: TObject); var

  2. Definition-nature of the problem solved - Car Mechanic business

    It is only secured in a locked draw with no insurance policy. The system requires a lot of time to create any backups. Investigation and Analysis Methods of Fact Finding Research into various methods of finding more about the current system have shown me that a one on one interview with the company owner would be the most beneficial.

  1. ICT Sample Work India Red

    What do you want the ICT solution to do? Tom would like the new solution which can produce orders using a electronic form and also the invoices can be printed out rather than hand-written. 5. Who will use the solution and what ICT skills do they have? Tom will use the solution, but is a very competent user of an ICT system.

  2. Flexible Architectures in Communication Security Application

    The protocol is used by web servers to establish secure HTTP connections. For very short sessions, fast public-key cipher processing is critical for high transaction throughput. For longer sessions, private-key cipher performance becomes more important. Figure 2 illustrates the SSL run-time breakdown by server processing type.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work