Skip to main content

An Exemplary College Application Essay

An Exemplary College Application Essay

----------------------------------------------------------------------------
3A. ESSAY:
IN ORDER FOR THE ADMISSIONS STAFF OF OUR COLLEGE TO GET TO KNOW YOU, THE
APPLICANT, BETTER, WE ASK THAT YOU ANSWER THE FOLLOWING QUESTION: ARE THERE
ANY SIGNIFICANT EXPERIENCES YOU HAVE HAD, OR ACCOMPLISHMENTS YOU HAVE
REALIZED, THAT HAVE HELPED TO DEFINE YOU AS A PERSON?
----------------------------------------------------------------------------
I am a dynamic figure, often seen scaling walls and crushing ice. I have
been known to remodel train stations on my lunch breaks, making them more
efficient in the area of heat retention. I translate ethnic slurs for Cuban
refugees, I write award-winning operas, I manage time efficiently.
Occasionally, I tread water for three days in a row.

I woo women with my sensuous and godlike trombone playing, I can pilot
bicycles up severe inclines with unflagging speed, and I cook Thirty Minute
Brownies in twenty minutes. I am an expert in stucco, a veteran in love, and
an outlaw in Peru.

Using only a hoe and a large glass of water, I once single-handedly defended
a small village in the Amazon Basin from a horde of ferocious army ants. I
play bluegrass cello, I was scouted by the Mets. I am the subject of
numerous documentaries. When I'm bored, I build large suspension bridges in
my yard. I enjoy urban hang gliding. On Wednesdays, after school, I repair
electrical appliances free of charge.

I am an abstract artist, a concrete analyst, and a ruthless bookie. Critics
worldwide swoon over my original line of corduroy evening wear. I don't
perspire. I am a private citizen, yet I receive fan mail. I have been caller
number nine and won the weekend passes. Last summer I toured New Jersey with
a traveling centrifugal-force demonstration. I bat .400. My deft floral
arrangements have earned me fame in international botany circles. Children
trust me.

I can hurl tennis rackets at small moving objects with deadly accuracy. I
once read Paradise Lost, Moby Dick, and David Copperfield in one day and
still had time to refurbish an entire dining room that evening. I know the
exact location of every food item in the supermarket. I have performed
covert operations for the CIA. I sleep once a week; when I do sleep, I sleep
in a chair. While on vacation in Canada, I successfully negotiated with a
group of terrorists who had seized a small bakery. The laws of physics do
not apply to me.

I balance, I weave, I dodge, I frolic, and my bills are all paid. On
weekends, to let off steam, I participate in full-contact origami. Years ago
I discovered the meaning of life but forgot to write it down. I have made
extraordinary four-course meals using only a Mouli and a toaster oven. I
breed prizewinning clams. I have won bullfights in San Juan, cliff-diving
competitions in Sri Lanka, and spelling bees at the Kremlin. I have played
Hamlet, I have performed open-heart surgery, and I have spoken with Elvis.

But I have not yet gone to college.

----------------------------------------------------------------------------
[From Harper's "This essay, by Hugh Gallagher, won first prize in the humor
category of the 1990 Scholastic Writing Awards. It appeared in the May issue
of Literary_Calvalcade, a magazine of contemporary fiction and student
writing published by Scholastic in NYC. Gallagher, who is 18, grew up in
Newtown Square, PA, and will attend NYU this fall."]
----------------------------------------------------------------------------

Comments

Popular posts from this blog

LinuxGuruz Netfilter IPTABLES Firewall Page

The Netfilter Project Homepage http://www.netfilter.org Source Code Userspace code (tar.bz2) http://www.netfilter.org/files/iptables-1.3.0.tar.bz2 FAQ Netfilter/Iptables FAQ http://netfilter.samba.org/documentation/FAQ/netfilter-faq.html Firewall Forensics (What am I seeing?) FAQ http://www.robertgraham.com/pubs/firewall-seen.html Network Intrusion Detection Systems - IDS http://www.robertgraham.com/pubs/network-intrusion-detection.html Sniffing (network wiretap, sniffer) FAQ http://www.robertgraham.com/pubs/sniffing-faq.html Linux IP Masquerade FAQ http://en.tldp.org/HOWTO/IP-Masquerade-HOWTO/ Firewall Admins Guide to Porn FAQ http://www.robertgraham.com/pubs/firewall-pr0n.html Hacking Lexicon - hacking dictionary http://www.robertgraham.com/pubs/hacking-dict.html Submit a FAQ Link or URL http://www.linuxguruz.com/iptables/#links Scripts Home LAN masquerading http://the-devil.dnsalias.net/home/extremist_MASQ Home LAN ip6t...

How to Address the Patching Paradox

Analyze your vulnerability response capabilities.  Assess vulnerability detection and patching capabilities to identify vulnerability response issues. Tackle low-hanging fruit first.  Prioritize minor vulnerability response problems and build a comprehensive vulnerability response strategy over time. Eliminate barriers between security and IT teams.  Combine vulnerability and IT configuration data into a single platform to drive collaboration between security and IT teams. Create end-to-end vulnerability response processes.  Develop vulnerability response processes and ensure that security and IT teams have a shared view of these processes. Retain security talent.  Remove internal barriers, optimize day-to-day processes and automate mundane work; by doing so, an organization can create a positive environment for security teams, increase employee satisfaction and boost the likelihood of retaining top security talent. Manual vulnerability response process...

mobile application Security Testing

Apps that enterprises develop themselves (or have developed by outsourcers) must be tested, to ensure they’re not leaking customer data or opening the enterprise to attack It’s cheaper and faster to test apps pre-production than it is after deployment Automated testing of mobile software is faster and more effective than manual testing Mobile applications interact with back-end web servers and services that also need to be tested That’s where AppScan® comes in What customers struggle with: Deploying secure mobile applications – both iOS and Android Static testing of mobile applications for security exposures, prior to deployment Inability to assess security of mobile applications developed by outsourcers Finding resources to test application code Understanding security risks of the mobile application environment Bringing together mobile application testing results with back-end web application and services resu...