SlideShare uma empresa Scribd logo
1 de 3
Mock Crisis Scenario Timeline
Time Event Description Image
9:30am
A disgruntled student that
is supposed to be on
suspension attempts to
enter the building.
Unbeknownst to security
he is in possession of a
firearm.
9:32am
The student bypasses the
main office and is
approached by the building
officer. The officer
attempts to question the
student’s presence in the
building and the student
proceeds to pull his gun on
the officer and shoot him.
9:33am
The principal watching
on surveillance camera
from his office notifies
the assistant principal
of the situation via
walkie-talkie. Then
immediately calls the
police.
9:34am
Meanwhile, the
assistant principal
radios all security
personnel in the
building so they can be
on alert. Next he issues
a code gray (building
lockdown).
9:35am
Security begins to
organize themselves
and begin ushering
student out of hallways,
bathrooms, and public
areas.
9:37am
All faculty and staff get
into lock down stance
and wait for instruction
via the PA system. All
hallways are cleared.
9:45am
Police arrive on the
scene and begin to enter
the building.
9:47am
Police occupy the
building and begin
down the halls in search
of the shooter.
10:30a
m
Police are able to
apprehend the shooter
and escort him out of
the building and into
police custody.
10:45a
m
Police begin to secure
the scene so that
students and faculty can
vacate the building.
10:50a
m
Emergency workers on
standby bring out the
wounded officer and 10
other shooting victims.
11:25a
m
Distraught students and
faculty are permitted to
exit the building next.
11:30a
m
Families arrive to meet
with their children.
Scenario Written by Melissa Winfield
Pictures provided by Google Images (various sources)

Mais conteúdo relacionado

Mais procurados

Pelaksanaan pengajaran mikro 2
Pelaksanaan pengajaran mikro 2Pelaksanaan pengajaran mikro 2
Pelaksanaan pengajaran mikro 2Nadwah Khalid
 
Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)
Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)
Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)Mohd Fauzi
 
Strategi,pendekatan, kaedah dan teknik
Strategi,pendekatan, kaedah dan teknikStrategi,pendekatan, kaedah dan teknik
Strategi,pendekatan, kaedah dan teknikAfiqah Nooh
 
PELAN STRATEGIK PEMBANGUNAN HOKI.pptx
PELAN STRATEGIK PEMBANGUNAN HOKI.pptxPELAN STRATEGIK PEMBANGUNAN HOKI.pptx
PELAN STRATEGIK PEMBANGUNAN HOKI.pptxRAFIZAHHANIMBINTIRAM
 
PENTAKSIRAN TENTANG PEMBELAJARAN
PENTAKSIRAN TENTANG PEMBELAJARANPENTAKSIRAN TENTANG PEMBELAJARAN
PENTAKSIRAN TENTANG PEMBELAJARANAmiraSuhaimi6
 
Peraturan 170 lari berganti
Peraturan 170 lari berganti Peraturan 170 lari berganti
Peraturan 170 lari berganti dila teen
 
10 upsi qss4013 keselamatan.ppt
10 upsi qss4013 keselamatan.ppt10 upsi qss4013 keselamatan.ppt
10 upsi qss4013 keselamatan.pptMuhamad Samsudin
 
DSKP BAHASA INGGERIS TAHUN 2
DSKP BAHASA INGGERIS TAHUN 2DSKP BAHASA INGGERIS TAHUN 2
DSKP BAHASA INGGERIS TAHUN 2zerat88
 
RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)
RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)
RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)ArifahAzlanShah2
 
Latihan 2 teori atribusi
Latihan 2    teori  atribusiLatihan 2    teori  atribusi
Latihan 2 teori atribusiannaliew
 
contoh buku Laporan perhimpunan mingguan
contoh buku Laporan perhimpunan mingguancontoh buku Laporan perhimpunan mingguan
contoh buku Laporan perhimpunan mingguanMarina Masdar
 
5.4.3 demonstrasi
5.4.3 demonstrasi5.4.3 demonstrasi
5.4.3 demonstrasiFarah Husna
 
PJ T2 KSSM Unit 1 Gimnastik Asas.pptx
PJ T2 KSSM Unit 1 Gimnastik Asas.pptxPJ T2 KSSM Unit 1 Gimnastik Asas.pptx
PJ T2 KSSM Unit 1 Gimnastik Asas.pptxssuser29d910
 
Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...
Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...
Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...digitalsejarah
 

Mais procurados (19)

Kemahiran sosial
Kemahiran sosialKemahiran sosial
Kemahiran sosial
 
Pelaksanaan pengajaran mikro 2
Pelaksanaan pengajaran mikro 2Pelaksanaan pengajaran mikro 2
Pelaksanaan pengajaran mikro 2
 
Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)
Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)
Penjelasan pelanggaran terma kontrak perkhidmatan kawalan & keselamatan (pkk)
 
Strategi,pendekatan, kaedah dan teknik
Strategi,pendekatan, kaedah dan teknikStrategi,pendekatan, kaedah dan teknik
Strategi,pendekatan, kaedah dan teknik
 
PELAN STRATEGIK PEMBANGUNAN HOKI.pptx
PELAN STRATEGIK PEMBANGUNAN HOKI.pptxPELAN STRATEGIK PEMBANGUNAN HOKI.pptx
PELAN STRATEGIK PEMBANGUNAN HOKI.pptx
 
PBD.pdf
PBD.pdfPBD.pdf
PBD.pdf
 
PENTAKSIRAN TENTANG PEMBELAJARAN
PENTAKSIRAN TENTANG PEMBELAJARANPENTAKSIRAN TENTANG PEMBELAJARAN
PENTAKSIRAN TENTANG PEMBELAJARAN
 
Peraturan 170 lari berganti
Peraturan 170 lari berganti Peraturan 170 lari berganti
Peraturan 170 lari berganti
 
10 upsi qss4013 keselamatan.ppt
10 upsi qss4013 keselamatan.ppt10 upsi qss4013 keselamatan.ppt
10 upsi qss4013 keselamatan.ppt
 
DSKP BAHASA INGGERIS TAHUN 2
DSKP BAHASA INGGERIS TAHUN 2DSKP BAHASA INGGERIS TAHUN 2
DSKP BAHASA INGGERIS TAHUN 2
 
10 unit 6
10 unit 610 unit 6
10 unit 6
 
RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)
RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)
RPH Bahasa Melayu Tahun 4 (Tema Sains, Teknologi & Inovasi)
 
Latihan 2 teori atribusi
Latihan 2    teori  atribusiLatihan 2    teori  atribusi
Latihan 2 teori atribusi
 
contoh buku Laporan perhimpunan mingguan
contoh buku Laporan perhimpunan mingguancontoh buku Laporan perhimpunan mingguan
contoh buku Laporan perhimpunan mingguan
 
teori pembelajaran
teori pembelajaranteori pembelajaran
teori pembelajaran
 
5.4.3 demonstrasi
5.4.3 demonstrasi5.4.3 demonstrasi
5.4.3 demonstrasi
 
PJ T2 KSSM Unit 1 Gimnastik Asas.pptx
PJ T2 KSSM Unit 1 Gimnastik Asas.pptxPJ T2 KSSM Unit 1 Gimnastik Asas.pptx
PJ T2 KSSM Unit 1 Gimnastik Asas.pptx
 
Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...
Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...
Pengajaran dan pembelajaran Sejarah menggunakan pendekatan web-based: Geograp...
 
Modul kedap membaca edit
Modul kedap membaca editModul kedap membaca edit
Modul kedap membaca edit
 

Destaque

Crisis Communications_Plans and Exercises
Crisis Communications_Plans and ExercisesCrisis Communications_Plans and Exercises
Crisis Communications_Plans and ExercisesReginaPhelps
 
Crisis Communication Simulation Exercise [Freberg]
Crisis Communication Simulation Exercise [Freberg]Crisis Communication Simulation Exercise [Freberg]
Crisis Communication Simulation Exercise [Freberg]Karen Freberg
 
Crisis Communication Workshop september 12th 2014
Crisis Communication Workshop september 12th 2014Crisis Communication Workshop september 12th 2014
Crisis Communication Workshop september 12th 2014Mikkel Zangenberg
 
Crisis Communications Planning
Crisis Communications PlanningCrisis Communications Planning
Crisis Communications PlanningTippingPointPR
 
Inventing strategies Using CRISIS GAMING
Inventing strategies Using CRISIS GAMINGInventing strategies Using CRISIS GAMING
Inventing strategies Using CRISIS GAMINGNavneet Bhushan
 
Deep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemDeep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemTUNE
 
Crisis Communication Plan
Crisis Communication PlanCrisis Communication Plan
Crisis Communication PlanBeth Wilson
 
How To Cultivate Brand Advocacy
How To Cultivate Brand AdvocacyHow To Cultivate Brand Advocacy
How To Cultivate Brand AdvocacyOgilvy Consulting
 
Crisis Management
Crisis Management Crisis Management
Crisis Management Brett Atwood
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Managementeuweben01
 
Crisis management - Types and Examples
Crisis management - Types and ExamplesCrisis management - Types and Examples
Crisis management - Types and ExamplesNupur Bhardwaj
 

Destaque (13)

Crisis Communications_Plans and Exercises
Crisis Communications_Plans and ExercisesCrisis Communications_Plans and Exercises
Crisis Communications_Plans and Exercises
 
Crisis Simulation Exercise
Crisis Simulation ExerciseCrisis Simulation Exercise
Crisis Simulation Exercise
 
Crisis Communication Simulation Exercise [Freberg]
Crisis Communication Simulation Exercise [Freberg]Crisis Communication Simulation Exercise [Freberg]
Crisis Communication Simulation Exercise [Freberg]
 
Crisis Communication Workshop september 12th 2014
Crisis Communication Workshop september 12th 2014Crisis Communication Workshop september 12th 2014
Crisis Communication Workshop september 12th 2014
 
Crisis Communications Planning
Crisis Communications PlanningCrisis Communications Planning
Crisis Communications Planning
 
Inventing strategies Using CRISIS GAMING
Inventing strategies Using CRISIS GAMINGInventing strategies Using CRISIS GAMING
Inventing strategies Using CRISIS GAMING
 
Deep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystemDeep linking - a fundamental change in the mobile app ecosystem
Deep linking - a fundamental change in the mobile app ecosystem
 
Crisis Communication Plan
Crisis Communication PlanCrisis Communication Plan
Crisis Communication Plan
 
How To Cultivate Brand Advocacy
How To Cultivate Brand AdvocacyHow To Cultivate Brand Advocacy
How To Cultivate Brand Advocacy
 
Crisis Management
Crisis Management Crisis Management
Crisis Management
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
Crisis management - Types and Examples
Crisis management - Types and ExamplesCrisis management - Types and Examples
Crisis management - Types and Examples
 
Bill Aulet GEC2016 keynote speech March 16 2016 Medellin Colombia
Bill Aulet GEC2016 keynote speech March 16 2016 Medellin ColombiaBill Aulet GEC2016 keynote speech March 16 2016 Medellin Colombia
Bill Aulet GEC2016 keynote speech March 16 2016 Medellin Colombia
 

Mais de mwinfield1

Real World Math (Packet for Home)
Real World Math (Packet for Home)Real World Math (Packet for Home)
Real World Math (Packet for Home)mwinfield1
 
Math tricks poster
Math tricks posterMath tricks poster
Math tricks postermwinfield1
 
Basic Math Skills Pre-Assessment
Basic Math Skills Pre-AssessmentBasic Math Skills Pre-Assessment
Basic Math Skills Pre-Assessmentmwinfield1
 
Race to... Lesson
Race to... LessonRace to... Lesson
Race to... Lessonmwinfield1
 
Technology in the math curriculum
Technology in the math curriculumTechnology in the math curriculum
Technology in the math curriculummwinfield1
 
Math test taking checklist
Math test taking checklistMath test taking checklist
Math test taking checklistmwinfield1
 
Multiplication strategies
Multiplication strategiesMultiplication strategies
Multiplication strategiesmwinfield1
 
Strategies for solving math word problems
Strategies for solving math word problemsStrategies for solving math word problems
Strategies for solving math word problemsmwinfield1
 
Study Memorization Skills
Study Memorization SkillsStudy Memorization Skills
Study Memorization Skillsmwinfield1
 
Behavior observation notes template
Behavior observation notes templateBehavior observation notes template
Behavior observation notes templatemwinfield1
 
Behavior report
Behavior reportBehavior report
Behavior reportmwinfield1
 
Place value match game
Place value match gamePlace value match game
Place value match gamemwinfield1
 
Cells Virtual Lab
Cells Virtual LabCells Virtual Lab
Cells Virtual Labmwinfield1
 
Cell Webquest Modified
Cell Webquest ModifiedCell Webquest Modified
Cell Webquest Modifiedmwinfield1
 
Student Tool Kit for Research Papers
Student Tool Kit for Research PapersStudent Tool Kit for Research Papers
Student Tool Kit for Research Papersmwinfield1
 
Technology in the classroom teaching in new creative ways
Technology in the classroom teaching in new creative waysTechnology in the classroom teaching in new creative ways
Technology in the classroom teaching in new creative waysmwinfield1
 
An overview of visual, auditory, and kinesthetic learners
An overview of visual, auditory, and kinesthetic learnersAn overview of visual, auditory, and kinesthetic learners
An overview of visual, auditory, and kinesthetic learnersmwinfield1
 
7 creative classroom organization ideas
7 creative classroom organization ideas7 creative classroom organization ideas
7 creative classroom organization ideasmwinfield1
 
Top 10 benefits of peer assisted learning
Top 10 benefits of peer assisted learningTop 10 benefits of peer assisted learning
Top 10 benefits of peer assisted learningmwinfield1
 

Mais de mwinfield1 (20)

Real World Math (Packet for Home)
Real World Math (Packet for Home)Real World Math (Packet for Home)
Real World Math (Packet for Home)
 
Math tricks poster
Math tricks posterMath tricks poster
Math tricks poster
 
Basic Math Skills Pre-Assessment
Basic Math Skills Pre-AssessmentBasic Math Skills Pre-Assessment
Basic Math Skills Pre-Assessment
 
Race to... Lesson
Race to... LessonRace to... Lesson
Race to... Lesson
 
Technology in the math curriculum
Technology in the math curriculumTechnology in the math curriculum
Technology in the math curriculum
 
Dyscalculia
DyscalculiaDyscalculia
Dyscalculia
 
Math test taking checklist
Math test taking checklistMath test taking checklist
Math test taking checklist
 
Multiplication strategies
Multiplication strategiesMultiplication strategies
Multiplication strategies
 
Strategies for solving math word problems
Strategies for solving math word problemsStrategies for solving math word problems
Strategies for solving math word problems
 
Study Memorization Skills
Study Memorization SkillsStudy Memorization Skills
Study Memorization Skills
 
Behavior observation notes template
Behavior observation notes templateBehavior observation notes template
Behavior observation notes template
 
Behavior report
Behavior reportBehavior report
Behavior report
 
Place value match game
Place value match gamePlace value match game
Place value match game
 
Cells Virtual Lab
Cells Virtual LabCells Virtual Lab
Cells Virtual Lab
 
Cell Webquest Modified
Cell Webquest ModifiedCell Webquest Modified
Cell Webquest Modified
 
Student Tool Kit for Research Papers
Student Tool Kit for Research PapersStudent Tool Kit for Research Papers
Student Tool Kit for Research Papers
 
Technology in the classroom teaching in new creative ways
Technology in the classroom teaching in new creative waysTechnology in the classroom teaching in new creative ways
Technology in the classroom teaching in new creative ways
 
An overview of visual, auditory, and kinesthetic learners
An overview of visual, auditory, and kinesthetic learnersAn overview of visual, auditory, and kinesthetic learners
An overview of visual, auditory, and kinesthetic learners
 
7 creative classroom organization ideas
7 creative classroom organization ideas7 creative classroom organization ideas
7 creative classroom organization ideas
 
Top 10 benefits of peer assisted learning
Top 10 benefits of peer assisted learningTop 10 benefits of peer assisted learning
Top 10 benefits of peer assisted learning
 

Último

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Último (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Mock crisis scenario timeline

  • 1. Mock Crisis Scenario Timeline Time Event Description Image 9:30am A disgruntled student that is supposed to be on suspension attempts to enter the building. Unbeknownst to security he is in possession of a firearm. 9:32am The student bypasses the main office and is approached by the building officer. The officer attempts to question the student’s presence in the building and the student proceeds to pull his gun on the officer and shoot him. 9:33am The principal watching on surveillance camera from his office notifies the assistant principal of the situation via walkie-talkie. Then immediately calls the police. 9:34am Meanwhile, the assistant principal radios all security personnel in the building so they can be on alert. Next he issues a code gray (building lockdown).
  • 2. 9:35am Security begins to organize themselves and begin ushering student out of hallways, bathrooms, and public areas. 9:37am All faculty and staff get into lock down stance and wait for instruction via the PA system. All hallways are cleared. 9:45am Police arrive on the scene and begin to enter the building. 9:47am Police occupy the building and begin down the halls in search of the shooter. 10:30a m Police are able to apprehend the shooter and escort him out of the building and into police custody.
  • 3. 10:45a m Police begin to secure the scene so that students and faculty can vacate the building. 10:50a m Emergency workers on standby bring out the wounded officer and 10 other shooting victims. 11:25a m Distraught students and faculty are permitted to exit the building next. 11:30a m Families arrive to meet with their children. Scenario Written by Melissa Winfield Pictures provided by Google Images (various sources)