SlideShare a Scribd company logo
1 of 7
Abel Escobedo
Abel Escobedo
Abel Escobedo
Abel Escobedo
Abel Escobedo
                Name of the Prisoners that were
                once in Manzanar when it was
                     being constructed.
This is a blade made out of Obsidian that was found near Cinder Hill and
       Fossil Falls. This is a prime example of a weapon that the Native
                                   Americans used.




   Abel Escobedo
Abel Escobedo




                Owens Valley follows
                through within these
                    mountains…

More Related Content

Viewers also liked

Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalCracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalSubrahmanyam KVJ
 
News paper review
News paper reviewNews paper review
News paper reviewjublegeorge
 
1 samuel 17b good response to a hateful brother
1 samuel 17b good response to a hateful brother1 samuel 17b good response to a hateful brother
1 samuel 17b good response to a hateful brotherGospel Baptist Tabernacle
 
Braskem day international business unit presentation - roberto ramos
Braskem day   international business unit presentation - roberto ramosBraskem day   international business unit presentation - roberto ramos
Braskem day international business unit presentation - roberto ramosBraskem_RI
 
February 10, 2011: Lunch on the Avenue XII @ Flamingo
February 10, 2011: Lunch on the Avenue XII @ Flamingo February 10, 2011: Lunch on the Avenue XII @ Flamingo
February 10, 2011: Lunch on the Avenue XII @ Flamingo Jmschwietz1
 
My trip to gibraltar.
My trip to gibraltar.My trip to gibraltar.
My trip to gibraltar.Chelo García
 
Nem artifact
Nem artifactNem artifact
Nem artifactpittus23
 
running windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorialrunning windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorial捷恩 蔡
 
Mallory presentation
Mallory presentationMallory presentation
Mallory presentationlnatiger
 
Presentación 4ºb viajandoconelcirco_2012_13
Presentación 4ºb viajandoconelcirco_2012_13Presentación 4ºb viajandoconelcirco_2012_13
Presentación 4ºb viajandoconelcirco_2012_13thankskiwi
 
How to make create financial planning process design 6 powerpoint presentatio...
How to make create financial planning process design 6 powerpoint presentatio...How to make create financial planning process design 6 powerpoint presentatio...
How to make create financial planning process design 6 powerpoint presentatio...SlideTeam.net
 
Cybermail Power Point
Cybermail Power PointCybermail Power Point
Cybermail Power PointRay_Higgins
 
Vermont EMS Ebola Virus Disease Education
Vermont EMS Ebola Virus Disease EducationVermont EMS Ebola Virus Disease Education
Vermont EMS Ebola Virus Disease Educationjlfreire
 

Viewers also liked (16)

Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalCracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
 
News paper review
News paper reviewNews paper review
News paper review
 
1 samuel 17b good response to a hateful brother
1 samuel 17b good response to a hateful brother1 samuel 17b good response to a hateful brother
1 samuel 17b good response to a hateful brother
 
Braskem day international business unit presentation - roberto ramos
Braskem day   international business unit presentation - roberto ramosBraskem day   international business unit presentation - roberto ramos
Braskem day international business unit presentation - roberto ramos
 
February 10, 2011: Lunch on the Avenue XII @ Flamingo
February 10, 2011: Lunch on the Avenue XII @ Flamingo February 10, 2011: Lunch on the Avenue XII @ Flamingo
February 10, 2011: Lunch on the Avenue XII @ Flamingo
 
My trip to gibraltar.
My trip to gibraltar.My trip to gibraltar.
My trip to gibraltar.
 
En20110404 3-2
En20110404 3-2En20110404 3-2
En20110404 3-2
 
Nem artifact
Nem artifactNem artifact
Nem artifact
 
running windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorialrunning windows 8.1 on VirtualBox tutorial
running windows 8.1 on VirtualBox tutorial
 
BSDCan2013
BSDCan2013BSDCan2013
BSDCan2013
 
Mallory presentation
Mallory presentationMallory presentation
Mallory presentation
 
Presentación 4ºb viajandoconelcirco_2012_13
Presentación 4ºb viajandoconelcirco_2012_13Presentación 4ºb viajandoconelcirco_2012_13
Presentación 4ºb viajandoconelcirco_2012_13
 
How to make create financial planning process design 6 powerpoint presentatio...
How to make create financial planning process design 6 powerpoint presentatio...How to make create financial planning process design 6 powerpoint presentatio...
How to make create financial planning process design 6 powerpoint presentatio...
 
Cybermail Power Point
Cybermail Power PointCybermail Power Point
Cybermail Power Point
 
Weekly news
Weekly newsWeekly news
Weekly news
 
Vermont EMS Ebola Virus Disease Education
Vermont EMS Ebola Virus Disease EducationVermont EMS Ebola Virus Disease Education
Vermont EMS Ebola Virus Disease Education
 

Recently uploaded

Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 

Recently uploaded (20)

Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

Field journal pt.4