Saturday, May 23, 2020

Public Policies Of The Canadian Government - 1890 Words

Throughout Canadian history, a responsible government depended on the act of the nation working together to apply appropriate public policy. William Lyon Mackenzie King, the prime minister of Canada in the 1920s (and again in the 1930s) once said, â€Å"Where there is little or no public opinion, there is likely to be bad government, which sooner or later becomes autocratic government.† This is true even almost 100 years later. A democratic society operates in relation to the voices of the nation. The Canadian government consists of many sectors to enforce this particular style of policy making, including the House of Commons, the Senate, the Cabinet, and of course, the prime minister. Many citizens may argue that these important sectors of government are aspects reflecting true democracy. On the other hand, some citizens might argue that the prime minister has significant control over Parliament alone, sometimes without the need for other voices. Government responsibility lie s in the heart of the prime minister and can have significant control over different policy areas if he or she feels the need to do so. This often flies in the face of a democratic society. This paper will argue that the Prime Minister of Canada has too much power over Canadian public policy because he or she maintains party discipline, controls Cabinet ministers, and has power over what bills are passed in Parliament. These factors determine that the Prime Minister indeed continues to control governmentShow MoreRelatedPublic Policy Of Globalization On Canada Essay1692 Words   |  7 PagesPublic Policy of Globalization in Canada The government is what makes executive decision for the public policy. Society is influenced by our living and working conditions which shape health. The social determinants of heath shape material, psychosocial, and behavioral routes. However, stages of life like, genetics, early life, and cultural factors are some components that influence health. The Canadian welfare state shape public policies enhance the social determinants in Canada and the low qualityRead MoreRadio and Television Broadcasting in Canada1446 Words   |  6 Pagesregulatory policies. Radio and television broadcasting were at their infancy and no one knew how big this idea of instant, national connection would become. Soon after this, it became apparent that Canadians prominently turned their attention to American broadcasting and, in turn, overlooked their own. This piece of information sparked the birth of regulatory policies and the Canadian Broadcasting Act which would control percentages of original Canadian and foreign content to see to it that Canadians wouldRead MoreThe Responsibility Of The Right Holders1383 Words   |  6 PagesAboriginal People) and the duty-bearers (the Canadian government). Under s. 91(24) of the Constitution Act, 1967, the Canadian government has a fiduciary obligation to address First Nations safe drinking water. After years of pressure, the government proposed Bill S-11 in 2010 as a viable solution. Bill S-11 sought to address the issue of First Nations’ access to clean drinking water rights. Unfortunately, it was not passed. Recently, the Liberal government promised in its 2015 election campaign toRead MoreThe Problem Of Global Health1588 Words   |  7 PagesCanada is a developed country the government is not able to resolve problems that less-developed countries face in a short period of time. That being said, there are too many illnesses that do not originate in Canada and are coming from other countries, periods of disease influx are causing m ajor deficits to the health of Canadian citizens and causing monetary loss to the Canadian government due to the development of vaccinations and medications. In addition, many Canadian health organizations emphasizeRead MoreCanadas Multicultural Dynamic1357 Words   |  6 Pagespractices that have positively integrated into Canadian society ever since the government began to acknowledge diversity within the country. This paper will argue that multiculturalism represents a qualitatively better approach to ethnic diversity than did the Canadian immigration and cultural policies that preceded it. Restricted immigration and aboriginal assimilation negatively affect the larger picture of Canadian culture in comparison to public policy supporting multiculturalism. The idea of CanadaRead MoreThe Issues Of Canada s Telecommunications Industry1648 Words   |  7 Pagesservice quality. In doing so, the Canadian federal government has used these criticisms to their advantage in order to justify interventionist spectrum allocation policies and advocate for additional regulation of the wireless sector (Masse Beaudry, May 2014). In the fall of 2013, the government even took the unusual step of launching a $9 million ad campaign aimed at publicizing its efforts to support greater competition in the wireless sector and to convince the public of the need to intervene (NationalRead MoreCanada Public Policy Essay1665 Words   |  7 Pagesthe way in which public policy is crafted and applied in Canada. Factors such as policy paradigms, the government in power, and economic incentives greatly impact how public policy affects Canadians. However, an unexpected political actor shapes Canadian law in a more extrinsic and all-encompassing way and acts as a sor t of â€Å"unofficial† policy maker in government despite its role in the judicial court system: The Supreme Court of Canada. The Supreme Court of Canada is a public policy maker because itRead MoreThe Government of Canada and Multiculturalism Essay examples1670 Words   |  7 Pagesâ€Å"Multiculturalism† entered public speech in the late 1960s and early 1970s in Canada that focused on unique cultural diversity, nationalities, and ethnicity across the nation. Multiculturalism and Immigration are important factors in the development of Canada to attain a strong multicultural example of economic stability, social and political growth which leads to the emergence of Canada’s identity and culture. The artefact design indicates the deep understanding of Canadian Multiculturalism which helpsRead MoreThe National Of Public Policy1194 Words   |  5 PagesMoore, Turcotte, Winter and Walp, of the University of Calgary’s School of Public Policy, recently undertook a series of surveys of Canadian residents to establish baseline energy literacy levels in the general population and within the business and policy leader and Aboriginal-Canadian populations (Moore, Turcotte, Winter, 2012; 2014, Moore, Turcotte, Winter Walp, 2013). For the purposes of their study they defined energy literacy as â€Å"a term that reflects a composite of consumer’s values andRead More(1575)The Contradictions Of Profunc: An Analysis Of The1632 Words   |  7 Pagesanti-communist contradictions of the covert Canadian operation called PROFUNC (PROminent FUNCtionaries of the communist party. PROFUNC defines a major problem with the democratic process by secretly monitoring and spying on commun ist party affiliates living in Canada in the aftermath of WWII. This Cold War policy not only sought to monitor communist, but it also sought to intern them in the potential WWWIII scenario with the Soviet Union. This type of policy defines a form of authoritarian type of governance

Tuesday, May 12, 2020

How Technology Has The Quality Of Life Of Aging Adults

How can technology contribute to the quality of life of aging adults? Self-reliance, well-being, and staying in a familiar, comfortable environment; these tend to be the aims of a number of seniors. Through the application of science and technological innovations, such objectives can be accomplished. Technology has the power to transform lives, usually in ways that are beneficial, but occasionally is detrimental. Clearly, technological advancements in the last century or so have resulted in major enhancements in many aspects of our lives such as transportation, employment, healthcare, and recreational activities. On the other hand, such developments have led to increased dependence on technology, and technological failure could result in†¦show more content†¦These remedies can help in reducing the difficulties of daily routines, increase independence, improve safety and security for the elderly, as well as lower the burden on caregivers. Communication technologies are a critical way of ensuring that the elderly are safe and secure, by providing access to health care providers and caregivers. Along with medical needs for elderly people are the needs for social support. Recognition of the well-being of the elderly is vital to family members and those tasked with caring for them, who must be able to make decisions regarding the individual s capacity to live safely in their homes. Additionally, from the adult s point of view, communicating with friends and family members can help in reducing feelings of solitude and loneliness, which in turn leads to improved quality of life. Loneliness and depressive disorders are some of the major challenges that most older adults face, particularly those with disabilities (Singh Misra 2009, p. 3). Although the elderly appreciate their ability to be independent, growing health issues, lack of proper ways of transporting them, and the general lack of motivation will always lead to feelings of being isolated. Furthermore, the interaction between the elderly and their extended family members is always crucial to an older adult s safety and self-reliance. A comprehensive approach toShow MoreRelatedLate Adulthood and Death Paper1460 Words   |  6 Pagesthe life span development process one must understand late adulthood consists of. This paper will give a brief overview of ageism and stereotypes associate with late adulthood. This will explain how health and wellness techniques in the late adulthood stages can mitigate the negative effects of aging. As people age the social views and experiences changes in relationships a nd interactions with individuals, as he or she nears end of life. When closely approaching the end of life, a person has culturalRead MoreDisease Trends and the Delivery of Health Care Services Essay1457 Words   |  6 PagesAxia college 1/15/2012 Many health care professional have great concerns about the growth of the aging population, chronic disease and the epidemic of obesity, and how will the United States healthcare system prepared for this continuing epidemic. The fact that the aging population along with obesity epidemic is a global healthcare concern, many health cares’ professional is baffled about how to address the growing epidemic that many American’s will face. . According to the Centers for DiseaseRead MoreThe Population Of The United States1633 Words   |  7 Pagesconfronted with the challenge of preparing to meet the financial demands of a continually aging population. The proportion of the population aged 65 years and older is expected to increase from 12.4% in 2000 to 19.6% in 2030; this is an increase to about 72 million. The number of persons aged 80 years and older is expected to increase from 9.3 million in 2000 to 19.5 million in 2030. Also by 2030, older adults will account for roughly 20% of the U.S. population. By 2050, it is anticipated that AmericansRead More Technology and Older Adults Essay1746 Words   |  7 PagesTechnology and Older Adults It is commonly believed that older people are uncomfortable with new forms of technology and that they are more resistant to using technology than are younger people. This belief often places older people at a disadvantage, because designers fail to consider older people as a potential user group when designing technology, both software and hardware (Parsons, Terner, Kersley, 1994). Another misconception is that the elderly are unable to learn new skills. OlderRead MoreEssay on Late Adulthood1394 Words   |  6 PagesLate Adulthood Late adulthood is known as the period of life after middle adulthood, usually from around 65 years old to death (Santrock, 2013, p. 485). There are many varying stages of development and health in late adulthood, along with steady changing of life expectancy. Aging is a part of life, and with it comes changes in every area of living. Many diseases find late adulthood as an opportune time to affect people. Eventually, whether caused by disease or another reason, every individual diesRead MoreThe Aging Population On The Delivery Of Healthcare1225 Words   |  5 Pagesassociated with aging. Therefore, it is vital for healthcare professionals to understand the significance of the term â€Å"baby-boomers†. In fact, by the year 2030, one in five people will be over the age of 65 and in 2050, that number will be close to 90 million older adults, which is two times the number compared to 2010 (CDC, 2013). The aging population in America is just one of the nine forces that influence health care and nursing management. This paper will summarize the influence of the aging populationRead MoreFor the most part, I have to agree with the critical theorists: learning barriers do exist. In1400 Words   |  6 Pagesthe same positions as held by women. Wealthier families have the means to pay for quality educational experiences and have endless opportunities to continue educational learning opportunities. Demographic factors, such as age and sex can determine who qualifies for educational opportunities. While the government funds the education of our younger children, there is a limited amount of funding available for adults to advance their education. In their pursuit of the American dream, many less fortunateRead MoreImpact of the Aging Population on Healthcare1508 Words   |  7 Pagesfacility or a particular region. The rate at which our population is aging is one of the most demographic trends that will changes the face of the future workforce of healthcare. The demand for services and they type of services offered will change as well. The impact will be felt on a economic level across the board. †¢ If health care consumption patterns and physician productivity remained constant over time, the aging population would increase the demand for physicians per thousand populationRead MoreAssessment Of Gerontology Paper1364 Words   |  6 Pagesyears and older is 12% of the population, the life expectancy of 77.9 years has caused this increase. The older people over age 85 is at about 40%, and the number of centenarians is on the rise (Center for Disease Control and Prevention, 2015). Longer life expectancies will intensify the demand for competent geriatric nursing care to reduce the years in which function and health are impaired. It is exciting to see that quality geriatric nursing education has been integrated into the BSN program at FloridaRead MoreAging As A State Of Decline1428 Words   |  6 Pages1. In her speech, Jane Fonda spoke about aging and the effect that it can have on a person. Fonda talked about â€Å"Life’s Third act† or the last three decad es of a person’s life. Fonda explained that the advances in medicine and technology enabled the human race to live longer than before (Fonda, 2012). According to Fonda, humans are living on average, thirty years longer than past generations. The human life span has been extended and humans are spending a great deal of their lives in older age (Fonda

Wednesday, May 6, 2020

The Method of Teaching Conroy’s Used Free Essays

The â€Å"Water is Wide† takes place on the coast of South Carolina and Yamacraw Island during the nineteen sixties. A man by the name of Pat Conroy offers to teach over on the island, many people on the island have no education and are illiterate. When Conroy gets over to the island he finds himself very disgraceful. We will write a custom essay sample on The Method of Teaching Conroy’s Used or any similar topic only for you Order Now The teachers at the school believe that the children cannot be taught. His method of teaching is very different from others. One of Conroy†s goals was to teach the children about America. So he showed them movies and let them listen to American musicians. After doing this about every day, it made an influence in the children†s lives. Big C and Lincoln were the class clowns. They hated the principle because every time they did something bad she would beat them. During most of his time on the island, Conroy stayed with the Skimberry†s. The Skimberry†s were a nice couple named Zeke and Ida. When Halloween came around Conroy decided he wanted to take the children over to Bluffton, South Carolina, or Halloween so they could â€Å"trick or treat.† None of the kids even knew what â€Å"trick or treating† was. After making field trip forms and sending them home with all the children. The children came back with one of them signed. So Conroy went door to door asking begging each of the parents to let their children go. Throughout the story Pat Conroy took the children many places. Unfortunately Mrs. Brown and Ted Stone accused him of doing many wrong things. He was not able to return the next year. Even if Conroy did not teach the children anything, he still felt they would be able to survive in the outside world. I like this book. It made me very thankful that I have a good education. I also like the way Pat Conroy writes. In the future, I hope to read some of his other books. My favorite part of the book was when they would listen to the music of different artists, I also liked when they would play outside and he would tell about how they played so roughly. This was the best book I have read in a long time. The one part I did not really like was how it did not really tell when the story took place. I also did not like all the description. I think people of all ages should read this book. How to cite The Method of Teaching Conroy’s Used, Papers The Method of Teaching Conroy’s Used Free Essays The â€Å"Water is Wide† takes place on the coast of South Carolina and Yamacraw Island during the nineteen sixties. A man by the name of Pat Conroy offers to teach over on the island, many people on the island have no education and are illiterate. When Conroy gets over to the island he finds himself very disgraceful. We will write a custom essay sample on The Method of Teaching Conroy’s Used or any similar topic only for you Order Now The teachers at the school believe that the children cannot be taught. His method of teaching is very different from others. One of Conroy†s goals was to teach the children about America. So he showed them movies and let them listen to American musicians. After doing this about every day, it made an influence in the children†s lives. Big C and Lincoln were the class clowns. They hated the principle because every time they did something bad she would beat them. During most of his time on the island, Conroy stayed with the Skimberry†s. The Skimberry†s were a nice couple named Zeke and Ida. When Halloween came around Conroy decided he wanted to take the children over to Bluffton, South Carolina, or Halloween so they could â€Å"trick or treat.† None of the kids even knew what â€Å"trick or treating† was. After making field trip forms and sending them home with all the children. The children came back with one of them signed. So Conroy went door to door asking begging each of the parents to let their children go. Throughout the story Pat Conroy took the children many places. Unfortunately Mrs. Brown and Ted Stone accused him of doing many wrong things. He was not able to return the next year. Even if Conroy did not teach the children anything, he still felt they would be able to survive in the outside world. I like this book. It made me very thankful that I have a good education. I also like the way Pat Conroy writes. In the future, I hope to read some of his other books. My favorite part of the book was when they would listen to the music of different artists, I also liked when they would play outside and he would tell about how they played so roughly. This was the best book I have read in a long time. The one part I did not really like was how it did not really tell when the story took place. I also did not like all the description. I think people of all ages should read this book. How to cite The Method of Teaching Conroy’s Used, Papers

Saturday, May 2, 2020

File System Evolution

Question: Describe about the File System Evolution? Answer: Introduction Before the computers were developed in order to function the disk operating system, then each of the computers is built to run the application that has a complete as well as exclusive control of the entire machine (Ovsiannikov, 2013). The file system applications are managing the absolute locations of the data on the disk. As one application is running on the computer at a time, then the task is not difficult to do. The file system gives a single level of indirection among the applications as well as risks; therefore, the outcome is that each of the applications saw a file as a single nearby stream of bytes on the disk still when the file system stores the file in irregular sectors (Coronel Morris, 2016). This application tracks the absolute position of the data on the storage device. This research paper is based on the evolution of file system. As the file system is developed over the time with the restricted file system, therefore over time additional file system focuses on particular requirements such as allocation of data, accessing the remote file, distributed file, and parallel files. Therefore, the file system imposes on the structure on the address space of one or more physical devices. Problem Statement The problem statement is that the file systems produce near their limits; the performance for streaming does not see to balance linearly with the size as well as degrades with disintegration (Maeno et al., 2014). Due to scalable metadata in the file system model, a sustained large block performance does not matter. It is addressed by the evolution of the file system, which faces problem in the open source model. There is no such prior work to understand the development process of the file system in the Linux world (Agren et al., 2014). It is difficult to analyze the development process of Linux in order to understand the difficulties involved with it. As a result, the problems in the file system are introducing the same bugs within the file systems. The file system provides a single level of indirection among the applications as well as disks (Campana Atlas 2014). Therefore, the result is that each of the application sees a file as a single contiguous stream of bytes on the disk. Goal and Objectives of the Study The goal of this study is to identify the future use of file system to observe the changes in the complexity of the system. It is related to the metrics to the features as well as the stability of the file system. From this research paper, it is identified that only a few of the file system components are vital to getting right the first time. The objectives are: To identify the benefits of the file system modifications To understand the internal behavior of the file system evolution To identify the future use of file system Significance and Relevant of the Study As the system is growing in complexity, therefore there is a requirement of techniques as well as approaches that enable the users to understand the operation process of a system (Aghaei, Nematbakhsh Farsani, 2012). The researcher creates and introduces semantic follow playback (STP) that empowers the assessment of new imaginative thoughts into the record framework. The pieces inside of the record framework are gatherings of divisions, which will streamline the tending to of capacity. Modern file systems are using a block size of from 1 up to 128 sectors (Rembar, 2015). The files are stored from the creation of the block as well as take the entire blocks. In addition to this, the user files the file system, which stores the parameters such as the size of the block and descriptions of the file such as file location, size, and fragments. It makes the computer faster to restart, as the operating system is not able to scan, the entire file system in order to find out if anything is out of synchronization (Podos Patek, 2014). The file system stores information related to security, information as well as extended attributes. The clear plan characterizes the different components of the examination theme and its effect on utilizing huge information for evaluation of file management system. An accumulation of the pertinent and significant information and data from dependable and substantial source helps in leading the exploration in the right way Review on File System Evolution Architecture of File System The file system has evolved largely during the last two decades. Rembar, (2015) The evaluation has started from local file system, but now a day, the additional file system has also come in front in the computerized world to share crucial data and information, to access remote files and to distribute information over the network channel. Siewiorek and Swarz (2014) stated that architectural compliments of the file system has their significances and run the whole network system effectively and efficiently. The file system has several command lines such as ls (List files), mv (move files), rm (remove files), cp (copy files) uses to transfer the control of computers for users. In the architecture of file system, a layer called kernel space which is used for privileged access (Barroso, Clidaras Holzle, 2013). Inter-process communication mechanism allows communicating the file system with another file system using segmented memory. Schedule section of this files system schedules the timel ine for tasks and multi tasking processes to run these files in proper operating system platform. Figure 1: Architecture of Files System (Source: Verissimo Rodrigues, 2012, pp-100) Enck (2014) mentioned that Local file system is located with the co-ordination of single server applications. The crucial data and files are either connected to the server or data and can be accessed by the accessing of storage area network, channel. On the other hand, Campana and Atlas (2014) opined that shared file system is very useful in the data and information sharing aspect through different servers with different running applications. The shared storage device of this system helps to store all the important data and information for business purposes can be shared with multiple devices simultaneously. Vrable, Savage and Voelker (2012) addressed the major part of shared file system called cluster file system, which allows accessing data and information for user purposes. It is a peer-to-peer structure where users know about the logical arrangement of the file system. File system communication is done between the server and client directly. The most useful part of network file s ystem is the client server distributed system where the important files are served across the entire network servers, and each of those files is segmented into small sections, which help to extract important data and information from those files. Features of File System The key features of this file system are described in the following sections Volume Management: According to Feitelson (2015) the above mentioned file system support both Robin round access and striped access. The master architectural configuration and parameters allow these file systems to identify the relationships between computerized devices and its controls. This feature allows passing the input-output requests over the driver interfaces. Support for Direct I/O and Paged: Ovsiannikov (2013) discovered that file systems support two kinds of input-output features, one is paged input-output, and other is direct input-output. Paged input-output facilities catch the users' data in virtual memory space, and the kernel layer writes the data to a disk (Wen et al., 2014). On the other hand, direct input-output features help to write users data directly from the memory to disk. By the use of these features, users can realize the performance improvements of large block and aligned input-output. High Capacity: The architectural components of the file system and coding data present in it can be extracted from any devices or disks. As the processing application of file system is 64 addressing system can manage more than 252 devices at a time. This high capacity feature and processing operation can easily recover the files from an unscheduled outage (Agarwal et al., 2015). These kinds of file system do not require a file checking system to repair its inconsistencies, as it uses journaling process. The journaling process recovers the files dynamically by the use of serial writes, identification records and error checking system for all the critical and crucial input-output operations. Operation of File System The main function of these file system is to control the data storage and retrieval process for a network system operations. If there is no file system, information could not be extracted from the large body of the database system (Rezaei Muntz, 2014). By the use of kernel space mechanism, data can be divided into several sections, so that important information can be extracted for user purposes. Methodology The most significant chapter of this particular research paper is the Research Methodology. Following a particular research methodology, assists in having a transparent view of the research topic file system management (Agren et al., 2014). The usage of a proper procedure helps in getting more profound information, and better examination of the information gathered. In this specific research, the experts have connected the different natty determined strategy of the viewpoint to comprehend the entire scenario of the file system management in the operating system. Here the researcher discussing the file management system there are many terms for referring too many concepts, and so it is necessary to know the methodology of the file system (Yang et al., 2014). The fundamental reason for PCs is to make, control, store, and recover information. A file framework gives the hardware to encourage these activities. At the most abnormal amount, a file framework is an approach to composing, store, recover, and oversee data on a changeless stockpiling medium, for example, a circle (Agarwal et al., 2015). File frameworks manage unchanging capacity and structure an indispensable part of every single working framework (He et al., 2014). There are many methodologies to perform a file management process in a computer. At the other hand, the ranges are persistent item stores and object-situated databases conceptual the entire idea of lasting stockpiling so that the client and developer never at any point should know about it. Apart from that, the researcher id entifies all approach of a file system how it store and evaluation that furthermore reduces the chances of error. The scientists have picked Deductive Approach to use of hypothetical learning in the down to mechanical earth field while directing the examination. With the assistance of deductive methodology, the specialist can comprehend the best possible way or a way for doing the examination (Siewiorek, Swarz, 2014). In addition, the choice of Explanatory Research Design bolsters the longitudinal normal for the exploration. The clear plan characterizes the different components of the examination theme and its effect on utilizing huge information for evaluation of file management system. An accumulation of the pertinent and significant information and data from dependable and substantial source helps in leading the exploration in the right way (Barroso, Clidaras Holzle, 2013). The information gathered permits better entrance and comprehension the extent of the exploration. For the investigation of this specific research, the specialist has picked the individual meeting and online review as the essential information-gathering source. The data in regards to the medicinal advancements and innovation is gathered from web and diary is considered as optional information accumulation source (Verissimo Rodrigues, 2012). Furthermore, the writing audit is additionally considered as the optional information for the examination. The subjective information gathered gives hypothetical move down to the examination methodology while the quantitative information gathered presents the factual result of the investigation (Enck et al., 2014). In this research, the primary data collected from many researchers and this data are studies will be considered for the implementation of a new file system Summary Within the computing, the file system is a technique that is used to store as well as systematize the computer files as well as the data that contain in order to make easy access to them. The file system uses a storage device like the hard disk and CD-ROM (Campana Atlas 2014). It engages maintaining of the physical location of the files so that it may be virtual as well as exit the access model for the virtual data over the network. A bunch of developers implements the file system before it gets included in the Linux (Vrable, Savage Voelker, 2012). Each of the file systems has its list of mailings. Currently, they are tracked through emails, which is inefficient. This particular chapter is used to describe the several research tools and selection methods to analyze the particular topic with better explanations. With the use of this chapter, the researcher will collect reliable and valid data from primary and secondary sources. After the collection of data, proper data analysis technique has been adopted to analyze the data in order to channelize them inside the research proposal for better evaluation and explanation (He et al., 2014). These research tools and techniques are very useful to analyze and throw a better light on the on the file system evaluation. The shared storage device of this system helps to store all the important data and information for business purposes can be shared with multiple devices simultaneously. Conclusion It is concluded from the research is that files are made up of blocks and the blocks are made up of bits as well as bytes. The metadata structure of the file system is responsible in order to provide semantics for the blocks. The extensions, as well as enrichment of the files with increasing amounts of metadata as well as information, are such that they become autonomous. In the future traditional file system, as well as the file system, manages the objects, which will co-exist as well as complement each other. The document framework applications are dealing with the outright areas of the information on the circle. As one application is running on the PC at once, then the errand is not hard to do. It is seen that the file system needs to keep track of the bits that are required to make the file itself where they are placed logically in the hard drive. It also stores information about the file. The most significant thing is that it also stores the name of the file as because without t he file name, it is vital to choose the file again. Finally, the file system worries about the metadata. Future Work The future exploration of this paper is that the working framework has developed, and it has more elements, which are added to the document framework (Rezaei Muntz, 2014). More information alternatives are added to the record framework, for example, change, the capacity to list documents for speedier explores the new capacity of plans that will diminish the document fracture and strong capacity to redress. The greatest advances in the document framework keep a log of changes that the PC is made to each of the records. On the off chance that the PC crashes and the force go out all through the operation of a document, then it checks the log and completes the operation rapidly without ruining the record (Mohammad, Mcheick Grant, 2014). It makes the PC quicker to restart, as the working framework does not ready to check, the whole document framework with a specific end goal to see whether anything is out of synchronization. References Agarwal, S., Pape, L. E., Dagli, C. H., Ergin, N. K., Enke, D., Gosavi, A., ... Gottapu, R. D. (2015). Flexible and Intelligent Learning Architectures for SoS (FILA-SoS): Architectural Evolution in Systems-of-Systems. Procedia Computer Science, 44, 76-85. Aghaei, S., Nematbakhsh, M. A., Farsani, H. K. (2012). Evolution of the world wide web: From WEB 1.0 TO WEB 4.0. International Journal of Web Semantic Technology, 3(1), 1. Agren, J. A., Wang, W., Koenig, D., Neuffer, B., Weigel, D., Wright, S. I. (2014). Mating system shifts and transposable element evolution in the plant genus Capsella. BMC genomics, 15(1), 602. Barroso, L. A., Clidaras, J., Hlzle, U. (2013). The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis lectures on computer architecture, 8(3), 1-154. Campana, S., Atlas Collaboration. (2014). Evolution of the ATLAS distributed computing system during the LHC long shutdown. In Journal of Physics: Conference Series (Vol. 513, No. 3, p. 032016). IOP Publishing. Chang, B., Wang, Z., Chen, B., Zhang, F. (2015, December). MobiPluto: File System Friendly Deniable Storage for Mobile Devices. In Proceedings of the 31st Annual Computer Security Applications Conference (pp. 381-390). ACM. Chen, M., Mao, S., Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171-209. Coronel, C., Morris, S. (2016). Database Systems: Design, Implementation, Management. Cengage Learning. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 5. Faibish, S., Bent, J. M., Tzelnic, P., Grider, G., Zhang, J. (2014). U.S. Patent No. 8,825,652. Washington, DC: U.S. Patent and Trademark Office. Feitelson, D. G. (2015). Workload modeling for computer systems performance evaluation. Cambridge University Press. Giampaolo, D. B., Cisler, P., Weiss, E., McIntyre, K. A. (2015). U.S. Patent No. 8,984,029. Washington, DC: U.S. Patent and Trademark Office. Gross, D., Nicolaou, C. (2013). U.S. Patent No. 8,560,579. Washington, DC: U.S. Patent and Trademark Office. He, J. Y., Liu, W. H., Wang, H., Wu, Y., Liu, X. J., Nieh, T. G., Lu, Z. P. (2014). Effects of Al addition on structural evolution and tensile properties of the FeCoNiCrMn high-entropy alloy system. Acta Materialia, 62, 105-113. Lucas, W. J., Groover, A., Lichtenberger, R., Furuta, K., Yadav, S. R., Helariutta, Y., ... Patrick, J. W. (2013). The Plant Vascular System: Evolution, Development and FunctionsF. Journal of Integrative Plant Biology, 55(4), 294-388. Maeno, T., De, K., Klimentov, A., Nilsson, P., Oleynik, D., Panitkin, S., ... Yu, D. (2014). Evolution of the ATLAS PanDA workload management system for exascale computational science. In Journal of Physics: Conference Series (Vol. 513, No. 3, p. 032062). IOP Publishing. Mashtizadeh, A. J., Bittau, A., Huang, Y. F., Mazieres, D. (2013, November). Replication, history, and grafting in the ori file system. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (pp. 151-166). ACM. Mohammad, A., Mcheick, H., Grant, E. (2014, September). Big data architecture evolution: 2014 and beyond. In Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications (pp. 139-144). ACM. Ovsiannikov, M., Rus, S., Reeves, D., Sutter, P., Rao, S., Kelly, J. (2013). The quantcast file system. Proceedings of the VLDB Endowment, 6(11), 1092-1101. Podos, J., Patek, S. N. (2014). Acoustic Signal Evolution: Biomechanics, Size, and Performance. Animal Signaling and Function: An Integrative Approach, 175-203. Rembar, C. (2015). The law of the land: The evolution of our legal system. Open Road Media. Rezaei, B. A., Muntz, A. H. Y. M. (2013). U.S. Patent No. 8,380,721. Washington, DC: U.S. Patent and Trademark Office. Siewiorek, D., Swarz, R. (2014). Reliable Computer Systems: Design and Evaluatuion. Digital Press. Stefanov, E., van Dijk, M., Juels, A., Oprea, A. (2012, December). Iris: A scalable cloud file system with efficient integrity checks. In Proceedings of the 28th Annual Computer Security Applications Conference (pp. 229-238). ACM. Ting, D. P., Vahalia, U. K., Hilliar, J. A., Gupta, U. (2013). U.S. Patent No. 8,417,788. Washington, DC: U.S. Patent and Trademark Office. Verissimo, P., Rodrigues, L. (2012). Distributed systems for system architects (Vol. 1). Springer Science Business Media. Vrable, M., Savage, S., Voelker, G. M. (2012, February). Bluesky: A cloud-backed file system for the enterprise. In Proceedings of the 10th USENIX conference on File and Storage Technologies (pp. 19-19). USENIX Association. Warren, I. (2012). The renaissance of legacy systems: method support for software-system evolution. Springer Science Business Media. Wen, J., Liu, W. H. E., Arons, P. L., Pandey, S. K. (2014). Evolution Pathway Towards Wide Area Monitoring and ProtectionA Real-World Implementation of Centralized RAS System. Smart Grid, IEEE Transactions on, 5(3), 1506-1513. Yang, H. M., Song, X. L., Yang, T. L., Liang, Z. H., Fan, C. M., Hao, X. G. (2014). Electrochemical synthesis of flower shaped morphology MOFs in an ionic liquid system and their electrocatalytic application to the hydrogen evolution reaction. RSC Advances, 4(30), 15720-15726. Significance and Relevant of the Study