What is college essay
Essay For Toefl Samples
Wednesday, August 26, 2020
Business Environment Fiscal Policy and Monetary Policy Essay Example
Business Environment Fiscal Policy and Monetary Policy Paper Financial Policy versus Fiscal Policy Financial Environment alludes to each one of those monetary components, which have a heading on the working of a business. Business relies upon the financial condition for all the required sources of info. It additionally relies upon the monetary condition to sell the completed merchandise. Normally, the reliance of business on the monetary condition is absolute and isn't astonishing on the grounds that, as it is properly stated, business is one unit of the complete economy. Monetary condition impacts the business by and large. It alludes to every one of those monetary variables which influence the working of a specialty unit. Reliance of business on financial condition is absolute - ? I. E. For information and furthermore to sell the completed merchandise. Prepared financial analysts providing the Macro monetary gauge and exploration are found in significant organizations in assembling, trade and money which demonstrate the significance of monetary condition in business. The accompanying components establish monetary condition of business: (an) Economic framework (b) Economic arranging (c) Industry (d) Agriculture (e) Infrastructure (f) financial segments (g) Removal of provincial uneven characters h) Price conveyance controls (I) Economic changes (j) Human asset and (k) Per capita pay and national salary The state turned into the encourager of reserve funds and furthermore a significant speculator and the proprietor of capital. Since the state was to be the essential operator of financial change, it followed that private area exercises must be carefully directed and controlled to comply with the goals of state strategy. We will compose a custom exposition test on Business Environment Fiscal Policy and Monetary Policy explicitly for you for just $16.38 $13.9/page Request now We will compose a custom article test on Business Environment Fiscal Policy and Monetary Policy explicitly for you FOR ONLY $16.38 $13.9/page Recruit Writer We will compose a custom article test on Business Environment Fiscal Policy and Monetary Policy explicitly for you FOR ONLY $16.38 $13.9/page Recruit Writer The development procedure additionally implied, in the early long stretches of arranging, an overall disregard Of open interests in horticulture. This carelessness Of farming division was implied by the general view that the expansion work in the creating nations must be invested in the business, and that during the beginning times of industrialization, it was fundamental for horticulture to contribute in the foundation of current industry by offering cheap work power. A quicker improvement of industry was the focal target of arranging. The above is a simple portrayal of the development technique followed by the organizers in the previous four decades. Monetary strategy might be characterized as a rationale under which the administration utilizes its consumption and income customized to deliver attractive impact stay away from bothersome impact on national salary, creation and joblessness. It accentuates the impact of government consumption and income upon absolute economy and contends that they ought to be utilized intentionally and deliberately as an adjusting element to make sure about monetary adjustment. Financial arrangement is the methods by which a legislature modifies its spending levels and expense rates to screen and impact a country s economy. It is the sister technique to fiscal approach through which national bank impacts a countries cash gracefully. These two arrangements are utilized in different blends to coordinate a countrys financial objectives. Gerhard Cool characterizes financial arrangement as the direct of government use, incomes and obligation the board so as to consider the impact of these activities in the allotment of assets and the progression of assets and subsequently their effect fair and square of pay costs business and creation. In the cutting edge government association the measures of open consumptions, incomes and open obligation are tremendous to such an extent, that they have weapon to accept a significant significance in the national economy. The ideal financial strategy can be sought after by budgetary estimates like tax assessment, use, open obligation and so forth. Job OF FISCAL POLICY He job of financial strategy in controlling the economy and shielding it from the ills of the market system were perceived gradually. Prior, governments were married to the conventional goals of sound budgetary arrangement of maintaining a strategic distance from deficiencies. Such an arrangement, in addition to other things, was causing to issues. One was as Keynes pointed the way that an endeavor to adjust the financial plan would put it to an unbalance and the other way around. The second was that through the procedure of adjusted spending multiplier, the financial plan was adding to the seriousness of repetitive variances. It was with incredible trouble that the propriety and convenience of the financial approach in battling the ills of the economy were perceived, particularly during the incomparable Depression of 1 backtalk. It was yielded that the administration had an essential obligation of helping the economy towards adjustment. As referenced before, the job of financial arrangement in advancing monetary soundness was perceived gradually, and not adequately till the Great Depression of 1 backtalk. In reality, as Keynes brought up ,the conventional sound budgetary arrangement of evading deficiencies itself contributed towards more prominent insecurity and made the errand of keeping the financial plan adjusted, even more troublesome. This actually, created an unreasonable arrangement with respect to the specialists, pushing the consumption and request in the economy down during a time of wretchedness and pushing them up during a blast. The advancement of the ideas of multiplier, and quickening agent and the connection between the large scale factors like venture, Income utilization and reserve funds empowered the financial aspects to imagine all the more obviously the sparkles of exchange cycles and the job which monetary strategy could play. This offered ascend to the standard of compensatory fund and utilitarian money. It was understood that through monetary arrangement , the legislature could generally, kill the destabilize developments in the economy. The general hypothetical ranch work was that a downturn is brought about by an insufficiency of powerful interest. Financial approach should cure it by expanding open consumption and by empowering private use; comparably during a blast period the need is to control the interest which again can be somewhat done fashioned shortening open use and gathering through checking the private use. HOW FISCAL POLICY WORKS? Financial approach depends on the speculations of British business analyst John Maynard Keynes. Otherwise called Keynesian financial matters, this hypothesis fundamentally expresses that legislatures can impact macroeconomic efficiency levels by expanding or diminishing assessment levels and open spending. This impact, thus, controls swelling (for the most part viewed as sound when between 2-3%), builds business and keeps up a solid estimation of cash. Monetary approach is critical to the economy. For instance, in 201 2 many stressed that the monetary bluff, a concurrent increment in charge rates and slices in government spending set to happen in January 2013, would send the U S. Economy back to downturn. The US. Congress stayed away from this issue by passing the American Taxpayer Relief Act of 2012 on Jan. 1, 2013. Exercise in careful control The thought, be that as it may, is to discover a harmony between changing expense rates and open spending. For instance, invigorating a stale economy by expanding spending or bringing down assessments risks making expansion rise. This is on the grounds that an expansion in the measure of cash in the economy, trailed by an expansion in purchaser request, can bring about a lessening in the estimation of cash implying that it would take more cash to purchase something that has not changed in esteem. Tees state that an economy has eased back down. Joblessness levels are up, shopper spending is down and organizations are not making significant benefits. An administration therefore chooses to fuel the economys motor by diminishing tax assessment, which gives buyers additionally going through cash, while expanding government spending through purchasing administrations from the market, (for example, building streets or schools). By paying for such administrations, the overspent makes occupations and wages that are thusly siphoned into the economy. Siphoning cash into the economy by diminishing tax collection and expanding government spending is otherwise called siphon preparing. Meanwhile, in general joblessness levels will fall. With more cash in the economy and less duties to pay, customer interest for merchandise and enterprises increments. This, thusly, revives organizations and diverts the cycle around from stale to dynamic. Assuming, be that as it may, there are no reins on this procedure, the expansion in financial efficiency can traverse an extremely barely recognizable difference and lead to an excessive amount of cash in the market. This overabundance in gracefully wrinkles the estimation of cash while pushing up costs (due to the expansion sought after for customer items). Thus, swelling surpasses the sensible level. Thus, adjusting the economy through financial arrangement alone can be a troublesome, if not unrealistic, intends to arrive at monetary objectives. If not firmly checked, the line between a profitable economy and one that is tainted by swelling can be effortlessly obscured. Furthermore, When the Economy Needs to Be Curbed . At the point when swelling is excessively solid, the economy may require a log jam. In such a circumstance, a legislature can utilize monetary arrangement to expand assessments to suck cash UT of the economy. Financial strategy could likewise direct an abatement in government going through and in this way decline the cash available for use. Obviously, the conceivable negative impacts of such an approach over the long haul could be a lazy economy and high joblessness levels. In any case, the procedure proceeds as the administration utilizes its monetary approach to calibrate spending and tax collection levels, with the objective of night out the business cycles. WHO DOES FISCAL POLICY AFFECT? Shockingly, the impacts of any monetary strategy are not the equivalent for everybody. Contingent upon the political or
Saturday, August 22, 2020
Asian Business - Case Study of Mitsui Essay Example | Topics and Well Written Essays - 500 words
Asian Business - Case Study of Mitsui - Essay Example The overarching strategy during that time was that items were specially made, and Mitsui resisted normal negotiating prudence by making items first and afterward selling them. Mitsuiââ¬â¢s beginning invasion into the banking and account industry came in the late seventeenth century. Moving cash between urban communities during that primitive time was amazingly unsafe, so Mitsui set up ââ¬Å"money exchangesâ⬠in Edo. Much like a crude antecedent to a Western Union, these foundations obliged the exchange of assets and diminished the measure of hazard engaged with the exchange( Shinjo, 1962 11) By 1876, the organization had set up Mitsui Bank, which was the nationââ¬â¢ first private bank. Approaching the mid twentieth century, the organization came to be known as one of the biggest zaibatsu in Japan. A conspicuous element of pre-World War II Japan, a zaibatsu can be inexactly characterized as ââ¬Å" a business element made out of a few differentiated undertakings possessed and only constrained by a solitary family ââ¬Å"( Morikawa, 1970:62) These ironclad imposing business models empowered the organization to be a focal business figure in pre-war Japan. Getting the pieces after the war, the remainders of the organizations from the destroyed Mitsui zaibatsu improved themselves into the alleged monetary marvels of the after war period, the keiretsu. Taking after what could be compared to a western combination, the changed business bunch was propelled with a capitalization of 195,000 yen and around 35 workers. Its attacks into outside exchange enormously encouraged the countryââ¬â¢s post-war financial resurrection. In the 1960ââ¬â¢s Mitsui exploited fast exchange advancement, and was effective in making sure about a steady gracefully of food, oil, and coal for residential utilize flowed through its abroad possessions. A venture into gaseous petrol assets in the 1970ââ¬â¢s protected the organization from the decadeââ¬â¢s oil emergency, and blunted the impacts of the overall financial downturn. (Mitsui,
Wednesday, August 19, 2020
d-d-d-d-drop date
d-d-d-d-drop date tl;dr: MIT lets you drop subjects basically at the end of the semester which is different and wonderful Oh, boy, I have been awake for many hours and in one more hour (its midnight rn) I will drive to Atlanta to attempt to fly back to Boston since essentially all of the flights out of my local airport were cancelled today and I have attendance-necessary, non-lecture classes to get to on Tuesday. This was my first year not staying in Cambridge for Thanksgiving, and I understand why now (so much work so little reliable plane). Turns out its really hard to revise that paper and do that pset when you have a puppy to play with. Thanksgiving plane tickets cost so much that I ended up skipping 3 days of classes just so that I could go home for less than a thousand dollars. The fried turkey was nice, though. The Wednesday that I missed was a really special day for MIT that we call Drop Date. November 21, 2018, marked the deadline to remove from your transcript any class in which you were currently enrolled. In the spring Baker House usually drops a piano off their roof to celebrate, but itâs too cold for that now. Whats so special about Drop Date? Maybe you completed a couple of midterms and a chunk of psets in a class and realized that its likely you wont pass or get the grade you want. Drop the class! Maybe you registered for like ten classes with the intention of only completing four. Drop the other five! Maybe you just want to stay at MIT forever and retake classes over and over. Drop all your classes!01 This is a joke. Please dont do this. Over the break, I was talking to my sister02 she goes to another university that recently lost the Iron Bowl about dropping classes, and she said that it sucks.03 this is true of most colleges You have a week or two to drop a class and it costs money. If you drop any later the class will show up on your transcript as a withdrawal, which looks a little ugly to grad schools and such. MIT is cool with you dropping classes 11 weeks into a 14-week semester. It will only show up on your internal transcript.04 the one that MIT keeps, not the one that gets sent to people In fact, it wonât even show up on your internal transcript if you drop before the fifth week of the semester. Perhaps best of all, it doesnât cost money. This probably has something to do with how at MIT you donât pay tuition based on the number of credit-hours you take. Everyone pays the same tuition, and you can take as many classes as you can feasibly absorb. Itâs great for nerds who want to study rockets and music and politics and physics. Since I love to extensively plan and schedule and scheme to maximize my fulfillment of institute requirements without overextending my goblin brain, Iâve sparingly taken advantage of this resource. Nevertheless, itâs nice to know itâs there if I need it (like a Who Wants to Be a Millionaire lifeline). Every post deserves pictures, so here are some precious moments from the past week. Enjoy! Post Tagged #drop date #Thanksgiving This is a joke. Please don't do this. back to text ? she goes to another university that recently lost the Iron Bowl back to text ? this is true of most colleges back to text ? the one that MIT keeps, not the one that gets sent to people back to text ?
Sunday, May 24, 2020
Isolation And Of Mice And Men By James Joyce - 2480 Words
Explore the ways in which the theme of isolation is presented in Dubliners and Of Mice and Men. Isolation - a complete, or near-complete lack of contact with people or society. People can either ostracise you, deliberately shunning you out, which is mainly the type which can be found in the books which we have studied, or it can be very accidental. From The Dubliners, a collection of short stories, I have selected two that I feel can be related to themes of isolation and withdrawal: First, The Dead, written by James Joyce, set in Edwardian Dublin, and like Of Mice and Men, it contains strong themes of isolation, primarily between the two main characters, Gretta and Gabriel Conroy. Joyce presents Gabriel as being very out of control of the situation, and although in close proximity to his wife, they are both in very different worlds; very apart. In Eveline, she doesnââ¬â¢t have any say on what she does with her life, often she finds herself isolated from her family, and is limited by the moral contexts restricting women at the time. The book Of Mice and Men, written by John Steinbeck, and set in rural southern California during the depression, follows the hopes of both Lennie Small and George Milton, towards their dream of owning a ranch together; a unique aspiration in a book full of insecurity and isolation. Most of the characters in this book are very isolated: by gender, for example there is only one woman, by race, for example there is only one black character, or evenShow MoreRelatedOf Mice and Men1242 Words à |à 5 PagesOf Mice and Men Thomas Hobbes in his Leviathan states that, in the state of nature mans life is nasty, brutish and short. In depression era America, no greater truth could be said. There were millions unemployed, largely unskilled and living on the margins of society. The lowest of the low were the migrant labourers travelling from place to place trying to scratch a living. They often had to travel illegally by freight car with all its consequent dangers. Their life expectancy was low, crimeRead MoreComparing Rosemarie Seus And John Steinbeck s Of Mice And Men2004 Words à |à 9 PagesRosemarie Seus John Steinbeckââ¬â¢s Of Mice and Men John Steinbeck On Feb. 27, 1902, in Salinas, California, John Ernst Steinbeck Jr was born.His father, John Ernst Steinbeck worked several jobs, while his mother, Olive Hamilton Steinbeck was a former schoolteacher. Steinbeck had a mostly happy childhood ââ¬â he grew up with three sisters, was smart, and formed an early appreciation for the land. Steinbeck decided to become a writer at the age of 14, writing many poems and stories. He enrolled in StanfordRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words à |à 1573 PagesModel 23 An Overview 23 â⬠¢ Inputs 24 â⬠¢ Processes 25 â⬠¢ Outcomes 25 Summary and Implications for Managers 30 S A L Self-Assessment Library How Much Do I Know About Organizational Behavior? 4 Myth or Science? ââ¬Å"Most Acts of Workplace Bullying Are Men Attacking Womenâ⬠12 An Ethical Choice Can You Learn from Failure? 24 glOBalization! Does National Culture Affect Organizational Practices? 30 Point/Counterpoint Lost in Translation? 31 Questions for Review 32 Experiential Exercise Workforce DiversityRead MoreFundamentals of Hrm263904 Words à |à 1056 Pagesreviewers of this edition: Norman Foy, Mercy College; Cathy Daly, Cal State Sacramento; Barbara Blissert, Mills College; Teresa Palmer, Illinois State University; Eugene Garaventa, College of Staten Island; Carolyn Waits, Cincinnati State University; Joyce Guillory, Austin Community College; Diane Regal, Sullivan County Community College; Robert Perkins, Mercer University; Carol A. Spector, University of North Florida; and Kim Lukaszewski, SUNY, New Paltz. A book doesnââ¬â¢t simply appear automatically on
Wednesday, May 13, 2020
Botswanas Economy Depends on Diamond Mining - 1286 Words
1. INTRODUCTION It is a well-known fact that Botswanaââ¬â¢s economy is based on mineral resources especially diamonds. As such since the 2008 economic meltdown, the diamond market has not thrived as well as it used to, prompting the Government of Botswana to come up with ways of diversifying the economy and reducing reliance on the mining sector. The main challenge for the country now is how to diversify its economy and reduce heavy reliance on diamond revenue. Therefore in 2010 the Economic Diversification Drive was borne in an effort to come up with ways of diversifying the countryââ¬â¢s economy. According to the Economic Diversification Drive Strategy of Botswana, ââ¬Å"Economic diversification means diversifying a countryââ¬â¢s sources of economicâ⬠¦show more contentâ⬠¦The country should also promote the development of industries. These are able to employ a lot of people. In addition, the government should make it easy for industries and the private sector to obtain funding. 2.2 DEVELOP THE AGRICULTURE SECTOR Botswana imports most of its food from other countries. In order to diversify the country should cut down its import bill on food and start producing its own and maybe be able to export to other countries as well. Also Agriculture is a labour intensive and it creates a lot of jobs. Job creating sectors are important for the development of the country as well as the development of the economy. Most farmers in Botswana cannot access funding and therefore they do not have working capital even if they do have the machinery and other inputs for farming. The country should have food security and be self-sustaining. 2.3 GOVERNANCE United Nations OSAA (2011) asserts that ââ¬Å"good governance is a pre-requisite in building an enabling environment for economic diversification.â⬠The Government has to set up and establish favourable regulatory frameworks that encourage economic activity and to ensure a healthy business climate in the country. In the case of Botswana, the country has a lot of policies that should be supporting the diversification strategy of the country. Unfortunately most of these policies are run parallel even though they are supposed to be complementing each other. Also the turnaroundShow MoreRelatedThe Role Of Centralized Policies On The State Capacities929 Words à |à 4 Pagesthe trained and efficient bureaucracy to devise national development schemes and implement relevant legal frameworks (Reinert, 2010). In addition to the capacities of setting up development plans, the successful development in resource-based economy depends on their ability to save all or part of the revenues from the extractive industries (Lewin, 2011). Since the non-renewable resources are destined to be depleted in the future, the mineral-wealth is limited, and it means the state should save theRead MoreEssay on Botswana4082 Words à |à 17 Pageslived contentedly through the landââ¬â¢s provisions of plants and abundant species of animals and through prosperous trade with each other. Today, this simple way of life conflicts the nationââ¬â¢s potential wealth in democracy, cattle industry, diamond-mining, and other technologies. Both lifestyles have their advantages and disadvantages, a majority of which will be portrayed within this composition. Botswana is entangled in a struggle to produce what is healthiest for its countryââ¬â¢s people and environment
Wednesday, May 6, 2020
Soul Surfer â⬠Persuasive Free Essays
This film has many positive lessons to be taken to heart throughout the film. However, the strongest messages are that with a bit of perspective and the support of our friends and family. You can make it through the worst of tragedies. We will write a custom essay sample on Soul Surfer ââ¬â Persuasive or any similar topic only for you Order Now Our family and friends are often our support system. With them, anything becomes possible. Tom Hamilton, Bethanys father (played by Dennis Quaid) tells Bethany when she is ready to quit surfing after the attack; ââ¬Å"That shark didnââ¬â¢t kill you, you are still here, still alive, ith a family who loves youâ⬠. (1) Bethany may have lost an arm, but that is not to say she has lost everything. Throughout this uphill battle, Bethany has her friends and family there for her to help her get back on the board with confidence and to turn surfing back into the Joyful hobby she initially fell in love with. Similarly, perspective is everything. It is our outlook on life and how we are able to see and eventually come to terms with lifeââ¬â¢s simplest and toughest decisions. During one of the towns youth ights, Sarah Hill, the youth groupââ¬â¢s pastor (played by Carrie Underwood) says ââ¬Å"It can be hard to make sense of things when you are looking at them really close. The same is true in life, so if you are ever dealing with anything that is Just too hard to handle, or does not seem to make much sense, get a new perspective. â⬠(2) After the attack Bethany struggles in finding a reason why this has all happened to her. Why she has lost her arm, why she must learn how to do almost everything again, and how this could be gods plan for her. Through the guidance of Sarahââ¬â¢s advice in getting a new perspective, and through her own faith, Bethany was able to come to a positive conclusion. With perspective and support you can make it over the highest bumps in the road. The movieââ¬â¢s enticingly unique story creates an everlasting connection between your own life and to the life of Bethany Hamiltonââ¬â¢s. Based on true-life events, this story will inspire you to love yourself, and to be thankful for all that you have. When director Sean McNama was asked about the challenges of making this movie nd he said ââ¬Å"it is about who Bethany really is, and so yeah-there was some give and take on both sides to make it great, but I was like letââ¬â¢s Just be true to what she is. (3) Since Sean was able to stay so true to whom and what the real Bethany is all about, it makes you really see and have an appreciation for all she has gone through. And furthermore, all the struggles and obstacles she will continue to be faced with throughout the rest of her life. In addition, the special effects of this movie really add on to the overall performance and the reality of the s tory. AnnaShophia Robb ore a green sleeve on her arm, which was later digitally removed to portray the missing limb. After the shooting of the actual scene took place, the crew would shot a second one without anybody, insuring the background would match with the movie They had to do this tor every scene that Bethany was in, theretore tor the scene. majority of the movie. This was difficult because they had to do this without wasting precious amounts of time. The main reason being, they were relying on the weather to hold up. All the extra work and attention to detail paid off, because everything ooks realistic, and as a viewer you can remain focused on the story and not the obvious Photoshop. When combing a story line based on true-life events and incredible special effects, you are left with a captivating movie. Creating relatable and convincing characters is perhaps the hardest aspect in making films. You may know her from movies such as; Charlie and the Chocolate Factory, Race to Witch Mountain, or maybe even from Because of Winn-Dixie. AnnaSophia Robb plays the main character of Bethany Hamilton. The character of Bethany is a strong one to say the ery least. With her persistence and confidence, she outshines all the other characters, making her relatable. One of the most memorable quotes in this move is said by the character herself, ââ¬Å"l do not need easy, I Just need possible. â⬠(4) What makes this role so strong is throughout the entire film, you embark on this Journey and you wait on Bethanys character to breakdown, quit, or to lose faith in everything. But she never does. She shows us her strength, determination and will to find the positive outcomes in all tragic things. Although the character of Bethany Hamilton is extraordinary, Soul Surfer has at least two memorable characters. You may know her from her victory on the fourth season of American Idol, or the story of a small town Oklahoma girl turns platinum recording artist; Carrie Underwood makes her acting debut, playing the inspirational role of the youth groupââ¬â¢s pastor-Sarah Hill. Carrie shows that she has the ability to light up a big screen in her movie debut, but it is the character she plays that makes the movie as moving as it is. Sarah Hill tells Bethany ââ¬Å"l o not know why terrible things happen to us sometimes, but I have to believe something good is going to come out of this. (5) This inspires Bethany to get back into the water, and to not lose faith in not only herself and her abilities, but also not lose faith in God and the role he plays in her life. Sarahââ¬â¢s compassion and Christian beliefs make this movie inspiring, relatable, and moving. Sarahââ¬â¢s character demonstrates a strong Christian belief which remains true to the life of the real Bethany Hamilton; by still hav ing a huge significance to the story, Sarah does this ithout alienating the non-Christian audiences. How to cite Soul Surfer ââ¬â Persuasive, Essays
Tuesday, May 5, 2020
Research Report on Operating System Maintenance
Question: Discuss the goal and Objectives of the Study, significance and Relevant of the Study and review on the Operating System Maintenance? Answer: Introduction The operating system is a vital program for running any device like computers, mobile phones, and tablets. Every computer needs to have an operating system for running any applications or programs. The operating system efficiently controls the peripheral devices and other computing devices. To maintain the proper working of the operating system, it is very much essential to concentrate on the maintenance of the operating system (McKusick, Neville-Neil Watson, 2014). Regular maintenance of the operating systems keeps the computer up to speed and helps the operating system to overcome annoying problems. Few steps that need to be followed for proper maintenance of operating system includes disk cleanup, defragmentation of the hard drive, deletion of the temporary files, and securing the computers from malware and virus attacks (Locker et al., 2013). This research paper reflects the study of the background of the research upon the maintenance of Operating Systems. Then the research paper illustrates the research focus which comprises of the research problems, research questions, and research aim. The research paper discusses the literature review and summary of the research. Then the research report then concentrates on the research methodology that includes qualitative research, quantitative research, data collection, and data analysis. Finally, the research report provides a conclusion and future scope of the research. Problem Statement The main research problem is related to issues that are encountered while maintaining an operating system. The research paper mainly focuses on identifying the issues related to the maintenance of the operating system. For keeping an operating system up to date and to let it work in an efficient manner, the running needs to be maintained adequately. But during the maintenance of the operating system, few problems arise and which requires addressing for overcoming such problems. Goal and Objectives of the Study The primary goal of the study is to identify the problem that is encountered during the maintenance of an operating system. Then it focuses on the identification of the possible solutions for maintaining an operating system. Finally, the research paper will verify the effectiveness of the potential solutions for better maintenance of the operating system. The research paper focuses on the maintenance of the operating system. The operating system is regarded as the heart of the computer system because when the computer is turn on, the operating system first performs the task of booting and, later on, it makes all the elements of the computer to work properly (Cui et al., 2015). Hence, it is necessary to maintain the Operating System in an efficient manner. But during the maintenance process, there are several problems arise and which need to be reduced for better functioning of the computer system (Rcz Petersen, 2016). The objectives are: To identify the problems arises from the maintenance of an operating system. To identify the possible solutions to maintain an operating system. To identify whether the options are practical for better maintenance of the operating system. Significance and Relevant of the Study As the new operating systems are becoming complex, for that reason all the necessary techniques need to be identified for maintaining an operating system. This research study is very much essential for identifying the problems that are encountered during the maintenance of large operating systems. Then the solutions are also identified during the research work and accordingly the maintenance team will perform the activity to maintain an operating system in an effective manner. Review on the Operating System Maintenance 1. Problems Encountered During Operating System Maintenance Some researches are being conducted for identifying the problems which encounter during the maintenance of an operating system. Firstly, there is a problem known as Blue Screen of Death (BSoD) which is an error that is encountered during operating system failure (Peter et al., 2015). This STOP error arises on the computer screen due to several reasons such as failing of the hardware, damaging software, corrupted DDL files, and problems encountered in the drive (Le Tan, 2013). Several codes are provided by the maintenance team to fix such computer problems. Secondly, there is a problem that clashes with Dynamic-Link Library (DDL) files that store information on the operating system to perform several operations. Sometimes the DLL files get loses or damages and which in turn affects the performance of the operating systems. By downloading the missing DLL files, the problem can be solved, and the better functioning of the operating system can be maintained (Finkelstein Gertsbakh, 2016 ). Thirdly, during the maintenance of an operating system, another common problem arises, and that is the applications are not installing correctly. The reason for this issue is that the computer doesn't have sufficient space on its hard drive. For overcoming such problem, it is necessary to delete the duplicate files and temporary files for better functioning of the operating system (Balasubramaniam et al. 2014). Fourthly, the patches and updating to the latest operating system are the crucial problems that the users and administrators are encountering. The vendors of the operating system are continuously publishing an increasing volume of patches (Capek Pickover, 2013). These patches need rebooting and restarting the services repeatedly, which results in downtime and becomes very much costly to afford. Again this process of rebooting an operating system led to the loss of transient state which in turn becomes a grave threat to the users. 2. Possible Solutions to maintain Operating System Few types of research have been conducted for identifying the potential solutions to keep the operating system in an efficient manner. The process of maintaining an operating system comprises of security fixing, bug fixing, and improving the performance of the operating system. New features are hardly released for the maintenance of an operating system because the application software needs to be updated for taking the advantage of those new features. The new updates are regularly released depending on the emergency (Chiang Torng, 2014). Later on, the updates are developed and tested by the vendor of the operating system to distribute it to the system administrator. The solution regarding the problems related to reliability and updates is to use a redundant hardware which may be either commodity hardware or some specialized equipment that the processes requested on matching machines. When the commodity hardware is used, and when the service upholds state, at that time the software support need to be provided for sustaining the synchronization between the systems that are redundant (Edwards, Teddy Camp, 2013). Virtualization can also be used instead of separate hardware structures. It also needs the support of software for maintaining the synchronization between the virtual machines during the time of update (Sangregorio et al., 2015). Now the most general approach towards the dynamic updating is to use the built-in support for getting the updates in particular languages or specific domains. The efficient maintenance of the operating system can be done by providing a dynamic update support inside the operating system which is necessary for loading an update within the operating system. This process is similar to the loading of kernel modules in an operating system for adding more functionality within the operating system. The fundamental approach is on reducing the obstacles during the updating of code and data inside the module without influencing the overall structure of the operating system (Bishop, Hlucka Vanderzweep, 2015). This research identifies the mechanism of updating safely any particular module and to change the data structures which is maintained in that module. There is a repetition in the use of those identified mechanisms for updating all the modules to achieve updates of the whole operating system. Various essential requirements are there for an operating system to provide the capability of dynamic updates. Among all the most crucial system is the modular system structure. It is a mechanism which is used for identifying a secure point for updating a given module, tracking the state, and transfer mechanism for locating and transforming the state information which is maintained by the module (Frankel, 2013). The process of a generic update for a single module includes the following steps: Firstly, the code which is related to an update needs loading into the system with the help of kernel module loader. Secondly, there needs to be a state tracking mechanism which is required to locate the overall data instances which get affected by an update of an operating system (Sidib et al., 2016). Thirdly, the maintenance team of the operating system needs to use the level of indirection upon the module for blocking any new accesses to the influenced module (Housel, Hom Guertin, 2013). Fourthly, when the mechanism of certain point identifies that that the module is inactive, the maintenance team of the operating system need to update the code within the module and need to change the data structures with the help of state transfer mechanism. At the end of the update session, the new module is ready to be accessed as well as the blocked calls get resumed (Alam, Katsikas Hadjiefthymiades, 2015). 3. Effectiveness of the Possible Solutions for better maintenance of the Operating System All the options identified by the researcher is very much valid for better maintenance of the operating system. For running an operating system in an effective and efficient manner, it is necessary to follow few steps. The steps include regular disk cleanup; the hardware needs to be fragmented; the temporary files need to be deleted (Bauer Bock, 2015). The most important measure for maintaining the operating system is to secure the operating system from any malware or virus attack. Methodology This designing of this research study depends on two tasks including data analysis and maintenance. For the purpose of measurement planning, it is necessary to have a close collaboration with the maintenance team of the operating system. Hence, there are some problems with the research paper related to the exchange of knowledge and amount of communication (Hunt Ernst, 2015). The main strength of this study is to help the maintenance team to maintain the operating system in an efficient manner. This study is meant for identifying the active support of the operating system. The research study is entirely dependent on the information related to the management team of the operating system and for that reason the research study may not be transparent (Locker et al., 2013). This is identified as the primary weakness of this research study. For collecting information from the primary sources, the analyst conducted interviews with the help of video calling or through a face-to-face interview. The overall population is 100 for conducting the research study. The questionnaire for this survey is distributed among the overall population. The sample size which is selected here for collecting the appropriate information regarding the maintenance of the operating system is taken from the maintenance team of different operating system maintenance organizations. The process of random probability sampling is used during the research study. This process allows the researcher to choose appropriate respondents in a successive way. During the conduction of the survey, for collecting the primary data, the researcher utilizes an online survey. For the collection of the secondary resources, the researcher reviews the newspapers, books, different relevant journals, relevant websites, and library sources. Furthermore, for the completion of the research work the database of the operating system maintenance organization is surveyed. The researcher conducts the task of data collection for two and a half weeks. After the completion of the process of data collection, the results are analyzed by describing the problems that are encountered during the maintenance of an operating system and to identify the possible solutions for maintaining an operating system. For collecting the information regarding the problems of operating system maintenance, the researcher consults with the maintenance team and from other relevant sources (Peter et al., 2015). For obtaining the data regarding the possible solutions to maintain the operating system, the researcher asks with the solution providers of operating system maintenance. For identifying whether the solutions is sufficient for the maintenance of the operating system, the researcher surveys in different operating system maintenance provider organizations for collecting the data (Finkelstein Gertsbakh, 2016). During the maintenance of an extensive operating system, there is much involvement of the experimental analysis of data collection. The collected data is related to the problems of the commercial users of the operating system. It also consists of details to avoid the issues and to patch the errors based on the problems (Capek Pickover, 2013). Different notices regarding the problems and relevant solutions are collected, assembled, and analyzed in a statistical manner for a range of two years. At first, the analysis is done at the global level for confirming whether there was confirmation in the earlier observations or not. In the sub level, the analysis is done regarding the following release of the article (Chiang Torng, 2014). The analysis clearly shows that the data regarding the maintenance is observed at the global scale. Summary The research work is wholly based on the identification of the essential features for maintaining the operating system in an efficient manner. This research paper identifies the major problems or issues that are frequently encountered by the maintenance team during the proper maintenance of the operating system. After analyzing the problems, the researcher investigates on the fact of finding the possible solutions to overcome these issues. At the end of the research work, the researcher verifies the effectiveness of those identified possible solutions to enhance the maintenance of the operating system. Conclusion The research work that is carried out in this particular thesis is mainly concentrated on the preservation of an operating system in an efficient manner. Though a possible amount of research has been performed earlier to find the potential solutions for maintaining an operating system but that was a challenging task with various complexities. This research paper clearly identifies the problem related to the maintenance of the operating system and which includes problems like Blue Screen of Death where there is a failure in hardware and damaging software and identified a necessary solution. The researcher also identifies the problem with corrupted Dynamic-Link-Library and improper installation of any application and found solutions to overcome it. Then the question related to the patches and updating of the latest operating system is identified and accordingly the solutions are identified to reduce these issues. The solutions are also determined by the analyst regarding the dynamic up dating facilities in an operating system. Finally, the effectiveness of the options is discussed by the analyst based on the better maintenance of the operating system. The methodology that is used during the research work includes research design, strength and weakness of the study, the approximate population upon which the research is performed and the information collected, the sampling design, the research instrument used, the method of data collection and data analysis for the investigation work. At last, a brief summary is given for understanding the comprehensive research. Future Scope The problems have been analyzed properly by the researcher who is commonly encountered by the maintenance team while maintaining an extensive operating system. In addition to it, some valid solutions are also identified by the researcher who led to adequate support of an operating system. But there has been few limitations found in the research work while carrying out the overall thesis. One of the limitations is that there is no well-established solution identified in the research work which will be able to fix the bugs encountered during the installation of an operating system and which can secure the infrastructure of the operating system in an efficient manner. Some pitfalls are also present in the research work which consists of performance improving solutions as those are not useful enough to overcome the problem related to the maintenance of an operating system. The method of dynamic updating needs improvement for maintaining an extensive operating system in an efficient manne r. References Alam, M. F., Katsikas, S., Hadjiefthymiades, S. (2015, September). An advanced system architecture for the maintenance work in extreme environment. InSystems Engineering (ISSE), 2015 IEEE International Symposium on(pp. 406-411). IEEE. Balasubramaniam, C., Kannan, R., Revashetti, S. B., Sampath, S., Katchapalayam, B. (2014).U.S. Patent No. 8,706,576. Washington, DC: U.S. Patent and Trademark Office. Bauer, K., Bock, H. P. (2015).U.S. Patent No. 20,150,323,920. Washington, DC: U.S. Patent and Trademark Office. Bishop, D. L., Hlucka, M., Vanderzweep, J. (2015).U.S. Patent No. 8,990,840. Washington, DC: U.S. Patent and Trademark Office. Capek, P. G., Pickover, C. A. (2013).U.S. Patent No. 8,370,840. Washington, DC: U.S. Patent and Trademark Office. Chiang, P. H., Torng, C. C. (2014). Development of an integrated information system for automated scheduling and control management in an aircraft maintenance plant.International Journal of Industrial and Systems Engineering,16(1), 51-69. Cui, Y., Voyles, R. M., Lane, J. T., Krishnamoorthy, A., Mahoor, M. H. (2015). A mechanism for real-time decision making and system maintenance for resource constrained robotic systems through ReFrESH.Autonomous Robots,39(4), 487-502. Edwards, J. L., Teddy, J. D., Camp, T. E. (2013).U.S. Patent No. 8,352,939. Washington, DC: U.S. Patent and Trademark Office. Finkelstein, M., Gertsbakh, I. (2016). On preventive maintenance of systems subject to shocks.Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 1748006X15624593. Frankel, E. G. (2013).Systems reliability and risk analysis(Vol. 1). Springer Science Business Media. Housel, T. J., Hom, S., Guertin, N. H. (2013).The Impact of Maintenance Free Operating Period Approach to Acquisition Approaches, System Sustainment, and Costs(No. NPS-LM-13-005). NAVAL POSTGRADUATE SCHOOL MONTEREY CA GRADUATE SCHOOL OF BUSINESS AND PUBLIC POLICY. Hunt, R., Ernst, T. (2015, March). Using IEC 61850 process bus to meet NERC PRC-005-2 Condition Based Maintenance requirements. InProtective Relay Engineers, 2015 68th Annual Conference for(pp. 546-552). IEEE. Le, M. D., Tan, C. M. (2013). Optimal maintenance strategy of deteriorating system under imperfect maintenance and inspection using mixed inspectionscheduling.Reliability Engineering System Safety,113, 21-29. Locker, H. J., Cromer, D., Springfield, R. S., Walterman, R. D. (2013).U.S. Patent No. 8,397,231. Washington, DC: U.S. Patent and Trademark Office. McKusick, M. K., Neville-Neil, G. V., Watson, R. N. (2014).The design and implementation of the FreeBSD operating system. Pearson Education. Peter, S., Li, J., Zhang, I., Ports, D. R., Woos, D., Krishnamurthy, A., ... Roscoe, T. (2015). Arrakis: The operating system is the control plane.ACM Transactions on Computer Systems (TOCS),33(4), 11. Rcz, A., Petersen, R. (2016).U.S. Patent No. 20,160,037,371. Washington, DC: U.S. Patent and Trademark Office. Sangregorio, P., Cologni, A. L., Owen, F. C., Previdi, F. (2015, September). Remote maintenance system for semi-automated manufacturing machines. InResearch and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), 2015 IEEE 1st International Forum on(pp. 457-461). IEEE. Sidib, I. B., Khatab, A., Diallo, C., Adjallah, K. H. (2016). Kernel estimator of maintenance optimization model for a stochastically degrading system under different operating environments.Reliability Engineering System Safety,147, 109-116. Wang, M., Yang, J. P., Lu, L., Wang, Y. P. (2016). Operational Availability Model of k-out-of-N System Under a Hard Time Maintenance Strategy. InProceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation(pp. 261-269). Atlantis Press.
Subscribe to:
Posts (Atom)