Free Essay

Files

In:

Submitted By kawaiikeun
Words 1009
Pages 5
Reaction Paper

Isang malaking pagmumulat ang ibinigay sa akin nina Udong, Toto, Angela, Jeremy at Julie Ann tungkol sa reyalidad ng buhay. Ang dati sa akala ko’y pinaka-mahirap na problema na aking kinaharap ay walang-wala kumpara sa problemang pinasan at patuloy na pinapasan ng mga batang ito hanggang sa kasalukuyan. Nakalulungkot isipin ang katotohanan na di man lang nila naranasan ang saya ng buhay ng isang normal na bata bagkus sila’y maagang tumanda tulad ni Udong at Toto at kung di nama’y maagang binawian ng buhay dahil sa kawalan ng makakain sa hapag-kainan dulot ng kahirapan sa buhay.

Noong una, akala ko’y manunuod lang kami ng isang palabas na makatutulong sa amin upang mas maintindihan ang tinatalakay naming leksyon. Ngunit habang kami’y nanunuod ay di ko maiwasang maiyak sa mga istorya ng mga batang ito na nagaganap pala sa totoong buhay. Una ay ang istorya ni Udong. Sa edad na sampung taon ay natuto na si Udong na kumayod para sa kanyang pamilya hindi lamang upang ipangtustos sa kanilang pangaraw-araw na pamumuhay kundi pati na rin pambayad sa kanilang utang. Kasama ng ilang daang katao at ng kanyang ama ay tumungo ng Batangas si Udong upang maging “Sakada”. Sila’y mga taga tabas ng tubo mula pa Aklan na dumayo sa nasabing lalawigan upang maghanap-buhay sa loob ng anim na buwan. Isang tanong ang pumasok sa isip ko habang pinapanuod ko ang eksenang ito, Bakit kailangan pang sumama ni Udong sa nasabing trabaho gayong siya’y napaka bata pa sa ganoong gawain? Ngunit agad din akong sinagot ni Udong ng tanungin siya ni Kara David kung bakit siya naroroon. Di ko inasahan ang naging sagot niya, Tila ba hindi bata ang bagkus isang matandang binata ang aking pinanunuod. Nais niya raw makatulong sa kanyang ama dahil matanda na ito. At ng tanungin siya kung bakit di na lamang siya maglaro o kaya’y mag-aral, nabigla ako sa naging sagot niya. Sinabi niyang mas gugustuhin na lamang daw niyang magtrabaho kaysa ang maglaro at pumasok sa eskwela. Kung akin babalikan ang panahon na ako’y kasing edad ni Udong, di ko alintana ang ganoong responsibilidad bagkus nagrereklamo pa ko kapag wala akong bagong laruan o damit. Mapili pa ako sa pagkain at nagagalit ako kapag di ako pinapayagang makipaglaro sa iba. Ngunit iba si Udong, kanya ng kinalimutan ang pagkabata at maagang pinatanda ang sarili dala ng kahirapan sa buhay. Magkahalong paghanga at kalungkutan ang nararamdaman ko para kay Udong. PAghanga sa kagustuhang makatulong sa pamilya at kalungkutan dahil di man lang niya naranasan ang dapat sana’y buhay ng isang batang katulad niya. Ganoon din ang naramdaman ko sa kwento ni Toto, 16 taon gulang at isa ring sakada. Pinadala siya doon upang magtrabaho at makabayad sa utang ng kanyang ama. Naawa ko sa kanya dahil nakita ko kung gaano siya katutol sa ideyang magta trabaho siya bilang sakada ngunit wala siyang magawa dahil tulad ni Udong ay biktima rin siya ng kahirapan.
NApagalaman kong kahit may tumulong na sa pamilya ni Udong at may nagbigay sa kanila ng ikabubuhay ay patuloy pa rin ito sa pagsasakada. Isang nakakalumgkot na katotohanan na tuluyan nan gang kinalimutan ni Udong ang kanyang pagkabata. Alam kong marami pang Udong at Toto na lapana sa buong Pilipinas na bikitima ng child labor. Mga batang sa loob ng murang edad ay pinasan na ang responsibilidad na dapat sana’y Gawain ng isang matanda. Mga batang mas pinili ang obligasyon kaysa ang kanilang edukasyon.
Naantig din ako sa kwento nina Angela, Jeremy at Julie Ann na tumatalakay naman sa malnutrisyon sa bansa. Ang kahabag-habag na kalagayan ni Angela na di na makatayo sa kanyang higaan dahil sa kapayatan at panghihina ng katawan ay nagpapatunay lamang na di na biro ang kaso ng malnutrisyon sa Pilipinas. Ganoon din ang kwento nina Jeremy at Julie Ann. Si Jeremy, 14 taong gulang na ngunit noong tinimbang ay may bigat lamang ng dapat sana ay bigat ng isang dalawang taong gulang na bata, ganoon din ang kanyang mga kapatid. At si Julie Ann, tatlong taong gulang na bata na madalas ay kape ang iniinom sa halip na gatas na nagsanhi upang siya’y makaranas din ng malnutrisyon. Ilan pa kayang Angela, Jeremy at Julie Ann ang kailangan mamatay para masolusyunan ito ng bansa?
Ang tanong: Bakit nga ba nangyayari ang mga bagay na ito? Bakit may mga batang kailangan g magtrabaho at bakit ilan sa kanilay nakararanas pa ng malnutrisyon? Isa lamang ang sagot na aking nakikita… ang KAHIRAPAN. Ang kahirapan ang ugat ng lahat ng ito. Ito ang nagtulak kina Udong at Toto na magtrabaho at nagdulot kina Angela, Jeremy at Julie Ann upang di makatikim ng masustansiyang pagkain. Kahirapan na isang malaking problema ng ating bayan na hanggang ngayon ay di pa rin mahanapan ng nararapat na solusyon.
Isa sa mga napansin ko na magkakapareho sa kwentong aming napanuod ay ang katotohanang kung sino pa ang mahihirap ay sila pa ang may napakaraming anak. Bakit sa kabila ng sinisisi nilang kahirapan ay patuloy pa rin silang gawa ng gawa ng anak? Kung sana’y inisip muna nila kung kaya nilang buhayin ang mga batang ito bago sila nagparami ay sana walang tulad nina Udong na nagta trabaho para sa pangkain ng kanyang mga kapatid at walang makikiagaw sa pagkaing sanay natatanggap ni Angela at ng iba pa. Disiplina sa bawat pamilya at tulong mula sa gobyerno ang kailangan ng tulad ng mga batang ito at ng pamilyang kanilang kinabibilangan. MAayos na implementasyon ng mga proyekto kontra child labor at malnutrisyon, at siguradong tulong na aabot sa mga tulad nilang mahihirap ang maaring maging isa sa mga solusyon upang matapos na ang mga problemang ito.
Sana nga’y makita ito ng atin pamahalaan. Sana ngay magsilbing aral sina Udong, Toto, Angela, Jeremy at Julie Ann sa iba pang Pilipino na pahalagahan ang mga bata, ang kanilang edukasyon at kalusugan dahil naniniwala pa din ako na tulad nga ng sinabi ng ating pambansang bayani na si Dr. Jose Rizal, ang kabataan pa rin ang magiging pag-asa nitong ating bayan.

Similar Documents

Free Essay

File

...The first thing that most new users shifting from Windows find confusing is navigating the Linux file system. The Linux file system functions differently than the Windows file system. I will compare and contrast the differences of both and takes you through the layout input/output systems of both. In Linux, there is only a single hierarchal directory structure. Everything begins from the root directory which is represented by the symbol /, which then expands into sub-directories. Windows includes various partitions and then directories under those partitions; Linux places all the partitions underneath the root directory by mounting them in specific directories. In contrast, Windows uses the letter C as its root directory. In Windows, various partitions are detected during the boot process and are assigned a drive letter. Under Linux, the system must mount partitions and devices during the boot process; otherwise it will be unaware of its existence. This might not seem very convenient to provide access to your partitions or devices, but it offers greater flexibility. This is known as the unified file system in Linux which offers several advantages over the Windows file system. For example, let's examine the /usr directory. This directory resides off the root directory and contains most of the system executables. With the Linux file system, you can choose to mount it off another partition or even off another machine over a network connection. The underlying system will...

Words: 309 - Pages: 2

Premium Essay

File Management

...File Management The File System Manager (also called the File Manager or File Management System) is the software responsible for creating, deleting, modifying, and controlling access to files – as well as for managing the resources used by the files. The File Manager provides support for the libraries of programs and data to online users, for spooling operations, and for interactive computing. These functions are performed in collaboration with the I/O Manager or Device Manager. ➢ Responsibilities of the File System Manager: The File System Manager has a complete job. It’s in charge of the system’s physical components, its information resources, and the policies used to store and distribute the files. To carry out its responsibilities, it must perform these four tasks: 1. Keep track of where each file is stored. 2. Use a policy that will determine where and how the files will be stored, making sure to efficiently use the available storage space and provide efficient access to the files. 3. Allocate each file when a user has been cleared for access to it, then record its use. 4. Deallocate the file when the file is to be returned to storage, and communicate its availability to others who may be waiting for it. The File System Manager’s policy determines where each file is stored and how the system, and its users, will be able to access them simply – via commands that are independent from device details. In addition, the policy must...

Words: 2584 - Pages: 11

Free Essay

Batch Files

...Batch Files: What is it and its harm Devry University The early business computers systems developed in the 1950’s showed how efficient they were by processing large group of records. They did all of this in batches. In the 1960s, computer engineers introduced interactive terminals. This would allow users to input for the very first time. Now today, even with use of laptops, home computers, and mobile devices. Most of the business and organizations still use some type of batch file processing for most of their applications. A batch file is a collection of commands that are processed in a certain order sometimes requiring the user to input information. With a computer using an operating system like Windows. A batch file is stored in a .bat file extension format. Most other operating systems may determine a batch file in a command file, using two or more commands that are processed one right after another. Just to perform the task at hand. Batch files are normally used to load programs, run different task at one time, and to perform repetitive tasks. An example of a batch file could be to back up files from different computers to a storage device or run the diagnostics on a system or process some type of log files. Batch files can start working at any time and can be left completely alone until the process is finished. The one of the main advantages to using batch files is the accessibility. A person can make the file entry themselves and...

Words: 710 - Pages: 3

Premium Essay

File Access

...File Access Computers have become an important tool for the companies. They are used as time clocks, keep track of inventory, to communicate with customers and to do research. In some cases, the computer is used to assign tasks and inform employees of upcoming events. Though computers are good tool and resource, there is the potential an employee may misuse or access files they have no clearance to access. For this reason there is a need to restrict access. If a company has 5000 employees who have access to the computer system and there is a need to restrict 10 users from accessing a specific file, there is a need to establish protocols to prevent access. How this is done differs in each operating system. In Unix there are ways to set parameters for the 4990 users to access a single file. These are set within the types of files. They are called regular, directory, special, named pipes, links and symbolic links. Unix operating systems operate these files and routes them into a uniformed system that operates in the background supporting files and giving disk space as needed for files. This is done by using inode (Index node) which controls information the system needed for a specific file. Multiple files can be connected to one inode, but if active the inode will only be associated with one file and a file will be controlled by one inode. A file’s attributes, permissions, and control information are stored within the inode. In the FreeBSD inode for example has...

Words: 654 - Pages: 3

Premium Essay

File Management

...File Management Nina N. Rountree POS 355 Terrence Carlson June 10, 2013 Operating systems that have numerous users with various security level clearances will require file protection. A UNIX operating system with 5,000 users could implement conventional UNIX file access controls if 4,990 of those users share the same level of security clearance. By means of a file access control structure on the UNIX operating system, each individual user is given a user ID (special user identification number). Users on a UNIX operating system will be allocated to a main class and possibly a variety of classes that will be associated with a unique class ID. Whenever a user creates a file, it is indicated by the individual’s unique user ID along with the user’s main class ID. Each individual user's accessibility is managed by the administrator with a file access control security type structure. The administrator can manage the permissions of all three main classes; read, write, and execute. Access is permitted to three types of users: the creator or owner of the file, the class the file belongs to, and various users with access to the system despite their class. The access control policy affects the level of access that is permitted by whom and under what conditions. Discretionary Access Control (DAC) manages permissions based on the requester’s identity and the regulations linked to access and permissions. Mandatory Access Control (MAC) manages permissions based on assessing protection...

Words: 526 - Pages: 3

Free Essay

File Management

...might think security will all be the same but there are difference between each one. As you read more you will understand the security and the difference between a MAC, UNIX/LINUX and Windows systems and how each one works.       Access control goal is to protect a resource from unauthorized access while facilitating seamless and legitimate use of such resources. Presently, each day users hold the need to access to those resources through a broad line of devices, such as PCs, laptops, PDA, smartphones and kiosks. Most organizations need to provide protection for their files and allow the correct people to access. The fundamental goal of an Access management system is to maintain confidentiality of user information and access, integrity of information control, availability of information and resources and accountability for knowing who holds the access to such information. File Management File management and file systems are a core part of the user experience for most users. They provide many...

Words: 2672 - Pages: 11

Premium Essay

File Managment

...File Management (Option 1) POS 355 July 29, 2015 Peng File Management (Option 1) Access Rights is an accommodating tool that can be used to allow users on a network to file share (Stallings, 2015, p. 541). In most systems, users and groups of users have a certain granted access to files. There are many different access rights that can be assigned and are assigned based on the level of the user. Specifying which users can access one file in a system being supported by 5,000 users can be done by creating an access control list with the names of the 4,990 users who need access. Another way to allow the 4,990 users to access the files would be to put them all in one group and set the group access level accordingly. An access control list specifies which users are granted or denied access to certain files, and can be granted to individual users, or groups (Stallings, 2015, p. 525). In most multiuser systems, access control is enforced, and only certain users are allowed access and to perform certain actions on certain files. Access control information may include the owner, access information, and permitted actions. The owner is the individual who has control over the file, and who can grant or deny access to other users. Access information includes each of the user’s name and password. Some permitted actions that can be granted to users include reading, writing, executing, and transmission over a network (Stallings, 2015, p. 537). The owner of the file can grant all of these...

Words: 403 - Pages: 2

Free Essay

File Management

...Stephen Sylvester File Management POS:335 John Demory May 26th 2014 In this paper on file access I will be covering two different ways that a system that can support 5,000 users, specifically a protection scheme in UNIX. Please note that out of these 5,000 users, only 4,990 of those users will have access to a specific file. I will first begin with the explanation of one of the ways that a system can support 5,000 users and then move on to the second way that a system can support 5,000 users. The first way that a system can support 5,000 users is for the administrator or facilitator to set up an access control list of all 4,990 users that he or she wants to have access to the specific file. A great real world example of controlled access would be at my current place of employment at the Department of Veteran’s Affairs. Every employee within the company is assigned user roles. These user roles reflect their job position within the company. Every employee has access to our shared drive folder on our network based on the employee’s credentials and need to know privileges (based on their specific duties and user role). Based on their credentials it will grant that employee access to specific folders. I personally deal with medical records and often, at times the doctors use our network shared drive to upload patient information to be indexed into our system. The doctors must be on the access control list in order to access our shared network drive. Being that I...

Words: 654 - Pages: 3

Premium Essay

File Management

...File Management Paper When dealing with the file management concept of computers and operating systems there are always multiple options and preferences that are available. One method of file storing is when an operating system detects the type of file; the type of program used to access it and saves it as such with pathways and locations filled out. A second method is to allow the pathways and file types to be set by the user, allowing for any program or file extension that is available to be used. A third method is for the operating system to not allow the saving of file type or file extensions, but to assign a specific code related to that operating system that allows it to determine the file type. These three methods all have their benefits and drawbacks referring to ease of access, ease of storage, and the structure of the file system. As each of these methods provides a specific purpose the use of one method over another will depend on how a computer filing system is designed and also how it is utilized by frequent and authorized users. In an operating system that detects the file type when it is being stored the system is recognizing what application is being used to access that file and saving it in storage under a file directory that will open the file with that type or certain program. For example if a user is accessing a text document and saves it, the operating system will detect the word processing application and save the file in a directory or pathway that will...

Words: 885 - Pages: 4

Premium Essay

File Management

...File Management POS/355 Brandon Elizaldi Steven Kernan File Management File management and file systems are a core part of the user experience for most users. They provide many essential and necessary functions for the user as well as almost anyone else working with a computer system. They provide anything from long term existence to the ability to create and delete stored data. Some of the benefits to the user are long term existence, the ability to be shared between processes and structure. Long term existence is an important aspect because it can be stored and recalled in the future. Imagine being stuck in the days the original Nintendo for example. You could play a game and get deep into game play but if you didn’t have time to finish the game you had to start all over again. This was due to the fact that there was no file system built in due to the fact a storage device was not available for the system. This is one of the great things about current game systems that have file systems and storage capacity. Another benefit is the ability to share files between processes. This has streamlined new software creation because the program doesn’t have to be built as a standalone. This keeps programmers from having to reinvent the wheel every time they write a program making them cheaper and easier to write. This also saves disk space on the users system. The next benefit is structure which provides a hierarchy within a file system allowing for more complex structures...

Words: 705 - Pages: 3

Premium Essay

File Management

...File Management By: Amy Gonzales POS/355 File Management The data we work with on a computer is kept in a hierarchical file system, the way an operating system has there file management set up effects the user’s ability in accessing and using those folders. According to "Webopedia" (2015), "File management system is the system that an operating system or program uses to organize and keep track of files. For example, a hierarchical file system is one that uses directories to organize files into a tree structure.” If you have ever downloaded a software on your computer you may have noticed how you can find it in the C drive under Program files. The root of this file is the C:\ portion which then stems off into one folder after another to form a tree like structure. For businesses this can be a huge impact on them; without even realizing it they are impacted by the operating system file management they use from storage to security to network. The following paragraphs will say how UNIX file management is set up, along with how it would work in a large company, and also an alternative to the UNIX file management for a large company. First we will start off with how UNIX uses their file management system with another operating system such as Windows. Unlike Windows UNIX has a unique directory structure. In Windows the user will be seeing common file names such as Program File or Users, but in UNIX stuff like a particular application would be scattered into multiple folders....

Words: 836 - Pages: 4

Free Essay

File Management

...File Management UNIX systems are based on the access control of files scheme which was introduced in the very early versions of UNIX. The way this works is that each UNIX user has an assigned unique user identification number which also puts this user ID into a primary group as well as other groups if the user ID needs it. These groups are identified, like the user’s ID, with a group ID. When a user creates a file, it is designated as owned solely by that user and marked with that user’s ID. This file can also be associated with a group with a unique group ID. This file is protected by a set of 12 protection bits. These bits along with the group and owner ID are part of the file’s index node or inode. This inode is a data structure that houses all the information about a file system object except the data content and name. Nine of these protection bits specify execute, write and read permissions for the owner of the file, the other members of the group and all other users. The remaining three outline special behavior for files and directories. A particular user ID is the superuser. This superuser ID is freed from the normal file access control constraints and also has system wide access. Whenever a file or program is set as owned by the superuser, the superuser potentially has unrestricted access to the system and to the users that are using the program. This scheme is acceptable when file access requirements are the same with users and a large number of groups of...

Words: 550 - Pages: 3

Free Essay

File Retention

...Employee Files and Retention In Human Resources the managers must make sure the files are maintained properly, stored properly, and the documents are filed in the appropriate files within the company. There are state laws that have to be followed. When determining where to place a document, the HR department has to consider what information the document contains. Personnel files cannot have documentation with medical, social security numbers or sensitive information (Personnel Records: What should, and should not, be included in the personnel file?, 2015). Most employers have three or four different employment record filing systems (Audit: Personnel Files: Employment (Personnel) Records Audit Checklist (Including Form to Audit Individual Employee Personnel Files), 2014). Personnel files contains employee performance information; confidential records contain non job-related or confidential information; payroll records are usually maintained by the payroll department; I-9 files are filed separately. Personnel records can be maintained by paper or electronically maintained by scanning into a secured system. Personnel Files * Employee applications/Resumes (online applications retention 2 years from the date of personnel action) * Job description. * Pay compensation information. * Letter of Recognition. * Records relating to job such as promotions, demotions, layoffs, training and education. * Warnings, counseling, or disciplinary notes. * Termination...

Words: 537 - Pages: 3

Free Essay

File Management

...File Management Paper There are issues that arise concerning file sharing in a multiuser system, and that is access rights and the management of simultaneous access. Access rights to a file is granted unique users whether singular or grouped. A flexible tool is provided to allow extensive file sharing among the users while providing a number of options so that certain access can be harnessed or controlled (Stallings , 2012). Although a wide range of access is being used, there is still a list of representatives with access rights that can be designated to a certain user for a unique file. One way is masking the existence of the file, leaving the user oblivious to its existence. If by chance the user gain knowledge of the files existence and owner identification, a petition to the owner can be put in place to gain additional access rights. There are ways where the user can load and execute a program with copy restrictions. Propriety programs are an example of this because they are made accessible to users with this restriction (Stallings, 2012). The only user with full access rights and the power to grant rights to others is the owner of the file created. There are also three classes of users provided said access by the owner. One- third of the class is a specific user, which are individual users who are assigned by a user id. User groups is the another class with a set of users that are not defined individually. The final class is granted to all users because the files are...

Words: 793 - Pages: 4

Premium Essay

File Management

...File Management File management systems have come a long way since the gigantic filing cabinets. Society has come a long way in an effort to save paper, space, and time. With modern technology and computers in most homes and workplaces file management systems are standard among operating systems. This capability gives businesses and individuals the ability to be organized and successfully archive important documents, images, and videos essential to a company a family or an individual. In the next couple of paragraphs one will read about file management systems the functions of file management systems and how it has made our society more efficient. When talking about file management it used to mean huge filing cabinets loaded with folders marked and organize so that one can easily find documents stuffed in said folders. In today’s world when talking about file management one is referring to electronic file management systems. File management systems are one of the most important aspects of a computer. File management systems have enabled the common person to organize documents images or videos however they see fit. File management systems use hardware components of a computer to save and store data. The hardware components that may be used are hard disk, CD-ROM, external hard drives and so forth. No matter what operating system used whether it’s Linux, Windows, or Mac file management system performs certain duties. One of the duties of a file management system is creating...

Words: 870 - Pages: 4