wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File System

profile
ANUJ YADAV
Sep 08, 2024
0 Likes
0 Discussions
94 Reads

Files and File Systems

 

 From the user’s point of view, one of the most important parts of an operating system is the file system. The file system provides the resource abstractions typically associated with secondary storage. The file system permits users to create data collections, called files, with desirable properties, such as:

 • Long-term existence: Files are stored on disk or other secondary storage and do not disappear when a user logs off.

• Sharable between processes: Files have names and can have associated access permissions that permit controlled sharing.

• Structure: A file can have an internal structure that is convenient for particular applications. In addition, files can be organized into hierarchical or more complex structure to reflect the relationships among files.

File system provides typical operations include the following:

• Create: A new file is defined and positioned within the structure of files.

• Delete: A file is removed from the file structure and destroyed.

 • Open: An existing file is declared to be “opened” by a process, allowing the process to perform functions on the file.

• Close: The file is closed with respect to a process, so that the process no longer may perform functions on the file, until the process opens the file again.

• Read: A process reads all or a portion of the data in a file.

• Write: A process updates a file, either by adding new data that expands the size of the file or by changing the values of existing data items in the file.

 Typically, a file system maintains a set of attributes associated with the file. These include owner, creation time, time last modified, access privileges, and so on.

File Structure

 Four terms are in common use when discussing files:

 • Field

 • Record

• File

• Database

A field is the basic element of data. An individual field contains a single value, such as an employee’s last name, a date, or the value of a sensor reading. It is characterized by its length and data type (e.g., ASCII string, decimal). Depending on the file design, fields may be fixed length or variable length.

 A record is a collection of related fields that can be treated as a unit by some application program. For example, an employee record would contain such fields as name, social security number, job classification, date of hire, and so on. Again, depending on design, records may be of fixed length or variable length. A record will be of variable length if some of its fields are of variable length or if the number of fields may vary.

A file is a collection of similar records. The file is treated as a single entity by users and applications and may be referenced by name. Files have file names and may be created and deleted. Access control restrictions usually apply at the file level.

A database is a collection of related data. The essential aspects of a database are that the relationships that exist among elements of data are explicit and that the database is designed for use by a number of different applications. A database may contain all of the information related to an organization or project, such as a business or a scientific study. The database itself consists of one or more types of files. 


Comments ()


Sign in

Read Next

Interrupts in operating system.

Blog banner

Blockchain in IoT Applications

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

NETWORK SECURITY RISKS

Blog banner

Deadlock

Blog banner

Deadlock

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Embedded Operating System

Blog banner

Service Design Model

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Segmentation and paging concept

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Importance of self defence for girls

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

"Audit" In Data Science

Blog banner

Deadlock and starvation in operating system

Blog banner

Virtual Memory

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Worms, viruses and Bots

Blog banner

Drawing tips for a beginner

Blog banner

Understanding Mobile Device Forensics

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Virtual memory

Blog banner

HUBSPOT

Blog banner

Risk factors in service transistion

Blog banner

LINUX

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Modern Operating system

Blog banner

Deadlock and starvation

Blog banner

RAID

Blog banner

The IT Service Lifecycle

Blog banner

Threat management

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

What is semaphore in operating system?

Blog banner