wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File System

profile
ANUJ YADAV
Sep 08, 2024
0 Likes
0 Discussions
94 Reads

Files and File Systems

 

 From the user’s point of view, one of the most important parts of an operating system is the file system. The file system provides the resource abstractions typically associated with secondary storage. The file system permits users to create data collections, called files, with desirable properties, such as:

 • Long-term existence: Files are stored on disk or other secondary storage and do not disappear when a user logs off.

• Sharable between processes: Files have names and can have associated access permissions that permit controlled sharing.

• Structure: A file can have an internal structure that is convenient for particular applications. In addition, files can be organized into hierarchical or more complex structure to reflect the relationships among files.

File system provides typical operations include the following:

• Create: A new file is defined and positioned within the structure of files.

• Delete: A file is removed from the file structure and destroyed.

 • Open: An existing file is declared to be “opened” by a process, allowing the process to perform functions on the file.

• Close: The file is closed with respect to a process, so that the process no longer may perform functions on the file, until the process opens the file again.

• Read: A process reads all or a portion of the data in a file.

• Write: A process updates a file, either by adding new data that expands the size of the file or by changing the values of existing data items in the file.

 Typically, a file system maintains a set of attributes associated with the file. These include owner, creation time, time last modified, access privileges, and so on.

File Structure

 Four terms are in common use when discussing files:

 • Field

 • Record

• File

• Database

A field is the basic element of data. An individual field contains a single value, such as an employee’s last name, a date, or the value of a sensor reading. It is characterized by its length and data type (e.g., ASCII string, decimal). Depending on the file design, fields may be fixed length or variable length.

 A record is a collection of related fields that can be treated as a unit by some application program. For example, an employee record would contain such fields as name, social security number, job classification, date of hire, and so on. Again, depending on design, records may be of fixed length or variable length. A record will be of variable length if some of its fields are of variable length or if the number of fields may vary.

A file is a collection of similar records. The file is treated as a single entity by users and applications and may be referenced by name. Files have file names and may be created and deleted. Access control restrictions usually apply at the file level.

A database is a collection of related data. The essential aspects of a database are that the relationships that exist among elements of data are explicit and that the database is designed for use by a number of different applications. A database may contain all of the information related to an organization or project, such as a business or a scientific study. The database itself consists of one or more types of files. 


Comments ()


Sign in

Read Next

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

FIREWALL

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

GIS Bharat Maps

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

RAID

Blog banner

SQL Injection

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Modern operating system

Blog banner

MODERN OPERATING SYSTEM

Blog banner

ProofHub

Blog banner

Life of a 2020-2021 student

Blog banner

Memory Management

Blog banner

operating system

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

A True Friendship

Blog banner

Life lesson

Blog banner

Threads

Blog banner

Types of Malware in Cyber Security

Blog banner

Virtual memory

Blog banner

Predictive Analysis - Ek Overview

Blog banner

MACHINE LEARNING

Blog banner

(Input/Output) in os

Blog banner

Microsoft Windows Overview

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Deadlock

Blog banner

semaphores

Blog banner

GraphX:- A graph processing tool

Blog banner

Health and fitness in technology

Blog banner

Dekkers Algorithm

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Password Generator - Lisp

Blog banner

Deadlock

Blog banner

Challenges and risks in service operations

Blog banner

Importance Of Blockchain

Blog banner

Security Issues

Blog banner

GOOGLE

Blog banner

Developments in Modern Operating Systems

Blog banner