wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File management -disha parekh

profile
Disha Parekh
Sep 08, 2024
0 Likes
0 Discussions
99 Reads

File management in an operating system refers to the ways in which the OS handles and organizes files on storage devices such as hard drives, solid-state drives, and flash drives. Here are some key aspects of file management:


1. File Systems: A file system is a way of organizing files on a storage device. Common file systems include FAT, NTFS, HFS, and ext4.


2. File Naming: Rules for naming files, such as allowed characters, length limits, and naming conventions.


3. File Structure: How files are organized in a hierarchical structure of directories and subdirectories.


4. File Permissions: Control over who can access, modify, or delete files.


5. File Storage: How files are stored on disk, including allocation methods and disk formatting.


6. File Retrieval: How files are retrieved from disk, including file searching and indexing.


7. File Editing: How files are modified, including file locking and version control.


8. File Backup: Creating copies of files to prevent data loss.


9. File Compression: Reducing file size to save storage space.


10. File Encryption: Protecting files from unauthorized access.


File management operations include :

• Create: A new file is defined and positioned within the structure of files.

• Delete: A file is removed from the file structure and destroyed.

• Open: An existing file is declared to be “opened” by a process, allowing the

process to perform functions on the file.

• Close: The file is closed with respect to a process, so that the process no longer

may perform functions on the file, until the process opens the file again.

• Read: A process reads all or a portion of the data in a file.

• Write: A process updates a file, either by adding new data that expands the size of the file or by changing the values of existing data items in the file.



Comments ()


Sign in

Read Next

MY FIRST BLOG?

Blog banner

What if COVID does not exist!

Blog banner

Importance Of Blockchain

Blog banner

Deadlock

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Beauty of indian railway

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Deadlock

Blog banner

Virtual memory

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Gamer life

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Big O Notation

Blog banner

Health and fitness

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

The most common internet security threats

Blog banner

Boxing

Blog banner

memory managment

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

PHONE TECHNOLOGY

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Security issues

Blog banner

Royal enfield

Blog banner

Business-to-Business

Blog banner

Modern operating system

Blog banner

 " Healing of Yoga "

Blog banner

Deadlock

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Malware Defense

Blog banner

Virtual Machine

Blog banner

Data Warehousing

Blog banner

An Overivew Of Cache Memory

Blog banner

JIRA SOFTWARE

Blog banner