wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File management -disha parekh

profile
Disha Parekh
Sep 08, 2024
0 Likes
0 Discussions
99 Reads

File management in an operating system refers to the ways in which the OS handles and organizes files on storage devices such as hard drives, solid-state drives, and flash drives. Here are some key aspects of file management:


1. File Systems: A file system is a way of organizing files on a storage device. Common file systems include FAT, NTFS, HFS, and ext4.


2. File Naming: Rules for naming files, such as allowed characters, length limits, and naming conventions.


3. File Structure: How files are organized in a hierarchical structure of directories and subdirectories.


4. File Permissions: Control over who can access, modify, or delete files.


5. File Storage: How files are stored on disk, including allocation methods and disk formatting.


6. File Retrieval: How files are retrieved from disk, including file searching and indexing.


7. File Editing: How files are modified, including file locking and version control.


8. File Backup: Creating copies of files to prevent data loss.


9. File Compression: Reducing file size to save storage space.


10. File Encryption: Protecting files from unauthorized access.


File management operations include :

• Create: A new file is defined and positioned within the structure of files.

• Delete: A file is removed from the file structure and destroyed.

• Open: An existing file is declared to be “opened” by a process, allowing the

process to perform functions on the file.

• Close: The file is closed with respect to a process, so that the process no longer

may perform functions on the file, until the process opens the file again.

• Read: A process reads all or a portion of the data in a file.

• Write: A process updates a file, either by adding new data that expands the size of the file or by changing the values of existing data items in the file.



Comments ()


Sign in

Read Next

virtual machine

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

security controls

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Virtual memory

Blog banner

Boxing

Blog banner

Importance Of Time

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Multithreading in Operating System

Blog banner

Memory Management in Operating System

Blog banner

Cycling

Blog banner

Incident management in ITSM

Blog banner

SESSION HIJACKING

Blog banner

Memory Management

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Virtual memory

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

I/O Management and Disk Scheduling

Blog banner

Mumbai Metro 3

Blog banner

How Much Protein Do You Really Need Every Day?

Blog banner

Blockchain

Blog banner

INSTAGRAM

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Importance Of Blockchain

Blog banner

File sharing

Blog banner

Basic Security For SOAP Services

Blog banner

Cache memory

Blog banner

A Journey By Train

Blog banner

Why am I never satisfied with my Life?

Blog banner

Hello World

Blog banner

VIRTUAL MACHINE

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Memory management

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Memory Management

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Remote Work in 2026

Blog banner