wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File management -disha parekh

profile
Disha Parekh
Sep 08, 2024
0 Likes
0 Discussions
99 Reads

File management in an operating system refers to the ways in which the OS handles and organizes files on storage devices such as hard drives, solid-state drives, and flash drives. Here are some key aspects of file management:


1. File Systems: A file system is a way of organizing files on a storage device. Common file systems include FAT, NTFS, HFS, and ext4.


2. File Naming: Rules for naming files, such as allowed characters, length limits, and naming conventions.


3. File Structure: How files are organized in a hierarchical structure of directories and subdirectories.


4. File Permissions: Control over who can access, modify, or delete files.


5. File Storage: How files are stored on disk, including allocation methods and disk formatting.


6. File Retrieval: How files are retrieved from disk, including file searching and indexing.


7. File Editing: How files are modified, including file locking and version control.


8. File Backup: Creating copies of files to prevent data loss.


9. File Compression: Reducing file size to save storage space.


10. File Encryption: Protecting files from unauthorized access.


File management operations include :

• Create: A new file is defined and positioned within the structure of files.

• Delete: A file is removed from the file structure and destroyed.

• Open: An existing file is declared to be “opened” by a process, allowing the

process to perform functions on the file.

• Close: The file is closed with respect to a process, so that the process no longer

may perform functions on the file, until the process opens the file again.

• Read: A process reads all or a portion of the data in a file.

• Write: A process updates a file, either by adding new data that expands the size of the file or by changing the values of existing data items in the file.



Comments ()


Sign in

Read Next

Microsoft Word

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

USPS mail

Blog banner

Starvation and Deadlock.

Blog banner

FREE VERSION OF G-MAIL

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Deadlock and starvation

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

10 Survival Tips that might save your life

Blog banner

Whatsapp Messenger

Blog banner

Paging

Blog banner

Mobile Survey

Blog banner

Process Creation

Blog banner

Modern Operating system

Blog banner

Business Intelligence v/s Big Data

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Buffer Overflow

Blog banner

Goa Trip With Friends

Blog banner

1.1 basic elements

Blog banner

Race Conditions

Blog banner

Threats To Computer System

Blog banner

Water Resources are about to exhaust...

Blog banner

WORKFRONT SOFTWARE

Blog banner

FIREWALL

Blog banner

Importance Of Blockchain

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Deadlock

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Race Condition in Operating Theatre

Blog banner

Guidelines for a low sodium diet.

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Dangers of Using Public WiFis

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

DIGITAL TECHNOLOGY

Blog banner

virtual memory

Blog banner

Veg Mix Pickle

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

What if COVID does not exist!

Blog banner