wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File system

profile
Hetvi undefined
Sep 09, 2024
0 Likes
0 Discussions
63 Reads

In an operating system, a file and file system play crucial roles in data management and storage.


File

A file is a collection of data or information stored on a storage device, such as a hard drive or SSD. It can contain various types of data, including text, images, videos, or executable programs. Files are typically organized with a name and an extension (e.g., .txt, .jpg, .exe) to indicate their type and facilitate identification.


File System

A file system is a method and data structure that an operating system uses to manage and organize files on a storage device. It determines how files are named, stored, and accessed.


File Structure


 Four terms are in common use when discussing files:


 • Field


 • Record


• File


• Database


A field is the basic element of data. An individual field contains a single value, such as an employee’s last name, a date, or the value of a sensor reading. It is characterized by its length and data type (e.g., ASCII string, decimal). Depending on the file design, fields may be fixed length or variable length.


 A record is a collection of related fields that can be treated as a unit by some application program. For example, an employee record would contain such fields as name, social security number, job classification, date of hire, and so on. Again, depending on design, records may be of fixed length or variable length. A record will be of variable length if some of its fields are of variable length or if the number of fields may vary.


A file is a collection of similar records. The file is treated as a single entity by users and applications and may be referenced by name. Files have file names and may be created and deleted. Access control restrictions usually apply at the file level.


A database is a collection of related data. The essential aspects of a database are that the relationships that exist among elements of data are explicit and that the database is designed for use by a number of different applications. A database may contain all of the information related to an organization or project, such as a business or a scientific study. The database itself consists of one or more types of files.


Comments ()


Sign in

Read Next

Dal Bafla Recipe

Blog banner

Why is ITSM important in IT organization?

Blog banner

How Cyber Forensics use in AI

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

OS- Assignnment 1

Blog banner

Uniprocessor scheduling

Blog banner

The IT Service Lifecycle

Blog banner

PERT Overview

Blog banner

Pooja Silver

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Threads

Blog banner

OS Assignment 3 Deadlock

Blog banner

Blog on Smartsheet.

Blog banner

Types of Malware in Cyber Security

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Danger assessment in GIS

Blog banner

The Sunny Side of Instagram

Blog banner

How I use google in my daily life

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Malicious softwares

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Oracle Corporation

Blog banner

Cache Memory in Operating Systems

Blog banner

Linux Threads:

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

What is Virtual Memory

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

What Is Experiential Learning and Why Does It Work Better Than Rote Learning?

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Difference Between Classification And Clustering

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

File management

Blog banner

Memory Management in Operating System

Blog banner

Mail merge

Blog banner

Memory management

Blog banner

Multicore and Multithreading

Blog banner