wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File System

profile
ANUJ YADAV
Sep 08, 2024
0 Likes
0 Discussions
94 Reads

Files and File Systems

 

 From the user’s point of view, one of the most important parts of an operating system is the file system. The file system provides the resource abstractions typically associated with secondary storage. The file system permits users to create data collections, called files, with desirable properties, such as:

 • Long-term existence: Files are stored on disk or other secondary storage and do not disappear when a user logs off.

• Sharable between processes: Files have names and can have associated access permissions that permit controlled sharing.

• Structure: A file can have an internal structure that is convenient for particular applications. In addition, files can be organized into hierarchical or more complex structure to reflect the relationships among files.

File system provides typical operations include the following:

• Create: A new file is defined and positioned within the structure of files.

• Delete: A file is removed from the file structure and destroyed.

 • Open: An existing file is declared to be “opened” by a process, allowing the process to perform functions on the file.

• Close: The file is closed with respect to a process, so that the process no longer may perform functions on the file, until the process opens the file again.

• Read: A process reads all or a portion of the data in a file.

• Write: A process updates a file, either by adding new data that expands the size of the file or by changing the values of existing data items in the file.

 Typically, a file system maintains a set of attributes associated with the file. These include owner, creation time, time last modified, access privileges, and so on.

File Structure

 Four terms are in common use when discussing files:

 • Field

 • Record

• File

• Database

A field is the basic element of data. An individual field contains a single value, such as an employee’s last name, a date, or the value of a sensor reading. It is characterized by its length and data type (e.g., ASCII string, decimal). Depending on the file design, fields may be fixed length or variable length.

 A record is a collection of related fields that can be treated as a unit by some application program. For example, an employee record would contain such fields as name, social security number, job classification, date of hire, and so on. Again, depending on design, records may be of fixed length or variable length. A record will be of variable length if some of its fields are of variable length or if the number of fields may vary.

A file is a collection of similar records. The file is treated as a single entity by users and applications and may be referenced by name. Files have file names and may be created and deleted. Access control restrictions usually apply at the file level.

A database is a collection of related data. The essential aspects of a database are that the relationships that exist among elements of data are explicit and that the database is designed for use by a number of different applications. A database may contain all of the information related to an organization or project, such as a business or a scientific study. The database itself consists of one or more types of files. 


Comments ()


Sign in

Read Next

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Dos (Denial of service) Attack

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Race Condition

Blog banner

INTERNET SECURITY

Blog banner

To travel is to live

Blog banner

security controls

Blog banner

Starvation

Blog banner

Multicore and Multithreading

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Buffering

Blog banner

GIS info about Bermuda Triangle

Blog banner

Data Lake

Blog banner

What are NFT s?

Blog banner

internet email and it's applications

Blog banner

Cyber Security in Data Breaching

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

CoWIN

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Evolution of Operating system.

Blog banner

Virtual Memory

Blog banner

PYTHON

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Web Site

Blog banner

Explain Kernel in OS

Blog banner

Gis in agriculture and farming

Blog banner

rupee

Blog banner

Functions Of Operating Systems

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Computer Security

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Deadlock and Starvation

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

ZOHO

Blog banner

What is OS Fingerprinting?

Blog banner

Deadlock and starvation

Blog banner

Service Operations Principles

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Measuring IT Risk

Blog banner

Security and E-mail

Blog banner