Sie sind auf Seite 1von 16

m FILE

m FILE CONCEPT
m FILE NAMING
m FILE ATTRIBUTES
m FILE OPERATIONS
m FILE TYPES
m FILE SYSTEM
m ACCESS METHODS
V File management is the process of storing ,
controlling and managing data stored on disks
or secondary storage in the form of files.
V File management ensures the consistency of
data when multiple users access files
concurrently.
V Files management also provide the measures
for files security and protection.
V A file is a logical collection of information
stored on secondary storage such as hard disk.
V Physically, a file is the smallest allotment of
secondary storage device e.g., disk, logically, a
file is a sequence of logical records i.e. a
sequence of bits and bytes.
V File can be used to contain data and
programs(both source and object program).
V Data files can be numeric, alphabetic,
alphanumeric or binary.
V A file can be given a name for the convenience
of its use by its creator.
V A name is attached to every file so as to
uniquely identify it and access it through its
name.
V The exact rules for naming file vary from
system to system but all the operating system
allow string of one to eight letters as legal file
name .
V digits and few special characters are also
allowed in file names .
V File attributes are required by file management
system to manage a file .
V Few attributes are accessible for users, such as
access privileges ,name, or size of a file
whereas some of them are specifically assigned
to file for file system usage.
V The flags are bits or short fields that enable or
control some specific property:
V 1-HIDDEN FLAG
V 2-ARCHIVE FLAG
V 3-TEMPRORARY FLAG
|   


1. PROTECTOIN Who can access a file in what way.

2. Password Password needed to access a file.

3. Creator Id of a person who created a file .

4. Owner Current owner of a file .

5. Read only flag 0 for read/write , 1 for read only .

6. Hidden flag 0 for normal, 1 for do not display in listings

7. System flag 0 for normal file , 1 for system file .


|   


s- Archive flag 0 has been backed up ,1 for needs to be backed up.

9- ASCII/Binary 0 for ASCII file , 1 for binary file.


flag

10- Random access 0 for sequential access only 1 for random access.
flag

11- Temporary flag 0 for normal , 1 for delete on process exit.

12- Lock flag 0 for unlocked , non zero for locked.

13- Creation time Date & time of file was created.

14- Time of last Date & time file was last accessed.
access
V In order to store and retrieve the contents of a file
,the user manipulates it using various operations
or command . These operations vary form system
to system.

V Some of the commonly used operation are:


1- CREATE
2-DELETE
3-OPEN
4-CLOSE
5-READ
6-WRITE
7-APPEND
s-RENAME
9-COPY
10-SEEK
11-TRUNCATE
V In order to support different types of files,
operating system support two part file names.

V The two parts are: name and extension. Both are


separated by a period . For example , a name of a
file can be program C.

V The various file types , their extension and


meaning .
   | 


Executable file .exe, .com, .bin Read to run machine language program

Object file .obi , .o Compile , machine language but not linked.

Source code file .c, .cc, .java, .pas, Represents source code in different
asm, .a, .ftn languages such as c, java, Pascal, assembly
language or Fortran.
Batch file .bat, .sh Command to the command interpreter

Text file .txt, .doc Textual data or documentation.

Library file .lib, .dll Libraries of routines for programmers

Backup file .bak Used for tasking backup of some program


file.
V File system is a part operating system responsible
for controlling secondary storage space.

V File system generally contain the following:

1. ACCESS METHODS
2. FILE MAGAMENT
3. AUXILIARY STORAGE MANAGEMENT
4. FILE INTEGRITY MECHANISMS
V The various function of file system are:
1. It enables users to give user defined names, to
create, to modify and delete files .
2. It provides a uniform logical view of data to users
rather than physical view .
3. It enables users to structure their files in a way
most appropriate for each application.
4. It also provides encryption and decryption
facilities to the users.
V File are used to store data . The information
present in the file can be accessed by various
methods.

V Different systems use different access methods.


The various access methods used are:

1. SEQUENTIAL ACCESS
2. DIRECT ACCESS
3. INDEXED ACCESS

Das könnte Ihnen auch gefallen