Computer File: 1 Etymology
Computer File: 1 Etymology
Etymology
2 File contents
A punched card le
The word le was used publicly in the context of computer storage as early as February, 1950. In an RCA (Radio Corporation of America) advertisement in Popular
Science Magazine[1] describing a new memory vacuum
tube it had developed, RCA stated:
"...the results of countless computations can be
kept on le and taken out again. Such a le
now exists in a memory tube developed at RCA
1
2 FILE CONTENTS
cate a few bytes for metadata, which allows a le to carry may contain lines of text, corresponding to printed lines
some basic information about itself.
on a piece of paper. Alternatively, a le may contain an
Some le systems can store arbitrary (not interpreted by arbitrary binary image (a BLOB) or it may contain an
the le system) le-specic data outside of the le format, executable.
but linked to the le, for example extended attributes or
forks. On other le systems this can be done via sidecar
les or software-specic databases. All those methods,
however, are more susceptible to loss of metadata than
are container and archive le formats.
2.1
File size
2.2
Organization of data in a le
Write data to a le
Close a le, terminating the association between it
and the program
Files on a computer can be created, moved, modied,
grown, shrunk, and deleted. In most cases, computer
programs that are executed on the computer handle these
operations, but the user of a computer can also manipulate les if necessary. For instance, Microsoft Word les
are normally created and modied by the Microsoft Word
program in response to user commands, but the user can
also move, rename, or delete these les directly by using
3
a le manager program such as Windows Explorer (on using names (lenames). In some operating systems, the
Windows computers) or by command lines (CLI).
name is associated with the le itself. In others, the le
In Unix-like systems, user-space programs do not oper- is anonymous, and is pointed to by links that have names.
ate directly, at a low level, on a le. Only the kernel In the latter case, a user can identify the name of the link
deals with les, and it handles all user-space interaction with the le itself, but this is a false analogue, especially
with les in a manner that is transparent to the user- where there exists more than one link to the same le.
space programs. The operating system provides a level
of abstraction, which means that interaction with a le
from user-space is simply through its lename (instead of
its lehandle). For example, rm lename will not delete
the le itself, but only a link to the le. There can be
many links to a le, but when they are all removed, the
kernel considers that les memory space free to be reallocated. This free space is commonly considered a security risk (due to the existence of le recovery software).
Any secure-deletion program uses kernel-space (system)
functions to wipe the les data.
(root)
Logfile
Widgets
Foobar
Payroll
Employees
Timecards
Salaries
Managers
Leads
Clerks
Files and folders arranged in a hierarchy
Files (or links to les) can be located in directories. However, more generally, a directory can contain either a list
of les or a list of links to les. Within this denition, it
is of paramount importance that the term le includes
directories. This permits the existence of directory hierarchies, i.e., directories containing sub-directories. A
name that refers to a le within a directory must be typically unique. In other words, there must be no identical
names within a directory. However, in some operating
systems, a name may include a specication of type that
means a directory can contain an identical name for more
than one type of object such as a directory and a le.
In environments in which a le is named, a les name
and the path to the les directory must uniquely identify it among all other les in the computer systemno
two les can have the same name and path. Where a le
is anonymous, named references to it will exist within a
namespace. In most cases, any name within the namespace will refer to exactly zero or one le. However, any
le may be represented within any namespace by zero,
one or more names.
Any string of characters may or may not be a well-formed
name for a le or a link depending upon the context of application. Whether or not a name is well-formed depends
on the type of computer system being used. Early computers permitted only a few letters or digits in the name of
a le, but modern computers allow long names (some up
to 255 characters) containing almost any combination of
unicode letters or unicode digits, making it easier to understand the purpose of a le at a glance. Some computer
systems allow le names to contain spaces; others do not.
Case-sensitivity of le names is determined by the le
system. Unix le systems are usually case sensitive and
allow user-level applications to create les whose names
dier only in the case of characters. Microsoft Windows
supports multiple le systems, each with dierent policies regarding case-sensitivity. The common FAT le
system can have multiple les whose names dier only
in case if the user uses a disk editor to edit the le names
in the directory entries. User applications, however, will
usually not allow the user to create multiple les with the
same name but diering in case.
Most computers organize les into hierarchies using folders, directories, or catalogs. The concept is the same irrespective of the terminology used. Each folder can contain
an arbitrary number of les, and it can also contain other
folders. These other folders are referred to as subfolders.
Subfolders can contain still more les and folders and so
on, thus building a tree-like structure in which one master folder (or root folder the name varies from one
6 BACK UP
operating system to another) can contain any number of computer system to hide essential system les that users
levels of other folders and les. Folders can be named should not alter.
just as les can (except for the root folder, which often
does not have a name). The use of folders makes it easier
to organize les in a logical way.
When a computer allows the use of folders, each le
and folder has not only a name of its own, but also a
path, which identies the folder or folders in which a
le or folder resides. In the path, some sort of special charactersuch as a slashis used to separate the
le and folder names. For example, in the illustration
shown in this article, the path /Payroll/Salaries/Managers
uniquely identies a le called Managers in a folder called
Salaries, which in turn is contained in a folder called Payroll. The folder and le names are separated by slashes
in this example; the topmost or root folder has no name,
and so the path begins with a slash (if the root folder had
a name, it would precede this rst slash).
5 Storage
5
dia that can be taken away from the computer and stored
in a safe, distant location.
The grandfather-father-son backup method automatically
makes three back-ups; the grandfather le is the oldest
copy of the le and the son is the current copy.
The way a computer organizes, names, stores and manipulates les is globally referred to as its le system. Most
computers have at least one le system. Some computers allow the use of several dierent le systems. For
instance, on newer MS Windows computers, the older
FAT-type le systems of MS-DOS and old versions of
Windows are supported, in addition to the NTFS le system that is the normal le system for recent versions of
Windows. Each system has its own advantages and disadvantages. Standard FAT allows only eight-character le
names (plus a three-character extension) with no spaces,
for example, whereas NTFS allows much longer names
that can contain spaces. You can call a le Payroll
records in NTFS, but in FAT you would be restricted to
something like payroll.dat (unless you were using VFAT,
a FAT extension allowing long le names).
File manager programs are utility programs that allow
users to manipulate les directly. They allow you to
move, create, delete and rename les and folders, although they do not actually allow you to read the contents
of a le or store information in it. Every computer system
provides at least one le-manager program for its native
le system. For example, File Explorer (formerly Windows Explorer) is commonly used in Microsoft Windows
operating systems, and Nautilus is common under several
distributions of Linux.
See also
Block (data storage)
Computer le management
Data hierarchy
File camouage
File copying
File conversion
File deletion
File directory
File manager
File system
Filename
Flat le database
Object composition
Soft copy
9 Notes
[1] Popular Science Magazine, February 1950, page 96.
Books.google.com. Retrieved 2014-03-07.
[2] Robert S. Casey, et al. Punched Cards: Their Applications
to Science and Industry, 1952.
[3] Martin H. Weik. Ballistic Research Laboratories Report
#1115. March 1961. pp. 314-331.
[4] Online Etymology Dictionary.
[5] Magnetic Storage Handbook 2nd Ed., Section 2.1.1, Disk
File Technology, Mee and Daniel, (c)1990,
10 External links
Data Formats Computer le at DMOZ
11
11
11.1
11.2
Images
11.3
Content license