Hi All,
Most of the people heared about file systems .so now i am showing some thing about this filesystem....
The method for storing and retrieving files on a disk. It is system software that takes commands from the operating system to read
and write the disk clusters (groups of sectors). The file system manages a folder/directory structure, which provides an index to the files,
and it defines the syntax used to access them (how the "path" to the file is coded). File systems dictate how files are named as well as the
maximum size of a file or volume.
There are numerous file systems in use; for example, FAT32 and NTFS are Windows file systems, and HFS(Hierarchical File System) is used on Macs. Linux uses ext2, ext3,ext4 and FAT32.
Unix systems use UFS, ext2, ext3,ext4 and ZFS. See cluster, path, FAT32, NTFS, HFS, NFS, UFS, ext, ZFS and hierarchical file system.
A data processing application that manages individual files. It opens, closes, reads and writes the file as a single entity. In a file system,
files are related to each other by customized programming (customers to orders, vendors to purchases, etc.). Contrast with a "relational database,
"which has built-in constructs that can more easily form these relationships. For example, they can be used to join files together and split them apart,
all without tedious programming. See relational database and DBMS.
WINDOWS :FAT16,FAT32,NTFS FILE SYSTEM
LINUX :EXT2,EXT3 AND LATEST ONE IS EXT4 FILE SYSTEM(MAC OS ALSO )
UNIX :UFS,EXT,ZFS.
THANK U...................
Sunday, December 5, 2010
Subscribe to:
Post Comments (Atom)
Popular Posts
-
H i All, In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when ...
-
Hi All, guess who is this guy ? He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest...
-
Hi All, Most of the hackers are using this tool for finding vulnerablities in the network.Mostly the penetrating tester are using this t...
-
Hi All, HACK your friend's keyboard and make him type "You are a FOOL" simultaneously: First open a note pad and copy the ...
-
Hi All, Want to have a look at the tools which Jester (the one who did a Ddos distributed denial of service) attack against Wikileaks ? j...
-
Hi All, If you are using Internet Explorer, Outlook or any Application, you can get Dr .Watson Postmortem Debugger error. You can also obse...
-
Hi All, In computer storage devices are devided in to 2 types . Those are 1. primary storage devices . 2. secondary storage devices. ...
-
Hi All, Navigating Google search results with keyboard keys is a long awaited feature. Shortcuts will save your time and speed up your wo...
-
Hi All, This list offers hundreds of operating system product and project names, many of them are based on the same operating system more ...
Followers
Disclaimer
All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
No comments:
Post a Comment