SlideShare a Scribd company logo
1 of 19
Download to read offline
FILES IN operating
system
By,
T.G.PREETHI
19IFTE073
CONTENT ( FILES )
1. Text file (doc)
2. Plain text file (txt)
3. MP3Audio file
4. MIDI file (mid)
5. Data file (ppt)
6. Video file (mpeg)
7. Image file (jpeg)
8. GIF file
9. Spreadsheet file (xls)
10. Database file
11. SQL Database file
12. Game file
13. HTML file
14. PHP file
15. PDFfile
FILE EXTENSIONS
• It is also known as file name extension.
• A file extension is the suffix at the end of a file name that indicates
what type of file it is.
• It is a set of charactersthat helps windows understandwhat kind of
informationis in a file and what program shouldopen it.
• EXAMPLE : image.jpg
image – filename,
.jpg - file extension
1.TEXT FILE
Microsoft Word Document
➢ A word processing document created by Microsoft Word.
➢ It may contain formatted text,images,tables,graphs,charts.
S.NO ATTRIBUTES EXAMPLE
1. File name preethi1
2. Extension .doc
3. Location C:usersELCOTDesktop
4. Size 100 KB
5. Time 10 : 30 : 59
6. Date 19 August2020
7. Password 123456
2.Plain text file
❖ Standard text document that contains unformatted text;
❖ It recognized by any text editing or word processing
program;
❖ It can also be processed by most other software programs.
S.NO ATTRIBUTES EXAMPLE
1. File name preethi2
2. Extension .txt
3. Size 500 KB
4. Location C:usersELCOTDocuments
5. Date and Time 20 August 2020 and 11 : 45 : 19
6. Password 123745
3.AUDIO FILE
MP3Audio file
✓ It is used to commonly store music files and audiobooks on a
hard drive
✓ The quality of an MP3 file depends largely on the bit rate
used for compression.
S.NO ATTRIBUTES EXAMPLE
1. File name Mahabharatham theme music
2. Extension .mp3
3. File size 50 MB
4. Location C:usersELCOT
5. Created Time 09 : 10 : 33
6. Created Date 21 August 2020
4. Midi file
Musical Instrument Digital Interface ( MIDI )
▪ It contains attributes of music data rather than music data itself.
▪ They can be played back using data software instruments that interpret
this data
S.NO ATTRIBUTES EXAMPLE
1. File name Prayer song
2. Extension .mid
3. Location C:userspreethimusic
4. File size 20 MB
5. Date 22 August 2020
6. Time 08 : 20 : 53
5. DATa file
PowerPoint Presentation
• It is editable slide show created with Microsoft Powerpoint;
• It is often used for presentations or slideshows
S.NO ATTRIBUTES EXAMPLE
1. File name Files in operating system
2. Extension .ppt
3. Location C:usersdocuments
4. File size 15 MB
5. Date and Time 25 August 2020 and 07 : 26 : 35
6. Owner dell)owner
6. Video file
MPEG Video File
▪ It is common digital video format standardized by the Moving Picture
Experts Group (MPEG) .
▪ It is often used for creating movies that are distributed on the internet
S.NO ATTRIBUTES EXAMPLE
1. File name songs
2. Extension .mpeg
3. Location C:usersvideos
4. File size 400 MB
5. Time and date 06 ; 15 : 36 and 26 August 2020
6. password 5689325
7. Image file
JPEG Image File
❖ The most used image file format and it is commonly used for storing
digital photos since the format supports up to 24-bit color;
❖ Therefore,most digital cameras save images as JPG files by default.
S.NO ATTRIBUTES EXAMPLE
1. File name Garden
2. Extension .jpeg
3. Location C:usersphotos
4. File size 50 MB
5. Date and Time 26 August 2020 and
6. Password 90038310
8. Graphical interchange
format file
➢ GIF Files are common format for web graphics , especially
small images.
➢ Images that contain text , such as navigation buttons .
S.NO ATTRIBUTES EXAMPLE
1. File name Krishna
2. extension .gif
3. Location C:usersphotos
4. File size 70 MB
5. Date and Time 28 August 2020 and 04 : 16 :46
6. Password 9344153
9. Spreadsheet file
Excel Spreadsheet
✓ A spreadsheet created by Microsoft Excel ,the most widely-used
spreadsheet program;
✓ It stores data in a table with rows and columns .
✓ It is often used to create charts and graphs.
S.NO ATTRIBUTES EXAMPLE
1. File name Student details
2. Extension .xls
3. Location C:usersdocuments
4. File Size 90 MB
5. Date and Time 29 August 2020 and 03 ; 56 :19
6. Password 8925169
10. Database file
➢ A Database file used on mobile devices such as Android,IOS and
Windows phone 7.
➢ It is often stores contacts and SMS information but may store any type
of device or application data.
S.NO ATTRIBUTES EXAMPLE
1. File name Employee details
2. Extension .db
3. Location C:usersdocuments
4. File size 110 MB
5. Date and Time 17 August 2020 and 15 ; 46 ; 19
6. Password 88702532
11. Sql database file
Structured Query Language Data
❖ It contains SQL Code used to modify the contents of a relational database ;
❖ It may contain statements for creating or modifying database structures or may contain
insertions , updates , deletions and other SQL operations.
S.NO ATTRIBUTES EXAMPLE
1. File name Customer details
2. Extension .sql
3. File Size 150 MB
4. Location C:usersdocuments
5. Date and Time 5 August 2020 and 05 : 16: 49
6. Password 91065963
12. Game file
Saved Game File
❑ A File created by various video games to store saved games;
❑ It may be manually saved by the user or automatically saved by the
program.
S.NO ATTRIBUTES EXAMPLE
1. File name Subway surfers
2. Extension .gam
3. File size 500 MB
4. Location C:usersdownloads
5. Date and Time 6 August 2020 and 09: 15: 58
6. Password 74846642
13. Web file
Hypertext Markup Language File
• Web page used by Web browsers and it contains markup code that is
stored on a plain text format.
• It is used to display and format text and images in a Web browser.
S.NO ATTRIBUTES EXAMPLE
1. File name praveena
2. Extension .html
3. File size 4.00 KB
4. Location C:usersdocuments
5. Date and TIme 8 August 2020 and 02 : 56: 13
6. Password 56413212
14. Hypertext
preprocessor file
➢It may includePHP Functions that can processonline forms .
➢It get the date and time or access informationfrom a database
S.NO ATTRIBUTES EXAMPLE
1. File name Smallest_number
2. Extension .php
3. File Size 6.00 KB
4. Location C:usershtdocssmallest_number
5. Date and Time 4 August 2020 and 01 : 23: 14
6. Password 56421210
15. Portable
document format
✓ A file format that has captured all the elements of a printed document
as an electronic image that you can view , navigate, print or forward
to someone else.
S.NO ATTRIBUTES EXAMPLE
1. File name Operating system
2. Extension .pdf
3. File size 100 MB
4. Location C:usersdocuments
5. Date and Time 27 August 2020 and 05 : 10 : 29
6. Password 75986221
THANK YOU…..!

More Related Content

What's hot

File management ppt
File management pptFile management ppt
File management pptmarotti
 
Degonto file management
Degonto file managementDegonto file management
Degonto file managementDegonto Islam
 
File management
File managementFile management
File managementsumathiv9
 
File management - ICT IGCSE Chapter 11
File management - ICT IGCSE Chapter 11File management - ICT IGCSE Chapter 11
File management - ICT IGCSE Chapter 11sayali patade
 
Metadata Security: MetaShield Protector
Metadata Security: MetaShield ProtectorMetadata Security: MetaShield Protector
Metadata Security: MetaShield ProtectorChema Alonso
 
Defcon 17 Tactical Fingerprinting using Foca
Defcon 17   Tactical Fingerprinting using FocaDefcon 17   Tactical Fingerprinting using Foca
Defcon 17 Tactical Fingerprinting using FocaChema Alonso
 
Files & folders.38
Files & folders.38Files & folders.38
Files & folders.38myrajendra
 
Wonder share data recovery mac
Wonder share data recovery macWonder share data recovery mac
Wonder share data recovery macsean kingston
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File ManagementDamian T. Gordon
 
Nokia and maemo in the new GNOME mobile context
 Nokia and maemo in the new GNOME mobile context Nokia and maemo in the new GNOME mobile context
Nokia and maemo in the new GNOME mobile contextqgil
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating SystemJanki Shah
 

What's hot (20)

File management ppt
File management pptFile management ppt
File management ppt
 
File Management
File ManagementFile Management
File Management
 
Degonto file management
Degonto file managementDegonto file management
Degonto file management
 
File management
File management File management
File management
 
File management
File managementFile management
File management
 
File Management
File ManagementFile Management
File Management
 
File management - ICT IGCSE Chapter 11
File management - ICT IGCSE Chapter 11File management - ICT IGCSE Chapter 11
File management - ICT IGCSE Chapter 11
 
File Management
File ManagementFile Management
File Management
 
File management
File managementFile management
File management
 
Metadata Security: MetaShield Protector
Metadata Security: MetaShield ProtectorMetadata Security: MetaShield Protector
Metadata Security: MetaShield Protector
 
Defcon 17 Tactical Fingerprinting using Foca
Defcon 17   Tactical Fingerprinting using FocaDefcon 17   Tactical Fingerprinting using Foca
Defcon 17 Tactical Fingerprinting using Foca
 
File Management
File ManagementFile Management
File Management
 
Files & folders.38
Files & folders.38Files & folders.38
Files & folders.38
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Wonder share data recovery mac
Wonder share data recovery macWonder share data recovery mac
Wonder share data recovery mac
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File Management
 
File management
File managementFile management
File management
 
Nokia and maemo in the new GNOME mobile context
 Nokia and maemo in the new GNOME mobile context Nokia and maemo in the new GNOME mobile context
Nokia and maemo in the new GNOME mobile context
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
OS & File System
OS & File SystemOS & File System
OS & File System
 

Similar to FILES IN OPERATING SYSTEMS

FILE AND TYPES OF FILE
FILE AND TYPES OF FILEFILE AND TYPES OF FILE
FILE AND TYPES OF FILEzameer hussain
 
Data security and Data Transfer
Data security and Data Transfer Data security and Data Transfer
Data security and Data Transfer Rita Puerta
 
HKU Data Curation MLIM7350 Student Project: Data Curation Workshop
HKU Data Curation MLIM7350 Student Project: Data Curation WorkshopHKU Data Curation MLIM7350 Student Project: Data Curation Workshop
HKU Data Curation MLIM7350 Student Project: Data Curation Workshopl_ernest
 
Bba203 unit 2data processing concepts
Bba203   unit 2data processing conceptsBba203   unit 2data processing concepts
Bba203 unit 2data processing conceptskinjal patel
 
SharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDrive
SharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDriveSharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDrive
SharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDriveBIWUG
 
Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Abdullah khawar
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptxSachinGosavi15
 
Bareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp StorzBareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp StorzNETWAYS
 
Files concepts.53
Files concepts.53Files concepts.53
Files concepts.53myrajendra
 
Advantages Of SAMBA
Advantages Of SAMBAAdvantages Of SAMBA
Advantages Of SAMBAAngela Hays
 
WEB DESIGNING MODULE
WEB DESIGNING MODULEWEB DESIGNING MODULE
WEB DESIGNING MODULEmar jun
 
Web Browser
Web BrowserWeb Browser
Web BrowserKZCheng
 
Jack of all Formats
Jack of all FormatsJack of all Formats
Jack of all FormatsBaronZor
 
A R T D M171 Week14 Multimedia
A R T D M171  Week14  MultimediaA R T D M171  Week14  Multimedia
A R T D M171 Week14 MultimediaGilbert Guerrero
 

Similar to FILES IN OPERATING SYSTEMS (20)

File management.pptx
File management.pptxFile management.pptx
File management.pptx
 
FILE AND TYPES OF FILE
FILE AND TYPES OF FILEFILE AND TYPES OF FILE
FILE AND TYPES OF FILE
 
Data security
Data securityData security
Data security
 
Data security and Data Transfer
Data security and Data Transfer Data security and Data Transfer
Data security and Data Transfer
 
HKU Data Curation MLIM7350 Student Project: Data Curation Workshop
HKU Data Curation MLIM7350 Student Project: Data Curation WorkshopHKU Data Curation MLIM7350 Student Project: Data Curation Workshop
HKU Data Curation MLIM7350 Student Project: Data Curation Workshop
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Bba203 unit 2data processing concepts
Bba203   unit 2data processing conceptsBba203   unit 2data processing concepts
Bba203 unit 2data processing concepts
 
SharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDrive
SharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDriveSharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDrive
SharePoint Saturday Belgium 2014 All about OneDrive for Business and OneDrive
 
Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)Pf cs102 programming-8 [file handling] (1)
Pf cs102 programming-8 [file handling] (1)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Handling computer files
Handling computer filesHandling computer files
Handling computer files
 
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
219568662-QUICK-Cloud-Storage-Forensic-Analysis-Presentation.pptx
 
Bareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp StorzBareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp Storz
 
Files concepts.53
Files concepts.53Files concepts.53
Files concepts.53
 
Advantages Of SAMBA
Advantages Of SAMBAAdvantages Of SAMBA
Advantages Of SAMBA
 
WEB DESIGNING MODULE
WEB DESIGNING MODULEWEB DESIGNING MODULE
WEB DESIGNING MODULE
 
Web Browser
Web BrowserWeb Browser
Web Browser
 
Jack of all Formats
Jack of all FormatsJack of all Formats
Jack of all Formats
 
A R T D M171 Week14 Multimedia
A R T D M171  Week14  MultimediaA R T D M171  Week14  Multimedia
A R T D M171 Week14 Multimedia
 
Google Drive
Google Drive Google Drive
Google Drive
 

More from Preethi T G

Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. ForouzanPreethi T G
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Preethi T G
 
Multimedia by Tay Vaughan
Multimedia by Tay Vaughan Multimedia by Tay Vaughan
Multimedia by Tay Vaughan Preethi T G
 
National symbols of india
National symbols of indiaNational symbols of india
National symbols of indiaPreethi T G
 
Various cultures in Tamil Nadu
Various cultures in Tamil NaduVarious cultures in Tamil Nadu
Various cultures in Tamil NaduPreethi T G
 
Normalization in relational database management systems
Normalization in relational database management systemsNormalization in relational database management systems
Normalization in relational database management systemsPreethi T G
 
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...Preethi T G
 
binary tree representation and traversal
binary tree representation and traversal binary tree representation and traversal
binary tree representation and traversal Preethi T G
 
Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide webPreethi T G
 
Fundamental Rights and Duties
Fundamental Rights and DutiesFundamental Rights and Duties
Fundamental Rights and DutiesPreethi T G
 
Software engineering project(Bikes and scooters rental system)
Software engineering project(Bikes and scooters rental system)Software engineering project(Bikes and scooters rental system)
Software engineering project(Bikes and scooters rental system)Preethi T G
 
Principles of programming languages(Functional programming Languages using LISP)
Principles of programming languages(Functional programming Languages using LISP)Principles of programming languages(Functional programming Languages using LISP)
Principles of programming languages(Functional programming Languages using LISP)Preethi T G
 
Relational Database Management System(TCS)
Relational Database Management System(TCS)Relational Database Management System(TCS)
Relational Database Management System(TCS)Preethi T G
 
Computer organisation and architecture
Computer organisation and architectureComputer organisation and architecture
Computer organisation and architecturePreethi T G
 

More from Preethi T G (14)

Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
 
Multimedia by Tay Vaughan
Multimedia by Tay Vaughan Multimedia by Tay Vaughan
Multimedia by Tay Vaughan
 
National symbols of india
National symbols of indiaNational symbols of india
National symbols of india
 
Various cultures in Tamil Nadu
Various cultures in Tamil NaduVarious cultures in Tamil Nadu
Various cultures in Tamil Nadu
 
Normalization in relational database management systems
Normalization in relational database management systemsNormalization in relational database management systems
Normalization in relational database management systems
 
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
 
binary tree representation and traversal
binary tree representation and traversal binary tree representation and traversal
binary tree representation and traversal
 
Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide web
 
Fundamental Rights and Duties
Fundamental Rights and DutiesFundamental Rights and Duties
Fundamental Rights and Duties
 
Software engineering project(Bikes and scooters rental system)
Software engineering project(Bikes and scooters rental system)Software engineering project(Bikes and scooters rental system)
Software engineering project(Bikes and scooters rental system)
 
Principles of programming languages(Functional programming Languages using LISP)
Principles of programming languages(Functional programming Languages using LISP)Principles of programming languages(Functional programming Languages using LISP)
Principles of programming languages(Functional programming Languages using LISP)
 
Relational Database Management System(TCS)
Relational Database Management System(TCS)Relational Database Management System(TCS)
Relational Database Management System(TCS)
 
Computer organisation and architecture
Computer organisation and architectureComputer organisation and architecture
Computer organisation and architecture
 

Recently uploaded

Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Recently uploaded (20)

Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

FILES IN OPERATING SYSTEMS

  • 2. CONTENT ( FILES ) 1. Text file (doc) 2. Plain text file (txt) 3. MP3Audio file 4. MIDI file (mid) 5. Data file (ppt) 6. Video file (mpeg) 7. Image file (jpeg) 8. GIF file 9. Spreadsheet file (xls) 10. Database file 11. SQL Database file 12. Game file 13. HTML file 14. PHP file 15. PDFfile
  • 3. FILE EXTENSIONS • It is also known as file name extension. • A file extension is the suffix at the end of a file name that indicates what type of file it is. • It is a set of charactersthat helps windows understandwhat kind of informationis in a file and what program shouldopen it. • EXAMPLE : image.jpg image – filename, .jpg - file extension
  • 4. 1.TEXT FILE Microsoft Word Document ➢ A word processing document created by Microsoft Word. ➢ It may contain formatted text,images,tables,graphs,charts. S.NO ATTRIBUTES EXAMPLE 1. File name preethi1 2. Extension .doc 3. Location C:usersELCOTDesktop 4. Size 100 KB 5. Time 10 : 30 : 59 6. Date 19 August2020 7. Password 123456
  • 5. 2.Plain text file ❖ Standard text document that contains unformatted text; ❖ It recognized by any text editing or word processing program; ❖ It can also be processed by most other software programs. S.NO ATTRIBUTES EXAMPLE 1. File name preethi2 2. Extension .txt 3. Size 500 KB 4. Location C:usersELCOTDocuments 5. Date and Time 20 August 2020 and 11 : 45 : 19 6. Password 123745
  • 6. 3.AUDIO FILE MP3Audio file ✓ It is used to commonly store music files and audiobooks on a hard drive ✓ The quality of an MP3 file depends largely on the bit rate used for compression. S.NO ATTRIBUTES EXAMPLE 1. File name Mahabharatham theme music 2. Extension .mp3 3. File size 50 MB 4. Location C:usersELCOT 5. Created Time 09 : 10 : 33 6. Created Date 21 August 2020
  • 7. 4. Midi file Musical Instrument Digital Interface ( MIDI ) ▪ It contains attributes of music data rather than music data itself. ▪ They can be played back using data software instruments that interpret this data S.NO ATTRIBUTES EXAMPLE 1. File name Prayer song 2. Extension .mid 3. Location C:userspreethimusic 4. File size 20 MB 5. Date 22 August 2020 6. Time 08 : 20 : 53
  • 8. 5. DATa file PowerPoint Presentation • It is editable slide show created with Microsoft Powerpoint; • It is often used for presentations or slideshows S.NO ATTRIBUTES EXAMPLE 1. File name Files in operating system 2. Extension .ppt 3. Location C:usersdocuments 4. File size 15 MB 5. Date and Time 25 August 2020 and 07 : 26 : 35 6. Owner dell)owner
  • 9. 6. Video file MPEG Video File ▪ It is common digital video format standardized by the Moving Picture Experts Group (MPEG) . ▪ It is often used for creating movies that are distributed on the internet S.NO ATTRIBUTES EXAMPLE 1. File name songs 2. Extension .mpeg 3. Location C:usersvideos 4. File size 400 MB 5. Time and date 06 ; 15 : 36 and 26 August 2020 6. password 5689325
  • 10. 7. Image file JPEG Image File ❖ The most used image file format and it is commonly used for storing digital photos since the format supports up to 24-bit color; ❖ Therefore,most digital cameras save images as JPG files by default. S.NO ATTRIBUTES EXAMPLE 1. File name Garden 2. Extension .jpeg 3. Location C:usersphotos 4. File size 50 MB 5. Date and Time 26 August 2020 and 6. Password 90038310
  • 11. 8. Graphical interchange format file ➢ GIF Files are common format for web graphics , especially small images. ➢ Images that contain text , such as navigation buttons . S.NO ATTRIBUTES EXAMPLE 1. File name Krishna 2. extension .gif 3. Location C:usersphotos 4. File size 70 MB 5. Date and Time 28 August 2020 and 04 : 16 :46 6. Password 9344153
  • 12. 9. Spreadsheet file Excel Spreadsheet ✓ A spreadsheet created by Microsoft Excel ,the most widely-used spreadsheet program; ✓ It stores data in a table with rows and columns . ✓ It is often used to create charts and graphs. S.NO ATTRIBUTES EXAMPLE 1. File name Student details 2. Extension .xls 3. Location C:usersdocuments 4. File Size 90 MB 5. Date and Time 29 August 2020 and 03 ; 56 :19 6. Password 8925169
  • 13. 10. Database file ➢ A Database file used on mobile devices such as Android,IOS and Windows phone 7. ➢ It is often stores contacts and SMS information but may store any type of device or application data. S.NO ATTRIBUTES EXAMPLE 1. File name Employee details 2. Extension .db 3. Location C:usersdocuments 4. File size 110 MB 5. Date and Time 17 August 2020 and 15 ; 46 ; 19 6. Password 88702532
  • 14. 11. Sql database file Structured Query Language Data ❖ It contains SQL Code used to modify the contents of a relational database ; ❖ It may contain statements for creating or modifying database structures or may contain insertions , updates , deletions and other SQL operations. S.NO ATTRIBUTES EXAMPLE 1. File name Customer details 2. Extension .sql 3. File Size 150 MB 4. Location C:usersdocuments 5. Date and Time 5 August 2020 and 05 : 16: 49 6. Password 91065963
  • 15. 12. Game file Saved Game File ❑ A File created by various video games to store saved games; ❑ It may be manually saved by the user or automatically saved by the program. S.NO ATTRIBUTES EXAMPLE 1. File name Subway surfers 2. Extension .gam 3. File size 500 MB 4. Location C:usersdownloads 5. Date and Time 6 August 2020 and 09: 15: 58 6. Password 74846642
  • 16. 13. Web file Hypertext Markup Language File • Web page used by Web browsers and it contains markup code that is stored on a plain text format. • It is used to display and format text and images in a Web browser. S.NO ATTRIBUTES EXAMPLE 1. File name praveena 2. Extension .html 3. File size 4.00 KB 4. Location C:usersdocuments 5. Date and TIme 8 August 2020 and 02 : 56: 13 6. Password 56413212
  • 17. 14. Hypertext preprocessor file ➢It may includePHP Functions that can processonline forms . ➢It get the date and time or access informationfrom a database S.NO ATTRIBUTES EXAMPLE 1. File name Smallest_number 2. Extension .php 3. File Size 6.00 KB 4. Location C:usershtdocssmallest_number 5. Date and Time 4 August 2020 and 01 : 23: 14 6. Password 56421210
  • 18. 15. Portable document format ✓ A file format that has captured all the elements of a printed document as an electronic image that you can view , navigate, print or forward to someone else. S.NO ATTRIBUTES EXAMPLE 1. File name Operating system 2. Extension .pdf 3. File size 100 MB 4. Location C:usersdocuments 5. Date and Time 27 August 2020 and 05 : 10 : 29 6. Password 75986221