Вы находитесь на странице: 1из 6

What is file management?

The data that we work with on computers is kept in a hierarchical file system in which
directories have files and subdirectories beneath them. Although we use the computer
operating system to keep our image data organized, how we name files and folders, how
we arrange these nested folders, and how we handle the files in these folders are the
fundamental aspects of file management. The operating system's organization of our data
can be enhanced by the use of cataloging programs, which make organizing and finding
image files easier than simply relying on the computer's directory structure. Another
feature of catalog programs is that they can streamline backup procedures for better file
protection.

File Management System

File management describes the fundamental methods for naming, storing and
handling files. By using appropriate file and folder naming strategies, along with
good metadata practice and catalog software, you can make the most of your
image collection.

Also referred to as simply a file system or file-system. The system that an operating system or
program uses to organize and keep track of files. For example, a hierarchical file system is one
that uses directories to organize files into a tree structure.

Although the operating system provides its own file management system, you can buy
separate file management systems. These systems interact smoothly with the operating
system but provide more features, such as improved backup procedures and stricter file
protection.
File manager

A file manager or file browser is a computer program that provides a user interface to work
with file systems. The most common operations performed on files or groups of files are:
create, open, edit, view, print, play, rename, move, copy, delete, search/find, and modify
attributes, properties and permissions. Files are typically displayed in a hierarchy. Some file
managers contain features inspired by web browsers, including forward and back navigational
buttons.

Some file managers provide network connectivity via protocols, such as FTP, NFS, SMB or
WebDAV. This is achieved by allowing the user to browse for a file server (connecting and
accessing the server's file system like a local file system) or by providing its own full client
implementations for file server protocols.

Networking
A computer network, often simply referred to as a network, is a collection of computers and
devices interconnected by communications channels that facilitate communications and allows
sharing of resources and information among interconnected devices.Computer networking or
Data communications (Datacom) is the engineering discipline concerned with the computer
networks. Computer networking is sometimes considered a sub-discipline of electrical
engineering, telecommunications, computer science, information technology and/or computer
engineering since it relies heavily upon the theoretical and practical application of these
scientific and engineering disciplines.

The three types of networks are: the Internet, the intranet, and the extranet. Examples of
different network methods are:
Local area network (LAN), which is usually a small network constrained to a small
geographic area. An example of a LAN would be a computer network within a building.
Metropolitan area network (MAN), which is used for medium size area. examples for a
city or a state.
Wide area network (WAN) that is usually a larger network that covers a large
geographic area.
Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and
WAN.
Networks may be classified according to a wide variety of characteristics such as topology,
connection method and scale.
All networks are interconnected to allow communication with a variety of different kinds of
media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and
various wireless technologies.[2] The devices can be separated by a few meters (e.g. via
Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet).[3]
Networking, routers, routing protocols, and networking over the public Internet have their
specifications defined in documents called RFCs
Purpose
Computer networks can be used for a variety of purposes:
Facilitating communications
Using a network, people can communicate efficiently and easily via email, instant
messaging, chat rooms, telephone, video telephone calls, and video conferencing.
Sharing hardware
In a networked environment, each computer on a network may access and use hardware
resources on the network, such as printing a document on a shared network printer.
Sharing files, data, and information
In a network environment, authorized user may access data and information stored on
other computers on the network. The capability of providing access to data and information on
shared storage devices is an important feature of many networks.
Sharing software
Users connected to a network may run application programs on remote computers.

Internet

The Internet is a global system of interconnected computer networks that use the standard
Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of
networks that consists of millions of private, public, academic, business, and government
networks, of local to global scope, that are linked by a broad array of electronic, wireless and
optical networking technologies. The Internet carries a vast range of information resources
and services, such as the inter-linked hypertext documents of the World Wide Web (WWW)
and the infrastructure to support electronic mail.

Most traditional communications media including telephone, music, film, and television are
reshaped or redefined by the Internet, giving birth to new services such as Voice over Internet
Protocol (VoIP) and IPTV. Newspaper, book and other print publishing are adapting to Web
site technology, or are reshaped into blogging and web feeds. The Internet has enabled or
accelerated new forms of human interactions through instant messaging, Internet forums, and
social networking. Online shopping has boomed both for major retail outlets and small artisans
and traders. Business-to-business and financial services on the Internet affect supply chains
across entire industries.

The origins of the Internet reach back to research of the 1960s, commissioned by the United
States government in collaboration with private commercial interests to build robust, fault-
tolerant, and distributed computer networks. The funding of a new U.S. backbone by the
National Science Foundation in the 1980s, as well as private funding for other commercial
backbones, led to worldwide participation in the development of new networking technologies,
and the merger of many networks. The commercialization of what was by the 1990s an
international network resulted in its popularization and incorporation into virtually every
aspect of modern human life. As of 2009, an estimated quarter of Earth's population used the
services of the Internet.

The Internet has no centralized governance in either technological implementation or policies


for access and usage; each constituent network sets its own standards. Only the overreaching
definitions of the two principal name spaces in the Internet, the Internet Protocol address
space and the Domain Name System, are directed by a maintainer organization, the Internet
Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and
standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering
Task Force (IETF), a non-profit organization of loosely affiliated international participants that
anyone may associate with by contributing technical expertise.
Terminology

Internet is a short form of the technical term internetwork, the result of interconnecting
computer networks with special gateways or routers. The Internet is also often referred to as
the Net.
The term the Internet, when referring to the entire global system of IP networks, has been
treated as a proper noun and written with an initial capital letter. In the media and popular
culture a trend has also developed to regard it as a generic term or common noun and thus
write it as "the internet", without capitalization. Some guides specify that the word should be
capitalized as a noun but not capitalized as an adjective.

Depiction of the Internet as a cloud in network diagrams


The terms Internet and World Wide Web are often used in everyday speech without much
distinction. However, the Internet and the World Wide Web are not one and the same. The
Internet is a global data communications system. It is a hardware and software infrastructure
that provides connectivity between computers. In contrast, the Web is one of the services
communicated via the Internet. It is a collection of interconnected documents and other
resources, linked by hyperlinks and URLs.
In many technical illustrations when the precise location or interrelation of Internet resources
is not important, extended networks such as the Internet are often depicted as a cloud. The
verbal image has been formalized in the newer concept of cloud computing.

Email

Electronic mail, commonly called email or e-mail, is a method of exchanging digital messages
from an author to one or more recipients. Modern email operates across the Internet or other
computer networks. Some early email systems required that the author and the recipient both
be online at the same time, a la instant messaging. Today's email systems are based on a
store-and-forward model. Email servers accept, forward, deliver and store messages. Neither
the users nor their computers are required to be online simultaneously; they need connect
only briefly, typically to an email server, for as long as it takes to send or receive messages.

An email message consists of three components, the message envelope, the message header,
and the message body. The message header contains control information, including,
minimally, an originator's email address and one or more recipient addresses. Usually
descriptive information is also added, such as a subject header field and a message
submission date/time stamp.

Originally a text-only (7-bit ASCII and others) communications medium, email was extended
to carry multi-media content attachments, a process standardized in RFC 2045 through 2049.
Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME).

The history of modern, global Internet email services reaches back to the early ARPANET.
Standards for encoding email messages were proposed as early as 1973 (RFC 561).
Conversion from ARPANET to the Internet in the early 1980s produced the core of the current
services. An email sent in the early 1970s looks quite similar to a basic text message sent on
the Internet today.

Network-based email was initially exchanged on the ARPANET in extensions to the File
Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), first
published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email
messages between systems, SMTP communicates delivery parameters using a message
envelope separate from the message (header and body) itself.

Computer Virus

A computer virus is a computer program that can copy itself and infect a computer. The term
"virus" is also commonly but erroneously used to refer to other types of malware, including
but not limited to adware and spyware programs that do not have the reproductive ability. A
true virus can spread from one computer to another (in some form of executable code) when
its host is taken to the target computer; for instance because a user sent it over a network or
the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB
drive.
Viruses can increase their chances of spreading to other computers by infecting files on a
network file system or a file system that is accessed by another computer.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include
all types of malware, even those that do not have the reproductive ability. Malware includes
computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware
and other malicious and unwanted software, including true viruses. Viruses are sometimes
confused with worms and Trojan horses, which are technically different. A worm can exploit
security vulnerabilities to spread itself automatically to other computers through networks,
while a Trojan horse is a program that appears harmless but hides malicious functions. Worms
and Trojan horses, like viruses, may harm a computer system's data or performance. Some
viruses and other malware have symptoms noticeable to the computer user, but many are
surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing
beyond reproducing themselves.

Infection strategies
In order to replicate itself, a virus must be permitted to execute code and write to memory.
For this reason, many viruses attach themselves to executable files that may be part of
legitimate programs. If a user attempts to launch an infected program, the virus' code may be
executed simultaneously. Viruses can be divided into two types based on their behavior when
they are executed. Nonresident viruses immediately search for other hosts that can be
infected, infect those targets, and finally transfer control to the application program they
infected. Resident viruses do not search for hosts when they are started. Instead, a resident
virus loads itself into memory on execution and transfers control to the host program. The
virus stays active in the background and infects new hosts when those files are accessed by
other programs or the operating system itself.
Nonresident viruses
Nonresident viruses can be thought of as consisting of a finder module and a replication
module. The finder module is responsible for finding new files to infect. For each new
executable file the finder module encounters, it calls the replication module to infect that file.
Resident viruses
Resident viruses contain a replication module that is similar to the one that is employed by
nonresident viruses. This module, however, is not called by a finder module. The virus loads
the replication module into memory when it is executed instead and ensures that this module
is executed each time the operating system is called to perform a certain operation. The
replication module can be called, for example, each time the operating system executes a file.
In this case the virus infects every suitable program that is executed on the computer.
Resident viruses are sometimes subdivided into a category of fast infectors and a category of
slow infectors. Fast infectors are designed to infect as many files as possible. A fast infector,
for instance, can infect every potential host file that is accessed. This poses a special problem
when using anti-virus software, since a virus scanner will access every potential host file on a
computer when it performs a system-wide scan. If the virus scanner fails to notice that such a
virus is present in memory the virus can "piggy-back" on the virus scanner and in this way
infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The
disadvantage of this method is that infecting many files may make detection more likely,
because the virus may slow down a computer or perform many suspicious actions that can be
noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts
infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow
infectors are designed to avoid detection by limiting their actions: they are less likely to slow
down a computer noticeably and will, at most, infrequently trigger anti-virus software that
detects suspicious behavior by programs. The slow infector approach, however, does not seem
very successful.

Email Virus

An e-mail virus is computer code sent to you as an e-mail note attachment which, if activated,
will cause some unexpected and usually harmful effect, such as destroying certain files on
your hard disk and causing the attachment to be remailed to everyone in your address book.
Although not the only kind of computer virus, e-mail viruses are the best known and
undoubtedly cause the greatest loss of time and money overall. The best two defenses against
e-mail viruses for the individual user are:

(1) a policy of never opening (for example, double-clicking on) an e-mail


attachment unless you know who sent it and what the attachment contains,
and
(2) installing and using anti-virus software to scan any attachment before you
open it.

Business firewall servers also attempt, but not always successfully, to filter out e-mail that
may carry a virus attachment.
The Melissa virus macro virus and the ILOVEYOU virus are among the most famous e-mail
viruses. Each of these also spawned copycat variations with different words in the subject line.

Вам также может понравиться