Computer Files and File Management. Why Is It Important to Manage Files?. Stop wasting time looking for saved files Can find files more quickly Helpful in keeping file storage space clean and organized Enables one to free-up space when more space is needed
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Note: the word folders is commonly used today; in the earlier days of computing, folders were called directories. These terms are used interchangeably in this class.
The Search function is a powerful tool for finding files that you might have “lost.”
Double Clicking on the top of any column will arrange the files alphabetically, by size, etc.
Click here, then click Details to get detailed information about the files.
organic beef production.pptx
Photo of Dog.jpg
photo_of_dog.jpgExamples of File Names
Computer at Home
This is the screen you will see next.
The left window shows files on the computer on which you are working
The right window shows files on the university server. Note the www folder
To move files, just “drag and drop” them from one screen to the other or highlight the file to be moved and then click on the appropriate button at the bottom of the screen.
This can’t really happen but you may feel like it if you computer picks up a virus.
A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.Trojan horses
A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.Worms