Wikipedia:Moving files to the Commons — For other uses, see Wikipedia:WikiProject Images and Media/Commons. Shortcuts: WP:MTC WP:MITC WP:TOCOMMONS WP:TRANSFER Many files have been uploaded to Wikipedia. A long term project under way is to move … Wikipedia
Duplicate Files Searcher — is a freeware disk utility for finding and deleting duplicate files. The program can also calculate MD5 and SHA hashes. It is platform independent software and runs on Windows, Linux, Unix, Solaris and Mac OS. The application supports English,… … Wikipedia
Recycle Bin (Windows) — In the Microsoft Windows operating systems, the Recycle Bin is a holding area for files and folders that are held before final deletion from a storage device.General Microsoft introduced the Recycle Bin in the Windows 95 operating system. The… … Wikipedia
File deletion — is a way of removing a file from a computer s file system. The reasons for deleting files are Freeing the disk space Removing duplicate or unnecessary data to avo >Wikipedia
Windows Explorer — This article is about the Windows file system browser. For the similarly named web browser, see Internet Explorer Windows Explorer A component of Microsoft Windows Details Included with Microsoft Windows … Wikipedia
Robocopy — robocopy, or Robust File Copy , is a command line directory replication command. It was available as part of the Windows Resource Kit, and introduced as a standard feature of Windows Vista and Windows Server 2008.Robocopy is designed for reliable … Wikipedia
File system permissions — Most modern file systems have methods of administering permissions or access rights to specific users and groups of users. These systems control the ability of the users affected to view or make changes to the contents of the file… … Wikipedia
File system — For library and office filing systems, see Library >Wikipedia
Universal Disk Format — The Universal Disk Format (UDF) is a format specification of a file system for storing files on optical media. It is an implementation of the ISO/IEC 13346 standard (also known as ECMA 167). It is cons >Wikipedia
Archos Gmini series — A set of portable audio and v >Wikipedia
Recycle bin (computing) — In computing, a recycle bin, or trash can, is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the physical media. Typically, a recycle bin is presented as a special file… … Wikipedia
Перевод по словам
verb: удалять, стирать, исключать, вычеркивать, вымарывать
- — delete key — клавиша DELETE
- — delete procedure — процесс удаления
- — cascade delete — каскадное удаление
- — delete operator — оператор delete
- — delete your post — удалять почту
- — line delete — удаление строки
- — measure delete — удаление тактов
- — positioned delete — позиционированное удаление
- — single code delete — команда стереть единичный код>
- — permanently delete — безвозвратно удалять
noun: файл, дело, досье, напильник, картотека, пилочка, подшивка, колонна, регистратор, шеренга
verb: хранить, подшивать, пилить, подпиливать, шлифовать, отделывать, подшивать к делу, сдавать в архив, посылать материал в газету, идти гуськом
File deletion is a way of removing a file from a computer’s file system.
Examples of reasons for deleting files are:
- Freeing the disk space
- Removing duplicate or unnecessary data to avoid confusion
- Making sensitive information unavailable to others
- Removing an operating system or blanking a hard drive
All operating systems include commands for deleting files (rm on Unix, era in CP/M and DR-DOS, del/erase in MS-DOS/PC DOS, DR-DOS, Microsoft Windows etc.). File managers also provide a convenient way of deleting files. Files may be deleted one-by-one, or a whole directory tree may be deleted.
Problem with accidental removal [ edit ]
The common problem with deleting files is accidental removal of information that later proves to be important. One way to deal with this is to back up files regularly. Erroneously deleted files may then be found in archives.
Another technique often used is not to delete files instantly, but to move them to a temporary directory whose contents can then be deleted at will. This is how the «recycle bin» or «trash can» works. Microsoft Windows and Apple’s macOS, as well as some Linux distributions, all employ this strategy.
In MS-DOS, one can use the undelete command. In MS-DOS the «deleted» files are not really deleted, but only marked as deleted—so they could be undeleted during some time, until the disk blocks they used are eventually taken up by other files. This is how data recovery programs work, by scanning for files that have been marked as deleted. As the space is freed up per byte, rather than per file, this can sometimes cause data to be recovered incompletely. Defragging a drive may prevent undeletion, as the blocks used by deleted file might be overwritten since they are marked as «empty».
Another precautionary measure is to mark important files as read-only. Many operating systems will warn the user trying to delete such files. Where file system permissions exist, users who lack the necessary permissions are only able to delete their own files, preventing the erasure of other people’s work or critical system files.
Under Unix-like operating systems, in order to delete a file, one must usually have write permission to the parent directory of that file.
Problem with sensitive data [ edit ]
The common problem with sensitive data is that deleted files are not really erased and so may be recovered by interested parties. Most file systems only remove the link to data (see undelete, above). But even overwriting parts of the disk with something else or formatting it may not guarantee that the sensitive data is completely unrecoverable. Special software is available that overwrites data, and modern (post-2001) ATA drives include a secure erase command in firmware. However, high security applications and high-security enterprises can sometimes require that a disk drive be physically destroyed to ensure data is not recoverable, as microscopic changes in head alignment and other effects can mean even such measures are not guaranteed. When the data is encrypted only the encryption key has to be unavailable. Crypto-shredding is the practice of ‘deleting’ data by (only) deleting or overwriting the encryption keys.