file handling


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial.

file handling

(1) See file handle.

(2) Working with digital files stored on the computer. See file, files vs. folders, file handle and file management.
References in periodicals archive ?
An updated Plot3D loader to support uniform and non-uniform grids and the CGNS loader to support multiple file loading, files with rigid body dynamics, and larger file handling.
Dawson, who teaches game programming at the Los Angeles Film School, uses short programs to teach the concepts of data structures, loops, functions, file handling, exceptions, object-oriented design, and graphical user interfaces.
User identity-based control over file handling, granular controls over data transfer based on user, group, time, file name, type, size, location, extending its controls outside the network in addition to creation of shadow copies ensures that Cyberoam delivers effective data security.
The pupils have been using hand held computers in all their lessons and at home and to pass the course had to complete three tests on internet safety and file handling.
The large number of files in the archive becomes an important issue because of the complex data management and the operating system file handling limits.
Look at the New York City Department of Health and Mental Hygiene, which saw a 2,500 percent improvement in file handling after deploying an SOA project, or Parametric Technology, a Fortune 500 software-and-services company that was able to achieve a single version of truth for its customers across all business groups in real time, using Oracle Fusion Middleware.
0 incorporates features that improve productivity when collecting, comparing and analyzing data, including enhanced trend screen features, file handling capabilities, chart/graphics print functions, a Web interface and secure Web-control capability.
It is able to emulate this file handling display by taking advantage of the extensive search capabilities for which Google is famous.
y belongs to a rare class of malicious programs: the object sent by email is not an executable file containing a worm but an image that contains an exploit for a WMF file handling vulnerability.