file

(redirected from computer file)
Also found in: Dictionary, Thesaurus, Medical, Financial, Encyclopedia, Wikipedia.
Related to computer file: record, Computer file management

File

A record of the court. A paper is said to be filed when it is delivered to the proper officer to be kept on file as a matter of record and reference. But in general the terms file and the files are used loosely to denote the official custody of the court or the place in the offices of a court where the records and papers are kept. The file in a case includes the original complaint and all pleadings and papers belonging thereto.

A clerk files a document by endorsing it on the date it is received and retaining it in his or her office for inspection by the parties that it might concern.

file

1) v. to deposit with the clerk of the court a written complaint or petition which is the opening step in a lawsuit and subsequent documents, including an answer, demurrer, motions, petitions, and orders. All of these are placed in a case file which has a specific number assigned to it which must be stated on every document. The term is used: "When are you going to file the complaint," or "The answer will be filed tomorrow." 2) n. the master folder of a lawsuit kept by the clerk of the court, including all legal pleadings (pages) filed by both sides. Each case file has an assigned number, and each document in the file must have a stamp showing the date it was received and the name of the clerk who received it. Any document which is filed must be served on the opposing attorney, usually by mail, except that the first paper filed (complaint, petition, motion) must be served on all defendants personally (hand delivered by a process server). 3) n. the record an attorney keeps on a case, containing all papers deposited with the clerk, as well as all correspondence and notes on the case.

file

to start a court action.
References in periodicals archive ?
Does an employer have a right to monitor computer files, e-mail, or voice mail?
In this manner, the inventor cannot access the computer file later to modify it.
In the CD Plus format, the audio CD files is on the first track, followed by a gap and then by the computer file. Sensing the gap, the audio CD player stops, but the CD-ROM reader can get to the computer file.
The offences concern allegations that Ditta possessed several computer files with titles such as Attack Against American Troops, Sound of Jihad, Hamas Bomb and Instructions.
The InfoDot[TM] Instrument Tracking System can link a specific instrument to a computer file that contains a wealth of information about that particular instrument, including purchase date, manufacturer part number, cost, photograph, scheduled preventative maintenance, repair history, loaner status, number of sterilization cycles, and instrument utilization by case and employee.
It is then compared to data in the computer file that have been obtained under identical conditions on a sample of Du Pont Vespel polymide, a thermoset material of known thermal conductivity.
Using all the design data, including a shrinkage allowance of a projected part, the special LOM slice software employs the STL computer file to create the individual 2-D computer sections that make up each laminated paper layer of the physical model.
Foundry quality control cannot be separated from production control since both share much of the same database, but there are a number of quality-associated functions that must be highlighted: * Pattern, die, tool and gage control is achieved by storing tooling information in a computer file along with details of when and where it is to be used, so that management reports can be created as needed.
Contract notice: framework agreement for supplies and services computer file publishing (with supply) and dematerialized provisioning
The Ministry of Territory Administration makes this Thursday, 4, in Luanda, the final delivery of the Computer File of Major Citizens to the National Electoral Commission.
Prosecutors claim he possessed documents and computer files which could be used to prepare or instigate terrorism.
And because the invading program made no changes in any computer files, the computer could resume its usual operations as if nothing had happened.