In this case, the cyber identity of this file would be a full set of its cyber coordinates in the IP subspace: the computer IP address, its MAC address, a Port number associated with the particular application, and the file name would constitute the full set of cyber coordinates, singularly identifying a cyber object (our file) in cyberspace.
Printing in 3D involves sending a design file to a printer that then forms a solid version of that object by slowly building it up in layers of plastic.