Disk operating system, Computer Engineering

Assignment Help:

Q. Disk operating system?

The operating system (OS) is the first program that should be loaded into the memory of your PC before you can use it for any application. You can start your computer with disk operating system (DOS) or any other operating system such as Windows 95, 97, 98 or Windows NT that might be installed in the Hard disk. In this unit, we shall talk about the basic facilities present in DOS. Switch to MS-DOS and go through most of the text given in this and the next two unit. If your PC is operating under windows 95/98 or Windows NT, complete the following steps to switch to MS-DOS.

• Click the start button in the taskbar then press the windows logo key to open the start menu then click programs in the start menu.

• Windows shows the program submenu.

• In the program menu click MS-DOS Prompt and your screen displays a window that includeMS-DOS Prompt, such as "C:\windows>_".

• If you want you can also restart your computer in MS-DOS mode by using the following steps:

o Close open programs

o Click the Start Button present in the TaskBar or Press the Windows Logo Key to open the Start Menu.

o Click "restart in MS-DOS Mode" and then press OK.

Wait for some time untill your PC restarts in MS-DOS Mode.


Related Discussions:- Disk operating system

Explain the term- hacking, Explain the term- Hacking    Use of passwor...

Explain the term- Hacking    Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s

Define the fundamentals of computer system, Define the Fundamentals of comp...

Define the Fundamentals of computer system A computer processes digital information. In order to do that it runs (executes) a machine language program. As an illustration, when

What are the advantages of open source system, What are the advantages of o...

What are the advantages of open source system? High-quality software Lesser hardware costs Integrated management No vendor lock-in Take control of our softwa

Determine about the security- accidental damage, Determine about the securi...

Determine about the security- accidental damage accidental damage is best guarded against by keeping back up files or use Grandfather-Father-Son (GFS) method; also use of passw

How does multiplexer know which line to select, How does multiplexer know w...

How does multiplexer know which line to select? This is managed by select lines. The select lines provide communication among different components of a computer. Now let's see

State the hardware faults and softwate faults, State the hardware faults an...

State the hardware faults and softwate faults - protection against hardware faults could be to keep backups or use GFS; use of UPS (in case of power loss) and parallel system a

Binary resolution - artificial intelligence, Binary Resolution: We look...

Binary Resolution: We looked at unit resolution (a propositional inference law) in the last lecture: A ∨ B,   ¬B /A We may have this a bit further to propositional bin

Concurrently read exclusively write, Q. Concurrently read exclusively write...

Q. Concurrently read exclusively write? It's one of the models based on PRAM. In this model, processors access the memory location simultaneously for reading whereas exclusivel

Determine through which symbolic names can be associated, Determine Symboli...

Determine Symbolic names can be associated with Symbolic names can be associated with the data or instruction

Divide two binary numbers, Divide (101110) 2   by (101) 2 Ans. Qu...

Divide (101110) 2   by (101) 2 Ans. Quotient is = -1001 Remainder is = -001

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd