Example to show directory in doc, Computer Engineering

Assignment Help:

Q. Example to show directory in doc?

762_Example to show directory in doc.png

Like a file name, the directory name may also have up to eight alpha-numeric characters. The directory name can also have an extension name up to 3 characters long. However, the extension name is not used with the directory name.

When you start your PC, it generally responds with ‘C :/>' and selects the main or the root directory of drive C. Any file that you create or copy to drive C is added to this root directory. If you continue to add files in the root directory, few days after, the root directory will have too many files. This will not only puzzle you, it will also make the PC slow. If there are too many files in a directory the PC may take too long to find or open the files. You should try to use directories (and sub directories) in your hard disk

DOS always creates a root directory in each story device. You can create new directories in the root directory of the hard disk or floppy disk. You can keep files in these directories. Moreover, beside files, each directory can also have directories. Those, the file and directory organization in DOS looks like the roots of a tree. here, the root directory in drive C contains if you files in two directories - EXEL and WORD . The WORD directory contains some files as well as a directory TENDER. Sometimes, the second level directory (TENDER in this case) is termed as sub-directory. The root directory contains another directory - EXCEL. This directory contains a few files as well as two directories - SALES and EMPLOYEE. Both these directories contain files.

Structure can be created at any level of directory. For example, a new directory, say FOXPRO directory may contain files as well as more directories. If you want, you can takes out files from any directory or more files to another directory. You can also remove an enter directory.


Related Discussions:- Example to show directory in doc

What is difference between cobol and vs cobol ii, In using COBOL on PC we h...

In using COBOL on PC we have only flat files and the programs can access only limited storage, while in VS COBOL II on M/F the programs can access up to 16MB or 2GB depending on th

Characteristics of magnetic disk, Q. Characteristics of Magnetic disk? ...

Q. Characteristics of Magnetic disk? Tracks and Sectors: Disk is divided in concentric rings known as tracks. Thus a track is one complete rotation of disk underneath read/wr

Dataflow computing, Dataflow Computing A different to the von Neumann m...

Dataflow Computing A different to the von Neumann model of computation is the dataflow computation model. In a dataflow model, control is fixed to the flow of data. The order o

#project, how to build PVR set-top box using raspberry

how to build PVR set-top box using raspberry

Why did some plug-ins disappear for 0.99.19, Some of the plug-ins have prov...

Some of the plug-ins have proven unstable. These have been moved into a split download, which should be available anywhere you got the GIMP, in the file gimp-plugins-unstable-VERSI

Differentiate aggregation and containment, Aggregation is the relationship ...

Aggregation is the relationship among the whole and a part. We can add/subtract some properties in the part (slave) side. It won't affect the entire part. Best example is Car,

Determine the object oriented principles, Determine the Object oriented pri...

Determine the Object oriented principles Many latest applications are being developed based on object oriented principles such as methods, classes, and inheritance. To fulfil

What is the purpose of guard bits, What is the purpose of guard bits used i...

What is the purpose of guard bits used in floating point operations? The guard bits are the extra bits which are used to retain the in-between steps to enhance the accuracy in

Define intranet, Intranet : An Intranet is a type of information system...

Intranet : An Intranet is a type of information system that facilitates communication within the organizations between widely dispersed departments, divisions, and regional loc

Rsa encryption function- cryptography, The general method for constructing ...

The general method for constructing the parameters of the RSA cryptosystem can be described as follows: Select two primes p and q Let N = pq and determine ∅ (N) = (p - 1

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd