Example to show directory in doc, Computer Engineering

Assignment Help:

Q. Example to show directory in doc?

762_Example to show directory in doc.png

Like a file name, the directory name may also have up to eight alpha-numeric characters. The directory name can also have an extension name up to 3 characters long. However, the extension name is not used with the directory name.

When you start your PC, it generally responds with ‘C :/>' and selects the main or the root directory of drive C. Any file that you create or copy to drive C is added to this root directory. If you continue to add files in the root directory, few days after, the root directory will have too many files. This will not only puzzle you, it will also make the PC slow. If there are too many files in a directory the PC may take too long to find or open the files. You should try to use directories (and sub directories) in your hard disk

DOS always creates a root directory in each story device. You can create new directories in the root directory of the hard disk or floppy disk. You can keep files in these directories. Moreover, beside files, each directory can also have directories. Those, the file and directory organization in DOS looks like the roots of a tree. here, the root directory in drive C contains if you files in two directories - EXEL and WORD . The WORD directory contains some files as well as a directory TENDER. Sometimes, the second level directory (TENDER in this case) is termed as sub-directory. The root directory contains another directory - EXCEL. This directory contains a few files as well as two directories - SALES and EMPLOYEE. Both these directories contain files.

Structure can be created at any level of directory. For example, a new directory, say FOXPRO directory may contain files as well as more directories. If you want, you can takes out files from any directory or more files to another directory. You can also remove an enter directory.


Related Discussions:- Example to show directory in doc

What is delayed branching, What is delayed branching? A method called d...

What is delayed branching? A method called delayed branching can minimize the penalty incurred as a result of conditional branch instructions. The idea is easy. The instruction

Is dos a real time os, DOS is not a RTOS (real time Operating system), thou...

DOS is not a RTOS (real time Operating system), though MS DOS can be used with certain APIs to attain the RTOS functionality. For example, the RT Kernel (Real Time Kernel) which ca

What problem does the namespace feature solve, Multiple providers of librar...

Multiple providers of libraries may use common global identifiers causing a name collision when an application tries to link with two or more such libraries. The namespace feature

Explain working of telnet, Q. Explain Working of TELNET? The working o...

Q. Explain Working of TELNET? The working of TELNET 1.  Commands and characters are sent to operating system on common server computer. 2.  Local operating system send

Explain subscriber access to strowger systems, What are the basic approache...

What are the basic approaches to the design of subscriber access to Strowger systems? Describe them. A step by step switching system has three main parts as demonstrated in fig

Describe about physical systems, Q. Describe about Physical Systems? Ph...

Q. Describe about Physical Systems? Physical Systems are tangible entities which may be dynamic or static.   Computer Systems, Buildings,Vehicles etc. are illustrations of p

What is the use of inter process communication, What is the use of inter pr...

What is the use of inter process communication. Inter process communication gives a mechanism to allow the co-operating process to communicate with each other and synchronies t

Unix , how to write algorithum for unix progam

how to write algorithum for unix progam

Physical characteristics and access mode of disk drive, Q. Physical charact...

Q. Physical characteristics and access mode of disk drive? Access Time: Access time is time needed between requests made for a read or write operation until the time data are

Explain anonymous FTP, Explain Anonymous FTP. Use of a login password...

Explain Anonymous FTP. Use of a login password and name helps maintain file secure from unauthorized access. Though, sometimes these authorizations can also be inconvenient.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd