Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about wildcard character in DOS?
Sometimes you may like to list files having similar names. Let as suppose that these files are present in a root directory of drive C. now if you use the command - DIR C: CHAPTER.*, it will list all files from drive C that have the name UNIT. In the same way, to list all '.DOC' files from the default drive, you can use the command - DIR *.DOC. the character '*' used in these commands is known as the wildcard character. This character selects any name (where * is used) in the command. In the 1st DIR command (DIR C: UNIT.*) it will choose any extension name. in the 2nd command (DIR *.DOC), '*' choose any file name having .DOC extension name. the '*' wildcard character can also be used in another way. Assume the command - DIR WCHAP*. This command list all file names that start with WCHAP from the current drive. For example, it will list filenames, such as WUNIT1, UNIT 10.DOC, WUNIT_A.RAP, etc.
You can also use a different wildcard character - '?'.
C:\> DIR sale?rep
This command will list filenames such as SALE1REP, SALESREP, SALE_REP.rap, etc. that is, it will accept any character at the position of '?' in the DIR command.
Write 8086 initialisation routine required to program 8255 for mode 1 with Port A and Port B as output Ports and Port C as an input port. Indicate all the relevant signals.
How to use messages in lists? ABAP/4 permits you to react to incorrect or doubtful user input by displaying messages that influence the program flow depending on how serious
Using Module-Instance Parameter: Parameter values can be overridden while a module is instantiated. New parameter values are passed at the time of module instantiation. Top-
What is Immediate addressing The data itself, beside the address, is given as the operand or operands of the instruction.
EXPLAIN SIDE EFFECT OF SCAN CONVERSION WITH DIGRAM
Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single
The concept of electronic cash is to implement payment by Using computers over network
Problem : a) What do you meant by a Multimedia Authoring System? b) Compare the verbose syntax to the dot syntax in Lingo. c) Explain each of the following terms: i) L
Q. How to Working in Dreamweaver? Let's now start our journey into the realm of Dreamweaver. We begin with typing in a few test lines in Design view. See that how our work area
Q. Power supply in computer system? Computer operate electronically- either by power supply attained from your electric plug or batteries in case of portable computers. Though
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd