Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about wildcard character in DOS?
Sometimes you may like to list files having similar names. Let as suppose that these files are present in a root directory of drive C. now if you use the command - DIR C: CHAPTER.*, it will list all files from drive C that have the name UNIT. In the same way, to list all '.DOC' files from the default drive, you can use the command - DIR *.DOC. the character '*' used in these commands is known as the wildcard character. This character selects any name (where * is used) in the command. In the 1st DIR command (DIR C: UNIT.*) it will choose any extension name. in the 2nd command (DIR *.DOC), '*' choose any file name having .DOC extension name. the '*' wildcard character can also be used in another way. Assume the command - DIR WCHAP*. This command list all file names that start with WCHAP from the current drive. For example, it will list filenames, such as WUNIT1, UNIT 10.DOC, WUNIT_A.RAP, etc.
You can also use a different wildcard character - '?'.
C:\> DIR sale?rep
This command will list filenames such as SALE1REP, SALESREP, SALE_REP.rap, etc. that is, it will accept any character at the position of '?' in the DIR command.
Virtual memory: Virtual memory is a technique which realized an application program the idea that it has contiguous working memory (an address space), whereas in fact it may b
Explain the term- Hacking Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s
Explain about Computer architecture Computer architecture is the conceptual design and fundamental operational structure of a computer system. It is a blueprint and functional
what is polymorphism
Function of an IP Packet Screening Router: A screening router is the most basic type of firewall and uses only the packet filtering capability to control and monitor network tr
Give LOAD-STORE optimization based on expression trees for the expression (A+B)/(C-D). LOAD-STORE optimization based on expression trees for the expression (A+B)/(C-D) is given
Interrupt handling: Handling Interrupts Several situations where the processor should avoid interrupt requests Interrupt-enable Interrupt-disable Typical
Write shorts notes on Remote Procedure Call (RPC) The facility whihc was created to help the programmers write client server software is termed as Remote Procedure Call. Within
Locality of reference implies that the page reference being made by a process is Ans. Locality of reference means that the page reference being made through a process is proba
Compare pre-emptive and non-preemptive scheduling policies. We preempt the currently executing process in preemptive scheduling. In non-preemptive we permit the current process
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd