How to copy several files in one stroke, Computer Engineering

Assignment Help:

Q. How to copy several files in one stroke?

The COPY command can also be used to copy several files in one stroke by using wildcards. For example, consider the following commands:

C :\> COPY C:*. DOC A:

C :\> COPY C: SALE?. REP A:

The first COPY command copies all file having the extension name DOC in the current directory in drive C to a disk in drive A. The second command copies files such as SALE1. REP, SALE 2. REP and SALE.REP from the current directory in drive C to a disk in drive A.

While using the COPY command (or for that matter, any dos command), if you do not specify the path, DOS assumes that you are referring to the currently selected drive and directory. For instance, consider the following command:

                  C :\> COPY COMMAND.COM A:

                  C: \ WORD> COPY DASTA 1.DOC A:

In the first command, the drive and directory names are not specified with COMMAND.COM. However, as drive C is the currently selected drive and the root directory is selected (prompt is 'C :\>'), DOS assumes that you are referring to the root directory of drive C. Accordingly, it looks for the COMMAND.COM file in the root directory of drive C. similarly, the next COPPY command looks for DATA1.DOC file in the WORD directory in drive C, as C:\WORD is the current directory and no path is specified with the DATA1.DOC.


Related Discussions:- How to copy several files in one stroke

DLD, Construction of j-k using 4-bit shift register

Construction of j-k using 4-bit shift register

What do you mean by communication traffic, Q. What do you mean by Communica...

Q. What do you mean by Communication Traffic? Communication Traffic offers a pictorial view of communication traffic in interconnection network with respect to time in progress

Explain about the logical devices, Explain about the Logical Devices ...

Explain about the Logical Devices Locator, to indicate a position and/or orientation Pick, to select a displayed entity To input a single value in the space of re

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a

Modelsim, design a basic computer

design a basic computer

Assessing heuristic searches , Assessing Heuristic Searches: Given a p...

Assessing Heuristic Searches: Given a particular problem you want to build an agent to solve, so there may be more than one way of justifying it as a search problem, more than

Relationship between distributed and mobile computing, a) Briefly describe...

a) Briefly describe the relationship between distributed computing, mobile computing and pervasive computing. b) Suppose the following scenario, which demonstrate the possibili

What is the ''blocking factor'' of a file, The "blocking factor" of a file ...

The "blocking factor" of a file is? Ans. The number of logical records in single physical record is called the "blocking factor" of a file.

Visualization, Visualization Visualization is a general method in contr...

Visualization Visualization is a general method in contract to search based tools.  In this method visual aids are given like pictures to assist the programmer in evaluating th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd