How to correct the error condition while copying file in dos, Computer Engineering

Assignment Help:

Q. How to Correct the error condition while copying file in DOS?

In most case, DOS allows you to correct the error condition and retry the command (by pressing R). If the drive is not ready, normally, the remedy lies in inserting a disk in a drive and closing the drive door, if required. If the target disk is the write-protected, you can remove the write-protect sticker (in a mini floppy disk) or move the write-protect tab in a micro floppy disk and retry the command. If you are attempting to copy files on a new floppy disk, you will first have to format the disk. In case of insufficient disk space on the target disk, the remedy lies in creating vacant space by deleting unwanted files or by changing the target disk.

When you use the COPY command, if the destination directory already has file(s) that you are trying to copy, you are prompted to give direction to the system, e.g.

Overwrite A\NEW\SAMPLE.DOC (Yes/No/All)?

You can choose the following:

Yes (Y) : Overwrites the file and continues the COPY command.

No (N)  : Does not overwrite the file and continues the COPY command.

All (A)   : Overwrite the indicated file and all subsequent files. That is, Suppresses To use any option, press the corresponding letter (e.g. Y for Yes) and press the Enter key.


Related Discussions:- How to correct the error condition while copying file in dos

What is asp.net authentication providers and iis security, What is ASP.NET ...

What is ASP.NET Authentication Providers and IIS Security? ASP.NET implements authentication using authentication providers, which are code modules that verify credentials and

Adding xml files to your page, Step 1: Choose File -> Import XML into Templ...

Step 1: Choose File -> Import XML into Template Step 2: Select the XML file & click Open When an XML file is imported, Dreamweaver merges XML content in Template, which is be

Illustrate about fifth generation electronic computers, Fifth Generation (1...

Fifth Generation (1984-1990) The advancement of the next generation of computer systems is characterized majorly by the acceptance of parallel processing.  Until this time para

Advantages & disadvantages of public-key cryptography, Advantages & Disadva...

Advantages & Disadvantages Enhanced security and convenience: private keys never require be transmitting or revealing to anyone.  They can givce a method for digital signatu

What is tcas, tCAS is the number of clock cycles required to access a parti...

tCAS is the number of clock cycles required to access a particular column of data in SDRAM. CAS latency is the column address strobe time, sometimes referred to as tCL.

Provision for data buffering, Data buffering is quite helpful for purpose o...

Data buffering is quite helpful for purpose of smoothing out gaps in speed of processor and I/O devices. Data buffers are registers that hold I/O information temporarily. I/O is pe

Define router, A router is used to Distributes information among networ...

A router is used to Distributes information among networks.

For which class address 192.5.48.3 belogs, Address 192.5.48.3 belongs to? ...

Address 192.5.48.3 belongs to? Address 192.5.48.3 belongs to class C.

Mathematical applications, The current 32 and 64 bit machines can represent...

The current 32 and 64 bit machines can represent integers of around 9 digits and 30 digits respectively, while various scientific and mathematical applications have to represent in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd