Illustrate about fat structure, Computer Engineering

Assignment Help:

Q. Illustrate about FAT structure?

DOS file system maintains a table of pointers known as FAT (File allocation table) that comprises an array of 16-bit values. There is one entry in FAT for every cluster in file area which implies that every entry of FAT (except the two) keeps up a correspondence to one cluster of disk space. If value in the FAT entry does not mark an unused, reserved or defective cluster then cluster corresponding to FAT entry is part of a file and value in FAT entry would signify the next cluster in file. 

First two entries (0 and 1) in FAT are reserved for use by operating system. Thus cluster number 2 corresponds to first cluster in data space of disk. Before any data being written on to disk FAT entries are all set to zero denoting a 'free' cluster. FAT chain for a file ends with hexadecimal value it implies that FFFF. FAT structure can be displayed as in Figure below.

387_Illustrate about FAT structure.png

Figure: FAT structure


Related Discussions:- Illustrate about fat structure

Carry look-ahead adder and booth''s algorithm, Describe carry look-ahead ad...

Describe carry look-ahead adder? Ans: The input carry required by a stage is directly computed from carry signals obtained from all of the preceding stages i-1,i-2,.....0, rat

Help, Write a class encapsulating the concept of a circle? I have been work...

Write a class encapsulating the concept of a circle? I have been working on this program for awhile and this is all I have so far... What are my flaws in the program besides not ha

Explain routing tone in strowger telephony, Explain routing tone in strowge...

Explain routing tone in strowger telephony with waveforms and the timings. The call-in-progress tone or routing tone is a 400 Hz or 800 Hz intermittent pattern. In electromec

Register-to-register operands in RISC, Q. Register-to-register operands in ...

Q. Register-to-register operands in RISC? Register-to-register operands: In RISC machines operation which access memories are LOAD and STORE. All other operands are kept in reg

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Computer systems architecture, Assume that you are working in a software co...

Assume that you are working in a software company as a programmer and a bank is your company's client. The Bank is a most popular and one of the leading banks in Malaysia. Your

Explain about the acoustic tablet, Explain about the Acoustic tablet Ac...

Explain about the Acoustic tablet Acoustic (or sonic) tablet use sound waves to detect a stylus position. Either strip microphones or point microphones can be used to detect th

Fetching a word from memory - computer architecture, Fetching a word from m...

Fetching a word from memory: CPU transfers the address of the needed information word to the memory address register (MAR). Address of the needed word is transferred to the pr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd