Sequential reading in fcb files, Basic Computer Science

Assignment Help:
Earlier than anything we must describe the file transfer area or DTA. With the intention of sequentially read we use the 14H function of the 21Hinterruption.The register to be read is the one which is described by the current block and register. The AL register goes back to the state of the operation, if AL holds a value of 1 or 3 it means we have reached the end of the file. Value of 2 means the FCB is incorrectly structured. Lest there is no fault, AL will contain the value of 0 and the fields of the current block and register are dated.

Related Discussions:- Sequential reading in fcb files

Microprocessors, what is the role of microprocessors in IT? how they are us...

what is the role of microprocessors in IT? how they are used in medical field? how they are used in our real lifes? how they are used in latest technology?

System administration and linux/unix, Write a system using script written i...

Write a system using script written in asuitable scripting language to automate taking a basic linux server instance and provisioning it with particular applications based on its I

Magnetic core memory, MAGNETIC CORE MEMORY: This type of memory is used...

MAGNETIC CORE MEMORY: This type of memory is used extensively in airborne digital systems, although integrated circuits are being developed with most modern aircraft systems.

Definition of assembler structure, In assembly language code lines have t...

In assembly language code lines have two fractions, the earliest one is the name of the instruction which is to be executed, and the next one are the parameters of the command. For

Fundamental of algorithm, exchanging the two variables: problem,algorithm d...

exchanging the two variables: problem,algorithm development,discription

Input and output devices, Input and Output Devices : The most common input...

Input and Output Devices : The most common input devices that you will see in your PC are the keyboard and the mouse. The keyboard of the computer looks like the keyboard o

What are the goals of wap architecture, Question 1 Explain the naming conv...

Question 1 Explain the naming conventions of functions in WML scripts and also explain characteristics of functions in WML Question 2 What is WML input field? Explain WML

Note on hyper text markup language (html) with example, Problem A) The ...

Problem A) The TCP/IP reference model is the network model used in the current Internet architecture. This model is derived from the OSI model and they are relatively same in n

Explain the characteristics of vector processing, Question 1 Draw the bloc...

Question 1 Draw the block diagram of von Neumann Architecture and explain about its parts in brief Question 2 Draw the block diagram of Intel 8085 CPU organization and explai

Cryptography, Question 1 Consider the one-time pad encryption scheme to e...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the ev

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd