Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Show example of COPY command?
This COPY command copies the REPORT file from the drive C to the disk in drive A. after copying the file in drive A, it will name the new file (in drive A)too REPORT. Now consider the following commands:
C :\> COPY A: CHAPTER1.DOC C:
C :\> COPY A: CHAPTER1. DOC C:\WORD
The first command copies the chapter1.DOC file from drive A to the current directory in drive C. as the root directory is selected in drive C(prompt is 'C:\>'), it copies the file to the root directory in drive C. the next command copies the file to the WORD directory in drive C.
In all examples discussed above the COPY command assigns the same name to the copied file as the source file name. Notice that in these COPY commands, you did not specify any filename with destination. That is why the COPY command assigned the source file name to the copied files. However if you like, you can assign a new name to the copied file for example,
C :\> COPY C: REPORT A: SALESREP
Will copy the REPORT file from the drive C to drive A and will assign SALESREP as the file name to the copied file.
Data Validation condition: The following condition stated below must be met for a data to be valid as is shown in the figure 3a below. 1. The data on the SDA line must remain stabl
Interleaved memory is a method for compensating the relatively slow speed of DRAM. The CPU can access alternative sections instantly without waiting for memory to be cached. Multip
Explain with the help of examples FIFO algorithms? FIFO policy: This policy easy removes pages in the order they arrived into the main memory. By using this policy we easily
What is write miss? During the write operation if the addressed word is not in cache then said to be write miss.
Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a
pebble merchant
diagrams of picket fence problem
calculate the time complexity of a=(b/c) operation in stack
Q. Define Stack segment ? 8086 Microprocessor supports Word stack. Stack segment parameters tell the assembler to alert linker that this segment statement states the program s
What are the Digital certificates of hardware computations Digital certificates are highly dependent on hardware computations, it is essential that mechanisms are evolved to i
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd