Random reading and writing and Closing a fcb file, Basic Computer Science

The 21H function and the 22H function of the 21H interruption are the ones in charge of realizing the random readings and writings in that order. The random register number and the recent block are used to calculate the virtual position of the register to read or write. The AL register gives identical information for the in order reading of writing. The information to be read will be returned on the transfer region of the disk, similarly the information to be written resides on the DTA.


To close a file we utilize the 10H function of the 21H interruption. If after calling up this function, the AL register holds the FFH value, it means that the file has altered position, the disk was altered or there is error of disk access.
Posted Date: 5/4/2012 8:00:29 AM | Location : United States







Related Discussions:- Random reading and writing and Closing a fcb file, Assignment Help, Ask Question on Random reading and writing and Closing a fcb file, Get Answer, Expert's Help, Random reading and writing and Closing a fcb file Discussions

Write discussion on Random reading and writing and Closing a fcb file
Your posts are moderated
Related Questions
If L is a regular language show that L U {a} is regular

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

WHAT IS DATA STRUCTURE AND EXPLAIN ME.

Question 1 What is Content Addressable Storage? Explain the elements of Content Addressable Storage Question 2 Explain briefly about DAS Question 3 Explain about N

Uninformed Search Strategies: To be able to undertake a regular search, our entire agent ought to know is the starting state, the possible operators and how to check whether th

THE FOURTH GENERATION (1975 ONWARDS) This generation of computers have one or more of the following characteristics:     Semi-conductor memory instead of core memo

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

PRINCIPAL STRUCTURES IN FLOW CHARTING Structured programing calls for the usage of four principal structures to help simplify the program. They are:     Sequential contro

to print first n even numbers

write a fuctions for MIDSQUARING hashing technique