Example to show directory in doc, Computer Engineering

Assignment Help:

Q. Example to show directory in doc?

762_Example to show directory in doc.png

Like a file name, the directory name may also have up to eight alpha-numeric characters. The directory name can also have an extension name up to 3 characters long. However, the extension name is not used with the directory name.

When you start your PC, it generally responds with ‘C :/>' and selects the main or the root directory of drive C. Any file that you create or copy to drive C is added to this root directory. If you continue to add files in the root directory, few days after, the root directory will have too many files. This will not only puzzle you, it will also make the PC slow. If there are too many files in a directory the PC may take too long to find or open the files. You should try to use directories (and sub directories) in your hard disk

DOS always creates a root directory in each story device. You can create new directories in the root directory of the hard disk or floppy disk. You can keep files in these directories. Moreover, beside files, each directory can also have directories. Those, the file and directory organization in DOS looks like the roots of a tree. here, the root directory in drive C contains if you files in two directories - EXEL and WORD . The WORD directory contains some files as well as a directory TENDER. Sometimes, the second level directory (TENDER in this case) is termed as sub-directory. The root directory contains another directory - EXCEL. This directory contains a few files as well as two directories - SALES and EMPLOYEE. Both these directories contain files.

Structure can be created at any level of directory. For example, a new directory, say FOXPRO directory may contain files as well as more directories. If you want, you can takes out files from any directory or more files to another directory. You can also remove an enter directory.


Related Discussions:- Example to show directory in doc

What is an event handler, An event handler is a part of a computer program ...

An event handler is a part of a computer program formed to tell the program how to act in response to a definite event.

What is state and state diagram, What is state and state diagram? A sta...

What is state and state diagram? A state is an abstraction of values and links of an object. Set of values and links are grouped together into a state according to the group be

Reprography of information distribution, Reprography In order to dissem...

Reprography In order to disseminate information widely some method of reprography is invariably used. Reprography is the science and practice of copying documents by photograph

Explain the concept of top-down design for a program, Explain the concept o...

Explain the concept of top-down design for a program. Top down Design: A top-down approach is fundamentally breaking down a system to gain insight into its compositional s

Use of hypertext links in internet access, Use of Hypertext links in Intern...

Use of Hypertext links in Internet access From the user's point of view, the Web having of a vast, worldwide collection of documents i.e. pages. Every page may have links (poin

Multi-layer artificial neural networks, Multi-Layer Artificial Neural Netwo...

Multi-Layer Artificial Neural Networks - Artificial intelligence: Now we can look at more sophisticated ANNs, which are known multi-layer artificial neural networks because the

Scientific knowledge, Scientific knowledge: This is not to be confused...

Scientific knowledge: This is not to be confused with the applications of "AI" programs to other sciences, discussed later. Its subfields can be classified into a variety of t

What is the use of buffer register, What is the use of buffer register? ...

What is the use of buffer register? The buffer register is used to avoid speed mismatch among the I/O device and the processor.

Design tables in html, In this portion you would see how to put tables in y...

In this portion you would see how to put tables in your web documents. It isn't that a table is simply a combination of rows and columns. If you have ever seen any table in an attr

Encryption techniques to ensute secured transaction on net, Two popular enc...

Two popular encryption techniques to ensute secured transactions on the net? 1. Translation table 2. Word/byte rotation and XOR bit masking.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd