Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about wildcard character in DOS?
Sometimes you may like to list files having similar names. Let as suppose that these files are present in a root directory of drive C. now if you use the command - DIR C: CHAPTER.*, it will list all files from drive C that have the name UNIT. In the same way, to list all '.DOC' files from the default drive, you can use the command - DIR *.DOC. the character '*' used in these commands is known as the wildcard character. This character selects any name (where * is used) in the command. In the 1st DIR command (DIR C: UNIT.*) it will choose any extension name. in the 2nd command (DIR *.DOC), '*' choose any file name having .DOC extension name. the '*' wildcard character can also be used in another way. Assume the command - DIR WCHAP*. This command list all file names that start with WCHAP from the current drive. For example, it will list filenames, such as WUNIT1, UNIT 10.DOC, WUNIT_A.RAP, etc.
You can also use a different wildcard character - '?'.
C:\> DIR sale?rep
This command will list filenames such as SALE1REP, SALESREP, SALE_REP.rap, etc. that is, it will accept any character at the position of '?' in the DIR command.
Using a combination of uniselectors and two motion selectors draw a schematic of thousand line exchanges. The schematic diagram for such an exchange is demonstrated in Fig. All
projections
Perform the following calculations assuming that all numbers are stored in 16-bit registers as 2's complement binary numbers with no overflow provision. Convert each of the numbers
Explain the differences between Logical and physical address space Logical Vs physical address space (1) An address produced by the CPU is commonly referred to like a logica
What are the attributes of a field that can be activated or deactivated during runtime? Input, Output, Mandatory, Active, Highlighted, Invisible.
What is parsing? The target of parsing is to find out the syntactic validity of a source string. A tree is built for use through subsequent phase of compiler, if the string is
What is the difference between top-down and bottom-up, programming? Ans: Top-down and Bottom-up Approaches In Top-down programming approach, we begin by identifying the main
Used to interrupt CPU normal implementation routine and to get its attention .Mostly generated by an external devices, timers, counters...etc
What is analysis, list its sub stages? Understand the requirement by constructing models. The goal of analysis is to state what need is to be done and not how it is to be done.
What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd