Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about wildcard character in DOS?
Sometimes you may like to list files having similar names. Let as suppose that these files are present in a root directory of drive C. now if you use the command - DIR C: CHAPTER.*, it will list all files from drive C that have the name UNIT. In the same way, to list all '.DOC' files from the default drive, you can use the command - DIR *.DOC. the character '*' used in these commands is known as the wildcard character. This character selects any name (where * is used) in the command. In the 1st DIR command (DIR C: UNIT.*) it will choose any extension name. in the 2nd command (DIR *.DOC), '*' choose any file name having .DOC extension name. the '*' wildcard character can also be used in another way. Assume the command - DIR WCHAP*. This command list all file names that start with WCHAP from the current drive. For example, it will list filenames, such as WUNIT1, UNIT 10.DOC, WUNIT_A.RAP, etc.
You can also use a different wildcard character - '?'.
C:\> DIR sale?rep
This command will list filenames such as SALE1REP, SALESREP, SALE_REP.rap, etc. that is, it will accept any character at the position of '?' in the DIR command.
Instruction Cycle The instruction cycle consists of a series of steps needed for the implementation of an instruction in a program. A typical instruction in a program is descri
SMLI firewalls are different from the conventional The SMLI firewalls are different from the conventional "stand in" proxies in a way that the stand-in proxies are used for th
What types of data entry services do you perform? Our business is to understand what data you require entered and in what particular format. After an initial analysis is perfor
the 68000 has rich of addressing mode . it concerned with the way data is accessed . identify the destion addressing mode for EXG D0, A2
Q. Limitation identified in Amdahls law? There is one main limitation identified in Amdahl's law. As said by Amdahl's law workload or problem size is forever fixed as well as n
What are the risks involved in Electronic Payment Systems? From the customer's perspective: Dishonest merchants or financial service providers Stolen payment
There were 50 respondents to our survey. The first component of the data examined here focuses on student's preference (ecommerce or traditional commerce). The Second compone
The idea behind inline functions is to insert the code of a known function at the point where the function is called. If done carefully, this can improve the application's performa
What is the transport protocol you use to call a Web service SOAP? Http is preferred for Soap whereas tcp for binary i.e. HTTP is used in web services and tcp works well in rem
Q. Show Advantages and Disadvantages of Shared Memory Programming? Advantages of Shared Memory Programming Data sharing between processes is both rapid and uniform bec
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd