How to define a filename in dos, Computer Engineering

Assignment Help:

Q. How to define a Filename in DOS?

Each file is given a name so that it can be referred to later. This name is termed as Filename. The filename in DOS can be up to eight alpha-numeric characters long. Optionally it can also have a period (.) followed by an extension name. The extension name should be up to three characters long. For example, consider the following filename:

                 REPORT2

                 PROGRESS.DOC

REPORT2 is a filename. This filename does not have an extension name - 'DOC'. Its optional to use of an extension name in a filename . However, the extension name help out in organizing and identifying a file. For example 'DOC' may suggest that it is a document file and 'COM' may suggest that is a command file. If you use an extension name with a filename, usually you will have to identify the complete file name, normally you will have to specify the complete file name (i.e. contain the extension name) when using it with DOS commands. While giving names to files, you can use the following characters in filename:

 #, $,@, %, ^, &, -, _,',{},( ),~,0-9,a-z,A-Z

You cannot use other characters, such as semicolon (;), colon (:), coma (,), <, >, \, /, etc. in filename. Moreover, you should not use space in filenames. Some examples of invalid file names are:

Filename                                            Reason

SALE 2                                               Contains space

PROGRESSER                                     Contains more that eight characters

MY, File                                              Contains commas

CHAP_01.DOC4                                 Extension name contains more than 3 characters

If you use more than eight characters in the filename or more than three characters in the extension name, DOS may automatically shorten the filename by removing extra characters. Except this, some file names, such as COM 1, COM 2, LPT1, com and PRN are reserved by DOS for its own use. Therefore, do not use these names to name your file. Also, keep in mind that every DOS application programs including Excel, Word, WordStar, Base III PLUS AND Fox Pro follow the same file naming convention.


Related Discussions:- How to define a filename in dos

What is meant by a field, What is meant by a field The consecutive nonw...

What is meant by a field The consecutive nonwhite space characters that define a data item collectively define a field. It is possible  to limit the number of such characters b

Define congestion, Define Congestion. Congestion: This is uneconomic ...

Define Congestion. Congestion: This is uneconomic to give sufficient equipment to carry all the traffic which could possibly be offered to a telecommunication system. Inside

What are the standard types of files produced, What are the standard types ...

What are the standard types of files produced? A PDF file is universally recognized by the internet and is also a secure image, given that an electronic footprint remains when

What is importance of xml into edi and electronic commerce, What is the imp...

What is the importance of XML into EDI and electronic commerce? XML has been explained as lightweight SGML: XML demonstrates great promise for its inherent capability to per

Graph to display the variable, We will be using data from the 2008 Canadian...

We will be using data from the 2008 Canadian General Election Study.1 The data can be found on the course page. As well, there are three other documents (loosely called "codebooks"

What is meant by hide area, What is meant by hide area? The hide comman...

What is meant by hide area? The hide command temporarily kept the contents of the field at the present line in a system-controlled memory called as the HIDE AREA.  At an intera

Fuzzy logic - artificial intelligence, Fuzzy set theory provides a means fo...

Fuzzy set theory provides a means for modeling the kind of uncertainty associated with vagueness, with imprecision, and/or with a lack of information regarding a particular element

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Develop the website, In this part you are required to develop the website t...

In this part you are required to develop the website that you designed in Your written report must describe any changes that you make to theoriginal plan with justification.

Components of magnetic disk, Q. Components of magnetic disk? Disk itsel...

Q. Components of magnetic disk? Disk itself is mounted in a disk drive that comprises arm which is a shaft that rotates disk and the electronics required for input and output b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd