Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate Header section of a device driver?
Header comprises information which allows DOS to identify the driver. It also comprises pointers which allow it to chain to other drivers loaded into the system.
Header section of a device driver is 18 bytes in length and comprises pointers and name of the driver.
Following structure of the header:
CHAIN DD -1 : link to next driver
ATTR DW 0 : driver attribute
STRT DW START: address of strategy
INTER DW INT: address if interrupt
DNAME DB 'MYDRIVER': driver name.
The first double word comprises a -1 which informs DOS this is the last driver in chain. If extra drivers are added DOS inserts a chain address in this double word as the segment and offset address. Chain address points to the subsequent driver in the chain. This enables additional drivers installed at any time.
The attribute word signifies the type of headers included for driver and the type of device the driver installs. It also signifies whether the driver control a character driver or a block device.
A datapool is a source of variable test data that scripts can draw from during playback
Define Polling. A Polling process is used to recognize the highest priority source by software means. In this process there is one common branch address for all interrupts.
Illustrate the Examples of simulations - Training (for example pilots, drivers, etc.) - Running/testing nuclear plants and chemical plants - trying out equipment to be
Which transmission mode is used for data communication along telephone lines? Serial transmission mode is utilized for data communication along telephone lines.
Explain the differences between Internal and external fragmentation. Internal and external fragmentation (1) While memory allocated to a process is a little larger than th
The various memory allocation functions are described below: (i) malloc( ) : It is a memory allocation function that assigns requested size of bytes and returns a pointer to t
Explain how the Web enables effective collaborative computing. Discuss the similarities and differences among WebEx, Microsoft NetMeeting and Novell Groupwise software (in less tha
CLASSIFICATION OF DIGITAL COMPUTER Computer are classified under a number of factors.Some people classify them according to their processing speed.main memory,technology used
Reprography: Reprography, as a term, has gained international recognition in 1963. It includes "photocopying , microcopying, duplicating and in-plant printing and is character
A router is used to Distributes information among networks.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd