Introduction to FCB , Basic Computer Science

Assignment Help:
There are two kinds of FCB, the normal, whose length is 37 bytes and the
expanded one of 44 bytes.
The FCB is created of data given by the programmer and by
data which it takes directly from the operative system.
When these types of files are used it is only achievable to work on the current
directory since the FCBs do not give sport for the use of the organization by directories of DOS.
The FCB is created by the following fields:
POSITION LENGTH sense
00H 1 Byte Drive
01H 8 Bytes File name
09H 3 Bytes Extension
18H 8 Bytes Reserved
20H 1 Bytes Current register
21H 4 Bytes Random register
0CH 2 Bytes Block number
0EH 2 Bytes Register size
10H 4 Bytes File size
14H 2 Bytes Creation date
16 H 2 Bytes Creation hours
To choose the work drive the next format is followed: drive A = 1; drive B
= 2; etc. If 0 is used the drive life form used at that instant will be taken as
option.
The name of the file must be defensible to the left and for fear that it is
essential the remaining bytes will have to be filled with gaps, and the
extension of the file is placed the same method.

Related Discussions:- Introduction to FCB

What features should the hospital software contain?, What Features Should t...

What Features Should the Software Contain? Although the needs of every nursing department, hospital, pharmacy, would vary, certain common features are desirable in the software

MIS, information system providors

information system providors

Briefly explain the shutter speed, Question 1 Write a note on transition, ...

Question 1 Write a note on transition, transition types & Features Question 2 Describe the different types of lens used in film shooting Question 3 Briefly explain

Write a schema for the operation of ending a game, QUESTION 1 We need ...

QUESTION 1 We need to write Z specifications to record the information about passengers on board an aircraft. Here you are required to produce the specifications using appropr

Oprator, what is member dereferencing oprator ?

what is member dereferencing oprator ?

Define CISC and RISC ?, Two competing architectures were developed for impr...

Two competing architectures were developed for improving the architecture of the central processing unit, and different processors are conventional to each one. Both had their powe

Differentiate Preemptive and Nonpreemptive Scheduling?, The Scheduling algo...

The Scheduling algorithms can be divided into two parts with respect to how they deal with clock interrupts. 1) Nonpreemptive Scheduling: A scheduling

Systems software, Systems Software: Systems software is generally supp...

Systems Software: Systems software is generally supplied by the hardware manufacturers. It includes operating systems, assemblers, compilers, and interpreters (to convert prog

Languages used in artificial intelligence, R e presentations/Languages Us...

R e presentations/Languages Used: Many people are taught Artificial Intelligence with the opening line: "The three most essential things in Artificial Intelligence are repres

Overview of a computer system, Overview of a Computer System The...

Overview of a Computer System There are three major elements in every computer solution. They are:     Data     Hardware     Software Hardware + Softwa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd