Introduction to FCB , Basic Computer Science

Assignment Help:
There are two kinds of FCB, the normal, whose length is 37 bytes and the
expanded one of 44 bytes.
The FCB is created of data given by the programmer and by
data which it takes directly from the operative system.
When these types of files are used it is only achievable to work on the current
directory since the FCBs do not give sport for the use of the organization by directories of DOS.
The FCB is created by the following fields:
POSITION LENGTH sense
00H 1 Byte Drive
01H 8 Bytes File name
09H 3 Bytes Extension
18H 8 Bytes Reserved
20H 1 Bytes Current register
21H 4 Bytes Random register
0CH 2 Bytes Block number
0EH 2 Bytes Register size
10H 4 Bytes File size
14H 2 Bytes Creation date
16 H 2 Bytes Creation hours
To choose the work drive the next format is followed: drive A = 1; drive B
= 2; etc. If 0 is used the drive life form used at that instant will be taken as
option.
The name of the file must be defensible to the left and for fear that it is
essential the remaining bytes will have to be filled with gaps, and the
extension of the file is placed the same method.

Related Discussions:- Introduction to FCB

An e-mail account, An E-Mail Account: Inbox: Inbox is the main folder ...

An E-Mail Account: Inbox: Inbox is the main folder in your email account. It contains all the e-mails that have arrived in your e-mail account. You can click on inbox to see t

ExtremeWhether.html, How to crete a web page name esp.html that allows user...

How to crete a web page name esp.html that allows users to conduct an ESP test

How to avoid race conditions with critical section?, • The key to preventi...

• The key to preventing problem involving shared storage is get some way to prohibit more than one process from reading and writing the shared data concurrently. That part of the p

Environment for intelligent agents-artificial intelligence, Environments ...

Environments We have seen that intelligent agents might take into account certain information when   choosing   a   rational   action, by  including information from its sensor

10, constant key use for in calculator

constant key use for in calculator

Create a database in access, The following are required: Create a ...

The following are required: Create a project in Access.  Your database must have flow and a theme. The database must be normalized.  The content m

Software Exploration, I need to review 2 different softwares one is windows...

I need to review 2 different softwares one is windows based and the other is Linux Based. Please Ask for further details

Write the steps to use the network setup wizard, Question 1 Elaborate the ...

Question 1 Elaborate the various steps in performing a Mail Merge. Execute one mail merge operation for sending invitation for a conference which is being conducted in your organi

Explain kinematics modeling in virtual reality, Question 1 How can you cre...

Question 1 How can you create surface with 3D Scanner in geometric modeling? Question 2 Explain kinematics modeling in virtual reality Question 3 Describe object hierarc

Transfer instructions, They are utilized to move the contents of the operat...

They are utilized to move the contents of the operators. Each instruction can be used with many different modes of addressing. MOV MOVS (MOVSB) (MOVSW) MOV INSTRUCTION Principle: D

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd