Introduction to FCB , Basic Computer Science

Assignment Help:
There are two kinds of FCB, the normal, whose length is 37 bytes and the
expanded one of 44 bytes.
The FCB is created of data given by the programmer and by
data which it takes directly from the operative system.
When these types of files are used it is only achievable to work on the current
directory since the FCBs do not give sport for the use of the organization by directories of DOS.
The FCB is created by the following fields:
POSITION LENGTH sense
00H 1 Byte Drive
01H 8 Bytes File name
09H 3 Bytes Extension
18H 8 Bytes Reserved
20H 1 Bytes Current register
21H 4 Bytes Random register
0CH 2 Bytes Block number
0EH 2 Bytes Register size
10H 4 Bytes File size
14H 2 Bytes Creation date
16 H 2 Bytes Creation hours
To choose the work drive the next format is followed: drive A = 1; drive B
= 2; etc. If 0 is used the drive life form used at that instant will be taken as
option.
The name of the file must be defensible to the left and for fear that it is
essential the remaining bytes will have to be filled with gaps, and the
extension of the file is placed the same method.

Related Discussions:- Introduction to FCB

Networking and telecommunications, NETWORKING AND TELECOMMUNICATIONS: ...

NETWORKING AND TELECOMMUNICATIONS: Computers can now communicate with each other and with a range of peripheral devices, over distances with increasing speed and reliability.

Program planning (preparation of a flow chart), Program Planning (Preparati...

Program Planning (Preparation of a Flow Chart) A flow chart is a graphic method for indicating a proposed or actual solution to the problem. A flow chart shows the steps a comp

How to set up the location (e.g. plaza, how to set up the location (e.g. pl...

how to set up the location (e.g. plaza, hall of fame, lecture theater or etc.) and services that will be used during the exhibition; devices needed; and finally produced a compreh

Alternative approaches for acquiring software, Alternative approaches for a...

Alternative approaches for acquiring software: There are some alternative approaches for acquiring software. They are:  i)  'off the shelf' software package  ii)  'turnk

Database management, Suppose you are designing a database for an art museum...

Suppose you are designing a database for an art museum that owns a large volume of works of art. Each work of art is described by a unique item code, a title, a type, and a size. T

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

#algorithm, #to determine whether given year is leap year or not

#to determine whether given year is leap year or not

Comp 100, I have an account in my www.itlab.com and i have a test and it s...

I have an account in my www.itlab.com and i have a test and it should do tonight, so do you have any one to help me and do this test and it is about excel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd