Introduction to FCB , Basic Computer Science

Assignment Help:
There are two kinds of FCB, the normal, whose length is 37 bytes and the
expanded one of 44 bytes.
The FCB is created of data given by the programmer and by
data which it takes directly from the operative system.
When these types of files are used it is only achievable to work on the current
directory since the FCBs do not give sport for the use of the organization by directories of DOS.
The FCB is created by the following fields:
POSITION LENGTH sense
00H 1 Byte Drive
01H 8 Bytes File name
09H 3 Bytes Extension
18H 8 Bytes Reserved
20H 1 Bytes Current register
21H 4 Bytes Random register
0CH 2 Bytes Block number
0EH 2 Bytes Register size
10H 4 Bytes File size
14H 2 Bytes Creation date
16 H 2 Bytes Creation hours
To choose the work drive the next format is followed: drive A = 1; drive B
= 2; etc. If 0 is used the drive life form used at that instant will be taken as
option.
The name of the file must be defensible to the left and for fear that it is
essential the remaining bytes will have to be filled with gaps, and the
extension of the file is placed the same method.

Related Discussions:- Introduction to FCB

Difference between an html and an xhtml page, QUESTION (a) Define four ...

QUESTION (a) Define four special target names use with the TARGET attribute (b) Explain the main difference between an HTML and an XHTML page (c) Give two merits and two

Buses, BUSES It can be seen from Figure 4 that there are three buses ...

BUSES It can be seen from Figure 4 that there are three buses - the data bus, the address bus, and the control bus. Each bus consists of a group of parallel wires. The da

Noemalization.., what is means with respect to software engineering?

what is means with respect to software engineering?

Array, Array: Array  :  In programming, when large amount of related d...

Array: Array  :  In programming, when large amount of related data needs to be processed and each data element is stored with different a variable name, it becomes very diffic

Discuss the roles of system analysts in detail, Question 1 Explain the ...

Question 1 Explain the following system design tools in detail System Flowcharts Decision tables Decision trees Organization charts Question 2 Write s

Information security, can someone balance between information security and ...

can someone balance between information security and access, if yes,how can they balance?

Output design, Discuss the factors considered during output design

Discuss the factors considered during output design

Rental model, Rental model: This has come into picture as Software as...

Rental model: This has come into picture as Software as a Service (SaaS) and Platform as a Service (PaaS) models have evolved over a period of time. Here, the buyer need not

Memory management, Memory Management: The purpose of the memory mana...

Memory Management: The purpose of the memory management system is to load programs into memory in such a way as to give each program loaded  the memory that it requires for

Computer, what is the first computer in this world

what is the first computer in this world

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd