Introduction to FCB , Basic Computer Science

Assignment Help:
There are two kinds of FCB, the normal, whose length is 37 bytes and the
expanded one of 44 bytes.
The FCB is created of data given by the programmer and by
data which it takes directly from the operative system.
When these types of files are used it is only achievable to work on the current
directory since the FCBs do not give sport for the use of the organization by directories of DOS.
The FCB is created by the following fields:
POSITION LENGTH sense
00H 1 Byte Drive
01H 8 Bytes File name
09H 3 Bytes Extension
18H 8 Bytes Reserved
20H 1 Bytes Current register
21H 4 Bytes Random register
0CH 2 Bytes Block number
0EH 2 Bytes Register size
10H 4 Bytes File size
14H 2 Bytes Creation date
16 H 2 Bytes Creation hours
To choose the work drive the next format is followed: drive A = 1; drive B
= 2; etc. If 0 is used the drive life form used at that instant will be taken as
option.
The name of the file must be defensible to the left and for fear that it is
essential the remaining bytes will have to be filled with gaps, and the
extension of the file is placed the same method.

Related Discussions:- Introduction to FCB

Software, what factors might be significant in your decision

what factors might be significant in your decision

Files, definition of file operations

definition of file operations

Briefly explain html and xml, Question 1 Briefly explain principles of eff...

Question 1 Briefly explain principles of effective navigation Question 2 Explain the terms URI and URL. Why should you use Relative URI? Question 3 What are the di

Quotation in Python, Python allows single (''), double (") and triple (''''...

Python allows single (''), double (") and triple ('''''' or """) quotes to indicate string literals, as long as the similar type of quote starts and ends the string. The triple quo

What is evaluating information system investments, 1. What is Evaluating In...

1. What is Evaluating Information System Investments? 2. Is IS evaluation different to evaluation of other investments? 3. What approaches are used to evaluate IS investments

Write a note on file permissions on linux, Question 1 Write a note on a...

Question 1 Write a note on advantages and disadvantages of Linux 2 Write a note on "File Permissions" on linux 3 Explain the usage of following Linux commands Cd kill

Standard Data Types, The data stored in memory can be of a lot of types. In...

The data stored in memory can be of a lot of types. In case, a person’s age is stored as a numeric value and his or her address is stored as alphanumeric characters. Python has som

Explain the characteristics of leasing, Question 1 Give the classification...

Question 1 Give the classification of Client/Server software architectures Question 2 Explain the characteristics of Leasing Question 3 Write a note on Activator interfa

Arrays and strings, This is a C file. 1. The program starts by printing you...

This is a C file. 1. The program starts by printing your name with an end sign ">". For example, "NAME >"; 2. Then, you can type in a string. If the string is not "vi xxx", you pri

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd