Skip to main content

DOS Programs (2)

Internal and External Commands

Internal and External Commands: There are  two kinds of DOS commands. These are called internal and external. The internal commands are loaded into memory when DOS is booted. Internal commands are always available for your use, although they are not seen when you display the disk directory of filenames on your screen.

Some internal commands are:

COPY                               copies files
DEL or ERASE               delete files
DIR                                  list are directory of filenames on the logged disk
PROMPT                         changes the form of the system prompt
REN                                 rename files
TYPE                               display a named file on the screen

External commands are conventional program files. These files can be deleted, copied and even renamed. Their filenames are displayed  when DIR lists a directory on the screen. Some examples frequently used external commands are:

CHIDR                           change directory (DOS version 2.0 and higher)
CHKDSK                       check the available space on the selected disk
CLS                                clear screen
COMP                            compare files
DISKCOMP                   compare disks
DISKCOPY                    make verbatim copies of  the source disk
DOSSHELL                   display file management menus (DOS version 4.01 and 5.0)
FORMAT                      organize new disks for use with DOS

DOS Program Summary  Table 1-3  is a summary of DOS commands. In addition to commands names and descriptions, the DOS version number and the type of command are listed. In the Type column, I represents internal, E is used for external.

Table 1-3  DOS Command Summary


Device Designations: 
A device designation is a reserved abbreviation, followed by a colon, which stands for different computer devices. For example designations for disk drives A and B are A: and B:. The device designation for your keyboard and screen, referred to as the console, is CON:. Like DOS commands, device designations can be typed in either uppercase or lowercase. So the designation "con:" is interpreted by DOS as "CON:." Table 1-4 is a list of DOS device designations and their meanings.

Table 1-4  Device Designations

6

With this background in place, move to Section 2 and begin learning how to use DOS.

Comments

Popular posts from this blog

MEM

MEM The MEM command was introduced in DOS version 4.01 and memory information. The MEM command is entered alone or with a modified slightly in MS-DOS 5.00. MEM is used to display system memory information. The MEM command is entered alone or with a parameter. MEM-Displays to all system memory values, including expanded and extended memory values. MEM PROGRAM--Displays programs presently loaded in memory with used and unused memory. You may use /P if you are using DOS 5.00 MEM/DEBUG--Dispiays a list of programs, device drivers, install drivers, and used unused memory. You may use / if you are using DOS 5.00. MEM CLASSIFY (or MEM /C)-Displays programs and cor-responding memory usage. The largest available memory block is also displayed. You may use /C if you are using DOS 5.00. Typing MEM and pressing Enter displays information similar to the following (typical of DOS 5.00): C:\>MEM                   655350 bytes total conventional memory        

Filenames

It is important to understand DOS file naming conventions and their use. Here, filenames and some special filename "tools" called wild cards and literals are described. What is a File name?   Every program and data file is given a name to differentiate it from other programs and data files. A program is one or more computer instructions collected into a file. A data file is normally a collection of characters (or data) that make up a document, like a letter, or a database, like a collection of accounting transactions or customer records. Descriptive filenames are normally used. For example, if you create and save a letter to Mom, you might give it the filename MOM.LTR. A letter to Dad could be called DAD.LTR. A word processing program file might have the filename WP.COM. Examine these filenames a little closer. First, notice that each filename is meaningful. This is important if you want to know what is in a file by looking at its name. Obscure filenames are of little u

Disk Construction

The various parts of standard 5.25- and 3.5-inch disks are contained in Figure 1-2. A description of each part is also provided. Write protect notch--When covered, prevents information from being recorded on the disk; when uncovered, information can be recorded. Temporary label--An adhesive-backed label allowing the contents of a disk to be identified. Permanent label--When used, contains disk manufacturer and capacity information. Exposed recording surface--Metal oxide surface used to magnetically record data. Do not touch! Protective jacket --House magnetic disk; provides protective cover. Disk sleeve (envelope)--Used to store disks;prevents  accidental contact with exposed surface. Protective slide --Protects magnetic media surface; slides open when inserted into a diskette drive (only on 3 1/2-inch diskettes). Figure 1-2 The Parts of a Floppy Disk Construction : Almost everyone is familiar with audio recording tape. The tape is a long, flexible acetate or mylar strip coated with fe