MS-DOS and PC-DOS a Practical Guide Macmillan Computer Science Series

Total Page:16

File Type:pdf, Size:1020Kb

MS-DOS and PC-DOS a Practical Guide Macmillan Computer Science Series MS-DOS and PC-DOS A Practical Guide Macmillan Computer Science Series Consulting Editor Professor F.H. Sumner, University of Manchester S.T. Allworth, Introduction to Real-Time Software Design Ian 0. Angell, A Practical Introduction to Computer Graphics W.D. Burnham and A.R. Hall, Prolog Programming and Applications G.M. Birtwistle, Discrete Event Modelling on Simula T.B. Boffey, Graph Theory in Operations Research Richard Bornat, Understanding and Writing Compilers J.K. Buckle, Software Configuration Management J.C. Cluley, Interfacing to Microprocessors Robert Cole, Computer Communications Derek Coleman, A Structured Programming Approach to Data Andrew J. T. Colin, Fundamentals of Computer Science Andrew J .T. Colin, Programming and Problem-solving in Algol 68 S.M. Deen, Fundamentals of Data Base Systems S.M. Deen, Principles and Practice of Database Systems P.M. Dew and K.R. James, Introduction to Numerical Computation in Pascal M.R.M. Dunsmuir and G.J. Davies, Programming the UNIX System K.C.E. Gee, Introduction to Local Area Computer Networks J.B. Gosling, Design of Arithmetic Units for Digital Computers Roger Hutty, Fortran for Students Roger Hutty, Z80 Assembly Language Programming for Students Roland N. lbbett, The Architecture of High Performance Computers Patrick Jaulent, The 68000- Hardware and Software J .M. King and J.P. Pa•doe, Program Design Using JSP- A Practical Introduction H. Kopetz, Software Reliability E.V. Krishnamurthy, Introductory Theory of Computer Science V.P. Lane, Security of Computer Based Information Systems Graham Lee, From Hardware to Software, an introduction to computers A.M. Lister, Fundamentals of Operating Systems, third edition G.P. McKeown and V.J. Rayward-Smith, Mathematics for Computing Brian Meek, Fortran, PL/1 and the Algols Derrick Morris, Systems Programming Based on the PDPll Pim Oets, MS-DOS and PC-DOS -A Practical Guide Christian Queinnec, LISP John Race, Case Studies in Systems Analysis W.P. Salman, 0. Tisserand and B. Toulout, FORTH L.E. Scales, Introduction to Non-linear Optimization Peter S. Sell, Expert Systems -A Practical Introduction Colin J. Theaker and Graham R. Brookes, A Practical Course on Operating Systems M.J. Usher, Information Theory for Information Technologists B.S. Walker, Understanding Microprocessors Peter J .L. Wallis, Portable Programming I.R. Wilson and A.M. Addyman, A Practical Introduction to Pascal - with BS6192, second edition MS-DOS and PC-DOS A Practical Guide Pim Oets M MACMILLAN © Pim Oets 1985 All rights reserved. No reproduction, copy or transmission of this publication may be made without written permission. No paragraph of this publication may be reproduced, copied or transmitted save with written permission or in accordance with the provisions of the Copyright Act 1956 (as amended). Any person who does any unauthorised act in relation to this publication may be liable to criminal prosecution and civil claims for damages. Authorised English Language translation and revision of Handleiding MS-Dos en PC-DOS by Pim Oets orignally published 1984 Published by MACMILLAN EDUCATION LTD Houndmills, Basingstoke, Hampshire RG21 2XS and London Companies and representatives throughout the world British Library Cataloguing in Publication Data Oets, Pim MS-DOS and PC-DOS- A Practical Guide - (Macmillan computer Science Series) 1. IBM Personal Computer -Programming 2. PC DOS (Computer operating system) I. Title 001. 64 125 DA76.8.12594 ISBN 978-1-349-08136-3 ISBN 978-1-349-08134-9 (eBook) DOI 10.1007/978-1-349-08134-9 IBM, IBM-PC and XT are trademarks of International Business Machines Corporation. MS-DOS is a trademark of Microsoft Co1poration, Bellevue, 98009 Washington. Contents 1. INTRODUCTION 9 2. OPERATING THE SYSTEM, VERSION 1 13 2.1 The keyboard 15 2.2 Correcting a mistake 16 2.3 Commands 17 2.4 Copying a disk - DISKCOPY 18 2.5 Comparing disks - DISKCOMP 20 2.6 Control instructions 21 2.7 Checking the storage - CHKDSK 22 2.8 Formatting - FORMAT 23 2.9 Entering and changing DATE and TIME 26 2.10 Function keys 28 3. THE FUNDAMENTALS OF FILES 31 3.1 Displaying the directory - DIR 32 3.2 File names 35 3.3 Utilities and system files 36 3.4 Copying system files 37 3.5 Creating a file - COPY CON: 38 3.6 Reproducing a file - TYPE 40 3.7 Dissecting a file - DEBUG 41 3.8 Renaming a file - REN 42 3.9 Copying a file - COPY 43 3.10 Comparing files - COMP 46 3.11 Removing files - DEL or ERASE 47 3.12 Creating a batch program file 48 3.13 The confirmation - PAUSE 49 3.14 The comment - REM 49 3.15 Introducing variables 50 3.16 Creating a self-starting program 51 3.17 Input and output channels 52 3.18 Regulating input and output - MODE 53 4. THE BASIC FACTOR 57 4.1 Opening and closing 57 4.2 Contact with the screen 59 4.3 Calculating 60 4.4 Creating variables 62 4.5 Creating a loop 63 4.6 Clearing the screen 64 4.7 Contact with the printer 64 4.8 The ASCII table 65 4.9 Instructing the printer 68 4.10 Creating a program 70 4.11 Addressing a program 71 4.12 Adjusting the screen 72 5. OPERATING THE SYSTEM, VERSION 2 75 5.1 Formatting - FORMAT (2) 76 5.2 Labelling a disk 78 5.3 Copying a disk - DISKCOPY (2) 79 5.4 Selecting the keyboard system 80 5.5 Entering and changing DATE and TIME (2) 81 5.6 The prompt 82 5.7 The system version number - VER 84 5.8 The interrupt function - BREAK 84 5.9 Clearing the screen - CLS 84 5.10 Creating a batch program file (2) 85 5.11 The condition - IF 86 5.12 The jump - GOTO 87 5.13 Redirecting input and output 88 5.14 Dosing - MORE 89 5.15 Verifying - VERIFY 89 5.16 Sorting - SORT 90 5.17 Finding - FIND 92 5.18 Creating a pipeline 93 5.19 Checking the storage - CHKDSK (2) 94 5.20 Reconstructing files - RECOVER 96 5.21 The CONFIG.SYS file 97 5.22 Adjusting the keyboard and screen 99 5.23 Regulating input and output - MODE (2) 103 5.24 Processing graphics 104 5.25 Simultaneous printing - PRINT 106 5.26 Remote control - CTTY 108 6. HANDLING A HARD DISK 111 6.1 Installing 112 6.2 Creating and using sub-directories 114 6.3 Checking the arrangement - TREE 120 6.4 Copying - BACKUP, RESTORE 122 7. WORKING WITH EDLIN 125 7.1 Creating 125 7.2 Closing 127 7.3 Re-opening 128 7.4 The . BAK file 129 7.5 Inserting 130 7.6 Reproducing 132 7.7 Editing keys 134 7.8 The active line 136 7.9 Editing 137 7.10 Searching and replacing 142 7.11 Erasing 144 7.12 Writing away 146 7.13 Reading back 146 7.14 Copying lines 147 7.15 Moving lines 147 7.16 Copying a file 147 8. OPERATING THE SYSTEM, VERSION 3 149 8.1 Entering and changing DATE and TIME (3) 150 8.2 Selecting the keyboard system (2) 152 8.3 Formatting - FORMAT (3) 153 8.4 Labelling a disk (2) 154 8.5 Addressing a program in a sub-directory 155 8.6 Reloading the COMMAND.COM file 155 8.7 Installing a virtual disk 156 8.8 Protecting a file - ATTRIB 158 8.9 Processing graphics (2) 159 9. ERROR MESSAGES 161 INDEX OF NAMES, CONCEPTS AND SYMBOLS 169 INDEX OF COMMANDS 173 .
Recommended publications
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • Introduction to MS-DOS
    1.Introduction to MS-DOS : MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers. It was essentially the same operating system that (Bill Gates's) young company developed for IBM as Personal Computer - Disk Operating System in 1981. Most users of either DOS system simply referred to their system as Disk Operating System. Like PC-DOS, MS-DOS was (and still is) a non-graphical line-oriented command- driven operating system, with a relatively simple interface but not overly "friendly" user interface. Its prompt to enter a command looks like this: C:\> MS-DOS does not care about anything called an icon, wallpaper or screen saver. Rather than being considered as a Graphical User Interface (GUI) MS-DOS is what is known as a command-line interface. You type commands on what is called the command line. MS-DOS is a single-user, single-tasking computer operating system. In spite of its very small size and relative simplicity, it is one of the most successful operating systems that has been developed to date. In DOS, a file name consists of eight character followed by a 3 character file extension. The size of a file is restricted to a 4 byte file descriptor, which limits a file’s maximum size to approximately 4 billion characters. The first release of DOS could not read or write to disk drives so users could only read and write to a floppy disc. DOS was not a state of the art operating system, even for its time.
    [Show full text]
  • MS-DOS Lecture
    MS-DOS 2017 University of Babylon College of Engineering Electrical Department Learning Basics of MS-DOS Assis. Lec. Abeer Abd Alhameed | 1 MS-DOS 2017 Outcomes: By the end of this lecture, students are able to: Define the MS-DOS system Log in MS-DOS commands system Display MS-DOS information on your computer Type basic commands of MS-DOS system (view directory contents, change directory, make directory) Assis. Lec. Abeer Abd Alhameed | 2 MS-DOS 2017 Learning of MS-DOS Basics: Definition - What does Microsoft Disk Operating System (MS- DOS) mean? The Microsoft Disk Operating System (MS-DOS) is an operating system developed for PCs (personal computers) with x86 microprocessors. It was the first widely-installed operating system in personal computers. It is a command-line-based system, where all commands are entered in text form and there is no graphical user interface. The Command Prompt: When you first turn on your computer, you will see some information flash by. MS-DOS displays this information to let you know how it is configuring your computer. You can ignore it for now. When the information stops scrolling past, you'll see the following: C:\> This is called the command prompt or DOS prompt. The flashing underscore next to the command prompt is called the cursor. The cursor shows where the command you type will appear. Typing a Command: This section explains how to type a command at the command prompt and demonstrates the "Bad command or file name" message. • To type a command at the command prompt 1. Type the following at the command prompt (you can type the command in either uppercase or lowercase letters): nul If you make a typing mistake, press the BACKSPACE key to erase the mistake, and then try again.
    [Show full text]
  • DR DOS for the Zfx86
    DR DOS for the ZFx86 Cost Effective, Reliable, Rapid Deployment of Embedded Systems w DR DOS on the ZFx86 gets products to market quickly at the lowest development and ownership cost. w Thousands of compatible applications, drivers and utilities available free or at minimal cost. w Full documentation available. DR DOS 7.03 Key Features of DR DOS Online Manual - DRDOS is supplied with a complete The ideal embedded DOS system, online manual that contains detailed information about all designed for out-of-the-box of the features of the operating system including the basic implementation into ROM or Flash commands, and the advanced utilities. It also has online ROM with tools and associated help available for all its commands. documents available in the DRDOS Memory Management - Memory management features OEM Documentation Kit. include a set of device drivers and commands that enable w 100% MS-DOS 6.22 compatible.. you to manage memory efficiently and make as much memory as possible available to your applications. w Comprehensive DOS utility set DOS Protected Mode Services - DOS Protected Mode w Multitasking, with API for developers Services (DPMS) interface allows specially-implemented w DPMS memory manager in addition to DPMI device drivers and TSRs to operate in extended memory. w Stacker disk compression This makes more memory within the first megabyte w NWCACHE - disk caching program available to applications and other conventionally-written drivers and TSRs. Both Stacker* (the disk compression w EMM386 memory manager program), and NWCACHE (the disk cache) use DPMS. w DOS Protected Mode Services (DPMS) Disk Compression - The disk compression component w Multitasking enables you to store more information by compressing the w DR-DOS provides a full multitasking environment data.
    [Show full text]
  • An Introduction to Windows Operating System
    EINAR KROGH AN INTRODUCTION TO WINDOWS OPERATING SYSTEM Download free eBooks at bookboon.com 2 An Introduction to Windows Operating System 2nd edition © 2017 Einar Krogh & bookboon.com ISBN 978-87-403-1935-4 Peer review by Høgskolelektor Lars Vidar Magnusson, Høgskolen i Østfold Download free eBooks at bookboon.com 3 AN INTRODUCTION TO WINDOWS OPERATING SYSTEM CONTENTS CONTENTS Introduction 9 1 About Windows history 10 1.1 MS-DOS 10 1.2 The first versions of Windows 11 1.3 Windows NT 12 1.4 Windows versions based on Windows NT 13 1.5 Windows Server 15 1.6 Control Questions 17 2 The tasks of an operating system 18 2.1 About the construction of computers 19 2.2 Central tasks for an operating system 20 2.3 Control Questions 22 �e Graduate Programme I joined MITAS because for Engineers and Geoscientists I wanted real responsibili� www.discovermitas.comMaersk.com/Mitas �e Graduate Programme I joined MITAS because for Engineers and Geoscientists I wanted real responsibili� Maersk.com/Mitas Month 16 I wwasas a construction Month 16 supervisorI wwasas in a construction the North Sea supervisor in advising and the North Sea Real work helpinghe foremen advising and IInternationalnternationaal opportunities ��reeree wworkoro placements solves Real work problems helpinghe foremen IInternationalnternationaal opportunities ��reeree wworkoro placements solves problems Download free eBooks at bookboon.com Click on the ad to read more 4 AN INTRODUCTION TO WINDOWS OPERATING SYSTEM CONTENTS 3 Some concepts and terms of the Windows operating system 23 3.1
    [Show full text]
  • Web Application Dos/Ddos Testing Methodology
    TECHNICAL WHITE PAPER Web Application DoS/DDoS Testing Methodology Gunter Ollman Chief Technology Officer IOActive®, Inc. Abstract As the goals and motivations of attackers have evolved, so too have their methods and the amount of effort they are willing to expend in taking down a targeted web application or hosting environment. This white paper outlines a methodology for enumerating the weaknesses in a web application’s architecture and service relationships that can be exploited remotely to cause a DoS condition and identifying steps the application owners can take to detect and prevent such attacks. Copyright ©2014. All Rights Reserved Contents Types of Denial of Service ............................................................................................................... 3 Volumetric DDoS ....................................................................................................................................... 3 Layer 3 DDoS ............................................................................................................................................. 4 Layer 7 DDoS ............................................................................................................................................. 4 Layer 7 DoS Implications ................................................................................................................. 5 Web Application Architecture ........................................................................................................ 6 Presentation Layer
    [Show full text]
  • Telework Dos and Donts White Full Sheetv2
    DEFEND THE DODIN CYBERSECURITY Do your part to protect the Department of Defense Information Network while teleworking • Reboot your machine prior to establishing a VPN connection • Ensure your government-furnished equipment (GFE) is patched with the latest updates • Use GFE when possible • Ensure your personal devices are updated with the latest operating system and NETWORK UTILIZATION security patches • Follow your organization’s GFE use and handling instructions • Log off of your VPN connection at the end of the work day • Report loss or theft of GFE to your IT service desk immediately • Verify your local internet connection before calling your IT service desk, if you’re having connectivity issues • Close all applications you’re not actively using • Use your organization-approved file sharing service/capability to share files with others • Configure your home Wi-Fi according to best practices; change the password and enable encryption • Use your organization’s approved communication and collaboration methods for official business • Study and know the difference between For Official Use Only (FOUO), Controlled Unclassified • Use DoD SAFE to share large files/videos (i.e., over 10 MB) with DoD and non-DoD recipients Information (CUI), and Unclassified information • Limit all non mission-essential activity on government-furnished equipment (GFE) (e.g., social • Familiarize yourself with adversary attack methodology (e.g., Coronavirus maps, coronavirus networking, audio and video streaming, personal shopping) spear phishing attacks) •
    [Show full text]
  • CONCURRENT DOS 8-16 INSTALLATION GUIDE Copyright
    CONCURRENT DOS 8-16 INSTALLATION GUIDE Copyright 1985 Viasyn Corporation Hayward, CA 94545 r First Edition: December, 1984 Latest Printing: March, 1985 Document No: 15372 Filename: CDOS.MAN Version 3.1x DISCLAIMER - Viasyn Corporation makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Further, VIASYN reserves the right to revise this publication and to make any changes from time to time in the content hereof without obligation of VIASYN to notify any person of such revision or changes. Registered Trademarks: MDRIVE, Viasyn Corporation. IBM, Inter- national Business Machines, Inc. Televideo, Televideo, Inc. ' Zenith, Zenith Radio Corporation. Compound Trademarks: Concurrent DOS 8-16 is a compound trademark of Digital Research, Inc. and Viasyn Corporation. Trademarks: Concurrent CP/M, CP/M 80, Digital Research Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form, or by any means, without the written permission of VIASYN. Printed and assembled in the United States of America. TABLE OF CONTENTS 1. INTRODUCTION .......................................... 1 2. HARDWARE REQUIREMENTS .................................. 2-3 3. CONNECT, SET UP AND TEST YOUR SYSTEM .................... 3 Unpacking the System ........................................... 3 Unpacking the Floppy Disk Drives ................................ 4 Unpacking the Hard Disk Drive .......................
    [Show full text]
  • Chapter 6 Operating Systems
    CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 6 Operating Systems 1 Operating Systems 1. Operating Systems 2. Types of Operating System 3. Major Functions 4. User Interface 5. Examples of Operating System 2 Operating Systems Operating Systems • The operating system is the most important program that runs on a computer. • Operating system is an interface between computer and user. • It is responsible for the management and coordination of activities and the sharing of the resources of the computer. 3 Operating Systems Operating Systems 4 Operating Systems Operating Systems 5 Operating Systems Types of Operating System • Real-time • Multi-user vs. Single-user • Multi-tasking vs. Single-tasking • Distributed • Embedded 6 Operating Systems Types of Operating System Real-Time • A real-time operating system is a multitasking operating system that aims at executing real-time applications. • Responds to input instantly. 7 Operating Systems Types of Operating System Multi-user vs. Single user . A multi-user operating system allows multiple users to access a computer system concurrently. Time-sharing system can be classified as multi-user systems as they enable a multiple user access to a computer through the sharing of time. Single-user operating systems, as opposed to a multi-user operating system, are usable by a single user at a time. 8 Operating Systems Types of Operating System Multi-tasking vs. Single-tasking . When a single program is allowed to run at a time, the system is grouped under a single-tasking system . While in case the operating system allows the execution of multiple tasks at one time, it is classified as a multi-tasking operating system.
    [Show full text]
  • Uniform for the Additional Improve Readability, Although the Blanks Are Not Necessary
    User's Guide IBM Personal Computer and Compatible Version Preface Congratulations on your decision to purchase UniForm. It will open new avenues of communication between your Computer and many others, giving you the ability to exchange diskettes füll of Information with people using other types of Computers. We think you'll agree that UniForm is one of the best additions you've ever rnade to your Computer System. UniForm allows you to redefine the Operating forrnat of one of your floppy disk drives. You manipulate the data on the diskette with the tools you normally use: word processors, file transfer Utilities, or other pro- grams. UniForm is Invisible to you when it is in use. This manual assumes that you have a basic working knowledge of your Computer System and the programs you will be using. If you have not yet learned to use COPY (for copying files between diskettes) and CHKDSK (for checking how much room is left on a diskette), you should read your DOS manuals and use a practice diskette to learn the basics of them. Once you know the basics, you can move on to UniForm. This User's guide will provide practical examples to Supplement the self-prompting menus of UniForm. If you want to know more about what First Edition (October 1984) UniForm does, read the introduction, which follows. When you're ready Copyright © 1984 by Micro Solutions, Inc. to start using UniForm, take just a moment to read about the conven- tions; then you'll quickly be on your way. Micro Solutions, Inc.
    [Show full text]
  • Counteracting Viruses in MS-DOS Systems
    86-01-35 Counteracting Viruses in MS-DOS Previous screen Systems A. Padgett Peterson Payoff The trapdoors programmed into the first DOS-based personal computers still persist today, providing relatively easy access for viruses and worms. By learning how malicious software exploits these weaknesses, security managers can develop a coordinated defense to counteract virus attacks now and in the future. This article describes how MS-DOS start- up processes can become exposed to viruses, discusses various intrusion methods, and presents techniques for designing a safe computing environment. Problems Addressed Today's personal computers still bear striking similarities to the first units created during the 1970s. All of the trapdoors and loopholes developed by systems experts to permit BIOS-level programming in the early stages of development of these systems are still present today, providing easy access for viruses, worms, logic bombs, and Trojan horses. It is alarming that such low-level programs are no longer being fully documented by manufacturers; they are currently treating as proprietary the techniques that were widely disseminated just a few years ago. Administrators and systems managers who are responsible for the millions of dollars of corporate investment in trusted computing systems typically lack an in-depth understanding of these systems. Unfortunately, penetration techniques, though not readily available, are known to an underground of hackers. Although numerous antivirus products have become available, these products are as available to hackers as to legitimate users. Fortunately, defenses are available to the corporate systems manager that cannot be readily compromised by the individual computer user. A trusted computing environment can be developed that is low in cost and user impact, one that not only has a high degree of reliability but permits natural and easy growth.
    [Show full text]
  • Introduction: DOS (Disk Operating System) Is an Oldest Type of Operating System
    DOS (Disk Operating System) 1 Introduction: DOS (Disk Operating System) is an oldest type of Operating System. Disk Operating System is abbreviated as DOS. DOS is a CUI type of Operating System. In computer science, a generic term describing any operating system is system software which is loaded from disk devices when the system is started or rebooted. DOS is a single-tasking, single-user operating system with a command-line interface. DOS acts on commands. Because DOS is ready to perform when given proper command hence, it is also known as Command Prompt. Commands are certain words of English language or short form of English words. The meaning of these word or short form is already known to DOS. Since, DOS recognized these words and hence acts accordingly. These words and short forms of the English words are better known as commands. Internal Command:-Those commands which are already stored in the “Command.Com” file of DOS are known as internal commands. For example, CLS, VOL, TIME, DATE, COPY etc External Command:-Those commands which are not included in the command.com file of DOS rather included in other files of DOS are known as external commands. It is formatted according to programme. For example, TREE, FORMAT, MODE etc Some Internal Commands:- 1. CLS To clear the screen. \>cls 2. DIR To view the directory and files C:\>Dir 3. DATE To View and change the date C:\>Date Current date is: 01-01-2008 Enter new date (mm/dd/yy):21-03-2009 4. TIME To view and change the time.
    [Show full text]