An Inside Look at MS-DOS, June 1983, BYTE Magazine

Total Page:16

File Type:pdf, Size:1020Kb

An Inside Look at MS-DOS, June 1983, BYTE Magazine An Inside Look at MS-DOS The design decisions behind the popular operating system Tim Paterson Seattle Computer Products 1114 Industry Dr. Seattle, WA 98188 The purpose of a personal com- often on the first try. Unfortunately, read-only memory). Both of these puter operating system is to provide many of the software developers tools had been developed in house. the user with basic control of the Seattle Computer talked to in the machine. A less obvious function is to earlier days preferred to simply ig- MS-DOS Organization furnish the user with a high-level, nore MS-DOS. Until the IBM Per- The core of MS-DOS is a device- machine-independent interface for sonal Computer was announced, independent input/output (I/O) han- application programs, so that those these developers felt that CP/M-86 dler, represented on a system disk by programs can run on two dissimilar would be the operating system of the hidden file MSDOS.SYS. It ac- machines, despite the differences in 8086/8088 computers. cepts requests from application pro- their peripheral hardware. Having Other concerns crucial to the grams to do high-level I/O, such as designed an 8086 microprocessor card design of MS-DOS were speed and ef- sequential or random access of named for the S-100 bus and not finding an ficiency. Efficiency primarily means disk files, or communication with appropriate disk operating system on making as much disk space as possi- character devices such as the console. the market, Seattle Computer Prod- ble available for storing data by mini- The handler processes these requests ucts set about designing MS-DOS. mizing waste and overhead. The and converts them to a very low level Today MS-DOS is the most widely problem of speed was attacked three form that can be handled by the I/O used disk operating system for per- ways: by minimizing the number of system. Because MSDOS.SYS is sonal computers based on Intel's 8086 disk transfers, making the needed hardware independent, it is nearly and 8088 microprocessors. disk transfers happen as quickly as identical in all MS-DOS versions pro- possible, and reducing the DOS's vided by manufacturers with their MS-DOS Design Criteria "compute time," considered overhead equipment. Its relative location in The primary design requirement of by an application program. The en- memory is shown in figure 1. MS-DOS was CP/M-80 translation tire file structure and disk interface The I/O system is totally device compatibility, meaning that, if an were developed for the greatest speed dependent and is represented on the 8080 or Z80 program for CP/M were and efficiency. disk by the hidden file IO.SYS. It is translated for the 8086 according to The last design requirement was normally written by hardware manu- Intel's published rules, that program that MS-DOS be written in assembly facturers (who know their equipment would execute properly under MS- language. While this characteristic best, anyway) with the notable excep- DOS. Making CP/M-80 translation does help meet the need for speed and tion of IBM, whose I/O system was compatibility a requirement served to efficiency, the reason for including it written to IBM's specifications by promote rapid development of 8086 is much more basic. The only 8086 Microsoft. The tasks required of the software, which, naturally, Seattle software-development tools available I/O system, such as outputting a Computer was interested in. There to Seattle Computer at that time were single byte to a character device or was partial success: those software an assembler that ran on the Z80 reading a contiguous group of developers who chose to translate under CP/M and a monitor/de- physical disk sectors into memory, their CP/M-80 programs found that bugger that fit into a 2K-byte are as simple as possible. they did indeed run under MS-DOS, EPROM (erasable programmable The command processor furnishes 230 June 1963 © BYTE Publications Inc Circle 122 on Inquiry card. --p- the standard interface between the -TOP OF MEMORY cludes error trapping, batch-file pro- user and MS-DOS and is contained in COMMAND TRANSIENT cessing, and reloading of the tran- the visible file COMMAND.COM. sient . The transient interprets user The processor's purpose is to accept commands; it resides at the high end commands from the console, figure of memory where it can be overlaid out what they mean, and execute the with any applications program (some correct sequence of functions to get of which need as much memory as the job done. It is really just an or- PROGRAM MEMORY they can get). This feature is of dinary application program that does limited value in systems with large its work using only the standard MS- main memory, and it need not be im- DOS function requests. In fact, it can itated by programs used as a replace- be replaced by any other program ment for COMMAND. that provides the needed user inter- COMMAND provides both a use- face. ful set of built-in commands and the There are, however, two special COMMAND RESIDENT ability to execute program files features of the COMMAND file. located on the disk. Any file ending First, it sets up all basic error trapping MS-DOS with the extensions COM, EXE, or for either hard-disk errors or the Con- .BAT can be executed by COM- trol-C abort command. MSDOS.SYS 1/0 SYSTEM MAND simply by typing the first provides no default error handling 00400 part of the file name (without exten- but simply traps through a vector INTERRUPT VECTORS sion ). You can normally enter 00000 that must have been previously set. parameters for these programs on the Setting the trap vector and providing command line, as with any of the Figure 1: Map of memory areas as as- a suitable error response is up to signed by MS-DOS. built-in commands. Overall, the ef- COMMAND (or whatever program fect is to give you a command set that might be used to replace it). can be extended almost without limit The second special feature is that sient sections . The resident, which just by adding the command as a pro- COMMAND splits itself into two sits just above MS-DOS in low gram file on the disk. pieces, called the resident and tran- memory, is the essential code and in- The three different extensions t. %I[Clil PRODUCT DESCRIPTION LIST YOUR COST*11 UDS 103LP, 300 bps, Modem 145 130 UDS 202LP , 1200 bps , Half Duplex Modem 195 150 ZX FORTH LIDS 212LP, 1200 bps, Full Duplex (212A) Modem 445 CALL U.S. Robotics Auto Dial 212A , 300/1200 Full Duplex Modem 599 475 Incomm Auto Dial 212A , 300/1200 Full Duplex Modem 599 450 Simplicity of BASIC with the speed Cermetec Auto Dial 212A , 300/1200 Full Duplex Modem 595 495 Microband Auto Dial 212A , 300/1200 Full Duplex Modem 695 495 of machine code! Rixon Intelligent Modem , 300/1200 ( 10 Number ) 495 CALL Rixon PC 212A ( IBM PC Modem Card) 300 / 1200 495 CALL Incomm Multi Dial 300/ 1200 ( 10 Number ) 795 550 U.S. Robotics Password 300 /1200 (Auto Dial ) Modem 495 CALL U.S. Robotics Courier, Osborne, 300/1200 Modem 518 CALL U.S. Robotics 5.100 , 300/1200 Auto Dial Modem 495 CALL A complete implementation of the FORTH language for computer. Visua150 CRT 695 550 the ZX81 and TS1000 FORTH 's most dis- Freedom 100 CRT, w/20 F. keys & Editing 595 550 tinctive feature is its flexability. It can turn your computer Incomm Remote Station I, w/Integrated 300/1200 Modem 1295 995 into a "word processor". The basic unit is the WORD - Epson MX60 /Graftrax + 650 399 the programmer uses existing WORDS to define his Epson MX80 FT/Graftrax + 700 498 Epson MX100 /Graftrax + 900 700 own which can then be used in further definitions. This Epson FX80 750 656 makes program development much faster than other Star Micranics Gemini 10 399 350 Star Micranics Gemini 15 649 548 languages. FORTH is an interactive compiled language AJ letter Quality Printer , 30 CPS (KSR) 1450 1250 that expands the capabilities of your own ZX81 /TS1000. Inc- AB Switch , 8 Pin 120 84 Programs run up to 10 times faster than BASIC. The Inc,,, AB Switch , 25 Pin 159 98 Incomm ABC Switch , 25 Pin 198 138 more programs you have written, the more words, therefore you can draw on those for further programs. ID SBreakout Box (Blue Box ) 159 140 Incomm Breakout Box (Bob ) 150 120 FORTH is supplied on cassette and is accompanied by -70 a 56 page users manual and an 8 page editors manual. Epson , HX-20 .AA /95 CALL Epson OX -10/256K 2995 CALL Z43 $29.95 Zenith Z -100 4000 CALL T-7MM, 7 Pin, 4 Wire, Telephone Cable ( Modular Plugs) 10 7 5.975, Modular Double Adapter 7 5 EIA 9/5 , RS 232 . 9 Pin Cable , 5 FT MM / FF/MF 15 12 EIA 25/5, RS 232 , 25 Pin Cable , 25 FT MM/FF/MF 22 14 EIA 50 /5, Centronics Parallel Cable , 5 FT (36 Pin) 30 21 Call toll free 1-800-833-8400 MC 0050/ 10, Centronics 10 Ft . MM Cable , 36 Pin (10 FT) 38 25 N.Y.(716)874-5510 7010/5, IBM PC Printer Cable w /36 Pin 40 22 In Canada call toll free 1 -800-268-3640 8010/5 Apple II Printer Cable w/36 Pin 27 18 9010/5, Atari Printer Cable w /36 Pin 30 21 U.S.
Recommended publications
  • GBCC-CIS-1 Page 1 Micro-Soft’S Macro-Impact
    CIS111 GBCC Renee Dodge CIS111 Mid-Term – Fall 2010 For your mid-term, I would like you to conduct some research on the history of computers. Select a milestone or event that you feel had a significant impact on the overall development of computers and how we use computers today. Be sure you not only provide your opinion as to why you feel this milestone is significant, but also provide historical proof - actual facts as to how this event shaped the development and use of computers. For this assignment, please complete the following: 1. Choose a topic 2. Research your topic and locate at least 5 different sources of information, overall. o At least 3 sources should be Internet websites. o Remember: Wikipedia is NOT an acceptable research source. 3. In addition to the Internet, you should also utilize the library online resources (EBSCO database, e-Books, etc). o At least 2 different sources of information should be online library resources. o If you have never used the library online resources before, you may ask me for a brief overview of how to use them or see Becky Clerkin in the library for help. 4. Include your research findings in a 5-page paper and be sure to properly cite where you found your information. If you are not sure how to cite references check out the following link: How to Cite Books, Magazines, and Web Sites in a Research Paper: http://www.lib.duke.edu/libguide/works_cited.htm 5. Upload your research paper to the Digital Drop BoX no later than Wednesday, October 27th at 11:59pm.
    [Show full text]
  • Wikipedia: Design of the FAT File System
    Design of the FAT file system A FAT file system is a specific type of computer file system architecture and FAT a family of industry-standard file systems utilizing it. Developer(s) Microsoft, SCP, IBM, [3] The FAT file system is a legacy file system which is simple and robust. It Compaq, Digital offers good performance even in very light-weight implementations, but Research, Novell, cannot deliver the same performance, reliability and scalability as some Caldera modern file systems. It is, however, supported for compatibility reasons by Full name File Allocation Table: nearly all currently developed operating systems for personal computers and FAT12 (12- many home computers, mobile devices and embedded systems, and thus is a bit version), well suited format for data exchange between computers and devices of almost FAT16 (16- any type and age from 1981 through the present. bit versions), Originally designed in 1977 for use on floppy disks, FAT was soon adapted and FAT32 (32-bit version used almost universally on hard disks throughout the DOS and Windows 9x with 28 bits used), eras for two decades. Today, FAT file systems are still commonly found on exFAT (64- floppy disks, USB sticks, flash and other solid-state memory cards and bit versions) modules, and many portable and embedded devices. DCF implements FAT as Introduced 1977 (Standalone the standard file system for digital cameras since 1998.[4] FAT is also utilized Disk BASIC-80) for the EFI system partition (partition type 0xEF) in the boot stage of EFI- FAT12: August 1980 compliant computers. (SCP QDOS) FAT16: August 1984 For floppy disks, FAT has been standardized as ECMA-107[5] and (IBM PC DOS 3.0) ISO/IEC 9293:1994[6] (superseding ISO 9293:1987[7]).
    [Show full text]
  • Table of Contents
    ^9/08/89 11:43 U206 883 8101 MICROSOFT CORP.. 12)002 Table of Contents m-^mm Table of Contaits 09/08/89 11:44 'Q206 883 8101 MICROSOFT CORP _ _ [ 1003 The Story Begins JAN The story of MS-DOS_begins ..in a hotel in Albuquerque, New Mexico. 1975 In 1975, Albuquerque was the home of Micro Instrumentation'Telemetry MiTS introduces the 8080-baseci Systems, better known as MITS- In January of that year, MITS had intro- Altair computer. duced a kit computer called the Altair. When it was first snipped, the Altair consisted of a metal box with, a panel of switches for input and output, a power supply, and-two boards. One board was the CPU.. At its heart was the 8-bit 8080 microprocessor chip from InteL The other board provided 256 bytes of memory. The Altair had no keyboard, no monitor, and no permanent storage. But it had a revolutionary price tag. It cost $397. For the first time, the term "personal computer" acquired a real-world meaning. The real world of the Altair was not, however, the world of business computing. It was-primarily the world of the computer hobbyist These first users of the microcomputer were not as interested in using spreadsheets and word processors as they were in programming. Accordingly, the first soft- ware for the Altair was a programming language. And the company that developed it was a two-man firm, in Albuquerque, called Microsoft FEB The two men at MiCTosof^ej^PailjAJten^and Bffl Gates-Allen and 1975 Gates-had met when-they were both students at Lakeside High School in Microsoft sails first BASIC to Seattle, where they began their computer-science education oa the school's MITS lor Altair time-sharing terminal By the time Gates had graduated, me two of them had computer.
    [Show full text]
  • Counteracting Viruses in MS-DOS Systems
    86-01-35 Counteracting Viruses in MS-DOS Previous screen Systems A. Padgett Peterson Payoff The trapdoors programmed into the first DOS-based personal computers still persist today, providing relatively easy access for viruses and worms. By learning how malicious software exploits these weaknesses, security managers can develop a coordinated defense to counteract virus attacks now and in the future. This article describes how MS-DOS start- up processes can become exposed to viruses, discusses various intrusion methods, and presents techniques for designing a safe computing environment. Problems Addressed Today's personal computers still bear striking similarities to the first units created during the 1970s. All of the trapdoors and loopholes developed by systems experts to permit BIOS-level programming in the early stages of development of these systems are still present today, providing easy access for viruses, worms, logic bombs, and Trojan horses. It is alarming that such low-level programs are no longer being fully documented by manufacturers; they are currently treating as proprietary the techniques that were widely disseminated just a few years ago. Administrators and systems managers who are responsible for the millions of dollars of corporate investment in trusted computing systems typically lack an in-depth understanding of these systems. Unfortunately, penetration techniques, though not readily available, are known to an underground of hackers. Although numerous antivirus products have become available, these products are as available to hackers as to legitimate users. Fortunately, defenses are available to the corporate systems manager that cannot be readily compromised by the individual computer user. A trusted computing environment can be developed that is low in cost and user impact, one that not only has a high degree of reliability but permits natural and easy growth.
    [Show full text]
  • Programmation Utilisant Les Interruptions Du Syst`Eme D’Exploitation : Le Cas De MS-DOS
    Programmation utilisant les interruptions du syst`eme d’exploitation : le cas de MS-DOS Patrick C´egielski Janvier 2019 Pour Ir`ene et Marie Legal Notice Copyright c 2019 Patrick C´egielski Universit´eParis XII – IUT de S´enart-Fontainebleau Route foresti`ere Hurtault F-77300 Fontainebleau [email protected] iv Table des mati`eres Pr´eface ix 0.1 Bibliographie ...................................... x 1 Lesgrandesfonctionsd’unsyst`emed’exploitation 1 1.1 Etudeg´en´erale´ ..................................... 2 1.1.1 Les deux tˆaches d’un syst`eme d’exploitation . .... 2 1.1.2 Principe des syst`emes d’exploitation . 3 1.2 CasdeMS-DOS .................................... 5 1.2.1 Mod`eleentroiscouches ............................ 5 1.3 Historique........................................ 6 1.4 Bibliographie ...................................... 9 I Le syst`eme d’exploitation comme machine virtuelle 11 2 Programmer avec le DOS 13 2.1 Lesentr´ees-sortiesstandard . ....... 14 2.1.1 Fonction 02h d’affichaged’uncaract`ere . 14 2.1.2 Fonction 01h desaisied’uncaract`ereavec´echo . 15 2.1.3 Fonction 08h desaisied’uncaract`eresans´echo . 17 2.1.4 Saisie d’une chaˆıne de caract`eres . .. 17 2.2 L’interruption 33h de manipulation de la souris . 18 2.2.1 Fonction 00h d’initialisation de la souris . 18 2.2.2 Fonctions 01h et 02h d’affichage et de transparence du pointeur . 18 2.2.3 Fonction 03h de r´ecup´eration de la position du pointeur . 19 2.2.4 Fonction 04h ded´eplacementdupointeur . 20 2.3 Fonction 05h d’impression............................... 21 2.4 Lesyst`eme ....................................... 22 2.4.1 Fonction 2Ah d’obtentiondeladate ..................... 22 2.4.2 R´ecup´eration de l’heure .
    [Show full text]
  • Bill Gates Has Been Controlling The
    sott.net We have a major crisis on our hands. Bill Gates is a VERY SERIOUS threat to not just the world economy, but to world peace. He has been using a loophole that allows health organizations to appear to be government agencies but are not independent and have been actually controlled by Gates. You will see that 80% of the funding of WHO is not from governments, but from donations. Then you see that Gates is the largest donor after countries listed on their website . Behind the curtain, the WHO has been bullied and pushed around by Bill Gates according to various sources one who is even writing a book on the domination of the WHO by Gates. Melinda Gates has been behind pushing digital currency and she has been addressing the G7 on the claim that this will empower women. Just unbelievable sophistry that digital currency will be better and create more jobs for women? She is also ANTI-Trump. I have explained that Jeffrey Epstein was NOT a Pedophile which is someone who is after children pre-puberty. I certainly would not have been able to visually distinguish between a girl who was 17 and one who is 18. So what is the point of seeking girls who are 16-17 and risk a criminal violation? To me, it has always smelled of a blackmail scheme . Get people involved who may or may not even know they are 17 v 18 and then use that as a bargaining chip for other things. Here Gates teamed up with Epstein, not once, but three times he went to his island.
    [Show full text]
  • Ms Dos If Statement Examples
    Ms Dos If Statement Examples Cobb is schoolgirlish and lathes invulnerably while flaggy Vinny overspills and reproof. Absolved prolationsRogers caracolled, outhires disproportionablyhis one-nighters chelated after Eddy snowks stacks charmingly. poisonously, Nepotistic quite feelingless. Ibrahim disenfranchise no Want make a review of Cafe? The if it would write all output to yacc on disk is a value may want. Click a statement to do loop. This example if statement is a number of do loop has a program code to control the ms dos. To do expression to. Suffix rules do some powerful. DOS source code and make spend own modifications, directories, it by left unchanged. However, they confer be accessed directly within the prerequisite list until a rule. Recovery console window title of dos commands that the statement to run the modified version of this license. A Very genuine Example An eating with Two Rules A More significant Example awk Statements Versus Lines Other Features of awk When immediate Use awk. Zip not hire from the DOS prompt or command line? Information here as no longer has accurate, as well enough some invariant text. The tree command is used to graphically display this folder structure of a specified drive root path. Enables local environments to be changed without affecting anything else. The if you must be redirected to get it will be used to work at all. How do not say Disney World in Latin? You first all variables may be interspersed, interpreting the function takes a tool will not need to performing conditional works of drive! You eat not copy, it is a good idea were put a comment like that at the essential of the line to sparkle your intent clear.
    [Show full text]
  • Paul Allen and Bill Gates Pose for the Camera on October 19, 1981, Surrounded by Pcs After Signing a Pivotal Contract with IBM
    Paul Allen and Bill Gates pose for the camera on October 19, 1981, surrounded by PCs after signing a pivotal contract with IBM. The big rise of Microsoft began only through a cooperation with IBM. In 1980, IBM needed an operating system as soon as possible. They were late to enter the home computer business with their IBM PC. So they turned to Bill Gates' company for an operating system. However, Microsoft did not have its own operating system, and Gates sent the IBM negotiators to Digital Research, which developed and distributed CP/M. But Gary Kildall, the head and founder of Digital Research, was not present at that time. Therefore, IBM talked to Kildall's wife Dorothy. IBM merely presented her with a confidentiality statement about the purchase intentions of IBM to postpone the negotiations. But Dorothy Kildall hesitated and did not want to sign anything until her husband was back. After waiting for three hours in vain, the negotiators at IBM finally left Kildall's office. Bill Gates's mother, Mary, was on board of the United Way charity. This way she had contacts with John Opel, president of IBM. So she could organize for her son the way to “Big Blue”. First, Bill Gates wanted to refrain from a deal with IBM, but after a meeting with Allen, Microsoft finally turned to IBM. Then they made a contract for an operating system with $ 186,000. This laid the foundation for Microsoft's success. Probably none of the participants suspected the historical significance at that moment. Two days later, Microsoft purchased Seattle Computer Products' operating system for $ 86,000.
    [Show full text]
  • A Code Correlation Comparison of the DOS and CP/M Operating Systems
    Journal of Software Engineering and Applications, 2014, 7, 513-529 Published Online May 2014 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2014.76048 A Code Correlation Comparison of the DOS and CP/M Operating Systems Robert Zeidman Zeidman Consulting, Cupertino, USA Email: [email protected] Received 3 April 2014; revised 1 May 2014; accepted 8 May 2014 Copyright © 2014 by author and Scientific Research Publishing Inc. This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/ Abstract For years, rumors have circulated that the code for the original DOS operating system created by Microsoft for the IBM personal computer is actually copied from the CP/M operating system de- veloped by Digital Research Incorporated. In this paper, scientifically tested and accepted forensic analysis mathematical techniques, step-by-step processes, and advanced software code compari- son tools are used to compare early versions of the two code bases. The conclusion is reached that no copying of code takes place1. Keywords DOS, CP/M, Copyright Infringement, Software Forensics, Software Correlation 1. Introduction For purposes of better understanding, the introduction includes the historical background and the legal issues. 1.1. Historical Background Gary Kildall is the man who, according to some, could have been and should have been the reigning king of software. Kildall created the CP/M (Control Program for Microcomputers) operating system that was used on many of the hobbyist personal computers before Apple and IBM introduced their machines. Kildall created 1Full disclosure: The process used is the process developed at my consulting company Zeidman Consulting.
    [Show full text]
  • Case 2:05-Cv-01719-TSZ Document 13 Filed 03/15/2007 Page 1 of 31
    Case 2:05-cv-01719-TSZ Document 13 Filed 03/15/2007 Page 1 of 31 1 The Honorable Thomas S. Zilly 2 3 4 5 6 7 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON 8 AT SEATTLE 9 TIM and PENNY PATERSON, husband and ) wife and the marital community thereof, ) 10 ) No. 2:05-CV-01719-TSZ Plaintiffs, ) 11 ) DEFENDANTS MOTION FOR v. ) SUMMARY JUDGMENT 12 ) LITTLE, BROWN AND COMPANY, a ) NOTE ON MOTION 13 Massachusetts state corporation, TIME ) CALENDAR: April 6, 2007 WARNER BOOK GROUP, a Delaware state ) 14 corporation, HAROLD EVANS ASSOCIATES ) ORAL ARGUMENT LLC, a New York state limited liability ) REQUESTED 15 company, HAROLD EVANS, and DAVID ) LEFER, ) 16 ) Defendants. ) 17 18 19 20 21 22 23 DEFENDANTS MOTION FOR SUMMARY JUDGMENT Davis Wright Tremaine LLP (05-CV-01719) LAW OFFICES 2600 Century Square 1501 Fourth Avenue SEA 1957745v6 3910089-000029 Seattle, Washington 98101-1688 (206) 622-3150 Fax: (206) 628-7699 Case 2:05-cv-01719-TSZ Document 13 Filed 03/15/2007 Page 2 of 31 1 TABLE OF CONTENTS 2 I. INTRODUCTION..................................................................................................... 1 3 II. STATEMENT OF FACTS........................................................................................ 1 4 A. The Controversy Surrounding QDOS, MS-DOS, and CP/M.................................... 2 5 1. The Zilog Z80 Chip and Cromemco s CDOS.......................................................2 6 2. Intel Introduces the 16-bit 8086 Chip....................................................................3 7 3. The Primary Design Requirement of QDOS Translation Compatibility.........................................................................................................4 8 4. The Reaction to Mr. Paterson s Efforts to Make QDOS 9 Translation Compatible with CP/M...................................................................8 10 B. Mr. Paterson s Responses to the Controversy......................................................... 12 11 III.
    [Show full text]
  • Dos Commands Interview Questions
    Dos Commands Interview Questions Q1. What is MS-DOS? MS-DOS is an operating system developed by Microsoft. It is a non-graphical command-line based operating system developed for x86-based computers. Released in the year of 1981, MS-DOS was originally written by Tim Paterson. Though not used by many today, MS-DOS was one of the popular operating systems throughout the 1980s. MS-DOS is a closed-source operating system that features a monolithic kernel. The first Windows with GUI used M-DOS as the underlying basic operating system. This command-line based system was preferred for its flexibility and stability, but the rise of the GUI based operating system led to its inevitable downfall. Q2. List some features of MS dos? Some of the features of the MS-DOS are, MS-DOS is a command-line based operating system and it doesn’t support the graphical user interface. It requires text and codes to operate. It is a 16-bit operating system. MS-DOS doesn’t support multi-programming so you can only run one process at a time in the RAM. The file names in the MS-DOS are limited to eight characters, with the three-character suffix denoting the type of the file. Q3. What is the Full Form of MS-DOS? Microsoft Disk Operating System is the full form of MS-DOS. Q4. How to change directory in Ms-DOS? The CD (Change Directory) command is used to change the directory or navigate to another folder. The "CD\" command is used to takes you to the top of the directory tree.
    [Show full text]
  • An Inside Look at MS-DOS
    An Inside Look at MS-DOS An Inside Look at MS-DOS The design decisions behind the popular operating system Tim Paterson Seattle Computer Products 1114 Industry Dr. Seattle, WA 98188 The purpose of a personal computer operating system is to provide the user with basic control of the machine. A less obvious function is to furnish the user with a high-level, machine-independent interface for application programs, so that those programs can run on two dissimilar machines, despite the differences in their peripheral hardware. Having designed an 8086 microprocessor card for the S-100 bus and not finding an appropriate disk operating system on the market, Seattle Computer Products set about designing MS-DOS. Today MS-DOS is the most widely used disk operating system for personal computers based on Intel's 8086 and 8088 microprocessors. MS-DOS Design Criteria The primary design requirement of MS-DOS was CP/M-80 translation compatibility, meaning that, if an 8080 or Z80 program for CP/M were translated for the 8086 according to Intel's published rules, that program would execute properly under MS-DOS. Making CP/M-80 translation compatibility a requirement served to promote rapid development of 8086 software, which, naturally, Seattle Computer was interested in. There was partial success: those software developers who chose to translate their CP/ M-80 programs found that they did indeed run under MS-DOS, often on the first try. Unfortunately, many of the software developers Seattle Computer talked to in the earlier days preferred to simply ignore MS-DOS. Until the IBM Personal Computer was announced, these developers felt that CP/M-86 would be the operating system of 8086/8088 computers.
    [Show full text]