0% found this document useful (0 votes)
55 views7 pages

Workshop 8

Uploaded by

firstlastfzsv3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views7 pages

Workshop 8

Uploaded by

firstlastfzsv3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Fundamentals of Computing (4CS015)

Workshop: Week 8(Windows Command)


Attempt all questions

1. Write a command to check our windows version.

2. Create the directory date. Within that directory create a text file to show the current
system date.
Fundamentals of Computing (4CS015)
Workshop: Week 8(Windows Command)
3. Show the system information using the command.

4. Create the directory called systemInfo and create the file name systemInfo.txt. In that
file all your system information should be auto generated using the command.

5. Launch the systeminfo.txt using notepad using the command.


Fundamentals of Computing (4CS015)
Workshop: Week 8(Windows Command)

6. Briefly explain about the Ping,getmac,ipconfig command.

Ans. Ping is a diagnostic tool that is used to test the reachability of a host on a network. It sends
a small packet of data, known as an "echo request," to the target host and waits for a response.
The response, called an "echo reply," contains information about the round-trip time and any
errors that may have occurred during the request. This helps to determine if the host is online
and responding to network requests.

getmac is a command-line utility that displays the media access control (MAC) address of a
network adapter. It is available on Windows operating systems and can be used to identify the
specific hardware address of a device on a network.

ipconfig is a command-line utility that displays the current configuration of network adapters on
a Windows-based computer. It can be used to display the IP address, subnet mask, and default
gateway of a device, as well as the DHCP server and DNS server being used. It also allows for
the release and renewal of DHCP leases and flushing of the DNS resolver cache. This tool can
be useful for troubleshooting network connectivity issues and for identifying network
configuration information.
Fundamentals of Computing (4CS015)
Workshop: Week 8(Windows Command)
7. Ping the google domain and paste the screenshot.

8. Show the ip address of your device.


Fundamentals of Computing (4CS015)
Workshop: Week 8(Windows Command)
9. What is the use of the FC command?

Ans. The FC command is a useful tool for comparing the contents of two files and
identifying any differences between them. It can be executed in a command prompt or
terminal window and can be used to compare text and binary files, or any other type of
file. The output of the FC command can be used to troubleshoot errors in files, or to
confirm that two versions of a file are identical. It can also be used as an important tool
to detect plagiarism by comparing the contents of different files. With this command, one
can compare multiple versions of a document and ensure that changes have been made
accurately and without any form of copying or plagiarism.

10. Create the directory called difference. In that directory create two files File1.txt and
File2.txt. Add contents in 2 files and perform the ascii comparison of these 2 files.

11. Generate the power efficiency diagnostics report using the command.

12. What does the CHKDSK do?


Fundamentals of Computing (4CS015)
Workshop: Week 8(Windows Command)

Ans. CHKDSK is a command-line tool that is built into the Windows operating system. It is used
to check and repair the file system on a hard drive or other storage device for errors. This
includes checking for issues such as lost clusters or cross-linked files, and attempting to fix any
errors that are found. Additionally, CHKDSK can check for bad sectors on the disk and attempt
to recover any readable information from them.

When CHKDSK is run, it performs a series of tasks. These include:


 Checking for file system errors: CHKDSK scans the file system to identify any errors and
then tries to fix them.
 Verifying free space: CHKDSK checks the amount of free space on the disk and makes
sure that it is properly accounted for.
 Looking for bad sectors: CHKDSK scans the disk to identify any bad sectors, which are
areas of the disk that are physically damaged and can't be used to store data.
 Attempting to recover readable information: CHKDSK will attempt to recover any
readable information from bad sectors and stores that information in a file in the root
directory of the disk.
CHKDSK can be run on both NTFS and FAT file systems. It can be run on the command line by
using the command "CHKDSK [Drive letter:]", for example "CHKDSK C:".

13. Explain doskey /history command.

Ans. The doskey /history command is a feature built into the Windows operating system that
allows users to view the command history of their current command prompt session. This
command history is a list of all the commands that have been entered into the command
prompt, along with the date and time they were executed.

When the doskey /history command is run, it will display the command history with the most
recent commands listed at the top. The commands are numbered, with the most recent
command being numbered 1. This can be useful for quickly re-executing a previously used
command or reviewing what commands have been used in the past.

In addition to displaying the command history, the doskey /history command also provides
several options to modify the command history. For example, the /reinstall option can be used to
Fundamentals of Computing (4CS015)
Workshop: Week 8(Windows Command)
clear the current command history and start a new one. Additionally, the /macros option can be
used to display all the macros that have been defined in the current session.

It's important to note that the command history is stored only in the current session and is not
persistent across multiple sessions. This means that the command history will be lost when the
command prompt is closed.

You might also like