Technical data

7–1 Resource Type Limits . . .................................... 7–3
7–2 System Privileges ........................................ 7–3
7–3 System Login Flow........................................ 7–5
7–4 System-Supplied UAF Accounts . . ............................ 7–7
7–5 Account Types ........................................... 7–12
7–6 Qualifiers Used with AUTHORIZE ........................... 7–17
7–7 SYSMAN command: class_schedule........................... 7–29
7–8 Limits and Suggested Values for SYSTEM and DEFAULT
Accounts................................................ 7–42
7–9 Descriptions of SYSTEM and DEFAULT Accounts ............... 7–43
8–1 Keyword Summary . . . .................................... 8–16
8–2 ISA_CONFIG.DAT Keywords and Equivalents .................. 8–18
8–3 Related Modem Documentation . . ............................ 8–26
8–4 Common Pinouts on the EIA-232 DB23 Connection ............... 8–28
8–5 Connectors . . ............................................ 8–28
8–6 Connector Applications .................................... 8–29
8–7 DECconnect Accessories .................................... 8–29
8–8 Types of Modem Control That Devices Support .................. 8–31
8–9 Troubleshooting Communications Problems . . ................... 8–34
9–1 Disk and CD–ROM Terminology . ............................ 9–3
9–2 File Structure Options on OpenVMS Systems ................... 9–4
9–3 Reserved Files ........................................... 9–5
9–4 Comparison of ODS-1, ODS-2, and ODS-5 Formats............... 9–6
9–5 ISO 9660 Terms .......................................... 9–8
9–6 Terms Related to Magnetic Tapes ............................ 9–10
9–7 Tasks Users Can Perform Unassisted ......................... 9–17
9–8 INITIALIZE Command Qualifiers ............................ 9–18
9–9 Access Types for Disk and Tape Volumes ....................... 9–21
9–10 INITIALIZE Command Qualifiers for Protection ................. 9–23
9–11 Protection Granted with INITIALIZE Command Qualifiers ........ 9–24
9–12 Access Types for Tape Volume Protection ....................... 9–26
9–13 MOUNT Command Qualifiers for Mounting Disks ............... 9–29
9–14 MOUNT Command Qualifiers for Mounting Tapes ............... 9–32
9–15 ISO 9660 Restrictions . .................................... 9–50
9–16 REPLY Command Qualifiers for Continuation Volumes . ........... 9–55
9–17 Contents of a Quota File ................................... 9–64
10–1 DCL Commands to Display Ownership and Protection . ........... 10–14
10–2 Access Types with Disk File Protection ........................ 10–15
10–3 DCL Commands to Modify File Protection Characteristics ......... 10–18
10–4 Access Types for Directory Protection ......................... 10–20
10–5 Comparison of OpenVMS Extended Names and Standard Names . . . . 10–23
10–6 Wildcard Character Support with Tape Volumes ................. 10–25
10–7 Methods of Transferring Information .......................... 10–28
11–1 Comparison of Image and Incremental Backups ................. 11–4
11–2 BACKUP Command Qualifier Types .......................... 11–5
11–3 Save-Set Types ........................................... 11–7
11–4 Recommended Process Quotas for Efficient Backups . . . ........... 11–11
xx