HP 3000 Series 9X8LX Computer Systems Understanding Your System ABCDE HP Part No.
The information contained in this document is subject to change without notice. Hewlett-Packard makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability or tness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for direct, indirect, special, incidental or consequential damages in connection with the furnishing or use of this material.
Printing History The following table lists the printings of this document, together with the respective release dates for each edition. The software version indicates the version of the software product at the time this document was issued. Many product releases do not require changes to the document. Therefore, do not expect a one-to-one correspondence between product releases and document editions. Edition Date Software Version First Edition April 1994 B.50.
Introducing the HP 3000 Series 9X8LX Hewlett-Packard's HP 3000 Series 9X8LX computer system for the multi-user environment combines o ce computing with mainframe power. The system is designed to be used in a standard o ce setting without the stringent environmental controls of the typical computer room. Its compact size accommodates a number of o ce con gurations. Typically, the system consists of the following components: The main computer that ts comfortably alongside a desk or table.
In This Book You may conclude one day that there are good reasons for knowing a little more about what goes on inside your computer. You may wonder: What really happens when you use your MPE/iX computer|what makes it work? Why you must do certain tasks, or why you must do them in a certain way. Whether it is time to investigate more of the full potential of your computer. This book will not turn you into a computer expert. Instead, it provides an introduction to what computers do, and how they do it.
Chapter 1: What Is A Computer? The parts of computer, including the hardware and the programs that make it run. Chapter 2: Where Am I? When log on, where do you nd yourself inside the computer's account structure? Knowing the account structure, and how les are named, will help to guide you to the work you want to do. The meaning of user names, session names and passwords. Chapter 3: What Are Files? The nature and structure of les|where they are kept.
Chapter 7: Commands Types of commands, using parameters, understanding how to read the syntax diagram of a command. Chapter 8: Command Files and Jobs You create them for your own use|command les and jobs. Chapter 9: Jobs and Job Files You create them and tell the computer how and when to do your work for you.
Related Manuals Understanding Your System is the rst book in a set of ve manuals that includes the following: Understanding Your If you are new to computers, this is a good place to System (B3813-90001) start. It provides an introduction to what computers do and how they do it. Familiarizes you with your computer and computer Getting Started peripherals.
Note The MPE/iX operating system has been enhanced as of Release 4.5 and 5.0 to include additional features that include POSIX compatibility and the hierarchical le system . The hierarchical le system is tree structured and can contain les at many di erent levels. This organization provides a special kind of le called a directory. Instead of holding data, directories contain lists of les and pointers to those les.
Contents 1. What Is a Computer? 2. Where Am I? Logging On Parts and Pieces|Seen and Unseen . . Hardware . . . . . . . . . . . . Peripheral devices . . . . . . . . Software . . . . . . . . . . . . . Files . . . . . . . . . . . . . . What Are Programs? . . . . . . . . How Do Programs Do What They Do? The Idea Behind Computing . . . . . Your mental computer . . . . . . . So a computer is. . . . . . . . . . . What computers do . . . . . . . . Interruptions . . . . . . . . . . . . Shutdowns . . . . . . . . .
Logging on without a group Shared group . . . . . . . SYS|A Special Account . . . MANAGER.SYS . . . . . OPERATOR.SYS . . . . . The PUB group . . . . . The account manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16 2-17 2-18 2-18 2-18 2-18 2-19 Where Are Files? . . . . . . . . . . Disk memory . . . . . . . . . . . File recording . . . . . . . . . .
Users . . . . . . . . . . . . . . If you log on in . . . . . . . . . . . User JOHN logs on in PUB . . . User JOHN logs on in MYGROUP User John logs on in OTHERGRP Other capabilities . . . . . . . . . Access control de nitions (ACDs) . . User and Group IDs . . . . . . . . Can I . . . ? . . . . . . . . . . . . . Programs . . . . . . . . . . . . Commands . . . . . . . . . . . . Starting Programs . . . . . . . . . Starting with the RUN command . . Starting without the RUN command Path restriction . . . . . . .
6. Behind the Scenes 7. Commands 8. Why Numbers? . . . . . . . . . . Binary notation . . . . . . . . . ASCII code . . . . . . . . . . Control and Escape . . . . . . Letters and numbers . . . . . Files: ASCII or binary? . . . . A Practical Problem . . . . . . . Addition|Computer Problem Solving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Errors and your job listing . . . . . . . . . . . . . . . .
Figures 1-1. 2-1. 2-2. 2-3. 4-1. The Parts on Your Desk . . . . . Files in Groups, Groups in Accounts Files|In Groups, In Accounts . . Hierarchical File System . . . . . Your Account Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 2-4 2-5 2-6 4-5 . . . . . . . . . . . . . 3-5 Tables 3-1.
1 What Is a Computer? Unless it is your job to manage your HP 3000 Series 9X8LX computer, the answer that may come to mind is that a computer is whatever is sitting on your desk|the video terminal and keyboard that you work with every day. There is more, but these two pieces of hardware are your immediate connection to the computer. Figure 1-1. The Parts on Your Desk 1. video screen 2. keyboard 3.
Parts and Pieces Parts and Pieces|Seen and Unseen Much of your computer is hidden in metal cases. Some of it is invisible to you. Behind the scenes are the fundamental parts of the computer. They consist of these elements: hardware All of the pieces that you can see, or touch, or pick up, or move around compose the hardware of your computer. software Recorded instructions that control the computer's operation.
Parts and Pieces usually in a matter of seconds or minutes. A multiuser system, such as your HP 3000 Series 9X8LX, requires time to start up, and it requires attention from someone who will perform many tasks to prepare the system for work. In general, there are very few occasions for turning o your computer. An emergency of some sort|overheating or some other malfunction|requires turning o the power to your computer.
Parts and Pieces disk drive tape drive UPS printer This terminal is vital to the operation of the computer and should not be turned o , except for special maintenance of the system. Information that you create or record, and all the programs that the computer uses, are stored on disk drives. There may be one or many attached to your computer. Your MPE/iX computer comes to you with at least one disk drive built into the computer cabinet.
Parts and Pieces Regardless of their source, three types of software will be of most concern to you. This is the \master" program that oversees and directs all of operating system the programs that are used on your system. The operating system in your computer is called MPE/iX, MultiProgramming Executive (MPE) with Integrated Posix (iX). iX in the name means that your operating system has more memory and more computing power than its predecessors.
Parts and Pieces electronic mail word processing data processing forms creation accounting process control sending and receiving messages creating and printing documents of all sorts (sometimes called a text editor ) organizing and managing immense volumes of information, such as inventory and orders management, mailing lists, and the like (usually recorded in a database ) mimicking the kinds of paper forms that businesses use to collect, assemble, and organize information (frequently used in conjunction w
Parts and Pieces executable les include all of the programs|recorded instructions|that direct the computer. Command les and job les are text (data) les. Unlike most data les, command les and job les contain instructions that the computer can interpret and carry out. Super cially, however, they behave like executable les. You will nd more information about command les and job les in Chapters 8 and 9 of this book, and in the book Task Reference - HP 3000 Series 9X8LX (B3813-90009).
What Are Programs? What Are Programs? A computer without a program is useless, as is an orchestra without music to play. Programs are what programs do. In fact, unless you use a program to do something, it is just another le taking up space on your computer disk. What any program does is to carry out instructions. Precisely what any particular program does depends upon the instructions that have been designed into it.
How Do Programs . . . ? The most sophisticated programs allow you to solve a problem, or to accomplish a task, in ways that are already familiar|or at least in ways that are less mysterious than the workings of the operating system. A spreadsheet mimics the appearance and function of an accounting ledger. You may enter numbers (and words) in positions that de ne their relation to each other. You may de ne one number as being the sum (or di erence, or product) of other numbers.
The Idea Behind Computing How Do Programs Do What They Do? If you have ever followed a recipe to cook a meal, or assembled something using printed instructions, you have gone step by step through a sequence of instructions, much the way a computer goes step by step through a program. Mama's Nice, Simple Tomato Sauce Ingredients fresh tomatoes, 3 or 4, cut up (peeled and seeded, if you wish). Save the juice.
The Idea Behind Computing The Idea Behind Computing In some ways, the operation of a computer mimics the kind of thinking that you do every day. When you set out to solve a problem or accomplish a task, you are likely to have a method, a way of doing things, that works for you. Many of your methods are so automatic that you do not think about them.
The Idea Behind Computing The result (the sum) you obtain goes somewhere. You might add it to the records of your yearly spending. Sending (or saving or storing) information somewhere is called output . Your mental computer Over and over again throughout this process of adding numbers, you are taking in information, recording information, moving information from one place to another, and manipulating existing information to produce new information.
The Idea Behind Computing information (in les|in its own memory, on disks, or on tape) for later retrieval. For the computer, \forgetting" something happens when you turn o the power or erase a le from a disk or a tape. So a computer is. . . . You can think of a computer as the sum of all of its pieces of hardware. If you include all of its software in that de nition, you are closer to the truth. And if you go no further, you have an entirely workable de nition.
Interruptions The information might be numbers, or letters of the alphabet, or words, or illustrations, or some combination of them. Some computers even work with sounds. What is your computer right now? It is what you instruct it to do|assuming that it is able to carry out your instruction.
Interruptions Backups From time to time, the person who manages your system needs to back up the les that all of the users have created. Backing up les is a method of copying them to a tape, so that they will be protected from loss. Backups are vital and should be performed at regular intervals in order to ensure that no vital data is ever lost.
Where Am I? Logging On 2 Personal computers are designed for one person to use. Once you have turned on a personal computer, you are ready to do something. Your MPE/iX computer, however, is designed for many persons to use, and on any given day, all of them might be using the computer at the same time. Without some method of keeping order, it could become confusing.
Maintaining Order Maintaining Order Your MPE/iX computer maintains order on the system through two closely related forms of organization. logging on Logging on is your way of tting yourself into the computer's organization. By logging on with the HELLO command, you answer the computer's most important questions. Who are you? Where do you want to t into my organization? Do you have the authority to do this? the account structure Logging on identi es you to the computer.
Maintaining Order An account is like a ling cabinet. Unlike the ling cabinet in your o ce, an account may be as large, or as small, as you need. You may have almost as many accounts on your computer as you like. Accounts do take up room on the computer: in its memory and on its disks. But if you are willing to buy more and more disks, you can create accounts almost to your heart's content. Users are somewhat like the keys to a ling cabinet. You might create an account called XM661A.
Maintaining Order Figure 2-1.
Maintaining Order Just as important, the account structure o ers a method of protecting sensitive les from tampering, and sensitive programs from abuse. You may create passwords that anyone wishing to use the system must know before he or she can log on. Accounts may have passwords. Groups may have passwords. Users may have passwords. Figure 2-2.
Maintaining Order In addition to the traditional group, le and account structure mentioned previously, you can now use the hierarchical le system shown below. The hierarchical le system is tree structured and can contain les at many di erent levels. You can also create les and directories under accounts. For more information on the hierarchical le system , refer to the book, New Features of MPE/iX: Using the Hierarchical File System (32650-90351). Figure 2-3.
Gaining Admission Gaining Admission When you want to work on a le in one of your ling cabinets, you may simply go to the right ling cabinet, open the right drawer, and pull out the le folder that you need. Working with the computer, however, you must specify which ling cabinet and which drawer you want to open. The computer insists that you provide the answers to its questions.
Starting a Session Starting a Session Logging on with the HELLO command starts a computer session |a dialog between you and the computer|and permits you to give instructions at your terminal, one at a time, to the computer. The computer attempts to carry out each instruction as soon as it can. If you enter something that the computer does not understand, or that it cannot for some reason execute, the computer will inform you by displaying an error message on your video terminal.
Starting a Session When you log on If passwords are required, the computer will ask (prompt you) for each of them, one at a time, and wait for your response. In that case, you would have to enter each password correctly in response to the computer's request. The passwords that you type will be invisible to you and to everyone else. The computer will read what you enter, but it will not display the passwords on your video terminal as you type them.
Starting a Session Logging on this way opens still another drawer|a rather special drawer| in the ling cabinet called ANYACCT. But that is a subject for \Logging on Without a Group". But where are the ling cabinets in the computer? The address of files Accounts (the ling cabinets), their groups, and the les within those groups are kept on the computer's disk or disks, which correspond to le rooms in an o ce. The log on does not by itself give you direct access to any particular le.
Starting a Session When a le name is shown in this fashion, it is called a fully quali ed le name , and it is the full and correct address of the le. For the computer, this is the equivalent of saying: the le MYREPORT . . . ( le) in the group MYGROUP (group) . . . in the ling cabinet called ANYACCT (account) There might be many les in the same group of the same account. These three les are found in the same group and account in the account structure: ACCTRPT.MYGROUP.ANYACCT BUDGRPT.MYGROUP.ANYACCT TAXRPT.
Starting a Session Where is that file? The day will come when you want to nd a le and you cannot remember where it is. Unlike the ling cabinet in the corner of your o ce, the computer can tell you where to nd a le, provided the le exists. If you remember the rst name of the le, the computer can nd it quickly. If you remember only a part of the name, the computer can still nd it|or at least show you le names that are close to the one that you are searching for. The LISTFILE command does the searching.
Starting a Session Suppose, however, that the les were named this way: JNTAXRPT, FBTAXRPT, MRTAXRPT, MYTAXRPT . . . . In that case, enter this: LISTFILE @TAXRPT.@.ANYACCT,6 \Look for any le names that end in TAXRPT in any group in the ANYACCT account." You might, as an experiment, enter this command: LISTFILE @.@.@,QUALIFY This will nd|and display|the fully quali ed names of all of the les on your system. The list could be quite long, and the display could take time.
Starting a Session You, as a person, are not the owner of this new le. The owner of this newly created le is JOHN.ANYACCT|the log on identity used when the le is created. Someone logging on with ALICIA.ANYACCT might be unable to use the newly created le|unless the owner identi ed as JOHN.ANYACCT uses the RELEASE command to suspend the normal security on that le. Security is restored to that le only after JOHN.ANYACCT uses the SECURE command.
Starting a Session Session names are a convenience for the people using the computer. The computer will not become confused if two di erent people log on using the same user name, the same account name, and the same group name, even if those people neglect to use a session name. Every time someone logs on to the computer, the computer starts a new session and assigns that session a unique session number (such as #S373). You will see session numbers if you use the SHOWJOB command.
Starting a Session letter of the alphabet. Any remaining characters may be letters or numbers or a combination of them. The person in charge of your computer system may change or remove account passwords. The person in charge of an account, may change or remove group passwords. Unless you are one of these people, you cannot remove or change the passwords attached to an account or to a group. You may, however, use the PASSWORD command to change the password attached to your own user name.
Starting a Session HELLO JOHN.ANYACCT,MKTG If no home group has been assigned to JOHN, then HELLO JOHN.ANYACCT will fail. Shared group It is fairly common to designate one group within each account that is open to all users who log on to that account. This \shared" group is open to anyone who can log on to the account. A shared group provides a \place" for any programs and les that deserve to be available to all of the users of an account. A shared group belongs to all of the users of that account.
SYS|A Special Account SYS|A Special Account Your HP 3000 Series 9X8LX computer arrives with one special account already in existence, the SYS account. SYS is the account from which the computer is rst started and from which it is managed and controlled day by day. Consequently, access to it should be tightly restricted by exercising careful control over the passwords attached to SYS and to its assigned users, especially to the users identi ed as MANAGER and OPERATOR.
SYS|A Special Account The account manager Each account that is created must have one special user, the account manager. This user has the highest set of authorities within the account, including the authority to create new groups and new users and to assign passwords to groups and users.
3 What Are Files? Programs take, send, record, and retrieve information. From the perspective of the computer, les are the only source and the only destination for all of the information that the programs manage for you. If you have kept records of any kind for any purpose, you have worked with les. Keeping related pieces of information together, in one place, is a loose but workable de nition of a le. Computers, however, go beyond this loose de nition of a le.
Where Are Files? Where Are Files? Files are kept on disks (unless they are stored on tape), and it is logical to assume that computers keep the contents of a single disk le in one, single location. In fact, computers almost never do that. What they really do is to keep the contents of a single disk le in one identity. You control the identity of les by giving them names. Disk memory A phonograph disk is the device that comes closest to the behavior of a computer's memory disk.
Where Are Files? File recording File segments are written (recorded) in tracks on a disk. A track, like the groove in a record, is a prescribed path for the read-write head of the disk to follow. If three people are recording information at the same time, the computer writes a segment of information for the rst person, a segment for the next person, and a segment for the next person. Then it repeats the process beginning again with the rst person.
Where Are Files? The computer keeps a record of the names (and creators) of all les created. This record is kept in still another, special le that the computer itself creates and names. Along with the name of each le, the computer records the location on the disk where the rst segment of every le is to be found. While you are recording information in les, while the computer is laying down segments of les, the computer keeps careful records of the location of each segment of every le.
Table 3-1. Summary of MPE/iX CI Limits Feature HFS Syntax Maximum 512 (/1/2/ . . . /512) directory depth Where Are Files? MPE Syntax 3 ( le, group, account) Maximum number of characters in a component Up to 255 for les or directories under HFS directories 8 for accounts, groups, or les Use of MPE syntax or HFS syntax Initial slash (/) or dot (.) in the CI means use HFS syntax; only HFS syntax is used in the MPE/iX shell Lack of an initial / or .
Where Are Files? Table 3-1. Summary of MPE/iX CI Limits (continued) Feature HFS Syntax MPE Syntax Under a group only File location Under any directory, /, account, or group Maximum characters in pathname 26 (8 times 3) +2 253 for relative pathnames (.
The Location of Files The Location of Files The account structure of the computer is analogous to a room full of ling cabinets|a place, or places, for the orderly storage of information in les (Figure 2-1). This picture is not literally accurate. From a technical point of view, it is a little misleading to think of computer les as being in places such as the drawer of a ling cabinet. But that description helps to explain the organization of the account structure.
The Location of Files File names and logons Have you noticed something a little odd? The fully quali ed name of the le called MYREPORT is this: MYREPORT.MYGROUP.ANYACCT file name.group name.account name Nevertheless, in order to log on to the group in which this le is found, you would enter this: HELLO JOHN.ANYACCT,MYGROUP4Return5 HELLO user name.account name,group name The user name and the account name are the two most critical elements of the logon.
The Location of Files Execution or information A last distinction among les is between executable les (programs) and data les (all others). Executable les provide instruction for the computer to do something. Executable les are usually in binary form, although some, such as command les and job les are written in ASCII. Data les hold information. Data les may be in ASCII or in binary form. Mnemonics The possible variations in le structure, type, and purpose are numerous.
The File Connection The File Connection For the computer, every source of information is a le. For the computer, every destination for information is a le. For the computer, groups, accounts and directories are all les. As curious as it might sound, the computer looks at your keyboard as a le| an input le. And it looks at your video screen as a le, too|an output le. Devices Devices such as printers and your terminal (keyboard and video screen, together) belong in the story of les.
The File Connection build houses. If all goes according to plan, you have nothing more to do. The carpenter/contractor \process" takes over, and, following the blueprints, builds a house. Processes and device drivers serve the computer in the same way. The computer must have a special device driver for each kind of device that it uses|in fact, two printers that operate di erently would need di erent device drivers.
The File Connection During a session, it is the video screen on your desk. When you enter information through your keyboard, it goes to the standard input le. $STDIN is a holding place for everything that you enter at the keyboard. As you type, $STDIN accumulates the characters that you type. When you press 4Return5, the contents of $STDIN are sent to the operating system for analysis and action.
The File Connection A logical device is not a machine, nor is it a physical object. It is a connection to the computer that is made through an intermediating le or process. This \logical" connection is not the same as the cable used to carry information to and from a device. The cable is hardware, a physical object, a thing that you can touch. The console Whether your terminal is designated as 24, 25, or 37|or some other number| is determined when the computer is rst set up.
The File Connection Certain LDEV numbers are assigned for special purposes. LDEV 1, for instance, is always the master volume of the system disk. That never changes. With such exceptions in mind, it is possible, for someone authorized to use a special program, the SYSGEN utility, to assign almost any LDEV number to any device. Such assignments are made when your system is rst set up. Using SYSGEN requires special knowledge. Do not attempt to use it without proper training.
The File Connection However, there may be times when you may want to in uence the choices that the computer makes. The PRINT command normally instructs the computer to display the contents of a le on a video screen. That is how the programming engineers designed it. You might, however, want to use the PRINT command to send the contents of a le to a printer. You can do that.
The File Connection destination was explicitly speci ed with the PRINT command, the computer uses the default destination that it was programmed to use when you do not explicitly specify a destination ($STDLIST). This touches on the subject of default parameters, which is covered in \Defaulted or Omitted Parameters" in Chapter 7. If instead you wanted to use PRINT to send the contents of a le to a printer, you would need to instruct the computer to send it to a le associated with or equated to a printer.
The File Connection The asterisk (*) preceding the XYZ creates a backreference . The computer then looks back to nd the le equation in which XYZ is de ned (FILE XYZ;DEV=LP4Return5). When the computer traces this reference to XYZ, it nds that XYZ is to be regarded as a printer. The le called TAXJAN goes to the printer, just as you wanted it to do.
The File Connection Nothing happens until you type a line at the keyboard. Then, when you press 4Return5, the computer sends that line to your video screen.
The File Connection Configuration|teaching the computer The number of devices connected to your system is potentially large. With some exceptions, your computer leaves the factory having no knowledge of which devices you might attach or how many of them. Telling the computer which devices are attached (and how to nd them) is a process called con guration . The con guration|a description of the number, type, and location of its parts|might di er from one MPE/iX computer to another.
The File Connection Spool files/print files One more signi cant group of les deserves your attention. These les exist because no computer system can do all things simultaneously. Spool les are di erent from the kinds of les that you will work with directly. In fact, most of the time you will have little contact with spool les, except under special circumstances. Spool les exist to hold information that is on its way to somewhere else, such as printer.
4 Here I Am|What Can I Do? The question is actually a little more involved.
Capabilities Capabilities Your ability to use the computer's many facilities may be extensive, or it may be limited. The extent of your ability to use the computer's facilities depends upon an MPE/iX security concept known as capability . Capability, in this sense, does not re ect any judgment made about the person using the computer. Capabilities are levels of authority (or permission) needed to use various functions that are available within the computer.
Who Can, Who Cannot . . . Who Can, Who Cannot . . . Capabilities are assigned , and they determine the extent to which you, or any other user, can make full use of the computer's facilities. Capabilities are assigned to these elements: users (user names) accounts (account names) groups (group names) certain commands, programs, and processes within the computer On most MPE/iX computers, you will nd that there is a hierarchy of capabilities.
Who Can, Who Cannot . . . It is possible to give every person using the computer almost full and equal capabilities on the system. The potential for confusion and disruption of the system is too great to make this practical or desirable. Equally troubling, such an arrangement would reduce the security of les and programs on the system. In charge of the entire system At the highest level, capabilities are assigned by the person who plays the role of system manager on your system.
Who Can, Who Cannot . . . controlling the e cient use of peripheral devices, such as printers, disk drives, and the like managing sessions|allowing or restricting activity on the computer managing jobs backing up les and restoring them starting up and shutting down the system (when that is necessary) trouble-shooting problems In charge of an account Every account on the system has an account manager (code AM ).
Who Can, Who Cannot . . . If yours is a small-size or medium-size organization, the system operator or system manager may serve as the manager of one or many accounts. At the group level Users (user names) that are assigned no extensive capabilities acquire the abilities that are assigned to the group (within the account) to which they log on. As a generalization, groups have the least extensive set of capabilities in the hierarchy of capabilities.
Who Can, Who Cannot . . . Users For users, these are the default (standard) capabilities: Code Capability IA Interactive Access BA This capability allows you to log on and start a session on the computer. Batch Access SF This capability allows you to start (batch) jobs on the computer. Save Files ND This capability allows you to save your work in a le on the disk. Nonshareable Devices This capability allows you to send information ( les) to printers, tape drives, and other nonshareable devices.
Who Can, Who Cannot . . . If you log on in ... Imagine an account called MYACCT. One of its users is JOHN. Imagine that this user happens to have only the standard (default) capabilities. Imagine, too, that this account has these three groups and that they have minimal capabilities: PUB This is the shared group in MYACCT. The logon is: HELLO JOHN.MYACCT,PUB. MYGROUP This your home group. The log on is: HELLO JOHN.MYACCT. (You can log on to your home group without specifying the group name.
User JOHN logs on in MYGROUP Who Can, Who Cannot . . .
Can I . . . ? Access control definitions (ACDs) ACDs are ordered lists of pairs. These pairs consist of access permissions and user speci cations that control the ability to access and change MPE les, hierarchical directories, and the les within them. ACDs are applied using the ALTSEC command and take precedence over other security features, such as lockwords and le access control, such as read/write access.
Can I . . . ? Can I . . . ? You probably can! Programs Even with the minimum set of capabilities, you will be able to run any program that is not protected in some way. Any program found in PUB.SYS (the PUB group of the SYS account) is available for your use, as well as any other les that reside there. Unless they are protected in some way, you will be able to run any program in the shared group of your logon account (it might be the PUB group).
Can I . . . ? Commands With the exception of those commands reserved for the console, you will be able to use almost all of the commands built into MPE/iX. There are commands, however, that are reserved for those users who have special capabilities. The NEWGROUP command, which creates new groups within an account, is available only to an account manager (AM capability). In addition, some commands will perform at full power only for users who have special capabilities.
Starting Programs Starting Programs The documentation that accompanies each program explains what it does and how to use it. In particular, the use of HP Easytime/iX is presented in detail in Volume I of Using Your System . You have three ways of starting|sometimes called running |any program on your MPE/iX system. starting a program with the RUN command starting a program without the RUN command starting a program with the XEQ command It might seem odd to have three ways of starting (running) a program.
Starting Programs Consider a program called AUDIT that resides in the REPORTS group of the FINANCE account. Its fully quali ed name is AUDIT.REPORTS.FINANCE. Notice that programs are les, too. They have fully quali ed names: AUDIT.REPORTS.FINANCE. Wherever you log on, you can run AUDIT this way: RUN AUDIT.REPORTS.
Starting Programs This second method of running a program may not work in each and every case. Before the computer can start a program, it must rst nd the program on the disk. Using RUN with the fully quali ed name of the program tells the computer speci cally where to nd that program. Using an implied RUN forces the computer to search for the program. To do that, it follows a search path Path restriction If you use an implied RUN (AUDIT4Return5), the computer follows a set of instructions called a path .
Starting Programs If the program that you want to run is not found along the path instructions, you will need to use RUN and specify the fully quali ed name of the program. Name restriction Still another limitation on using an implied RUN name might be the very name of the program you want to run. The computer follows a set of priorities|a search priority |in its hunt for executable les.
Starting Programs There are two solutions to this problem. One solution is to use the RUN command with the fully quali ed name of the program (RUN SHOWME.group.account). The other solution is to use the XEQ command.
5 Where Does the Information Go? A complete answer to \where does the information go?" would take many pages of explanation. In part, the answer depends on what you are doing and what you want to accomplish. And in part, it depends on the methods by which the computer sends information from one place to another. If you use HP Easytime/iX, you can point the way and have your information go exactly where you want it to go.
To and From Your Terminal To and From Your Terminal Even before you log on, you can begin a \dialog" with the computer. That might seem an odd way to describe what is going on. The computer is not a person, and its vocabulary is severely limited compared to yours. Yet, an exchange of information is taking place. Before you log on, the computer displays a log on prompt : MPE/iX: That is the computer's message: \I am waiting for an instruction.
To and From Your Terminal says \Please interpret and carry out my instruction if you can." 4Return5 If you now press 4Return5, something happens: the computer attempts to nd the signi cance of whatever you have entered. If you are at the system prompt ( : ), the computer might|or might not| recognize what you typed. There is no built-in command called A. Unless someone has instructed the computer to accept \A" as being somehow signi cant, the computer will display an error message on your video terminal.
To and From Your Terminal You could, if you like, create a command le called A that would have signi cance for the computer. Once you did that, A4Return5 would be a command to the computer to execute the instructions in the command le that you created and called A. Command les are discussed in Chapter 8. A is not very informative to human beings.
To and From Your Terminal Arti cial intelligence programs attempt to instruct the computer in the sort of vague comparisons that human beings make all of the time: almost , not quite , more or less , nearly , a little , many , few , big small , probably , maybe . Human beings use these sorts of comparisons when we make decisions that are based not on precise information but on estimations, guesses, or hunches.
To and From Your Terminal The computer will look in its own memory to determine whether HELLO is a command or some other instruction that it can execute. In contrast, HELLOW is a misspelling. More signi cantly, the computer would not nd in its memory any command called HELLOW and would conclude that you had made an error of some kind. The computer will accept BUDGET as session name. It will look in its own memory to determine whether a user called JOHN is on its list of users to accept.
Destinations for Information Destinations for Information Where information goes depends in part on where you want it to go and your reasons for sending it there. In part, where information goes is determined by the command or program that you are using and by the computer itself. Computer memory Computers have not one but several forms of memory. Which kind of memory is devoted to your work is determined by the stage at which you nd yourself.
Destinations for Information Because random access memory in any computer is nite, specialized programs exist to \ ne tune" the management of this vital commodity. In fact, one or more of these memory management programs may be running in the background while you are working on something of your own. The active portion of the computer's memory exists only in electronic form and exists only while the computer is active (receiving electrical current and operating normally).
Destinations for Information user who is logged on to the computer. It reserves some memory for its own purposes, too. When you log o , the computer reclaims the portion of memory that was devoted to your session and your work and, if needed, reassigns that portion of memory to another session or program. Random access memory is large, but it has limits. As more and more users log on, as they run more programs, or more complex programs, the computer can devote less of its time and memory to each user.
Destinations for Information If you leave a program without this vital, saving step, there is a chance that you will lose whatever you have added to RAM|the rest of that letter that you decided to nish writing today. Sophisticated programs will alert you and ask whether you really intend to leave the program without saving your latest e orts. Worth Remembering In the event of a loss of power or a catastrophic failure, information in RAM can be lost.
Destinations for Information Almost every computer system provides some means for saving vital information in a safe, protected environment. Transferring, or copying, information from a disk to a magnetic or digital tape is a common and economical means. The process may be called backing up or archiving . The term associated with MPE/iX computers is storing , from the command to perform this operation, STORE.
Destinations for Information When the person managing your system warns you that a backup is impending, heed any instructions to save the work that you are doing and, if requested, log o . During a backup, you will not be permitted to continue working or to log on and start new work. The process of backing up depends upon having les that do not change during the backup. When the backup concludes, you will be allowed to log on again and resume your work.
Spool Files, Print Files Spool Files/Print files Spool les exist to hold information that is on its way somewhere else|to your printer, for example. On the instructions of a program or a command that you might use, the computer creates spool les. They are the computer's equivalent of in-boxes and out-boxes. In-box spool les are called input spool les . Out-box spool les are called output spool les . HP Easytime/iX refers to certain kinds of output spool les as print les .
Spool Files, Print Files prints rst those les of highest priority and prints them in the order that they were sent to the printer. It next prints les of lower priorities, again, printing them in their order of receipt. Output spool files The print le of a letter you write|an output spool le destined for the printer|may contain more than the original contents of the letter that you wrote and sent to the printer.
Spool Files, Print Files An output spool le (print le) can be made permanent. Why would you do that? You might want to examine the le to be sure that it is, indeed, what you intended for the printer. You may wish to change its priority in the waiting line (the queue ). The SPOOLF command allows you to make spool les permanent or to change their priority in the queue.
Spool Files, Print Files aware of them. You cannot examine or modify them. You can, however, nd their names with the LISTSPF command. Because the computer can process input spool les much more quickly than a printer can print output spool les, it is not uncommon for the input spool les created as part of your work to be processed and erased before you have a chance to nd them.
6 Behind the Scenes This chapter takes you a little further behind the scenes to explain more about how the computer handles information and why it operates the way it does. There is no requirement to read this chapter, and if have no great interest in the how and why of computers, you may wish to skip ahead to the next chapter.
Why Numbers? Why Numbers? Computers do not truly understand words or letters the way we do. They understand only numbers. Everything that a computer can work with is represented inside the computer as a number. To work with letters, computers assign numbers (codes) to each letter|in fact, to each key on the keyboard. When you press 4A5 on your keyboard, the keyboard electronically sends a number code to the computer.
Why Numbers? \CAT" means something in the English language: a small, furry, four-legged feline that behaves in ways that we have come to recognize. To the computer, however, it is simply the characters C, A, and T bound together in what is known as a string . When you enter HELLO at the logon prompt, that entry does have meaning for the computer, but it has meaning only because a programming engineer has instructed the computer to recognize this string of characters.
Why Numbers? The entire \alphabet" of electronic computers consists of two digits, 1 and 0. This limited \alphabet" has advantages for the computer and some obvious disadvantages for human beings. The advantage for computers is that counting from 0 to 1 at the speed of electricity goes very fast. The disadvantage for us is that with an \alphabet" of only two digits, there is not much that you can say, and counting looks hopeless.
Why Numbers? Addition appears strange, but that is that you must work with twos instead of tens: Binary 101 + 11 -----1000 Decimal 5 3 -8 + Binary Decimal 101010 1011 -----110101 42 11 -53 Each digit, 1 or 0, (On or O ) is called a bit . The largest number that a computer can count depends on how many ones and zeros that it can examine at one time. Older personal computers, for instance, might examine only eight bits at a time: 11111111 is the largest counting number that they can manage.
Why Numbers? ASCII code If you feel that binary code is awkward for human beings, you are not alone. The solution that makes computers workable for us is the ASCII code (American Standard Code for Information Interchange). It is not the only code for computers, but it is in wide use. Your MPE/iX computer uses the ASCII code. Like Morse code, ASCII code assigns to each letter|not a sequence of longs and shorts|but a sequence of bits (zeros and ones).
Why Numbers? permits you to enter special coding sequences into whatever you are typing. Embedding coding sequences into anything that you write is an advanced use of the computer. Avoid doing this unless you know what the results will be. 4Ctrl54A5 permits someone using the console to respond to requests from others who are using the computer. It has other functions, too. 4Ctrl54B5 permits someone using the console to perform a soft or hard reset of the computer.
Why Numbers? Files: ASCII or binary? When you hear or read that something is in ASCII code, you will know that what is recorded is letters or words or symbols that you can read, just as you would read any printed document. When you hear or read that something is in binary code, you will know that what is recorded is collections of ones and zeros. You cannot read binary les as you would a document. To say that a text le is recorded in ASCII form is a convenient way of thinking about text les.
Addition/Computer Problem Solving A Practical Problem If you were writing a program designed to put out a re, you might write something like this: program stopfire(telephone, first aid, water){what is needed} begin {start the program} call firemen {a simple command} get people out of the house {a simple command} if someone is hurt then {a single question} begin {start special action} call a doctor {a simple command} administer first aid {a simple command} end {stop special action} look at the house {a simp
Addition/Computer Problem Solving Addition|Computer Problem Solving You may recall this small problem in addition from Chapter 2. 234 19 8 611 ---872 Computers solve such problems by following the instructions designed into them. The instructions are written in one of the many programming languages that are available. There is no need to learn a programming language, unless the subject catches your interest or your job requires it.
Addition/Computer Problem Solving Here is one computer solution to the task of adding numbers. This program will take numbers from the keyboard, one after the other, and continue adding them together, one after the other, until you enter a zero (0). Then it will display the sum of the numbers that you entered.
Addition/Computer Problem Solving If you do nothing else, make note that the instructions in this program are very speci c. 1. PROGRAM ADD(INPUT, OUTPUT); fline 1g This program statement is an introduction. It tells the computer \this is a program called ADD, and it will accept input from the user and produce output." In the vocabulary of Pascal, it tells the computer quite speci cally that information will come from the keyboard (INPUT, which happens to be the le $STDIN during a session).
Addition/Computer Problem Solving 3. BEGIN {line 3} \Now, after all this introductory material, here is what you (the program) will do." This statement signals the end of the introductory material and the beginning of the main body of the instructions. 4. TOTAL := 0; {line 4} \Begin with a sum of zero." The computer must be told explicitly where to start. Where it starts is by putting the value 0 (zero) into the area of memory represented by the variable TOTAL.
Addition/Computer Problem Solving one after another, to yield a sum. And we want the computer to stop taking and adding numbers when we enter a zero. In the language of Pascal, while is a convenient way to start a loop | a sequence of steps that is repeated, over and over, until we give the computer some reason to cease the repetition. Each time we enter a number, while says: \Is this zero? If it is not zero, do whatever comes after the next begin.
Addition/Computer Problem Solving If at any time we enter 0 (zero), the computer will discover that the condition de ned in statement 6 (is not zero) has not been met. Until we enter zero, the computer will continue to take numbers, one number at a time, perform addition, juggle its memory, and wait for still another number. Recall that this circular repetition of one or more steps is called a loop .
Addition/Computer Problem Solving an error and display a message. Then it would suggest an answer and wait patiently for another number and continue with the additions. As cryptic as the Pascal language might seem, it is still too close to everyday language for the computer to use e ciently. Computers truly understand only collections of ones and zeros.
7 Commands There are well over 200 commands built into the MPE/iX operating system. Some are as simple as SHOWME. The SHOWME command requires only that you enter its name at the prompt and press 4Return5: SHOWME4Return5 Others are more involved, and some of them are complex. A \simple" command does one or two things and does not o er much exibility in its execution. A \complex" command may do one thing|or many things.
Command Parameters Types of Commands Not every command is available to every user. Some commands are restricted to those who have the authority (capability) to use them. A handful of commands are available only to the person using the system console (the system operator or the system administrator). Restricted commands The restrictions on some commands are an extension of the same capabilities that apply to groups, accounts, and users. The NEWUSER command is restricted.
Command Parameters Command Parameters Simple commands, such as SHOWME and SHOWTIME, need|and want|nothing more from you than this: type the name of the command and press 4Return5. SHOWME4Return5 SHOWTIME4Return5 The complex commands o er greater exibility in their execution, but this exibility comes at a price. The complex command may require additional pieces of information from you in order to execute successfully. The pieces of information that you add to a command are called parameters .
Command Parameters Parameters fall into these two groups: Required parameters A required parameter is a piece of information that you must add to the command in order to have the command execute. Optional parameters An optional parameter is a piece of information that you may choose to add to the command. Add the information if it suits your purpose. Be aware, though, that choosing not to include an optional parameter will cause the computer to do something .
Character @ ? # Wildcard Characters: @ ? # Command Parameters Meaning This tells the computer to look for any combination of letters or numbers (none or as many as 8). In this case G@ tells the computer to look for any le name in your logon group that begins with the letter G This is the equivalent of \any single character, letter or number ." G?? tells the computer to look for any le name beginning with the letter \G" and having (at most) two more letters or numbers in the name.
Command Parameters This second decision involved creating a default |a set of instructions for LISTFILE to follow if the user does not specify any parameters. By default, LISTFILE lists all the le names it can nd in your current group if you decide not to narrow the search. With this release, LISTFILE contains additional parameters. For more information, refer to the book, New Features of MPE/iX: Using the Hierarchical File System (32650-90351). Every optional parameter of a command has some default action.
Help with Commands Help with Commands If you look at the PURGE command in the book Command Reference - HP 3000 Series 9X8LX (B3820-90007), you will nd, under the heading Syntax, a curious-looking entry: 2 PURGE lereference ,TEMP 3 This method of showing a command and its parameters is called a syntax diagram . Filereference looks unfamiliar. It is simply the formal name of the (required) parameter for specifying a le to erase. A formal name is not a parameter.
Help with Commands You may nd ,TEMP unfamiliar, too. It is an optional parameter. It is also a keyword . There is more on information on keywords in \Variables and keywords" and in \Syntax diagrams". In the syntax diagram, the square brackets ( [ ] ) surrounding ,TEMP signify that using ,TEMP is optional. You may use it or omit it according to your need.
Variable|required parameter Help with Commands What is a variable? You might think of it as an empty box. Until you put something inside it, the box is just an empty box. When you put something inside it, it becomes a box of. . . . What did you put inside the box? For a computer, a variable is much like an empty box. It is an area of memory waiting for something to ll it. In a syntax diagram, a formal name such as lereference represents just such an empty box.
Help with Commands Variable|optional parameter Optional parameters are variables, too, but with a di erence. The LISTFILE command serves as an example. Its syntax diagram includes this parameter: LISTFILE 2 lename 3 Here, lename is an optional parameter. There is a memory box called lename , too. But for LISTFILE that box always has something in it. What is there is a value that says: all files in the group. And that is what LISTFILE displays if you do not specify a le name.
Help with Commands Keyword|not variable Look again at the syntax diagram for PURGE. 2 PURGE lereference ,TEMP 3 ,TEMP is also a parameter. It happens to be optional, too, because it is surrounded by brackets. But it is not a variable. It is a keyword . It appears in uppercase letters. It instructs PURGE to remove a temporary le , rather than a permanent one. A keyword is not a variable. It is not an empty box into which you can put what you like.
Help with Commands The elements of syntax There are valuable \clues" in any syntax diagram: Syntax Elements Element [] fg Name Brackets Meaning What is inside is optional. Pay attention to the punctuation, the comma or the semicolon if there is one. Braces What is inside is required.
Syntax Elements (continued) Element lowercase lowercase Name Lowercase Letters Help with Commands Meaning What is shown in lowercase letters is a variable. In your documents, variables appear in italic lowercase lettering. In the Help Facility, variables appear in plain lowercase lettering. If it is an optional parameter, you may give the command some information in place of that variable when you type the command line.
Defaulted or Omitted/Parameters Defaulted or Omitted Parameters When you enter a command line, the operating system examines everything that you typed up to the point at which you pressed 4Return5. If you have not mistyped the name of the command, or any of its parameters, the operating system searches its memory concerning the command that you entered.
Defaulted or Omitted/Parameters In this case, the otherwise of ,TEMP is: \erase a permanent le, if it can be found." The otherwise (default) for a required parameter that you fail to specify, that you mistype, or that the computer cannot, for some reason, accept is to display an error message. :PURGE ^ REQUIRES FILE NAME TO BE PURGED. (CIERR 381) CIERR 381 identi es the error that the system encountered.
PRINT|A Closer Look PRINT|A Closer Look The syntax diagram for the PRINT command is a little more complex than the ones illustrated so far. It looks like this: PRINT 22 FILE= 3 lename 32 2 3 ; OUT= out le 3 This is only part of the syntax diagram for PRINT. It has other parameters, in addition to the ones shown here The lename parameter is optional. Notice, though, that you have the choice of whether to precede that parameter with FILE=.
PRINT|A Closer Look You could transform this temporary le into a permanent le by using the SAVE command: SAVE XYZ4Return5 Worth Knowing PURGE removes only one le at a time: PURGE G@4Return5 will not remove all of the les beginning with the letter \G." It will, instead, generate a message informing you that you made an error. You must use PURGE each time that you wish to remove a single le. That helps to ensure that you make a conscious decision to erase a particular le.
8 Command Files and Jobs During a session, the computer accepts only one command line at a time. But over the course of days or weeks or months, you are likely to identify groups of commands that are valuable and change very little. This is especially true if you have the responsibility of managing your computer system. There is a way to execute this group of commands all at once, instead of having to enter each command one at a time every time. In fact, there is more than one way.
Jobs and Job Files Command Files Command les are the easiest to create. The le that you create should contain the commands that you want to execute, plus any parameters that you want to supply to the commands. You may put into each le as few, or as many, commands as you need. When you save the le to disk, give the le a name that has some meaning to you, something that you will remember. To execute the les, all that you need to do is type its name at the keyboard and press 4Return5.
Job or Session? When an error|or something unexpected|occurs in a job, it can take a little time to determine exactly why something went amiss. Job or Session? A major di erence between a session and a job is the di erence between \right now" and \sometime in the future." During a session, the computer attempts to execute your instructions as soon as it possibly can.
Job or Session? However, there are commands and some special programs that require considerable time to nish executing. During the time that a command or program is executing, your terminal is unavailable to you. It could be unavailable for seconds, or even for hours. That can happen during some complex system administration tasks, such as backing up your les. It can happen, too, if the computer is using all of its resources to satisfy the needs of many users.
When You Run a Job Starting jobs through HP Easytime/iX Starting a job through HP Easytime/iX is accomplished through the Job Management screen. You will nd information about starting jobs through HP Easytime/iX in the book Getting Started - HP 3000 Series 9X8LX (B3820-90003). Starting jobs through MPE/iX Commands Starting a job through MPE/iX commands involves using the STREAM command. For that reason, running a job is sometimes called \streaming a job.
When You Run a Job When You Run a Job This last section on jobs is devoted to points of interest, rather than to the steps involved in creating and starting jobs. Using Your System includes several chapters that guide you through the creation of job les and starting jobs. At the start You may leave the decision of when to execute your job to the computer. Or, within limits, you may increase the priority of your job in the job queue in order to have it execute sooner.
When You Run a Job Worth Remembering Record the job identi cation number of your job. While the job is running, this number is your link with the job. You may want to do several things that are possible if you know the job number.
When You Run a Job Getting over the fence Your system manager or system operator will use the JOBFENCE command to set the priority limits for jobs. If the jobfence is set at 7 and your job has a priority of 8, it will eventually execute, but only after jobs having a priority of 9 or greater have executed. If your job has a priority equal to or less than 7 (the same as the jobfence), it will not run. If the jobfence is set at HIPRI, no jobs except those given HIPRI priority will execute.
When You Run a Job Errors and your job listing If there are errors in your job le|or if the computer cannot complete an instruction in the job le|the computer will display on your video terminal nothing more than a message telling you that your job terminated in an error. During a session, the computer displays error messages on your terminal ($STDLIST for a session). During a job, however, $STDLIST is redirected to the printer connected to your MPE/iX system, and that is where your error listing appears.
Index Special characters A capabilities, 4-5, 7-2 applications what are, 1-6 archiving information, 5-10 arti cial intelligence, 5-4 ASCII codes, 6-6 les, 3-8, 3-9, 8-1 access control de nitions ACDs, 4-10 accounts, 2-10, 3-7 capabilities, 4-3 manager, 4-5 managers, 2-19 names, 2-3, 2-15, 5-6 passwords, 2-9 protecting, 2-15 structures, 2-3, 3-7 ACDs access control de nitions, 4-10 security features, 4-10 action default, 7-16 addresses les, 3-7 AI, 5-4 ALLOW command, 7-2 alphabet computer language, 6-3 AM
syntax, 7-12 brackets syntax, 7-8, 7-12 4Break5 keys, 2-13 byte computer languages, 6-5 byte stream les, 3-8 C capabilities, 4-2, 4-3, 4-11 accounts, 4-3 AM, 4-5, 7-2 BA, 4-7 batch access, 4-7 commands, 4-3, 7-2 groups, 4-3, 4-6 IA, 4-7 interactive access, 4-7 ND, 4-7 nonshareable devices, 4-7 OP, 4-4, 7-2 PH, 4-9 PM, 4-9 privileged mode, 4-9 processes, 4-3 process handling, 4-9 programs, 4-3 save les, 4-7 SF, 4-7 SM, 4-4, 7-2 users, 4-3 central processing unit, 1-2, 5-6 characters wildcards, 7-4 CI prog
RESUMINGJOB, 8-7 RUN, 4-13, 4-16 SAVE, 7-16 SHOWJOB , 8-7 SHOWME, 3-11, 4-16, 4-17, 7-1, 7-3 SHOWTIME , 7-3 simple, 7-1 SPOOLF, 5-14 starting, RUN, 4-13 starting, without RUN, 4-14 starting, XEQ, 4-17 STORE, 3-18, 5-10 STREAM, 8-5, 8-7, 8-8 STREAMS , 8-5 suspending, 2-13 syntax, 7-7 SYSGEN, 3-14, 3-19 terminating, 2-13 variables, 7-10, 7-11, 7-13 XEQ, 4-13, 4-16, 4-17 commas syntax, 7-13 compiled programs, 6-16 component, 3-5 computer languages alphabet, 6-3 bit, 6-5 byte, 6-5 number, 6-3, 6-6 Pascal, 6-11
disks, 3-10 driver, 3-10 keyboards, 1-3 ldev, 3-12, 3-13 logical, 3-12, 3-13 nonshareable, 4-7, 5-13, 5-15 peripheral, 1-3, 3-10, 5-12 printers, 1-4, 3-10, 4-7, 5-12, 5-13, 7-16 tape drives, 1-4, 3-13 tapes, 3-18, 4-7 terminals, 1-3 UPS, 1-4 video screens, 1-3 diagrams syntax, 7-7, 7-8, 7-10, 7-12 dialogs con guration, 3-19 terminals, 5-2 disk drives devices, 1-4 disks devices, 3-10 les, 2-10 memory, 3-2, 5-9, 5-10, 5-11 segments, 3-2 tracks, 3-3 drives disks, 1-4 tapes, 1-4 E EDIT/3000 program, 3-9 progr
names, 3-3, 3-4 names, fully quali ed, 2-10, 2-11 of commands, 8-1 owner, 2-13 permanent, 3-3 print les, 3-20, 5-13, 5-14 protecting, 5-11 segments, 3-4 source, 3-10 spool les, 3-20, 5-13, 5-14, 5-15 standard input, 3-11 standard output, 3-11 $STDIN, 3-11, 3-12 $STDLIST , 3-11, 3-12, 8-9 structures, 3-9 system, 3-19 system-de ned, 3-11 temporary, 3-3, 7-8, 7-11, 7-16 what are, 3-1 le system hierarchical, 2-3 nding les, 2-12 fractional numbers, 6-12 full backup, 5-11 fully quali ed les name, 2-10, 2-11 funct
output, 1-12 writing, 1-12 italics syntax, 7-12 J JOB command, 8-8 JOBFENCE command, 8-8 jobs, 4-11 background, 8-4 fence, 8-8 les, 8-1 identi cation number, 8-6, 8-7 listing, 8-9 monitoring status, 8-7 not interactive, 8-4 priorities, 8-7 queue, 8-5 resuming, 8-7 scheduling, 8-8 starting, 8-5 suspending, 8-7 terminating, 8-7 K keyboard codes computers, 5-2, 6-6 keys 4Break5, 2-13 control, 6-6 4Ctrl5, 6-6 4Esc5, 6-6 function, 6-2 4Return5, 6-6 keywords command, 7-11 L languages machine, 6-16 programs
mnemonics, 3-9 Morse code, 6-3 MPE/iX, operating system, 1-5 MPE syntax summary, 3-5 N names accounts, 2-3, 2-15, 5-6 device classes, 3-16, 3-17, 3-18 les, 3-3, 3-4 fully quali ed, 2-10 groups, 2-3, 2-15, 5-6 programs, 4-16 rules, 3-6 sessions, 2-14, 5-6 users, 2-3, 2-13, 2-15, 2-16, 5-6 ND capabilities, 4-7 NEWACCT command, 7-2 NEWUSER command, 7-2 nonshareable devices, 5-13 capabilities, 4-7 notations binary, 3-3, 6-4 decimal, 6-4 numbers computer language, 6-3, 6-6 fractional, 6-12 job identi cation, 8
devices, 1-4, 3-10, 5-12 laser, 5-12 line, 5-12 page, 5-12 print les, 3-20, 5-13 priorities jobs, 8-7 search, 4-16 privileged mode capability, 4-9 processes capabilities, 4-3 programs, 3-10 processes handling capability, 4-9 processing unit central, 5-6 system, 5-6 program main body, 6-13 programs abort on error, 6-15 background, 5-7 capabilities, 4-3 CI, 5-5 command interpreter, 1-5, 5-5 compiled, 6-16 condition, 6-14 EDIT/3000, 3-9, 5-9, 8-1, 8-2 example, 6-10 execution time, 8-3 grammar of, 6-11 input, 6
keys, 6-6 what is, 5-2 ROM memory, 5-9 rules names, 3-4, 3-6 programs, 1-9 run implied, 4-14, 4-16 RUN command, 4-13, 4-16 S SAVE command, 7-16 save les capabilities, 4-7 scanner programs, 5-5 scheduling backing up, 5-11 jobs, 8-8 search priorities, 4-16 security features ACDs (access control de nitiions), 4-10 segments disks, 3-2 les, 3-4 semicolons syntax, 7-13 sessions, 2-8 interactive, 8-4 names, 2-14, 5-6 numbers, 2-14 SF capabilities, 4-7 shared group, 2-17 passwords, 2-17 SHOWJOB command, 8-7 SHOW
subystems what are, 1-6 summary HFS syntax, 3-5 MPE syntax, 3-5 supervisor system, 3-13, 4-4 suspending commands, 2-13 syntax braces, 7-12 brackets, 7-8, 7-12 commands, 7-7 commas, 7-13 diagrams, 7-7, 7-8, 7-9, 7-10, 7-12 italics, 7-12 lowercase, 7-9, 7-13 place holders, 7-13 semicolons, 7-13 uppercase, 7-11, 7-13 variables, 7-13 syntax summary HFS, 3-5 MPE, 3-5 SYSGEN command, 3-19 SYSGEN utility, 3-14, 3-19 system backing up, 3-19 console, 1-3 les, 3-19 manager, 3-13, 4-4 processing unit, 5-6 prompt, 5-2
W what are applications, 1-6 computer language, 6-2 computers, 1-1 les, 3-1 programs, 1-2, 1-10, 3-1 subsystems, 1-6 variables, 7-9 what is hardware, 1-2 input, 1-12, 5-2 output, 1-12 4Return5, 5-2 software, 1-2 whole numbers, 6-12 wildcards #, 7-4 ?, 7-4 @, 2-12, 7-4 characters, 7-4 writing I/O, 1-12 X XEQ command, 4-13, 4-16, 4-17 Index-11