DEC 10 OTSCA A D Decsystem10 Getting Started With TOPS Commands
DEC-10-OTSCA-A-D decsystem10 Getting Started With TOPS-10 Commands DEC-10-OTSCA-A-D decsystem10 Getting Started With TOPS-10 Commands
User Manual: DEC-10-OTSCA-A-D decsystem10 Getting Started With TOPS-10 Commands
Open the PDF directly: View PDF
.
Page Count: 48
| Download | |
| Open PDF In Browser | View PDF |
GETTING STARTED
WITH
TOPS-10 COMMANDS
DEC-10-0TSCA-A-D
GETTING STARTED WITH
TOPS-10 COMMANDS
digital equipment corporation • maynard. massachusetts
First Printing June 1971
Second Printing July 1972
Third Printing March 1975
Fourth Printing June 1975
The information in this document is subject to change without notice
and should not be construed as a commitment by Digital Equipment
Corporation. Digital Equipment Corporation assumes no responsibility
for any errors that may appear in this manual.
The software described in this document is furnished to the purchaser
under a license for use on a single computer system and can be copied
(with inclusion of DIGITAL's copyright notice) only for use in such
system, except as may otherwise be provided in writing by DIGITAL.
Digital Equipment Corporation assumes no responsibility for the use
or reliability of its software on equipment that is not supplied by
DIGITAL.
copyright
~
1971, 1972, 1973, 1974, 1975
by Digital
Equipment Corporation
The HOW TO OBTAIN SOFTWARE INFORMATION page, located at the back of
this document, explains the various services available to DIGITAL
software users.
The postage prepaid READER'S COMMENTS form on the last page of this
document requests the user's critical evaluation to assist us in
preparing future documentation.
The following are trademarks of Digital Equipment Corporation:
CDP
COMPUTER LAB
COMSYST
COMTEX
DDT
DEC
DECCOMM
DECTAPE
DIBOL
DIGITAL
DNC
EDGRIN
EDUSYSTEM
FLIP CHIP
FOCAL
GLC-8
IDAC
IDACS
INDAC
KAID
LAB-8
LAB-8/e
LAB-K
OMNIBUS
OS/8
PDP
PHA
PS/8
QUICKPOINT
RAD-8
RSTS
RSX
RTM
RT-ll
SABR
TYPESET 8
UNIBUS
6/75-15
CONTENTS
Page
1 .0
GETTING ON THE SYSTEM
1.
2.0
FILES
3
3.0
CREATING FILES
4
3.1
The CREATE Command
5
3.2
The MAKE Command
6
4.0
EDITING FILES
6
4.1
The EDIT Command
6
4.2
The TECO Command
7
5.0
MANIPULATING FILES
7
5.1
The DIRECT Command
7
5.2
The TYPE Command
7
5.3
The DELETE Command
9
5.4
The RENAME Command
9
6.0
TRANSLATING, LOADING, EXECUTING, DEBUGGING
PROGRAMS
9
6.1
The COMPI LE Command
9
6.2
The LOAD Command
10
6.3
The EXECUTE Command
10
6.4
The DEBUG Command
11
7.0
GETTING INFORMATION FROM THE SYSTEM
12
7.1
The PJOB Command
13
7.2
The DAYTIME Command
13
7.3
The TIME Command
13
8.0
LEAVING THE SYSTEM
14
8.1
The KJOB Command
14
9.0
HOW TO LIVE WITH THE TERMINAL
15
9.1
Control -C
15
9.2
The RETURN Key
16
9.3
The RUBOUT Key
16
9.4
Control -U
16
9.5
The ALTMODE Key
17
9.6
Control -0
17
10.0
PERIPHERAL DEVICES
17
11 .0
COMMANDS TO ALLOCATE SYSTEM RESOURCES
19
11 .1
The ASSIG N Command
19
iii
CONTENTS (Cont)
Page
11 .2
The MOUNT Command
11 .3
The DEASSIGN Command
20
21
11.4
The DISMOUNT Command
21
11 .5
The REASSIGN C;ommand
21
11 .6
The FINISH Command
22
11 .7
The CORE Command
22
12.0
COMMANDS TO MANIPULATE TERMINALS
22
12.1
The SEND Command
22
12.2
The DETACH Command
23
12.3
The ATJ ACH Command
23
13.0
COMMANDS TO REQUEST LINE PRINTER OUTPUT
23
13.1
The PRINT Command
23
13.2
The CREF Command
24
13.3
The DIRECT Command
24
14.0
COMMANDS TO MANIPULATE CORE IMAGES
25
14.1
The SAVE Command
25
14.2
The RUN Command
25
14.3
The R Command
25
14.4
The GET Command
26
15.0
COMMANDS TO START A PROGRAM
26
15.1
The START Command
26
15.2
The HALT (tC) Command
26
15.3
The CONTINUE Command
26
16.0
ADDITIONAL COMMANDS TO GET INFORMATION
FROM THE SYSTEM
27
16.1
The RESOURCES Command
27
16.2
The SYSTAT Command
27
TABLES
Title
Table No.
17
Peripheral Devices
iv
FOREWORD
Getting Started With TOPS-l,0 Commands is a simplified guide for the timesharing user of the
DECsystem-l,0. The commands described in this document are the subset of monitor commands
that are most useful to the beginning user. With the commands described herein, the user can
create, edit, and manipulate files; translate, execute, save, and start programs; use devices;
and obtain information from the system. The complete reference document for the command
repertoire is DECsystem-l,0 Operating System Commands (DEC-l0-oSCMA-A-D); this manual
should be referred to for additional information.
Another manual written for the beginning user is Getting Started With DECsystem-l,0
(DEC-l,0-XGSDA-A-D). This manual is a procedural-oriented document and describes
how to use the language translators and the editor in addition to the basic monitor commands.
Complete examples are given for FORTRAN, BASIC, and ALGOL languages.
March,1975
Programs are typed directly. into the computer by means of the terminal. By typing in programs, you
establish communication with other programs already resident in the computer. The first resident program you communicate with is the monitor, the most important program in the computer. The monitor
is the master program that plays an important role in the efficient operation of the computer. Just as
the terminal is your link with the computer, the monitor is your link with the programs within the computer.
The monitor has many functions to perform, like keeping a record of what each user is doing and deciding what user should be serviced next and for how long. The one function of the monitor that is of
greatest concern at this point is that the monitor retrieves any resident programs that you need. This
retrieval happens only if the monitor "understands" what is expected of it. The commands to the monitor which are explained in the following sections are sufficient for the terminal to be the device by
which information is inputted into the system and by which the system outputs its results.
See section 9.0 for a discussion on How to Live With
the Terminal.
1.0
GETTING ON THE SYSTEM
In order to gain access to the timesharing system, you must say hello to the system by "logging in".
The first move is to make contact with the computer facility by whatever means the facility has established (e.g., acoustic coupler, telephone, or dataphone). Next, notice the plastic knob (the power
switch) on the lower right-hand side of the terminal. This knob has three positions: ON, OFF, and
LOCAL (turning clockwise). When the knob is in the LOCAL position, the terminal is like a typewriter;
it is not communicating with the system at all. The knob must be turned to the ON position in order
to establish communication with the computer. When the terminal is turned ON, type a fC (depress
the CTRL key and type C). This action establishes communication with the monitor. The monitor
We wish to express appreciation to Stanford University for the use of their Stanford A-1 Project User's
Manual, Chapter 1, SAILON No. 54, as a guide in writing the material in this section.
signifies its readiness to accept commands by responding with a period (.). All the commands discussed
in this document can only be typed to the monitor. They are operative when the monitor has typed a
period, signifying that it is waiting for a command.
The first program the monitor should call in for you is the LOGIN program. This is accomplished by
typing LOGIN followed by a carriage-return (depress the RETURN key). All commands to the monitor
should be terminated with a carriage-return. When the monitor "sees" a carriage-return, it knows that
a command has been typed and it begins to execute the command.
In the text, underscoring is used to desi gnate terminal output.
A carriage-return is designated by a ) .
By typing LOGIN, you cause the monitor to read the LOGIN program from the disk into core memory
and it is this program that is now in control of your terminal. Before the LOGIN program is called in,
the monitor assigns you a job number for system bookkeeping pl/rposes. The system responds with an
information message simi lar to the following.
JOB 23
H57ATA SYS ~ ~
.!!..
In the first line, the system has assigned your job number (23) and has given the name of the monitor,
the name of the system, and the number of your terminal line. In the second line, the number sign
(#), which is typed out by the LOGIN program, signifies that it wants your identification.
The standard identification code is in the form of project numbers and programmer numbers, but individual installations may have different codes. The numbers, or whatever code each installation uses,
are assigned to each user by the installation. The LOGIN program waits for you to type in your project
number and your programmer number, separated by a comma and terminated with a carriage-return,
following the number sign.
JOB 23
R57ATA
sys
~
II..Y1l
.11.27,235)
An alternate method of typing in your project number and programmer number is to type your identification on the same line as the LOGIN command and to follow it with a carriage return. The system responds with the information message, and the LOGIN program does not type out the number sign. For
example,
.LOGIN 27,235)
JOB 23
R57ATA
ill
~ ~
2
The LOGIN program needs one more item to complete its analysis of your identification. This it
requests in the next line by asking for your password.
JOB 2~
PASSWORD:
R57ATA SYS '40/2 TTY73
Type in your password, which is also assigned by the installation, followed by a carriage-retum. To
maintain password security, the LOGIN program does not print the password.
If the identification typed in matches the identification stored in the accounting file in the monitor,
the LOGIN program signifies its acceptance by responding with the time, date, day of the week, the
message of the day (if any), and a period.
.LOGIN )
JOB 23
.LOGIN 27,235 )
JOB 23
R5 7 ATA sys #40/2 TTY73
PASSWORD:
)
1854
30-0CT-84
TUE
TT=SEp WE AR E NOW
RUNNING OUR DATE75 TEST.
R57ATA SYS #40/2 TTY73
!.27 ,235 )
PASSWORD:
)
1850
30-0CT-§,4
TUE
11- SEP
WE AR E NOW
RUNNING OUR DATE75 TEST.
This typeout indicates that the LOGIN program has exited and returned control to the monitor. You
have successfully logged in and may now have the monitor call in other programs for you. If the identification typed in does not match the identification in the accounting file, the monitor types out the
error message
?LGNIET INVALID ENTHY -
THY AGAIN
!..
If th is error message occurs, type in the correct project-programmer numbers and password.
2.0
FILES
When you want to run a program, first type in the program and decide on a name for it. The program
is stored on the disk with the specified name. Then translate the program by calling in a translator
and giving it the name of the program you wish to translate.
A program, or data, is stored on the disk in files. If a program is being typed in to a text editor (for
example, TEeO), the editor is busy accepting the characters being typed in and generating a disk file
for them. Then, when the program is to be translated, the translator reads this file just created and
generates a relocatable binary file. Since you may have many files and the other users on the computer
may have files, there must be a method for keeping all of these files separate. This is accomplished by
3
giving each user a unique area on the disk. This area is identified by your project and programmer
numbers. For example, if your project and programmer numbers are 27,235, you have a disk area by
that name. Each fi Ie you create goes to your disk area and must be uniquely named.
Files are named with a certain convention, the same as a person is named. The first name, the filename, is the actual name of the file, and the last name, the filename extension, indicates what group
the file is associated with. The filename and the filename extension are separated by a period.
Filenames are from one to six letters or digits. All letters or digits after the sixth are ignored. The
filename extension is from one to three letters or digits. It is generally used to indicate the type of
information in the file. The following are examples of standard filename extensions.
.TMP
Temporary fiI e
.MAC
Source file in MACRO language
.F4
Source file in FORTRAN IV (F40) language
.FOR
Source file in FORTRAN-l0 language
. BAS
Source file in BASIC language
.AlG
Source file in ALGOL language
.CBl
Source file in COBOL language
.REL
Relocatable binary file
.SAV
A saved core image
Since files are identified by the complete name and the project and programmer numbers, two users
may use the same filename as long as they have different project and programmer numbers; the files
would be distinct and separate. The following are examples of filenames with filename extensions.
3.0
MAIN .FOR
A FORTRAN file named MAIN
SAMPLE. BAS
A BASIC file named SAMPLE
TESTl . TMP
A temporary file named TEST 1
NAME.REl
A relocatable binary file named NAME
CREATING FILES
The two commands mentioned in this section use two editors to create a new disk file. One of the
editors is LINED, a line-oriented editor, and the other is TECO, the Text Editor and Corrector {refer
to the LINED and TECO documents in the DECsystem-10 Software Notebooks}. Each command requires a filename as its argument and should have a filename extension. A new file may be created
with either of these commands, depending on the editor desired.
4
March 1975
3.1
The CREATE Command
The CREATE command is used only to create a new disk file. When this command is executed, the
monitor calls in LINED to initialize a disk file with the specified name and to accept input from the
terminal. At this point, begin to type in your program, line by line. LINED types a line number at
the beginning of each line so that later a reference to a given line may be made in order to make corrections. Below is a sample program using the commands discussed so far.
tC
~LOGIN
JOB 23
Establish communication with the monitor.
Type C while depressing the CTRL key.
Begin the login procedure and type in your
identification.
27,235)
R57ATA SYS 640/2 TTY73 The job number assigned, followed by the
monitor and system name and the terminal
Iine number. The LOG IN program requests
identification (project number and programmer number) if it was not typed on the same
Iine as the LOGIN command.
PASS~!(1RD:
1856
II-SEP
The LOG IN program requests your password.
Type it in; it is not printed.
)
30-0CI-B4
WE ARE NOW
TUE
RUNNING OUR DATE75 TEST.
If identification matches identification
stored in the system, the monitor responds
with the time, date, day of the week, message of the day, and a period.
A new file on the disk is to be created and
called MAIN .FOR. The extension .FOR is
used because the program is to be a
FORTRAN-l0 source file. LINED is
called in to create the fi Ie.
.CREATE MAIN. FOR )
Response from LINED signifying it is ready
to accept commands.
1 )
A command to LINED to insert line numbers
starting with 10 and incrementing by 10
(refer to the LIN ED document).
Type in your FORTRAN PROGRAM.
53
TYPE 53)
F'OHMAT C' THIS IS MY PROGHAM'))
END)
The ($) (altmode) is a command to LINED
to en'd1'he insert. On the terminal this key
is labeled ALT, ESC, or PREFIX.
$
Response from LINED signifying it is ready
to accept another command.
E)
A command to LINED to end the creation of
the file.
5
*
Response from LINED indicating readiness to
accept a command.
Return to the monitor.
rC
The monitor now has control of the program.
The three LINED commands (I,
(!),
E) shown in the examples are fully discussed in the LINED
document.
3.2
The MAKE Command
This command can also be used to open a new disk file for creation. It differs from the CREATE command in that TECO is used instead of LINED. (TECO is discussed in the DECsystem-l0 Introduction
to TECO Manual.) Otherwise, the CREATE and MAKE commands operate in the same manner •
• MAKE
FILEA.F4)
~ I (T ext input)
$~
EX$$
.!.
The altmode ($) and the EX command are commands to TECO and are explained in the TECO document.
4.0
EDITING FILES
After creating a text file, you may wish to modify, or edit, it. The following two commands cause
an existing file to be opened for changes. One command (EDIT) calls in LINED, and the other (TECO)
calls in TECO. In general, the editor used to create the file should be used for editing. Each command requires, as its argument, the same fi lename and filename extension used to create the file.
4.1
The EDIT Command
The EDIT command causes LINED to be called in and, as the name implies, signifies that you wish to
edit the specified file. LINED responds with an asterisk and waits for input. The file specified must
be an already existing sequence-numbered file on the disk. For example, in Paragraph 3.1, the file
MAl N .FOR was created. If the command
.!.EDIT MAIM.FOR)
is given to edit the file, the computer responds with an error message (assuming that there was no file
named MAIM .FOR). The command
6
March 1975
.EDIT MAIN. FOR )
causes the right file to be opened for editing.
4.2
The TECO Command
The TECO command is similar to the EDIT command except that it causes the TECO program to open an
already existing file on the disk for editing purposes. The command sequence
.TECO
!
FILEA.r4)
(editing)
$$
*FX.~%
causes TECO to open FILEA. F4 for editing and close the file upon completion, creating a backup file
out of the original file. Whenever one of the commands used to create or edit a file is executed, this
command with its arguments (fi lename and fi lename extension) is "remembered" in a temporary file on
the disk. Because of this, the file last edited may be recalled for the next edit without having the
filename specified again. For example, if the command
.CRfATF. PROGl .MAC )
is executed, then you may type the command
:JDlT)
instead of
.FDIT
PROGl.f:.'AC)
assuming that no other CREATE, TECO, MAKE, or EDIT command that changed the filename was used
in-between. As mentioned before, if a command tries to edit a file that has not been created, an error
message is given.
5.0
MANIPULATING FILES
You may have many files saved on your disk area. (For discussion on how to save a file on your disk
area, refer to Paragraph 14. 1.) The list of your files, along with lists of other users fi les, is kept on
I
the disk in what are called user directories. Suppose you cannot remember if you have created and
saved a particular file. The next command helps in just that type of situation.
7
5.1
The DIRECT Command
The DIRECT command requests from the monitor a listing of the directory of your disk area. The
monitor responds by typing on the terminal the names of your files, the length of each file in the number of DECsystem-10 disk blocks written (a block is 128 10 words), and the date on which each file was
created. The protection associated with each file is also output. This protection is a code that indiIt is automatically assigned when you create the
cates which users are allowed to access your files.
file. Refer to DECsystem-10 Monitor Calls (DEC-I0-0MCMA-A-D) for an explanation of file
protection.
Names of files not explicitly created by you may show up in the directory. These files were created
as intermediate files for storage by programs you may have used. For example, in translating a file,
the translator generates a fi Ie with the same fi lename but with a filename extension of • REL. This
file contains the relocatable binary translation of the source file. You may also notice filenames with
the filename extension of . TMP. This extension signifies a temporary file created and used by different system programs.
5.2
The TYPE Command
By listing your directory on the terminal, you know the names of the fi les on your disk area. But what
if you have forgotten the information contained in a particular file? The TYPE command causes the
contents of source files specified in your command string to be typed on your terminal. For example,
the command
causes the file MAIN. F4 to be typed on the terminal. Multiple files separated by commas may be
specified in one command string, and only source files, not binary files, may be listed.
This command allows the "asterisk construction" to be used. This means that the filename or the filename extension may be replaced with an asterisk to mean any filename or filename extension. For
example, the command
.TYPF
FILEB.*)
causes all files named FILEB, regardless of filename extensions, to be typed. The command
causes all files with the filename extension of .MAC to be typed. The command
.=..TYPE
*. * )
causes all files to be typed.
8
5.3
The DELETE Command
Having finished with a file, you may erase it from your disk area with the DELETE command. Multiple
files may be deleted in one command string by separating the files with commas.
For example,
.DFLFTF: LINEAR)
and
.:.DELETE CHANGE.F4~ SINE.REL)
are both legal commands. The asterisk convention discussed in section 5.2 may also be used with the
DELETE command.
5.4
The RE NAME Command
The names of one or more files on your disk area may be changed with the RENAME command. The old
filename on the right and the new filename on the left are separated by an equal (=) sign. In renaming more than one file, each pair of filenames (new= old) is separated by commas. For example, the
command
.:.REI'MjIt,E SALES .C8L=GkOSS.CBL~F ILE2 .F4=F ILE 1 .F4)
changes the name of fi Ie GROSS. CBL to SALES. CBL and fi Ie FILE 1. F4 to FILE2. F4. The old fj lename
no longer appears in your directory; instead the new filenames appear containing exactly the same data
as in the old files. The asterisk convention may again be used. For example, the command
causes all files with no filename extension to have the extension .F4.
6.0
TRANSLATING, LOADING, EXECUTING, DEBUGGING PROGRAMS
As this point you know how to get on the system, how to create and edit a source file of a program,
and how to list your source file on the terminal. The program has not been executed. This only happens
after it has been translated into the binary machine language understandable to the computer and loaded
into core memory. More often than not the program must be debugged.
6. 1 The COMPILE Command
This command has as its argument one or more filenames separated by commas. It causes each named file
to be processed (translated) if necessary by the appropriate processor (translator). It is considered
necessary to process a file if no .REL file of the source file exists, or if the .REL file was created
9
March 1975
before the last time the source file was edited. If the .REL file is up-to-date, no translation is done.
The appropriate processor is determined by examining the extension of the file. The following shows
which processor is used for various extensions.
.MAC
MACRO assembler
.F4 or .FOR
FORTRAN compiler
.ALG
ALGOL compiler
.CBL
COBOL compiler
.REL
No processing is done
other than above,
or null
"Standard processor"
The standard processor is used to translate programs with null or nonstandard extensions. The standard
processor is FORTRAN at the beginning of the command string, but may be changed by use of various
switches {refer to DECsystem-lO Operating System Commands}. Although it is not necessary to indicate the extension of a file in the COMPILE command string, the standard processor can be disregarded
if all source files are kept with the appropriate extension.
When the appropriate translator has translated the source file, there is a file on your disk area with
the filename extension .REL and the same filename as the source file. This file is where the translator
stores the results of its translation (:md is called the relocatable binary of the program. The program is
now translated into binary machine language, but is still on the disk. Since the disk is used for storage
and not for execution, a copy of the binary program must be loaded into core memory to form a core
image. The core memory of the computer is used for execution; it is like a scratch pad. The COMPILE
command does not generate a core image, but the following three commands do.
6.2
The LOAD Command
The LOAD command performs the same operations as the COMPILE command and in addition causes
L1NK-10 to be run. L1NK-10 is
Q
program that takes the specified REL files, links them together,
and generates a core image. The LOAD command does not cause execution of the program.
6.3 The EXECUTE Command
This command performs the functions of the LOAD command and also begins execution of the loaded
programs, if no translation or loading errors are detected. The compiled program is now in core memory and running, and what happens next depends on the program. More than likely, the program is
not retum ing the correct answers, and you now enter the magi c world of program debugging.
10
March 1975
6.4
The DEBUG Command
This command prepares for the debugging of a program in addition to performing the functions of the
COMPILE and LOAD commands. A system debugging program is loaded into core memory first,
followed by the progrom. Upon completion of loading, the debugging program is started. rather than
the user's program. A command to this debugging program may then be issued to begin the program
execution. The DEBUG command should be used by the experienced programmer fami liar with the
debugging programs on the DECsystem-l0. The above four commands have extended command
forms discussed in DECsystem-10 Operating System Commands.
The following is an example showing the compi lation and execution of a FORTRAN-l0 main program
and subroutine. The login procedure is not shown.
.!,.CREATE MYF'IL.FOn )
CREATE a disk file •
!!)
Command to LINED to begin inserting on
line 10, incrementing by 10.
Statements of the FORTRAN main program.
69
TYPE 69 )
FORMAT (' THIS
CALL SUBl )
IS THE MAIN PROGRAM')
iN D)
Altmode ends the insert.
)
*E)
LINED command to end the edit.
.!,tC
Return to the mon itor •
.CREATE PHOG. FOR)
Create a disk file for the subroutine.
j;I )
Begin inserting at line 10 incrementing by
10.
Statements of the FORTRAN Subroutine.
00012
00020
~
~
~
00060
1~5
SUBROUTINE S UBH )
TyPE lC5)
FORMAT (' THIS IS THE SUBROUTINE') )
RETur~N )
END
$
Altmode ends the insert.
!,E)
LINED command to end the edit.
..!,tC
Return to monitor.
• EXECUTE MYFIL.FOR,PROG.FOR)
FORTH AN: MYFIL
FORTH AN: PIWG
L1'1K:
LOADING
Request executi on of the programs created .
11
FORTRAN reports its progress.
March 1975
7LNKUGS I UNDEFINED GLOBAL SYMBOL
SUB 1
156
[LNKXCT MYF'IL EXECUTION]
There is no subroutine named SUB 1.
THIS IS THE MAD PROGRAM?
7ILLEGAL UUO AT USER PC 000000
Only the main program was executed.
.!oEDI T)
Ask to edit PROG .FOR; filename need not be
mentioned since it was the last file named.
*PI0,20 )
Type lines 00010 and 00020 on the terminal.
00013
SUBROUTINE SUBH
TYPE 1~5
*ll~
Insert a new line 10.
S UBf!O UTI NE SUS 1..>
00010 •
Term i nate the insert.
$
End the edit.
• EXECUTE MYFIL. FOI{,
F'ORTHAN: PROG
LI NK:
P~OG.
FOR)
Request execution •
Only the subroutine is recompiled since
only it has been edited.
Both MAIN and PROG are loaded.
LOADING
[LNKXCT MYFIL EXECUTION I
THIS IS THE MAIN PROGHAM
THIS IS THE SUBROUTINE
Execution begins.
END OF EXECUTIO~~
Execution ends.
CPU TIME: 0.05
ELAPSED TIME: 0.05
EXIT
.:.
7.0
GETTING INFORMATION FROM THE SYSTEM
There are several monitor commands that are used to obtain information from the system. Three commands useful at this point are discussed in this section, and additional commands are discussed in Paragraph 16.0.
12
7.1
The PJOB Command
If you have forgotten the job number assigned to you at LOGIN time, you may use the PJOB command
to obtain it. The system responds to this command by typing out your assigned job number. For example,
.PJ08 )
23
7.2
The DAYTIME Command
This command gives the date followed by the time of day. The time is presented in the following format:
hh:mm:ss
where hh represents the hours, mm represents the minutes, and ss represents the seconds. For example,
.DAYTIME)
30-0CT-S4" 19:16:09
7.3
The TIME Command
The TIME command produces three lines of typeout. The first line is the total running time since the
last TIME command was typed. The second line is the total running time since you logged in. The
third line is used for accounting purposes. The time is presented in the following format:
hh:mm:ss.hh
where hh represents the hours, mm the minutes, and ss.hh the seconds to the nearest hundreth. For example,
.!.T I tVoE )
52 • L! 5
02:29.95
KILO-C(:f
25
26
27
28
31,2573
4121121,3547
61214,3641
37,772
6133,3633
1121,21121121
[aPR 1
156,3565
35,3521
12,2166
20
11
6~
5
MACRO
SOS
VT55A
DIRECT
MACRO
DIRECT
LPTSPL
VED
LOGIN
SYSTAT
PIP
COBOL
TECO
LOGIN
COPYED
LOGIN
DEBUG
5+14
11 + 15
12+13
6+19
5+14
6+19
6
16+14
4+19
13+SPY
3+9
2121+21
5+7
4+19
5+19
1+19
2121+1121
2+9
SIN
SIN
SIN
SW
Rtl SIN
TO SIN
RN
RN
TO
fC
33
16
31
11
17
1:27
51
14
121
41
19
27
21
0
3
0
7
16
321
42
10
P2J8
163
II SW
61
RN SW
fC SW
17
fC SIN
157,36~3
161
12,2166
Pl1 J 11
RN SIN
41212, H!Jl2l1
7
TI SW
156,3507
25
RN SIN
37,772
27
TI
2,5
26
RN SIN
1121,4077
16
TI SW
34
PIP
TI
4121,4"21
# MEANS NON-SYSTEM HI-SEG
$ MEANS EXEC~TE ONLY
JNN IS THE CONTROLLING JOB, PNN CORRESPONDS TO TTY212+NN
29
3121
31
32
33
34
35
36
37
38
39
4121
45
5121
28
#
$
$
#
$
#
INDEX
A
Allocating system resources, 19
C (Cont)
CREF command, 24
Cross reference listing, 24
ASSIGN, 19
CORE, 22
DEASSI GN, 21
DISMOUNT, 21
FINISH, 22
MOUNT,20
REASSIGN, 21
D
DAYTIME command, 13
DDT program, 11
ALTMODE key, 17
DEASSIGN command, 21
ASSIGN command, 19
DEBUG command, 11
Assigning devices, 18
Debugging programs, 9
DEBUG, 11
ASSIGN, 19
MOUNT,20
DELETE command, 9
Asterisk construction, 8
ATTACH command, 23
Deleting characters, 16
DETACH command, 23
Devices, 17
B
Block, 8
DIRECT command, 8, 24
Disconnecting a job, 23
Disk area, 4
C
DISMOUNT command, 21
Central site, 20
Changing filenames, 9
COMPILE command, 9
CONTINUE command, 26
E
EDIT command, 6
Editing files, 6
Continuing a program, 26
EDIT, 6
TECO, 7
Control characters, 15
Control-C, 15
Control-O, 17
Control-U, 16
Erasing files, 9
Examples,
assigning devices, 20
compiling and executing, 11
creating a file, 5
logging in, 3
KJOB CONFIRM dialogue, 14
SYSTAT, 27
Control key, 15
CORE command, 22
Core image, 10
Correcting typing errors, 16
CREATE command, 5
EXECUTE command, 10
Creating files, 4
Executing programs, 9
CREATE, 5
MAKE,6
EXECUTE, 10
INDEX-1
INDEX (Cont)
F
L (Cont)
Filename, 4
Listing directories, 8, 24
Filename extension, 4
Listing files, 8, 23
Files, 3
LOAD command, 10
FINISH command, 22
LOADER program, 10
Loading programs, 9
LOAD, 10
G
GET command, 26
Logical device name, 18
Getting date and time, 13
LOGIN command, 2
Getting information, 12, 27
LOGIN program, 2
DAYTIME, 13
PJOB, 13
RESOURCES, 27
SYSTAT, 27
TIME, 13
M
MAKE command, 6
Manipulating core images, 25
Getting job number, 13
GET, 26
R, 25
RUN, 25
SAVE, 25
Getting on the system, 1
Getting running time, 13
Manipulating files, 7
H
DELETE, 9
DIRECT, 8
RENAME,9
TYPE, 8
HALT command, 26
Manipulating terminals, 22
Identification code, 2
ATTACH,23
DETACH, 23
SEND, 22
J
Monitor, 1
Job number, 2
MOUNT command, 20
K
N
KJOB command, 14
Naming of files, 4
L
o
Leaving the system, 14
LINED program, 4, 6
Obtaining information, 12, 27
DAYTIME, 13
PJOB, 13
RESOURCES, 27
SYSTAT, 27
TIME, 13
Line printer output, 23
CREF,24
DIRECT, 24
PRINT, 23
INDEX-2
INDEX (Cont)
o (Cont)
S
Operating the terminal, 15
SAVE command, 25
Operator communication, 20, 21
Saving core images, 25
SEND command, 22
P
Spool ing, 18, 23
Password, 3
Standard processor, 10
Peripheral devices, 17
ST ART command, 26
Physical device name, 17
Starting a program, 26
PJOB command, 13
Suppressing terminal output, 17
PRINT command, 23
SYSTAT command, 27
Processors, 10
System status, 27
Project and programmer numbers, 2
T
Protection code, 8
TECO command, 7
R
TECO program, 4, 7
R command, 25
Temporary fi les, 7
REASSIGN command, 21
Terminal, 1, 15
Reassigning devices, 21
Terminating commands, 16, 17
Relocatable binary, 10
TIME command, 13
Remembered arguments, 7
Translating programs, 9
COMPILE, 9
Remote users, 20
RENAME command, 9
TYPE command, 8
RESOURCES command, 27
Typing a line over, 16
Returning devices
Typing source files, 8
DEASSIGN, 21
DISMOUNT, 21
FINISH, 22
KJOB, 14
U
User directori es, 7
Returning to the monitor, 15
RETURN key, 16
RUB OUT key, 16
RUN command, 25
Running programs, 3, 25
Running time, 13
INDEX-3
HOW TO OBTAIN SOFTWARE INFORMATION
SOFTWARE NEWSLETTERS, MAILING LIST
The Software Communications Group, located at corporate headquarters in
Maynard, publishes software newsletters for the various DIGITAL products.
Newsletters are published monthly, and keep the user informed about customer software problems and solutions, new software products, documentation corrections, as well as programming notes and techniques.
There are two similar levels of service:
The Software Dispatch
The Digital Software News
The Software Dispatch is part of the Software Maintenance Service.
service applies to the following software products:
This
PDP-9/15
RSX-IID
DOS/BATCH
RSTS-E
DECsystem-lO
A Digital Software News for the PDP-II and a Digital Software News for
the PDP-8/12 are available to any customer who has purchased PDP-II or
PDP-8/12 software.
A collection of existing problems and solutions for a given software
system is published periodically. A customer receives this publication
with his initial software kit with the delivery of his system. This
collection would be either a Software Dispatch Review or Software Performance Summary depending on the system ordered.
A mailing list of users who receive software newsletters is also maintained by Software Communications. Users must sign-up for the newsletter they desire. This can be done by either completing the form supplied with the Review or Summary or by writing to:
Software Communications
P.O. Box F
Maynard, Massachusetts 01754
SOFTWARE PROBLEMS
Questtons or problems relating to DIGITAL's software should be reported
as follows:
North and South American Submitters:
Upon completion of Software Performance Report (SPR) form remove last
copy and send remainder to:
Software Communications
P.O. Box F
Maynard, Massachusetts 01754
The acknowledgement copy will be returned along with a blank SPR form
upon receipt.
The acknowledgement will contain a DIGITAL assigned SPR
number •. The SPR number or the preprinted number should be referenced in
any future correspondence. Additional SPR forms may be obtained from
the above address.
All International Submitters:
Upon completion of the SPR form, reserve the last copy and send the remainder to the SPR Center in the nearest DIGITAL office. SPR forms are
also available from our SPR Centers.
PROGRAMS AND MANUALS
Software and manuals should be ordered by title and order number.
United States, send orders to the nearest distribution center.
In the
Digital Equipment Corporation
Software Distribution Center
146 Main Street
Maynard, Massachusetts 01754
Digital Equipment Corporation
Software Distribution Center
1400 Terra Bella
Mountain View, California 94043
Outside of the United States, orders should be directed to the nearest
Digital Field Sales Office or representative.
USERS SOCIETY
DECUS, Digital Equipment Computers Osers Society, maintains a user exchange center for user-written programs and technical application information. The Library contains approximately 1,900 programs for all
DIGITAL computer lines. Executive routines, editors, debuggers, special
functions, games, maintenance and various other classes of programs are
available.
DECUS Program Library Catalogs are routinely updated and contain lists
and abstracts of all programs according to computer line:
PDP-B, FOCAL-B, BASIC-B, PDP-12
PDP-7/9, 9, 15
PDP-II, RSTS-ll
PDP-6/10, 10
Forms and information on acquiring and submitting programs to the DECUS
Library may be obtained from the DECUS office.
In addition to the catalogs, DECUS also publishes the following:
DECUSCOPE
-The Society's technical newsletter, published bi-monthly,
aimed at facilitating the interchange of technical information among users of DIGITAL computers and at disseminating news items concerning the Society. Circulation reached 19,000 in May, 1974.
PROCEEDINGS OF
THE DIGITAL
EQUIPMENT USERS
SOCIETY
-Contains technical papers presented at DECUS Symposia
held twice a year in the United States, once a year
in Europe, Australia, and Canada.
MINUTES OF THE
DECsystem-lO
SESSIONS
-A report of the DECsystem-lO sessions held at the two
United States DECUS Symposia.
COPY-N-Mail
-A monthly mailed communique among DECsystem-lO users.
LUG/SIG
-Mailing of Local User Group (LUG) and Special interest
Group (SIG) communique, aimed at providing closer
communication among users of a specific product or
application.
Further information on the DECUS Library, publications, and other DECUS
activities is available from the DECUS offices listed below:
DECUS
Digital Equipment Corporation
146 Main Street
Maynard, Massachusetts 01754
DECUS EUROPE
Digital Equipment Corp. International
(Europe)
P.O. Box 340
1211 Geneva 26
Switzerland
DECsystem-lO
Getting Started with
TOPS-IO Commands
DEC-lO-OTSCA-A-D
READER'S COMMENTS
NOTE:
This form is for document comments only. Problems
with software should be reported on a Software
Problem Repcrt (SPR) form (see the HOW TO OBTAIN
SOFTWARE INFORMATION page) •
Did you find errors in this manual?
If so, specify by page.
Did you find this manual understandable, usable, and well-organized?
Please make suggestions for improvement.
Is there sufficient documentation on associated system programs
required for use of the software described in this manual? If not,
what material is missing and where should it be placed?
Please indicate the type of user/reader that you most nearly represent.
o
o
o
o
o
o
Name
Assembly language programmer
Higher-level language programmer
Occasional programmer (experienced)
User with little programming experience
Student programmer
Non-programmer interested in computer concepts and capabilitie!
Date _____________
Organization ________________________________
Street ___________________________________________
City __________________________ State ____________ Zip Code ______________
or
Country
If you do not require a written reply, please check here.
0
.------------------------------------------------------------Fold lIere------------------------------------------------------------
.----------------------------------------------- Do Not Tear - Fold lIere and Staple ----------------------------------------------FIRST CLASS
PERMIT NO. 33
MAYNARD, MASS.
BUSINESS REPLY MAIL
NO POSTAGE STAMP NECESSARY IF MAILED IN THE UNITED STATES
Postage will be paid by:
Software Communications
P. O. Box F
Maynard, Massachusetts 01754
DECsystem-lO
Getting Started with
TOPS-IO Commands
DEC-lO-OTSCA-A-D
READER'S COMMENTS
NOTE:
This form is for document comments only. Problems
with software should be reported on a Software
Problem Report (SPR) form (see the HOW TO OBTAIN
SOFTWARE INFORMATION page).
Did you find errors in this manual?
If so, specify by page.
Did you find this manual understandable, usable, and well-organized?
Please make suggestions for improvement.
Is there sufficient documentation on associated system programs
required for use of the software described in this manual? If not,
what material is missing and where should it be placed?
Please indicate the type of user/reader that you most nearly represent.
[]
[]
[]
[]
[]
[]
Name
Assembly language programmer
Higher-level language programmer
Occasional programmer (experienced)
User with little programming experience
Student programmer
Non-programmer interested in computer concepts and capabilities
Date __________________________
Organization _______________________________________________________________
Street ______________________________________________________________________
City ___________________________ State _____________ Zip Code ______________
or
Country
If you do not require a written reply, please check here.
[]
-------------------------------------------------------------Fold lIere---------------------------------------------------- --------
----------------------------------------------.- Do Not Tear - Fold lIere and Staple -----------------------------------------------
FIRST CLASS
PERM'''' NO. 33
MA YI\
BUSINESS REPLY MAIL
NO POSTAGE STAMP NECESSARY IF MAILED IN THE UNITED STATES
Postage will be paid by:
Software Communications
P. O. Box F
Maynard, Massachusetts 01754
, MASS.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Has XFA : No XMP Toolkit : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-21:37:19 Modify Date : 2017:08:04 05:50:25-07:00 Create Date : 2007:07:15 07:11:49+10:00 Metadata Date : 2017:08:04 05:50:25-07:00 Creator Tool : Adobe Acrobat 7.08 Format : application/pdf Document ID : uuid:be91dcbf-873a-417f-8dd1-ed96cff4bb6b Instance ID : uuid:5b74fe77-4686-de44-b5d6-7d4c14a07fb6 Producer : Adobe Acrobat 9.0 Paper Capture Plug-in Page Layout : SinglePage Page Count : 48 Creator : Adobe Acrobat 7.08EXIF Metadata provided by EXIF.tools