Professional Documents
Culture Documents
CPU COMMANDS :
No ext.
Security
R
Read
W
Write
E
Exce
P
Purge (delete)
U
user
Filecode
101
Txt file
100
Exe file
A- all
O- owner
G- Group
N- Network user
U-user
SPOOLER COMMANDS
SPOOLCOM COLLECT
PERUSE
Job no.
J
LA
LL
Ln
LOC
J job no.; LOC location
LOC; J
LE/OUT $disk.subvol.filename/all
LE/OUT $disk.subvol.filename/all; del
FB string
EXIT
EMS COMMAND (Event viewer)
PL
R
PL *- 30
F*
EXIT
STATUS *,term or ST
STATUS *, USER
STATUS *, USER user name
STATUS *, TERM terminal name
STATUS *, PRI priority no.
UTILITY COMMANDS
USERS *. *
RENAME file1, file2
RENAME file1, $disk.subvol.file2
TEDIT filename
HISTORY
!
FC n
SYSBUSY
F12
OBEY filename
LOAD filename
PAK pakfilename, file1, open, audited, listall
PAK pakfile, (file1, file2, filen)
UNPAK filename
UNPAK pakfilename, *. *. *, VOL $disk.subvol,
MYID
PAK pakfile, @ file1
TIME
FTP ip addr.
LOGIN NAME
Type password
PASSWORD
PWD
LCD
ASCI
BIN
CD $. disk.subvol
GET filename
PUT filename
For showing status of the harddisk: dsap *, short (dsap-Disk Space Analysis Program)
For viewing the sub-folders : fup subvols (Shortcut : fs)
For viewing the files in the subfolders : fup info * (Shortcut : fi *)
For viewing the files in the particular folder : fup info <subvolname).*
For moving from one folder to another : volume $<diskname>.<subvolname>
For viewing the contents of the file : type
To rename the file to another name : fup rename <filename>,<new-filename>
To copy the file to another sub vol: fup dup <filename>,$<diskname>.<subvol-name>.*
CPU COMMANDS :
Txt file
Exe file
Security
R
W
E
P
Read
Write
Exce
Purge (delete)
A- all
O- owner
G- Group
N- Network user
TRANSACTION PROCESSING :
How the transaction takes place via ATM:
Step 1:
I. Customer inserts the card in the machine
II. He feed in the PIN Number, type of the account, the amount required,
This is known as NATIVE MODE MESSAGE(NMM)
Step 2:
Process is known as DEVICE HANDLER PROCESS
Which converts NATIVE MODE MESSAGE into STANDARD INTERNAL MESSAGE
ATD file
It verifies
CPF File
(SIM)
IDF file
Step 3:
AUTH Process
Step 5: