Handbook of the Ordnance Q.F. 18 -PR ... (LS) 1940

Total Page:16

File Type:pdf, Size:1020Kb

Handbook of the Ordnance Q.F. 18 -PR ... (LS) 1940 I:«-w.\,~~""'" ~ .:'",\'t'~:1i;~~". :~7 "",;";'I~~1,j~~fl"?'~,~~';:t;;~~"'~i;'r,~"c", '"'c~,.,.. ., -'I~ ' ..''ii'-' "\ I) ~'"Jr., " "'c' ,,';.. };".,j ~ _~"'i !;( :;).t~JS..l'.. A;C}',?;~-'I ..;.~-~ A~I.I.~ r '-f: - m " "c";;'t,~f"~ ~~';~:~' .'~._",~~"~ ,'", ..\ ..," .,' 1 .-~ .-J , ,r.. -~,'~ "c,i\?~:,;;$V:; -c:~:; ~~}""'~~,; ",..',.- ~'~i!iJf~~'t-;c ,I;};:' " y~~$1t"j.' ~~' ~~.JI-"""-r7-~."':'!: ,=-;'.ie'~:~'M~'o~J;i~~' , ""', jt';:f :,,'1.,~" ~;~~' ' ~' i!:'"':t'AJ!~~",. ~ Tile JaforII'8tIen clftn In this doco~ "U ,"~/~/"""7 ~~~r,:::~~L';c1:~ti11:";:" F,c' ,'"" .~;~~, c' ':fI"'" -~ .~...,. --to be CommunlQt84. either I or Indlrect".'to the p~ or to any "r-. t;~'" an offtclal poeItlon In H18 -:':~.;'7':::;,.'.'0;~:; ~j';t:f.;:;~~~~~\' '~1 t~i"~~ -"'Iy'a ..rvtc.. I _M~;, ",;:.,.,~,,:..:.~'~;J,.:::'.iJ.:'i~~;.',".',!" ~:i:\'!"'\irti1;;:;'.~';":~if:.~~c.I.'.~:';:~~~4:{" ~~f~j::~~~~t~.:'-(Lt' ,,",:;,."~;:1."r:~~~":~'" '~t;,~:f~- ,". .:,.:~f",..,~::t; ~';1"'\N' "' ~~~\;;,,;'Vj~ .:i4'~,:f : ~' "¥:"{i'.'!'.J~.,' ,":;' ~~~~~t;~"':~~;:... f~::~if~~;,;:r'()C'~C"~' ,)"""";'(/ "~..; I I'OR TIlE ,,~~,~fincT'\. ,:fS'-'~',.,,"~~":t~y :~"j.,j,"~" ~"'-" NA .,NCE" lS-.PR. ~t'.':!"".;(-~;~ '" , 'r\\"'.'~ARKS. ][V .,~,rtr~ c;,.;::J~~;;;;; , ' AND IVB ON '~~.t...':11Jii 'i~J; "'~ ~,'.'-: ~'~:li f*c ..\'1" ; 1';,' .",...'c ~; AND VR ~.,~ ~; LA1~D 1940 ~' (Rqriftted IOith 1M ~ion of tht ControllP, His Majesty's StatiOlftry Offiu, London.) ..~ By Author!ty: M~Laft... &. Co. Pc,. Ltd., Melbourne (Prinred In Australia) :,.":,,,~:;i c' ff.1,.'"",;',~;£.~~ff;;"~ ",~~,: ,,;iN; ~~: I.'~m;~~f,.~ 208 -E ~ e ~OJ ~ .d ~. ~." ..~ ~ ~ .~~ ~ ~ It) c= .d~ ~.~ ~ ::~ ~ ~:: 0:; .ff) ..~ ..~ ..: : Q~ C-I .~~ -~ ~ - .~ .'- ..~ .. ~ .s ~ C-I Cl ~ ~ ~ ~ ~ ~ N ~ :-0.;:.-:->.- ;;. ~ ,.::>,.: :> > ~ bO cd ~ cd cd.~ -,.:-..,.:..~ ".~..". ,.:~.."-.. .. ~ ~~ ~ >. ~ 0 N ~ O~ 0 > 0 ~ =' -~- ~ cd ~ .. ~ ..I." "".. 0 0 00 0": 0 ~ co r-. <0 r-. 0 00 0 0 0 0 0 -0 - ~ ~~ : :~:~ ~ ~:: - :- : :- : :- : : : : ci () ci ci ci ci 0" 0 0 0 Z ZZ Z Z Z Z -- ~ z z z ~ > > > > ~ ~ ~ ~ ~ 00 5 '0 '0 '5: ~ .c""'"0 ~ 'Qj ~ ~ ~ ~ ~ ..: .~ ~.~ .~ . ~ z ot U) ~ ~ ~ ~ e""'"0 ~.. ... .. ...0 ' '"~ >.>""».>0 0 0 >. ~». '" :> 0 z~ ~ ~ 0 .~ : : : : : : : f.'~E-cf::~ ~ ...~ u """""" ~- Z ~...Z~ ~ ~ »'~>'»~ > » , ~ .. ~ 0 <p~i: ~:I .. ~~~~ c:> I/) as as u ~~U-< 0 .c:> >" ...>" """"Ix)Ix)Ix)""~C:>;:s: """"""Ix) ' 1-0 ...trJ"'trJo"'trJo"'trJ..."""""""". trJ Z Ix) Ix)Ix) ~ ~ ~ Ix)z r-: Ix),,' Ix)~ ~ ~ as...'~..~..~" .cQaS.cQr-.aS.cQr-.aS.cQr.:aS~ ~ ~td A A~~~~~~ '.Q:s:'.Q~~ A AAAO;AA,?;AAO;AA ~ U ~ ~~~~~~~ ~ ~~~ f-t ~ ~~~~~~~~~~~~ ~ ~~ :!:.~~~~~~ ~ ~~~ "'" ""'""'""'""'""'""'""'""'""'""'""'"'" (/) ~(l) ~~(l)(l)(l)(l)~ (l) (l)(6(l) co coco co co co coco co co co co co :9- ;:;---..!4 . - ... s4) ):.!4): '):):.!4): ):::: : :: ~~~...:.. "'... ""'""'0""" . ~ .0 ..0 .0 ,£ 0 0 0 -~ z z Z ~ ~ ... 0) ~ ~ ~ ::::::: ~ 3 >, >. ~ I = < -< ~ ~~~~>~~ ~ >~~ u uuuuuuuuuuuu >~~~~~~ ~ ~~~ WI~ ~~~~»~~~~~~ ~~~~~~ ~ ~~>~~~ ~~~~~»~~~~ ~ I ~~~ ~ ::3~~.5 ~~ ~~>~~K ~ --~ :; ~ Q,e ~ ~ I<~ Q, wa. ~ .cl. I. ~... .c -~ C/} ~ , 209 It) 0) 'D r-. ~ ~ ~ -~ : : :~ : : ~ e-I ~ ~ ~ ~:! ~ ~ ~ ~ ~ co co (0 ~ ~ ~ ~ -0 ~ =;0 ~ 8 8 : 0 :: <5 c:i :0:: : 00 :0 : : ci ~ Z Z Z ~ Z Z Z Z Z .,;... => 0 .c; . ..0) 0 ~ ... > > > " > ... ... u >' 'd 0 0 ... >< : ... >' 0 .- ... : : :... : " .8 ", ... (.) -u ... ... ... k k k 0 It)0 It)0 It)0 0 0 0 "" "" Of) Of) ...0 0 0 ... 0 0 <=!~ ~ ...~ <=! "". ""-~ ~ rrJ rrJ~.t-.' rrJ""""""r.: ~ .,.; rrJ to."rrJ ~ ~ ~ ~ ~ ~ .,.; .,.; Z Z. ~...~... '-"-'~""-' rxJ. ~rxJ.~~'~!;;' ~A "'~""-;AAA'c::?~'c::?~ "";r-.'~'r-:aS ~ ~~~~ 'C!~'C!~~ ~ 'C!~~ Q QQQQQo. ~ ~~~~ ~ ~ ~ ~ ~ ~ ~ ~~~~~~ ~ ~~~~ ~ It) 1t)1t)1t)~ It) It) It) It) It) ~ Of) Of) Of) Of) Of) Of) (£) (£)(£)(£)~ (£) (£) (£) (£) (£) ~ CD CDCDCDCD/DCD (D (D(D(D(D (D ~.. ~ cIS ; ~ ).: >. >. = = < < tt5 --C') Q ::. <0 C'! 0 .. 0 'C ~ a. :a 'g, ~ ] ;E 'ii ~'" .. .£ ~ <0 -Q .0 ~ Z m ~= ~ ~ ~ ~ . ~ ~ a. ~ a. .~ a. ~ "ic e 'g, ~ g ~ I .0 .~ cn ..== a. ~ ~ :t: - A ~ 'ii ~~~ ~ :Sa... ~ ...'5.£ 0=- -< ",'~ ~ U ~C'!'~ gO)g mC'!:.~ OIm.o ~._p. a.~~ Wi'8 ~a.-y- . .a. 0 N~ 0, ..Z ""a.'"'=~>~.0)'"'0 8""~e '2a...< ~~o.. .o~'"'o0 a. '"'1-4 ~ §'~ Z =-~0"""1-4 .~ ~:;~~"'- bOa.a.~;E bO== "..a.== ~~~a. ~~m~ I ~~~~'"yy~", ~~~~ ~~~~ 211 f/J Iz1 004 § Iz1 0 ~ ~ 212 GENERAL Ammunition for the Q.F. IS-pr. gun is of the fixed Q.F. type, comprising a primer, propellant charge (in a brass case),projectile and fuze, all of which are issued,stored, and loaded together as one complete round. Under peaceconditions some natures of shell are issued and stored without fuzes, plugs being used instead. These shell are fuzed before practi(;e. The name cartridge is given to the completeround (Fig. 92). Cartridgesare issuedin boxes containing four rounds. The time and percussionfuzes used with shrapnel, when in the projectile, are provided with a brass cover, solderedon, to protect the fuze from deterioration due to damp. 'Fuzes when issued separatelyare sup- plied in hermetically sealedcylinders, which should not be opened until actually required for use. FIG. 92 The propellant chargesare usually grouped according to their ballistic properties; the Group Letter and No. is stencilled on the rear of the cartridge case. The. propellant chargesare normally of cordite. N.C.T. charges were used considerablyin certain war areas and may still be met with. The cartridge being of the fixed type, there is no facility for varying the charges; consequently,the normal cartridge is the full charge. For practice purposes,or for use on servicein hilly country, or when considereddesirable to reduce wear of the gun, certain reduced cartridges are made up and issued. These are specially marked to avoid confusionin their issueand use. The table onpages 208 to 210shows the cartridgesnow in use with this equipment. PRIMERS PRIMER, PERCUSSION,Q.F. CARTRIDGE, No.1 The Mark II primer (Fig. 93) consists of a body, percussioh cap, anvil plug, copper ball, screwed plug and brass closing disc. The body is of metal provided with a flange in front of which it is screw-threaded externally to screw into the base of the cartridge 213 case, and two slots are cut in the flange for the No. 27 key. The interior is bored, cupped and threaded, to take the percussion arrangement. The cap is of copper, and contains detonating composition, covered by a tinfoil disc; it is placed in a recessin the body, and over it an anvil plug is screwed,having a conedseating, into which is placed a soft copper ball. Three fire holes are bored through the anvil plug to allow the flash from the cap to pass into the cone seating. The screwed plug screwsin on the anvil plug and retains the copperball in position; it is perforated by three fire channelsand is covered by a paper capsule,to prevent the powder working into the ball seating. A fillet of cementis placed betweenthe cap and body to prevent the ingressof damp. FIG. 93 The magazine of the primer contains R.F.G.2 or G.12 gunpowder, covered by a brass disc; this disc has six radial slits and a hole in the centre to weaken it, and has a paper disc secured to its under side with cement. The brass closing disc is secured in position by the metal of the primer being burred over it, and it is coated with cement. The primer is marked, as shown on page 245. The primer is issued assembled in the cartridge; in addition, spa,reprimers are issued in boxes containing four, to replace missfired primers. The letter M after the Mark indicates that the primer has been repaired and refilled. Action When the striker of the firing mechanism is driven by its spring on to the cap, the composition is ignited on the anvil; the flame 214 passes through the fire channels in anvil and plug, to ignite th,e gunpowder in the magazine. The magazine explodes, opens out the closing disc and ignites the propellant charge. The explosion of charge and magazine forces the copper ball into the coned seating of the anvil plug, closing the fire channels and preventing the escapeof gas at that point. The wall of the primer is pressed outwards to grip the cartridge case tightly, and prevent gas escape b~tween the primer and case. PRIMER, PERCUSSION,Q.F. CARTRIDGE,No. 11 The Mark I primer (Fig. 94) differs from the Mark II No.1 Q.F. percussion primer principally in having a magazine screwed into the body. It is of brass, rounded at the front end and perforated with eight holes, a white metal dome being inserted at the front end. FIG. 94 A paper envelope is fitted internally and the magazine is filled with six drams of G.12 gunpowder. The Mark 1M is the Mark 1 repairedand refilled. The Mark IMR is the Mark 1M repaired, the anvil and plug being of increaseddiameter. PROPELLANT CHARGES The full charge(Fig. 95) consistsof a bundle of M.D.S, R.D.B.S, W.O52, W.O54 or W.S cordite, recessedat one end to fit over the primer and the bossof the case,the other end being in contact with the shell. The cordite sticks are securedin two placesby shalloon braid. The weight of the chargeis lIb. 6 oz. 15 dr. With R.D.N./ A.040 cordite, the weight of the chargeis lIb. 13 oz. S dr. The charge for the streaIriline shell is generally similar to the above, exceptthat Mark I.I cordite is usedfor the M.D.Sand R.D.B.S 215 charges,it alsodiffers in weight slightly and in the tying of the sticks. The weight of the chargein this caseis lIb. 6 oz. 4 dr. The reducedcharge consistsof a bundle of M.D.2! or R.D.B.2! cordite having a cylindrical core of IO'4-inchcordite sticks, secured in two places with sewing silk surrounded at the base by a ring of 4.I-inch sticks, tied in two places with sewing silk; the whole is arrangedto fit over the boss of the caseand the protruding portion of the primer. The weight of the reducedcharge is 9 oz.
Recommended publications
  • 'Unix' in a File
    ============================ AWK COMMANDS ================================ 1) find the total occurances of pattern of 'unix' in a file. ==> $awk '/unix/ {count++} END{print count}' nova.txt 2) find the total line of a file. ==> $awk 'END{print NR}' nova.txt 3) print the total number of even line of a file. ==> $awk 'NR % 2' nova.txt 4) print the total number of odd line of a file. ==> $awk 'NR % 2 == 1' nova.txt 5) print the sums of the field of every line of a file. ==> $awk '{ sum = $3+sum } END{print sum}' emp.txt 6) display those words whose length greater than 10 and consist of digits only in file awk ==> $awk '/^[0-9]+$/ length<10 {print}' t3.txt 7) display those words whose length less than 10 and consist of alpha only in file awk ==> $awk '/^[a-zA-Z]+$/ length >3 {print}' t3.txt 8) print odd number of word in each line ==> awk -F\| '{s="";for (i=1;i<=NF;i+=2) { {s=s? $i:$i} print s }}' nova.txt { s = ""; for (i = 1; i <= NF; i+=2) { s = s ? $i : $i } print s } 9) print even number of word in each line ==> awk -F\| '{s="";for (i=0;i<=NF;i+=2) { {s=s? $i:$i} print s }}' nova.txt ==> { s = ""; for (i = 0; i <= NF; i+=2) { s = s ? $i : $i } print s } 10) print the last character of a string using awk ==> awk '{print substr($0,length($0),1)}' nova.txt ============================ MIX COMMANDS ================================ 1) Assign value of 10th positional parameter to 1 variable x. ==> x=${10} 2) Display system process; ==> ps -e ==> ps -A 3) Display number of process; ==> ps aux 4) to run a utility x1 at 11:00 AM ==> at 11:00 am x1 5) Write a command to print only last 3 characters of a line or string.
    [Show full text]
  • 5 Command Line Functions by Barbara C
    ADAPS: Chapter 5. Command Line Functions 5 Command Line Functions by Barbara C. Hoopes and James F. Cornwall This chapter describes ADAPS command line functions. These are functions that are executed from the UNIX command line instead of from ADAPS menus, and that may be run manually or by automated means such as “cron” jobs. Most of these functions are NOT accessible from the ADAPS menus. These command line functions are described in detail below. 5.1 Hydra Although Hydra is available from ADAPS at the PR sub-menu, Edit Time Series Data using Hydra (TS_EDIT), it can also be started from the command line. However, to start Hydra outside of ADAPS, a DV or UV RDB file needs to be available to edit. The command is “hydra rdb_file_name.” For a complete description of using Hydra, refer to Section 4.5.2 Edit Time-Series Data using Hydra (TS_EDIT). 5.2 nwrt2rdb This command is used to output rating information in RDB format. It writes RDB files with a table containing the rating equation parameters or the rating point pairs, with all other information contained in the RDB comments. The following arguments can be used with this command: nwrt2rdb -ooutfile -zdbnum -aagency -nstation -dddid -trating_type -irating_id -e (indicates to output ratings in expanded form; it is ignored for equation ratings.) -l loctzcd (time zone code or local time code "LOC") -m (indicates multiple output files.) -r (rounding suppression) Rules • If -o is omitted, nwrt2rdb writes to stdout; AND arguments -n, -d, -t, and -i must be present. • If -o is present, no other arguments are required, and the program will use ADAPS routines to prompt for them.
    [Show full text]
  • The AWK Programming Language
    The Programming ~" ·. Language PolyAWK- The Toolbox Language· Auru:o V. AHo BRIAN W.I<ERNIGHAN PETER J. WEINBERGER TheAWK4 Programming~ Language TheAWI(. Programming~ Language ALFRED V. AHo BRIAN w. KERNIGHAN PETER J. WEINBERGER AT& T Bell Laboratories Murray Hill, New Jersey A ADDISON-WESLEY•• PUBLISHING COMPANY Reading, Massachusetts • Menlo Park, California • New York Don Mills, Ontario • Wokingham, England • Amsterdam • Bonn Sydney • Singapore • Tokyo • Madrid • Bogota Santiago • San Juan This book is in the Addison-Wesley Series in Computer Science Michael A. Harrison Consulting Editor Library of Congress Cataloging-in-Publication Data Aho, Alfred V. The AWK programming language. Includes index. I. AWK (Computer program language) I. Kernighan, Brian W. II. Weinberger, Peter J. III. Title. QA76.73.A95A35 1988 005.13'3 87-17566 ISBN 0-201-07981-X This book was typeset in Times Roman and Courier by the authors, using an Autologic APS-5 phototypesetter and a DEC VAX 8550 running the 9th Edition of the UNIX~ operating system. -~- ATs.T Copyright c 1988 by Bell Telephone Laboratories, Incorporated. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy­ ing, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Published simultaneously in Canada. UNIX is a registered trademark of AT&T. DEFGHIJ-AL-898 PREFACE Computer users spend a lot of time doing simple, mechanical data manipula­ tion - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like.
    [Show full text]
  • The Evolution of the Unix Time-Sharing System*
    The Evolution of the Unix Time-sharing System* Dennis M. Ritchie Bell Laboratories, Murray Hill, NJ, 07974 ABSTRACT This paper presents a brief history of the early development of the Unix operating system. It concentrates on the evolution of the file system, the process-control mechanism, and the idea of pipelined commands. Some attention is paid to social conditions during the development of the system. NOTE: *This paper was first presented at the Language Design and Programming Methodology conference at Sydney, Australia, September 1979. The conference proceedings were published as Lecture Notes in Computer Science #79: Language Design and Programming Methodology, Springer-Verlag, 1980. This rendition is based on a reprinted version appearing in AT&T Bell Laboratories Technical Journal 63 No. 6 Part 2, October 1984, pp. 1577-93. Introduction During the past few years, the Unix operating system has come into wide use, so wide that its very name has become a trademark of Bell Laboratories. Its important characteristics have become known to many people. It has suffered much rewriting and tinkering since the first publication describing it in 1974 [1], but few fundamental changes. However, Unix was born in 1969 not 1974, and the account of its development makes a little-known and perhaps instructive story. This paper presents a technical and social history of the evolution of the system. Origins For computer science at Bell Laboratories, the period 1968-1969 was somewhat unsettled. The main reason for this was the slow, though clearly inevitable, withdrawal of the Labs from the Multics project. To the Labs computing community as a whole, the problem was the increasing obviousness of the failure of Multics to deliver promptly any sort of usable system, let alone the panacea envisioned earlier.
    [Show full text]
  • PR 6201 (500 Kg… 50 T) Precision Compression Load Cell
    PR 6201 (500 kg… 50 t) Precision Compression Load Cell 500 kg… 50 t Type LA | L | D1 | C3 – Easy to install – Well-proven rockerpin design – Easy corner adjustment by matched load cell output – Full stainless steel housing – Wide temperature range – High overload capacity – Resistant against vibrations – Hermetically sealed, IP68 (depth of 1.5 m for 10,000 hrs.), IP69K – 4 to 20 mA output signal as option (LA version) – Optimum overvoltage protection – Ex-version available (PR 6201/..E) – W&M aprroval (OIML R60, NTEP) Product Profile At the same time, this range distinguishes There is an especially wide working tempera- The PR 6201 range of load cells is specially itself – in addition to its high measurement ture range attributable to sophisticated designed for weighing silos, tanks and accuracy and repeatability - above all for resistance strain gauge technology. The process vessels. its unmatched reliability, robustness and hermetically sealed enclosure and special stability, which offer trouble-free operation TPE cable allow the unit to be used even The unique design principle, in combination without adjustment, year after year. under extreme operating conditions in with the FlexLock installation kits, makes harsh production environments. it possible to balance out movements arising The pendulum support principle, combined from mechanical or thermal ex pansion or with patented measuring element geometry, The entire measurement chain can be contraction of the vessel or its supporting ensures that force transmission into the calibrated without the use of reference construction. sensor is always at the optimum level and, weights. Due to “matched output” techno- in this way, the effect on measurement logy, a damaged load cell can be exchanged A particular design characteristic is that the accuracy is minimized.
    [Show full text]
  • The UNIX Time- Sharing System
    1. Introduction There have been three versions of UNIX. The earliest version (circa 1969–70) ran on the Digital Equipment Cor- poration PDP-7 and -9 computers. The second version ran on the unprotected PDP-11/20 computer. This paper describes only the PDP-11/40 and /45 [l] system since it is The UNIX Time- more modern and many of the differences between it and older UNIX systems result from redesign of features found Sharing System to be deficient or lacking. Since PDP-11 UNIX became operational in February Dennis M. Ritchie and Ken Thompson 1971, about 40 installations have been put into service; they Bell Laboratories are generally smaller than the system described here. Most of them are engaged in applications such as the preparation and formatting of patent applications and other textual material, the collection and processing of trouble data from various switching machines within the Bell System, and recording and checking telephone service orders. Our own installation is used mainly for research in operating sys- tems, languages, computer networks, and other topics in computer science, and also for document preparation. UNIX is a general-purpose, multi-user, interactive Perhaps the most important achievement of UNIX is to operating system for the Digital Equipment Corpora- demonstrate that a powerful operating system for interac- tion PDP-11/40 and 11/45 computers. It offers a number tive use need not be expensive either in equipment or in of features seldom found even in larger operating sys- human effort: UNIX can run on hardware costing as little as tems, including: (1) a hierarchical file system incorpo- $40,000, and less than two man years were spent on the rating demountable volumes; (2) compatible file, device, main system software.
    [Show full text]
  • Some UNIX Commands At
    CTEC1863/2007F Operating Systems – UNIX Commands Some UNIX Commands at Syntax: at time [day] [file] Description: Provides ability to perform UNIX commands at some time in the future. At time time on day day, the commands in filefile will be executed. Comment: Often used to do time-consuming work during off-peak hours, or to remind yourself to do something during the day. Other at-related commands: atq - Dump the contents of the at event queue. atrm - Remove at jobs from the queue. Examples: # at 0300 calendar | mail john ^D # # cat > DOTHIS nroff -ms doc1 >> doc.fmt nroff -ms file2 >> doc.fmt spell doc.fmt > SPELLerrs ^D # at 0000 DOTHIS cal Syntax: cal [month] year Description: Prints a calendar for the specified year or month. The year starts from year 0 [the calendar switched to Julian in 1752], so you typically must include the century Comment: Typical syntax: cal 11 1997 cal 1998 /Users/mboldin/2007F/ctec1863/unixnotes/UNIX-07_Commands.odt Page 1 of 5 CTEC1863/2007F Operating Systems – UNIX Commands calendar Syntax: calendar [-] Description: You must set-up a file, typically in your home directory, called calendar. This is a database of events. Comment: Each event must have a date mentioned in it: Sept 10, 12/5, Aug 21 1998, ... Each event scheduled for the day or the next day will be listed on the screen. lpr Syntax: lpr [OPTIONS] [FILE] [FILE] ... Description: The files are queued to be output to the printer. Comment: On some UNIX systems, this command is called lp, with slightly different options. Both lpr and lp first make a copy of the file(s) to be printed in the spool directory.
    [Show full text]
  • Unix Commands January 2003 Unix
    Unix Commands Unix January 2003 This quick reference lists commands, including a syntax diagram 2. Commands and brief description. […] indicates an optional part of the 2.1. Command-line Special Characters command. For more detail, use: Quotes and Escape man command Join Words "…" Use man tcsh for the command language. Suppress Filename, Variable Substitution '…' Escape Character \ 1. Files Separation, Continuation 1.1. Filename Substitution Command Separation ; Wild Cards ? * Command-Line Continuation (at end of line) \ Character Class (c is any single character) [c…] 2.2. I/O Redirection and Pipes Range [c-c] Home Directory ~ Standard Output > Home Directory of Another User ~user (overwrite if exists) >! List Files in Current Directory ls [-l] Appending to Standard Output >> List Hidden Files ls -[l]a Standard Input < Standard Error and Output >& 1.2. File Manipulation Standard Error Separately Display File Contents cat filename ( command > output ) >& errorfile Copy cp source destination Pipes/ Pipelines command | filter [ | filter] Move (Rename) mv oldname newname Filters Remove (Delete) rm filename Word/Line Count wc [-l] Create or Modify file pico filename Last n Lines tail [-n] Sort lines sort [-n] 1.3. File Properties Multicolumn Output pr -t Seeing Permissions filename ls -l List Spelling Errors ispell Changing Permissions chmod nnn filename chmod c=p…[,c=p…] filename 2.3. Searching with grep n, a digit from 0 to 7, sets the access level for the user grep Command grep "pattern" filename (owner), group, and others (public), respectively. c is one of: command | grep "pattern" u–user; g–group, o–others, or a–all. p is one of: r–read Search Patterns access, w–write access, or x–execute access.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • Gnu Coreutils Core GNU Utilities for Version 5.93, 2 November 2005
    gnu Coreutils Core GNU utilities for version 5.93, 2 November 2005 David MacKenzie et al. This manual documents version 5.93 of the gnu core utilities, including the standard pro- grams for text and file manipulation. Copyright c 1994, 1995, 1996, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. Chapter 1: Introduction 1 1 Introduction This manual is a work in progress: many sections make no attempt to explain basic concepts in a way suitable for novices. Thus, if you are interested, please get involved in improving this manual. The entire gnu community will benefit. The gnu utilities documented here are mostly compatible with the POSIX standard. Please report bugs to [email protected]. Remember to include the version number, machine architecture, input files, and any other information needed to reproduce the bug: your input, what you expected, what you got, and why it is wrong. Diffs are welcome, but please include a description of the problem as well, since this is sometimes difficult to infer. See section “Bugs” in Using and Porting GNU CC. This manual was originally derived from the Unix man pages in the distributions, which were written by David MacKenzie and updated by Jim Meyering.
    [Show full text]
  • Comparative Studies of 10 Programming Languages Within 10 Diverse Criteria Revision 1.0
    Comparative Studies of 10 Programming Languages within 10 Diverse Criteria Revision 1.0 Rana Naim∗ Mohammad Fahim Nizam† Concordia University Montreal, Concordia University Montreal, Quebec, Canada Quebec, Canada [email protected] [email protected] Sheetal Hanamasagar‡ Jalal Noureddine§ Concordia University Montreal, Concordia University Montreal, Quebec, Canada Quebec, Canada [email protected] [email protected] Marinela Miladinova¶ Concordia University Montreal, Quebec, Canada [email protected] Abstract This is a survey on the programming languages: C++, JavaScript, AspectJ, C#, Haskell, Java, PHP, Scala, Scheme, and BPEL. Our survey work involves a comparative study of these ten programming languages with respect to the following criteria: secure programming practices, web application development, web service composition, OOP-based abstractions, reflection, aspect orientation, functional programming, declarative programming, batch scripting, and UI prototyping. We study these languages in the context of the above mentioned criteria and the level of support they provide for each one of them. Keywords: programming languages, programming paradigms, language features, language design and implementation 1 Introduction Choosing the best language that would satisfy all requirements for the given problem domain can be a difficult task. Some languages are better suited for specific applications than others. In order to select the proper one for the specific problem domain, one has to know what features it provides to support the requirements. Different languages support different paradigms, provide different abstractions, and have different levels of expressive power. Some are better suited to express algorithms and others are targeting the non-technical users. The question is then what is the best tool for a particular problem.
    [Show full text]
  • Gnu Coreutils Core GNU Utilities for Version 6.9, 22 March 2007
    gnu Coreutils Core GNU utilities for version 6.9, 22 March 2007 David MacKenzie et al. This manual documents version 6.9 of the gnu core utilities, including the standard pro- grams for text and file manipulation. Copyright c 1994, 1995, 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". Chapter 1: Introduction 1 1 Introduction This manual is a work in progress: many sections make no attempt to explain basic concepts in a way suitable for novices. Thus, if you are interested, please get involved in improving this manual. The entire gnu community will benefit. The gnu utilities documented here are mostly compatible with the POSIX standard. Please report bugs to [email protected]. Remember to include the version number, machine architecture, input files, and any other information needed to reproduce the bug: your input, what you expected, what you got, and why it is wrong. Diffs are welcome, but please include a description of the problem as well, since this is sometimes difficult to infer. See section \Bugs" in Using and Porting GNU CC. This manual was originally derived from the Unix man pages in the distributions, which were written by David MacKenzie and updated by Jim Meyering.
    [Show full text]