Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material Stichwortverzeichnis Stichwortverzeichnis Symbole APT 232 Arbeitsverzeichnis 117, 118, 327, 379 %CPU 220 Argument 207, 351, 352, 355, 359, 379 %MEM 220 ASCII 194, 380, 395 .cshrc 136–138, 333 ASCII-Code 193, 371 .login 136, 138, 205 ASCII-Mode 301, 302 .plan 237 AT&T 163 .profile 136, 137, 205, 333 at (Programm) 194, 195 .project 237 At-Zeichen 262 @ 262 Audioübertragung 321 3101-Terminal 247 Ausschalten 33, 229, 366 3270-Terminal 248 Auswählen 75 authorized_keys 250 A awk 185 AbiWord 168 Abkürzungen 272 B Abmelden 41 Background 380 Account siehe Benutzerkennung Backslash 113, 359, 380 adduser 228 Backspace 53, 55 Adobe Systems 157, 169 Backup 104, 211, 336–341, 365, 380 Adressbuch 268–270 Full-Backup 341 Adresse 379 inkrementelles 341 AFAIK 273 rotierendes 341, 393 Affengriff 230, 328 Strategien 340 AIX 44, 372 balsa 262 Alias-Name 208, 209, 335 Band 380 Alt-Taste 379 Bandbreite 315, 380 American National Standards Institute siehe Bandgerät 337 ANSI Bandlaufwerk 337 America Online siehe AOL Bandstation 337 Analog-Modem 243 bar 337 Anforderungs-ID 393 Bash 49, 50, 59, 134, 135, 204, 208, 380 Anklicken 75 Bedienungsfehler 26 Anmeldezeit 236 Befehl 51, 380 Anonymous FTP 308,COPYRIGHTED 310 Ausgabe MATERIAL drucken 130 ANSI 246, 247, 265 Ausgabe sortieren 129 Anwendung 379 Ausgabe umleiten 126 AOL 263, 264, 320 Bash siehe Bash Apache 47, 316, 317, 319, 321, 375 Eingabe umleiten 127 Apache Group 319 eingeben 52, 55 Apple 230 externer 385 ApplixWare 59 history 136 apropos 370 Leerzeichen in Befehlsnamen 56 399 bindex.indd 399 27.04.2006 14:47:26 Uhr UNIX für Dummies Optionen 101 Büro-Netzwerk 242 selbst erstellen 206 Button 382 wiederholen 51, 54, 133, 135, 136 Byte 382 Befehlsinterpreter 49 bz2 196 Befehlsmodus 381 bzcat 196 Behlendorf, Brian 319 bzip2 196 Bell-Laboratorien 43 Benutzer anlegen 228 C Benutzerfehler 363 C 382 Benutzerkennung 38, 39, 379, 381 C-Shell 49–51, 133, 134, 137, 205, 208, 383 Benutzerkonto 38, 379, 381 cancel 155 Benutzername 38, 356, 381 Caps-Lock 356 Benutzeroberfläche 381 carbon copies 269 grafische 381 cat 106, 128, 196, 395 textbasierte 381 cd 114, 117, 327, 365 Benutzerschnittstelle 381 CD-R 338, 339, 340 grafische 63 CD-ROM 382 Beowulf 59 CD-RW 339 Berechtigung 107, 109, 358, 360, 381 CDE 67–69, 82, 83, 85, 86, 93, 261, 372, absolute 109 382– 384 Berkeley 245 CGI 316, 318 Berkeley-UNIX 44 cgi-bin 122 Betriebssystem 381, 391 CGI-Skript 318 bg 223, 224 chgrp 112 Bildschirm chmod 110, 111, 343, 360 grafischer 63 chown 111 Bildschirm-Terminal 248 Click-to-Type 382 Bildschirmanzeige 326 Client 66, 253, 382 Bildschirmeditor 381 Client-Server-Architektur 382 Bildschirmschoner 326 cmp 191 bin 202, 381 Codes Binärmodus 301, 302, 305 optimale 197 Binary-Mode siehe Binärmodus COMMAND 218–220 Bit 197, 381 Command Mode siehe Befehlsmodus Blindkopien 269 Command siehe Befehl Bourne-Shell 49, 50, 204, 208, 381 Common Desktop Environment siehe CDE Break-Taste 38, 54, 381 Common Open Software Environment 67 Breitbandverbindung 243 compress 195, 197, 211 Browser 281 Compression 383 BSD 372, 374 Computer-Problem 325 BSD-UNIX 44, 381 Computercluster 59 BSD/OS 45 Computer Museum 63 BSDNet 374 Content Management System 318 BTW 273 Control-Taste 383 Buffer 382 Core 383 Bug 382 core 346 BUGS 369 cp 332, 333, 334, 355 bunzip2 196 Cray-Supercomputer 235 400 bindex.indd 400 27.04.2006 14:47:27 Uhr Stichwortverzeichnis Cream 185 Datenbank 145, 317, 318, 320 csh 50 Datenbankmanagement 318 Ctrl-Taste 383 Datenstation 384 cu 353 Datentransfer 315 Current Directory 117, 383 Datum 194 Cursor 75, 383 Debian 60, 231, 373, 374 Default 384 Delete 54, 55 D delete 307 Daemon 151, 320, 383 DESCRIPTION 369 Dämon 216, 219 Desktop 82, 83, 87, 381, 384 DANTE 169 Desktop-Environment 384 date 194 Desktop-Manager 76 Datei 383 Desktop-Publishing-Programm 170 Alias-Namen 147 Desktop-Umgebung 384 auflisten 99 Deutsches Museum 63 ausführbare 204, 210, 380, 385 df 256, 353 benennen 103 DHCP 242, 243, 246 Eigentümer 111 diff 191, 192 enttaren 211 DIN 247 Hintergrund 387 Directory 113, 384 Inhalt anschauen 105 dired-Modus 356 komprimieren 195 Disk 384 Kopien anlegen 105 Diskette 338–340, 384 kopieren 102 Distribution 317 löschen 146, 342 DNS 315 ls 100 Domainname 315, 321 schreibgeschützt 343, 360 Domain Name System 315 Sicherungskopie 336 Doom 35 sortieren 192, 193 Doppelklick 75, 384 suchen 139 DOS 49, 52, 198, 372, 384 tar 211, 212 Drag&Drop 82, 86, 384 temporäre 123 Dragging 384 Textdateien 105 Druck überschreiben 332 abbrechen 155, 156 umbenennen 105 formatieren mit pr 158 vergleichen 191 mehrspaltig 160 verschieben 120 mit PostScript 156 versehentlich löschen 331, 332 Druckdatei 336 verstecken 105 Drucken 151 versteckte 101, 387 Anforderungs-ID 151 ZIP 198, 211 Druckjob 153 Datei-Kompression 197 DSL 243 Dateigröße 354 DSL-Router 243 Dateimanager 85, 86 Dual-Boot-System 229 Dateiname 103, 357 DVD 338, 339, 384 Dateisystem 149, 150, 353, 383 Dateitransfer 245 Daten 384 401 bindex.indd 401 27.04.2006 14:47:27 Uhr UNIX für Dummies E Einschalten 33 Einschaltungszeichen 135, 138 E-Mail 259–265, 267, 269–277, 279, 316, Elektronische Post siehe E-Mail 317, 366, 385 Elkins, Michael 271 Absender 269 elm 226, 261, 262, 271 Adressbuch 268, 269 Elternverzeichnis 359, 385 Adresse 261, 263, 385 emacs 47, 135, 168, 176, 226, 335, adressieren 261 356, 364 Anhang 265, 268 beenden 180, 181 Attachment siehe Anhang Befehlsübersicht 181 ausgehende 380 im Text bewegen 179 beantworten 263 starten 176 Benachrichtigung 137 Text ändern 180 Betreff 269 Text eingeben 179 eingehende 385 Text löschen 180 Empfänger 269 Text sichern 181 Fehlermeldungen 264 Text verschieben 181 Fernzugriff 259 Emoticons 272 häufige Abkürzungen 272 End of Input 385 Header 269 enscript 157 ins Internet 263 Enter-Taste 364, 385 Kopfzeilen 266 Enttaren 211 lesen 267 Epiphany 95 lokale 259 Escape-Taste 385 mit Mozilla 274 Ethernet 242, 246 Nachrichten-Kopf 269 Evolution 95, 262, 279, 280 Ordner 270 konfigurieren 279 remote 259, 271 ex 186 Signature 267 Executable File 385 speichern 270 exit 41, 137 Subject 269 exmh 261, 262 ungelesene 259 unterschreiben 272 versenden 261–264, 266 F Würmer 265 Fanartikel 375 echo 137 FAQ 273 ed 185 fc 136 beenden 186, 189 fdisk 229 Befehle 190 Feature 191 Befehlsmodus 187 Featuritis 191, 218 Eingabemodus 187 Fedora 60, 230, 231 starten 186 Fehlermeldung 351, 352, 353 Text ändern 189 Fenster 381, 397 Text eingeben 187 aktives 78 Text speichern 188 anordnen 78 Editor 335, 384 Click-to-Type 78 Eigentümer 109 expliziter Fokus 78 Eingabemodus 384 Größe ändern 78, 79 Eingaben rückgängig machen 39 hin- und herschieben 78 402 bindex.indd 402 27.04.2006 14:47:28 Uhr Stichwortverzeichnis ikonifizieren 76, 79 bin 308 Move-to-Type 78 cd 303, 304, 308 öffnen 74 cdup 308 Rahmen 77 del 308 schließen 80 dir 303, 308 stapeln 78 get 300–308 verschieben 79 lcd 308 verschwinden lassen 79 mdel 307, 308 Verwaltungsmenü 80, 81 mget 305–308, 311 Zeiger-Fokus 78 mkdir 307 Fenstersystem 64 mput 307, 308 Richtlinien 64 prompt 306–308 Fernschreiber 197 put 302, 306–308 Festplatte 338, 353, 357, 385 quit 308 Festplattencontroller 338 fvwm 328 Festplattenlaufwerk 355 FYI 273 Feststelltaste 356 fetchmail 271 fg 223, 224, 226 G file (Befehl) 106, 199 GByte 386 FILES 369 GCC 47 File siehe Datei gdm 93 File System 385 gedit 185 File Transfer 245, 385 Gentoo 60, 373 File Transfer Protocol siehe FTP Gerät 353 Filter 126, 385 German UNIX User Group 377 find 140–146 Ghostscript 157, 163 finger 236, 237, 238, 240 Ghostview 157, 164 Firefox 210, 276, 311, 375 Gibibyte 386 Fixed Disk 386 GiByte 386 Flag 101, 386, 391 Gigabyte 354, 386 Flamen 366 GNOME 92, 93, 261, 262, 328, 371, 372, 375, Flaming 272 384, 386 FlightLinux 60 Anwendungen 94 Floppy-Disk 384, 386 Benutzerschnittstelle 95 Folder 386 E-Mail-Client 95 Foreground 386 Hilfe 95 FrameMaker 170 Sprachauswahl 93 FreeBSD 44, 374, 386 Themen 94 Free Software Foundation 47, 48, 157 gnome-session 93 freie Software 58 GNU 47, 386 FrontPanel 83, 84, 87 GNU Emacs 177 FTP 210, 245, 251, 257, 258, 282, 299, 300, GNU General Public License 58, 231, 386 301–311, 316, 317, 386 GNU Network Object Model anonymes 308, 309 Environment 93 Anonymous 310, 379 GPL 58, 386 Server 299, 310 Graphical User Interface siehe GUI FTP-Befehl grep 143, 144, 145, 146, 358 asc 308 groff 160, 162, 168 403 bindex.indd 403 27.04.2006 14:47:29 Uhr UNIX für Dummies Groß- und Kleinschreibung 103, 114, 193, Hurd 47 264, 272, 364 Hyperlink 387 groups 108 Hypertext 281, 387 Gruppe 107 Hypertext Markup Language siehe HTML GUI 63, 64, 65, 216, 386 HyperText Transfer Protocol siehe HTTP gunzip 196, 211 gzcat 196 gzip 195, 196, 198, 211 I I/O 355, 387 I/O-Umleitung 388 H IBM 82, 198, 230, 248, 318, 376 Hack 221 Icon 76, 79, 387 Handbuch 375 id 107 Handbuchseite 123, 367, 368, 369, 371, 375, 389 id_dsa 250 Hard-Link 149 id_rsa 250 Hardware 373, 386 ignoreeof 137 Hash 386 IIS 319 hash (Befehl) 206, 208, 210 Image-Mode 301 hash table 206 IMAP 321, 387 head 106 IMHO 273 Header 387 INBOX 270 Heimatverzeichnis 122, 387 Inbox 387 Helligkeit 326 Incremental Backup 387 help 375 index.html 122 Help-Viewer 86 init 219 herunterfahren 230 Input Mode 387 Hewlett-Packard 82, 156, 376 Input Redirection 396 Hidden File 101, 387 Intel 230, 258 hilfe (Befehl) 375 Intel-Prozessor 229 Hilfesystem 375 Internet 37, 235, 242, 245, 313–321, 387 Hintergrund 387 verbinden mit 242 Hintergrund-Ausgabe 226 Internet-Adresse 263 Hintergrundjob 138 Internet-Präsenz 313 Hintergrundprogramm 215 Internet-Provider 371 Hintergrundprozess 222, 223, 356 Internet-Service-Provider siehe ISP History 133–136 Internetdienst 313, 314,
Recommended publications
  • X Window System Version 6.4.2 Release Notes
    X Window System Version 6.4.2 Release Notes October 2000 0890298-6.4.2 READREAD MEME BEFOREBEFORE INSTALLINGINSTALLING THISTHIS PRODUCTPRODUCT Copyright Copyright 2000 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent Computer Corporation products by Concurrent Computer Corporation personnel, customers, and end–users. It may not be reproduced in any form without the written permission of the publisher. Disclaimer The information contained in this document is subject to change without notice. Concurrent Computer Corporation has taken efforts to remove errors from this document, however, Concurrent Computer Corporation’s only liability regarding errors that may still exist is to correct said errors upon their being made known to Concurrent Computer Corporation. Concurrent Computer Corporation assumes no responsibility for the use or reliability of software if used on equipment that is not supplied by Concurrent Computer Corporation. License The software described in this document is furnished under a license, and it can be used or copied only in a manner permitted by that license. Any copy of the described software must include any copyright notice, trademarks or other legends or credits of Concurrent Computer Corporation and/or its suppliers. Title to and ownership of the described software and any copies thereof shall remain in Concurrent Computer Corporation and/or its suppliers. The licensed software described herein may contain certain encryptions or other devices which may prevent or detect unauthorized use of the Licensed Software. Temporary use permitted by the terms of the License Agreement may require assistance from Concurrent Computer Corporation.
    [Show full text]
  • No Slide Title
    Embedded Systems Class overview, Embedded systems introduction, Raspberry Pi, Linux OS, X-windows, Window manager, Desktop Environment Prof. Myung-Eui Lee (A-405) [email protected] Embedded Systems 1-1 KUT Embedded Systems Class Overview ⚫ Embedded Systems Class Operations » Past : 3 (credit) -2 (lecture) -2 (practice) » Now : 3 (credit) -1 (lecture) -1 (design) -2 (practice) » Future : 4 (credit) -2 (lecture) -2 (design) -0 (practice) ⚫ PBL : Problem or Project Based Learning » Problem : 4 problems » Project : 2 projects ⚫ 4 hours Class » 1 hour (lecture) + 1 hour (lecture or design) + 2 hours (practice) ▪ 1 hour (lecture) + 1 hour (lecture or design) : me ▪ 2 hours (practice) : Ph.D Park ⚫ Target Board : Raspberry Pi 3 » ARM + Linux Embedded Systems 1-2 KUT Embedded Systems Class Overview ⚫ Class Grade : » Mid Term Exam : 15 % [30 %] » Final Term Exam : 15 % [30 %] » Peer Evaluation : 10 % (Project #1 : 5% + Project #2 : 5%) » Project #1 Evaluation : 10 % » Project #2 Evaluation : 15 % » Experimental Lab. : 20 % [20 %] » Class Participation : 15 % [20 %] » Social Problem (Project #2) Optional : +5 % ⚫ Lecture Notes: http://microcom.koreatech.ac.kr Embedded Systems 1-3 KUT Embedded Systems ⚫ Definition of embedded system » Embedded system = H/W + S/W ▪ H/W = CPU + Memory + I/O ▪ S/W = Device driver + OS (or non OS) + Application program » Any electronic system that uses a CPU chip, but that is not a general-purpose workstation, desktop or laptop computer. » In embedded systems, the software typically resides in memory device, such as a flash memory or ROM chip. In contrast to a general-purpose computer that loads its programs into RAM each time. » Sometimes, single board and rack mounted general-purpose computers are called "embedded computers" if used to control.
    [Show full text]
  • The Virtualization Cookbook for SLES 10
    z/VM and Linux on IBM System z: The Virtualization Cookbook for z/VM 6.2 RHEL 6.2 and SLES 11 SP2 A “cookbook” for installing and customizing z/VM 6.2, RHEL 6.2 and SLES 11 SP2 on the mainframe Michael MacIsaac Brad Hinson Marian Gasparovic . Contents Preface . xi Parts of this book . xi Summary of changes in the July 2012 version . xi Summary of changes in the January 2012 version . xii Conventions . xiii Operating system releases used . xiii The team that wrote this book . xiii Special thanks . xiii Comments welcome. xiv Part 1. Introduction and z/VM . 1 Chapter 1. Introduction to z/VM and Linux . 1 1.1 What is virtualization? . 3 1.2 A philosophy adopted in this book . 4 1.3 Choices and decisions made in this book . 4 1.4 Single System Image design. 4 1.5 Infrastructure design . 5 1.6 Usability tests performed. 6 Chapter 2. Planning . 7 2.1 Planning for an SSI and LGR . 7 2.1.1 Hints and Tips . 7 2.1.2 Need for ECKD DASD . 9 2.2 Bill of materials . 9 2.2.1 Hardware resources . 9 2.2.2 Software resources . 9 2.2.3 Networking resources . 10 2.3 z/VM conventions . 10 2.3.1 Volume labeling convention . 10 2.3.2 Backup file naming convention . 11 2.3.3 The command retrieve convention . 11 2.4 Disk planning. 12 2.5 Memory planning. 13 2.6 Password planning . 13 2.7 Planning worksheets . 14 2.7.1 z/VM resources used in this book .
    [Show full text]
  • Bonus Chapter B Programming for X
    Bonus Chapter B Programming for X In this chapter and the next, we’ll take a look at writing programs to run in the usual Linux graphical environment, the XWindow System or X, http://www.x.org/Xorg.html. Modern UNIX systems and nearly all Linux distributions are shipped with a version of X. We’ll be concentrating on the programmer’s view of X, and we’ll assume that you are already comfortable with configuring, running, and using X on your system. We’ll cover ❑ X concepts ❑ X Windows managers ❑ X programming model ❑ Tk—its widgets, bindings, and geometry managers In the next chapter, we’ll move on to the GTK+ toolkit, which will allow us to program user interfaces in C for the GNOME system. What Is X? X was created at MIT as a way of providing a uniform environment for graphical programs. Nowadays it should be fair to assume that if you’ve used computers, you’ve come across either Microsoft Windows, X, or Apple MacOS before, so you’ll be familiar with the general concepts underlying a graphical user interface, or GUI. Unfortunately, although a Windows user might be able to navigate around the Mac interface, it’s a different story for programmers. Each windowing environment on each system is programmed differently. The ways that the display is handled and the programs communicate with the user are different. Although each system provides the programmer with the ability to open and manipulate windows on the screen, the functions used will be different. Writing applications that can run on more than one system (without using additional toolkits) is a daunting task.
    [Show full text]
  • Common Desktop Environment 1.0 Programmer's Overview
    Common Desktop Environment 1.0 Programmer’s Overview This edition of the Common Desktop Environment Advanced User’s and System Administrator’s Guide applies to AIX Version 4.2, and to all subsequent releases of these products until otherwise indicated in new releases or technical newsletters. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii) and FAR 52.227-19. THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. The code and documentation for the DtComboBox and DtSpinBox widgets were contributed by Interleaf, Inc. Copyright 1993, Interleaf, Inc. Copyright 1993, 1994, 1995 Hewlett-Packard Company Copyright 1993, 1994, 1995 International Business Machines Corp. Copyright 1993, 1994, 1995 Sun Microsystems, Inc. Copyright 1993, 1994, 1995 Novell, Inc. All rights reserved. This product and related documentation are protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form by any means without prior written authorization. All rights reserved. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii) and AR 52.227-19. Part 1 —Common Desktop Environment Architectural Overview 1. Architectural Overview. 1 Conceptual Overview. 1 Data Interaction GUIs. 2 Multiuser Collaboration. 3 Desktop Management.
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • 007-2006-100 Contributors
    Indigo Magic™ Desktop Integration Guide Document Number 007-2006-100 CONTRIBUTORS Written by Beth Fryer, Jed Hartman, Ken Jones, and Pete Sullivan Illustrated by Beth Fryer and Seth Katz Edited by Christina Cary Production by Derrald Vogt, Cindy Stief, and Linda Rae Sande Engineering contributions by Bob Blean, Susan Dahlberg, Susan Ellis, John Krystynak, Chandra Pisupati, Jack Repenning, CJ Smith, Dave Story, Steve Strasnick, Rebecca Underwood, Steve Yohanan, and Betsy Zeller St Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © Copyright 1994, 1995, 1996 Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94039-7311. Silicon Graphics, the Silicon Graphics logo, and IRIS are registered trademarks and IRIS, IRIS GL, IRIS IM, IRIS InSight, IRIS ViewKit, IRIX, GoldenGate, IconSmith, Indigo Magic, the Graphics Library, OpenGL, Open Inventor, and RapidApp are trademarks of Silicon Graphics, Inc. Apple is a registered trademark and Apple Quicktime is a trademark of Apple Computer, Inc.
    [Show full text]
  • An Introduction to X Window Application Development
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1992-03 An introduction to X Window application development. Rust, David Michael Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/23933 FV KNOX LIBRARY •Ud SCHOOL SivAL POSTGRADUATE SoNTEHEV.CAUFORN.AG^^ CURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE 1b. RESTRICTIVE MARKINGS REPORT SECURITY CLASSIFICATION UNCLASSIFIED a SECURITY CLASSIPICAT I6M AUTH6RITV 3. bisTRiBuTi6N7AVAlLABiUTY 6P REP5RT Approved for public release; b. dECLAssIFICATIoN/doWNgRADINg SCHEDULE distribution is unlimited PERFORMING ORGANIZATION REP6RT NUM&ER(S) 5. M6niT6Ring6Rgani2aTi6n rep6rT numbER(S) *. NAME 6F PERFORMING 6R6ANIZATI6N 6b OFFICE SYMBOL 7a. NAME 6E M6NIT6R1NG ORGANIZATION vdministrative Sciences Department (if applicable) Naval Postgraduate School Javal Postgraduate School AS :. ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code) /lonterey, CA 93943-5000 Monterey, CA 93943-5000 NAME OF FUNDING/SPONSORING 8b. OFFICE SYMBOL g PROCURE M E N T I NST RUMEN T ID E N T I FI CATION NUMBE R ORGANIZATION (if applicable) 6. ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS PROGRAM 1 PR6JECT TTa^R" WoRkUNiT ELEMENT NO. NO. NO. ACCESSION NO. 1 . TITLE (Include Security Classification) ^N INTRODUCTION TO X WINDOW APPLICATION DEVELOPMENT (U) 2 PERSONAL AUTHOR(S) lust, David M. 3a. type of report 13b. time covered 14. DATE OF REPORT (Year, Month, Day) 16. PAGE COUNT Master's Thesis from 10/90 to 03/92 1992, March, 23 70 supplementary notation 6 The views expressed in this ^sis ^ those of the author md do not reflect the official policy or position of the Department of Defense or the United States Government.
    [Show full text]
  • Operációs Rendszerek III. Az X Window Rendszer Működése Kliens-Szerver Modell Használata
    Operációs rendszerek III. X WindowSystem Az X Window rendszer Grafikus alkalmazások felhasználói felületének megjelenítése. · 1983-84: a Massachusetts Institute of Technology- n (MIT, USA). · Azonos kezelői felületet különböző operációs rendszereken. · Működés: az alkalmazás és a kezelői felület szétválasztása. · Forráskódja publikus. (Elsősorban a UNIX rendszerek támogatják.) vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. X WindowSystem X munkahely X protokoll X szerver Távoli kliens képernyő képernyő alkalmazás vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. X WindowSystem vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. Az X Window rendszer működése Kliens-szerver modell használata. A szerver kezeli az ún. grafikus munkahelyet, melynek részei: · képernyő (ill. képernyők), · billentyűzet (alfanumerikus bemeneti eszköz), · egy grafikus bemeneti eszköz. A kliens egy grafikus kimenetű (általában vasárnianp, 2t00era5. novembkert ív) folyamDr.a Benyt.óBalázs 27. Operációs rendszerek III. Az X protokoll Az X protokoll •A rendszer magja az X protokoll: · Definiálja a kliens és a szerver együttműködésének módját. •A protokoll kétirányúaszinkron kommunikációt tesz lehetővé. vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. Az üzenetek típusai · Kérés (kliens küldi a szervernek). · Válasz (szerver küldi a kliensnek). · Esemény (szerver küldi a kliensnek). · Hiba (szerver küldi a kliensnek). vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. A hálózati kommunikáció mérséklése · Kliens: · üzenetek összegyűjtött csomagját küldi át · Szerver: · helyben kezel egyszerű eseményeket (pl. egérmozgatás). · szoftver erőforrásokat hoz létre · pl. palettát, grafikus környezetet, betűtípushoz tartozóleírást, stb. · erőforrás kezelése: · létrehozás kliens kérésére · a kliens folyamat egyszerű hivatkozással érhet el vasárnap, 2005. november Dr. BenyóBalázs 27. Operációs rendszerek III. X Windowrendszer működése Az X Window rendszer koncepciója Alapvető elem a grafikus, ún.
    [Show full text]
  • Technical Standard X/Open Common Desktop Environment (XCDE
    Technical Standard X/Open Common Desktop Environment (XCDE) Services and Applications NICAL H S C T A E N T D A R D [This page intentionally left blank] X/Open CAE Specification X/Open Common Desktop Environment (XCDE) Services and Applications X/Open Company Ltd. March 1995, X/Open Company Limited All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. X/Open CAE Specification X/Open Common Desktop Environment (XCDE) Services and Applications ISBN: 1-85912-074-1 X/Open Document Number: C323 Published by X/Open Company Ltd., U.K. Any comments relating to the material contained in this document may be submitted to X/Open at: X/Open Company Limited Apex Plaza Forbury Road Reading Berkshire, RG1 1AX United Kingdom or by Electronic Mail to: [email protected] ii X/Open CAE Specification Contents Chapter 1 Window Management Services..................................................... 1 1.1 Introduction ................................................................................................. 1 1.2 Data Formats................................................................................................ 2 Chapter 2 Workspace Management Services ............................................... 3 2.1 Introduction ................................................................................................. 3 2.2 Functions .....................................................................................................
    [Show full text]
  • Motif Reference Manual for Openmotif 2.3
    THE DEFINITIVE GUIDES TO THE X WINDOW SYSTEM VOLUME SIX B Motif Reference Manual for OpenMotif 2.3 Open Source Edition Based upon the manual writted by Antony Fountain and Paula Ferguson, O’Reilly and Associates Updated and Published by Peter Winston and the Technical Staff of Integrated Computer Solutions, Inc. Motif Reference Manual, Open Source Edition for OpenMotif version 2.3 Copyright ©2005 by Integrated Computer Solutions, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). December 2001 Copyright ©1993, 2000, 2001 by O’Reilly & Associates, Inc. and Antony Fountain. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). This is an updated version of the Motif Reference Manual, Open Source Edition for Motif 2.1, published by Imperial Software Technology in December 2001. The source files for this version of the document are available at http://www.motifzone.org. The source files for the Open Source Edition can be found at http://www.ist.co.uk/motif/motif_refs.html. A description of the modifications is contained in the Preface to the Open Source Edition. The Open Source Edition is a modified version of the Motif Reference Manual, Second Edition, published by O’Reilly & Associates in February 2000. The source files for the Second Edition can be found at http://www.oreilly.com/openbook/motif/.
    [Show full text]
  • Motif Programming Manual 1 Preface
    Motif Programming Manual 1 Preface...........................................................................................................................................................................1 1.1 The Plot..........................................................................................................................................................1 1.2 Assumptions...................................................................................................................................................2 1.3 How This Book Is Organized........................................................................................................................3 1.4 Related Documents........................................................................................................................................5 1.5 Conventions Used in This Book....................................................................................................................6 1.6 Obtaining Motif.............................................................................................................................................6 1.7 Obtaining the Example Programs..................................................................................................................7 1.7.1 FTP.................................................................................................................................................7 1.7.2 FTPMAIL......................................................................................................................................7
    [Show full text]