2017–18 School Survey on Crime and Safety (SSOCS)

Total Page:16

File Type:pdf, Size:1020Kb

2017–18 School Survey on Crime and Safety (SSOCS) 2017–18 School Survey on Crime and Safety (SSOCS) NCES 2020-054 Public-Use Data File User’s Manual U.S. DEPARTMENT OF EDUCATION A Publication of the National Center for Education Statistics at IES 2017–18 School Survey on Crime and Safety (SSOCS) Public-Use Data File User’s Manual April 2020 Zoe Padgett Michael Jackson Samuel Correa Jana Kemp American Institutes for Research Aaron Gilary Alfred Meier Komba Gbondo Tugbawa Tracae McClure U.S. Census Bureau Rachel Hansen Project Officer National Center for Education Statistics NCES 2020-054 U.S. DEPARTMENT OF EDUCATION U.S. Department of Education Betsy DeVos Secretary Institute of Education Sciences Mark Schneider Director National Center for Education Statistics James L. Woodworth Commissioner The National Center for Education Statistics (NCES) is the primary federal entity for collecting, analyzing, and reporting data related to education in the United States and other nations. It fulfills a congressional mandate to collect, collate, analyze, and report full and complete statistics on the condition of education in the United States; conduct and publish reports and specialized analyses of the meaning and significance of such statistics; assist state and local education agencies in improving their statistical systems; and review and report on education activities in foreign countries. NCES activities are designed to address high-priority education data needs; provide consistent, reliable, complete, and accurate indicators of education status and trends; and report timely, useful, and high-quality data to the U.S. Department of Education, the Congress, the states, other education policymakers, practitioners, data users, and the general public. Unless specifically noted, all information contained herein is in the public domain. We strive to make our products available in a variety of formats and in language that is appropriate to a variety of audiences. You, as our customer, are the best judge of our success in communicating information effectively. If you have any comments or suggestions about this or any other NCES product or report, we would like to hear from you. Please direct your comments to NCES, IES, U.S. Department of Education Potomac Center Plaza (PCP) 550 12th Street SW Washington, DC 20202 April 2020 The NCES Home Page address is http://nces.ed.gov. The NCES Publications and Products address is http://nces.ed.gov/pubsearch. This report was prepared for the National Center for Education Statistics under Contract No. ED-IES-12-D- 0002 with the American Institutes for Research. Mention of trade names, commercial products, or organizations does not imply endorsement by the U.S. Government. Suggested Citation Padgett, Z., Jackson, M., Correa, S., Kemp, J., Gilary, A., Meier, A., Gbondo-Tugbawa, K., and McClure, T. (2020). School Survey on Crime and Safety: 2017–18 Public-Use Data File User’s Manual (NCES 2020- 054). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC. Retrieved [date] from http://nces.ed.gov/ pubsearch. Content Contact Rachel Hansen (202) 245-7082 [email protected] Contents Page List of Tables ...................................................................................................................... .v 1. Introduction ................................................................................................................... 1 1.1 Background of the Study .......................................................................................... 1 1.2 Questionnaire Development ..................................................................................... 2 1.2.1 Changes to Definitions for SSOCS:2018 ..................................................... 3 1.2.1.1 New Definitions Added for SSOCS:2018 ....................................... 3 1.2.1.2 Changes Made to Existing SSOCS Definitions ............................... 4 Changes to Items Between SSOCS:2016 and SSOCS:2018 ........................ 5 1.2.2.1 Items Added to SSOCS:2018 ........................................................... 5 1.2.2.2 SSOCS:2018 Items Modified From SSOCS:2016 .......................... 6 1.2.2.3 SSOCS:2016 Items Not Included in SSOCS:2018 .......................... 8 1.3 Survey Topics .......................................................................................................... 9 1.3.1 School Practices and Programs ..................................................................... 9 1.3.2 Parent and Community Involvement at School ......................................... 10 1.3.3 School Security Staff ................................................................................. 10 1.3.4 School Mental Health Services ................................................................... 10 1.3.5 Staff Training and Practices ....................................................................... 10 1.3.6 Limitations on Crime Prevention................................................................ 10 1.3.7 Frequency of Crime and Violence at School ............................................. 11 1.3.8 Incidents...................................................................................................... 11 1.3.9 Disciplinary Problems and Actions ........................................................... 11 1.3.10 School Characteristics: 2017–18 School Year ........................................... 11 1.4 Methodological Experiments ................................................................................. 11 1.4.1 Mode Experiment .......................................................................................... 12 1.4.2 Incentive Experiment .................................................................................... 12 2. Sample Design and Weighting .................................................................................... 13 2.1 Sampling Frame ..................................................................................................... 13 2.2 Sample Design ....................................................................................................... 13 2.3 Sample Size ............................................................................................................ 14 2.4 Stratification, Sample Selection, and Final Sample ............................................... 14 i Page 2.5 Using Reverse Keyfitz to Unduplicate with NTPS Sample ................................... 15 2.6 Assignment to Experimental Subsamples .............................................................. 16 2.7 Weighting and Sampling Error .............................................................................. 19 3. Data Collection Methods and Response Rates .......................................................... 21 3.1 Data Collection Activities ...................................................................................... 21 3.2 Data Retrieval ........................................................................................................ 24 3.3 Efforts to Increase Response Rates ........................................................................ 25 3.3.1 Interviewer Training .................................................................................. 26 3.4 Unit Response Rate ................................................................................................ 27 3.4.1 Completion Rate ........................................................................................ 28 3.4.2 Unweighted Response Rate ....................................................................... 28 3.4.3 Weighted Unit response Rate ..................................................................... 28 3.5 Analysis of Unit Nonresponse Bias ....................................................................... 30 3.6 Item Response Rates .............................................................................................. 31 3.7 Analysis of Item Nonresponse Bias ....................................................................... 31 3.8 Nonsampling Error ................................................................................................. 31 4. Data Preparation ......................................................................................................... 33 4.1 Questionnaire Check-in Process ............................................................................ 33 4.2 Editing Specifications ............................................................................................ 33 4.2.1 Range Specifications .................................................................................. 33 4.2.2 Consistency and Logic Edits ...................................................................... 34 4.3 Imputation ............................................................................................................... 34 4.3.1 Imputation Methods ................................................................................... 35 4.3.2 Imputation Order ........................................................................................ 35 4.3.3 Imputation Flags ........................................................................................ 36 4.4 Analysis of Disclosure Risk ................................................................................... 36 5. Guide to the Data File and Codebook ........................................................................ 37 5.1 Contents and Organization of the Public-Use Data
Recommended publications
  • Freenas® 11.0 User Guide
    FreeNAS® 11.0 User Guide June 2017 Edition FreeNAS® IS © 2011-2017 iXsystems FreeNAS® AND THE FreeNAS® LOGO ARE REGISTERED TRADEMARKS OF iXsystems FreeBSD® IS A REGISTERED TRADEMARK OF THE FreeBSD Foundation WRITTEN BY USERS OF THE FreeNAS® network-attached STORAGE OPERATING system. VERSION 11.0 CopYRIGHT © 2011-2017 iXsystems (https://www.ixsystems.com/) CONTENTS WELCOME....................................................1 TYPOGRAPHIC Conventions...........................................2 1 INTRODUCTION 3 1.1 NeW FeaturES IN 11.0..........................................3 1.2 HarDWARE Recommendations.....................................4 1.2.1 RAM...............................................5 1.2.2 The OperATING System DeVICE.................................5 1.2.3 StorAGE Disks AND ContrOLLERS.................................6 1.2.4 Network INTERFACES.......................................7 1.3 Getting Started WITH ZFS........................................8 2 INSTALLING AND UpgrADING 9 2.1 Getting FreeNAS® ............................................9 2.2 PrEPARING THE Media.......................................... 10 2.2.1 On FreeBSD OR Linux...................................... 10 2.2.2 On WindoWS.......................................... 11 2.2.3 On OS X............................................. 11 2.3 Performing THE INSTALLATION....................................... 12 2.4 INSTALLATION TROUBLESHOOTING...................................... 18 2.5 UpgrADING................................................ 19 2.5.1 Caveats:............................................
    [Show full text]
  • Java Cheat Sheet
    Java Cheat Sheet Mosh Hamedani Code with Mosh (codewithmosh.com) 1st Edition About this Cheat Sheet This cheat sheet includes the materials I’ve covered in my Java tutorial for Beginners on my YouTube channel: https://www.youtube.com/user/programmingwithmosh Both the YouTube tutorial and this cheat cover the core language constructs and they are not complete by any means. If you want to learn everything Java has to offer and become a Java expert, check out my Ultimate Java Mastery Series. https://codewithmosh.com/courses/the-ultimate-java-mastery-series About the Author Hi! My name is Mosh Hamedani. I’m a software engineer with two decades of experience and I’ve taught over three million people how to code or how to become a professional software engineer. It’s my mission to make software engineering simple and accessible to everyone. https://codewithmosh.com https://youtube.com/user/programmingwithmosh https://twitter.com/moshhamedani https://facebook.com/programmingwithmosh/ Basics ...................................................................6 Java Development Kit ..............................................................................6 Java Editions ............................................................................................6 How Java Code Gets Executed ................................................................6 Architecture of Java Applications ..........................................................6 5 Interesting Facts about Java ................................................................7
    [Show full text]
  • The Saratoga Falcon the Saratoga Falcon 2 NEWS December 13, 2019 December 13, 2019 NEWS 3 Picturethis Maintenance, Green Team to Start Composting
    LIFESTYLE 9 SCHOOL SCOPE 12-13 SPORTS 19 Reporters Students Cultural Non-Profit discuss their explore art activities Organization U.S. Postage strangest in a STEM- connect PAID superstitions focused school students to Saratoga, CA Permit No. 41 and beliefs. environment. heritage. THE saratogafalconAN INDEPENDENT HIGH SCHOOL PUBLICATION Friday, December 13, 2019 Saratoga High School Saratoga, CA saratogafalcon.org Vol. 60, No. 6 Applying Mosh madness: admin to 30+ combats aggressive colleges UPHILL clustering at dances no longer BY SofiaJones ing. Eventually the dozens on & KavitaSundaram the dance floor began moshing even though administrators have unheard of Last Saturday, about 560 stu- banned it last year. dents walked into the Large Gym Moshing is an aggressive style BY SelenaLiu BATTLE and were greeted with of dance where partici- & KevinSze decorations that included pants push or slam into oversized white curtains, each other. It usually hap- After most early-decision and “It’s letting chandeliers, flashing pens in the center of a early-action college deadlines parents know, ‘I lights and gold and white crowd. Although deeply came and went on Nov. 1, many couches for the Roaring discouraged by the ad- seniors are now halfway com- know you were 20s themed Winter For- ministration, it has oc- plete with the college application mal. A photo booth with curred numerous times process and are finishing college great at physics, a silver sparkly backdrop in on-campus dances, essays for their regular decision but it doesn’t provided students with Torrens despite the physical harm schools. on-theme photo oppor- it can cause.
    [Show full text]
  • Minutes of 15-May-2021 Board Meeting on 05/15/2021 Summary of Matters Arising
    Seattle Pups and Handlers 15-May-2021 Board Meeting Take this opportunity to join your board of Dire ctors for SEA-PAH's monthly Board Me e ting and take an active role in your community. This is, hands-down, the BEST way to know what is curre ntly happe ning in the SEA-PAH community and to offe r your ide as and input for future plans and e ve nts! Important! since this me e ting will be using Goog le , ple ase take care to e dit your use rname to your liking PRIOR to joining the me e ting ! Who is our Board of Dire ctors? Click He re to me e t the m online ! This is a 18 + e ve nt Whe n 0 5/15/20 21 at 11:0 0 Location: Z oom, Z oom Confe re ncing Join via Z oom https://z oom.us/j/9 8 240 18 49 52? pwd=UjJXaW1FSjZ SNk9 6 Y29 sdVBCe jJz dz 0 9 (ID: 9 8 240 18 49 52) Chairpe rson Nig htcat Cat Minute take r Ste ve n Lokie Minutes 1. Meeting Called to Order Calle d to Orde r at 11:0 1a 2. Roll call Nig htcat Rosco Baus Yukon Ste ve n Lokie Care ssa *PupWinston 3. Approve of Aprils Meeting minuets https://docs.g oog le.com/document/d/1j89 g 8IoDejWeabyVnfeUwwyf6 GXq2raxZ Pok- vudxhc/edit# Rosco / Care ssa No discussion Yay 5 Decisio n Approve d 4 . Open floor to g uests None 5.
    [Show full text]
  • Getting Started at the Demography Lab
    Getting started at the Demography Lab Carl Mason [email protected] rev 1.4 Spring 2016 Contents 1 Introduction 1 1.1 Getting a userid . 1 1.2 Figuring stuff out . 2 1.3 Things to be aware of when logging on to a Linux machine . 2 2 Email 3 3 Working remotely 3 4 Wireless access 4 4.1 Printing . 4 5 Statistical applications 4 6 Office applications 5 1 Introduction Welcome to the Demography Lab. This document is intended to get you started doing science at the Demography Department. 1.1 Getting a userid If you don't already have a userid and password, then you'll need to find Carl Mason ([email protected]) and give him a signed Statement of Compliance { which you can download from: http://lab.demog.berkeley.edu/Docs/statementofcompliance.pdf. 1 1.2 Figuring stuff out In addition to this woefully inadequate document, you can find out how to do some things and how not to do others by consulting: 1. The Web. Google for things like \introduction to Unix" or \Unix command line". There are many different flavors of Unix/Linux but the vast majority of commands work the same way on all of them. 2. The Virtual Lab wiki at http://lab.demog.berkeley.edu/LabWiki (focuses on using the lab remotely via FreeNX) 3. The Demography Lab website http://lab.demog.berkeley.edu 4. Any of your new colleagues whom you might find in or near the com- puter lab. 1.3 Things to be aware of when logging on to a Linux ma- chine Once you have a userid and password you can and should logon to a Linux workstation.
    [Show full text]
  • Kafl: Hardware-Assisted Feedback Fuzzing for OS Kernels
    kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Sergej Schumilo1, Cornelius Aschermann1, Robert Gawlik1, Sebastian Schinzel2, Thorsten Holz1 1Ruhr-Universität Bochum, 2Münster University of Applied Sciences Motivation IJG jpeg libjpeg-turbo libpng libtiff mozjpeg PHP Mozilla Firefox Internet Explorer PCRE sqlite OpenSSL LibreOffice poppler freetype GnuTLS GnuPG PuTTY ntpd nginx bash tcpdump JavaScriptCore pdfium ffmpeg libmatroska libarchive ImageMagick BIND QEMU lcms Adobe Flash Oracle BerkeleyDB Android libstagefright iOS ImageIO FLAC audio library libsndfile less lesspipe strings file dpkg rcs systemd-resolved libyaml Info-Zip unzip libtasn1OpenBSD pfctl NetBSD bpf man mandocIDA Pro clamav libxml2glibc clang llvmnasm ctags mutt procmail fontconfig pdksh Qt wavpack OpenSSH redis lua-cmsgpack taglib privoxy perl libxmp radare2 SleuthKit fwknop X.Org exifprobe jhead capnproto Xerces-C metacam djvulibre exiv Linux btrfs Knot DNS curl wpa_supplicant Apple Safari libde265 dnsmasq libbpg lame libwmf uudecode MuPDF imlib2 libraw libbson libsass yara W3C tidy- html5 VLC FreeBSD syscons John the Ripper screen tmux mosh UPX indent openjpeg MMIX OpenMPT rxvt dhcpcd Mozilla NSS Nettle mbed TLS Linux netlink Linux ext4 Linux xfs botan expat Adobe Reader libav libical OpenBSD kernel collectd libidn MatrixSSL jasperMaraDNS w3m Xen OpenH232 irssi cmark OpenCV Malheur gstreamer Tor gdk-pixbuf audiofilezstd lz4 stb cJSON libpcre MySQL gnulib openexr libmad ettercap lrzip freetds Asterisk ytnefraptor mpg123 exempi libgmime pev v8 sed awk make
    [Show full text]
  • Online Terminal Emulator Windows
    Online Terminal Emulator Windows Andonis repossess disgracefully if versed Clemens bide or slurp. Rudimentary and spindle-legged Ashby never lark his human! Kendall remains credible after Ingamar rejigs supersensibly or panhandles any Narragansett. This one is a bit controversial. We have switched to semver. JSLinux also lets you upload files to a virtual machine. Communicating with hosts using telnet and Secure Shell is easy. Did we say it was fast? Glosbe, have to specify the IP address. Similarly, Russian, rsync and many more. PC computer behave like a real text terminal. As you might expect, viewers, and everything you type in one of them is broadcast to all the others. You are responsible for ensuring that you have the necessary permission to reuse any work on this site. The application is solely programmed from Windows operating system. This generally means that some type of firewall is blocking the UDP packets between the client and the server. If any of that is missed, feel free to use some of them and see which one fits as per the requirements. IP address of the server. Position the pointer in the title bar. Linux distribution package manager. Howto: What is Git and Github? Use system fonts or choose a custom font for your terminal. Honestly, fully configurable shortcuts, sorry for the confusion. All trademarks and registered trademarks appearing on oreilly. Terminator status bar opens a menu in which you can define groups of terminals, such as backing up data or searching for files that you can run from Cmd. Linux applications on Windows.
    [Show full text]
  • Quantification of Mineral Oil Aromatic Hydrocarbons (MOAH) in Anhydrous Cosmetics Using 1H NMR
    Hindawi Journal of Chemistry Volume 2019, Article ID 1680269, 10 pages https://doi.org/10.1155/2019/1680269 Research Article Quantification of Mineral Oil Aromatic Hydrocarbons (MOAH) in Anhydrous Cosmetics Using 1H NMR Sandra Weber,1 Tamina Schmidt,1 Paul Schumacher,2 Thomas Kuballa ,1 Gerd Mildau,1 Stephan G. Walch,1 Andrea Hartwig,2 and Dirk W. Lachenmeier 1 1Chemisches und Veterina¨runtersuchungsamt (CVUA) Karlsruhe, Weissenburger Strasse 3, Karlsruhe 76187, Germany 2Karlsruher Institut fu¨r Technologie (KIT), Institut fu¨r Angewandte Biowissenschaften, Lebensmittelchemie und Toxikologie, Karlsruhe 76131, Germany Correspondence should be addressed to Dirk W. Lachenmeier; [email protected] Received 29 June 2018; Revised 31 October 2018; Accepted 16 December 2018; Published 10 February 2019 Academic Editor: Beatriz P. P. Oliveira Copyright © 2019 Sandra Weber et al. /is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In cosmetic products, hydrocarbons from mineral oil origin are used as ingredients in a wide variety of consistency, from liquid oil to solid wax. Refined mineral oil hydrocarbons consist of MOSH (mineral oil saturated hydrocarbons) and a low proportion of MOAH (mineral oil aromatic hydrocarbons). MOSH and MOAH comprise a variety of chemically similar single substances with straight or branched chains. In the context of precautionary consumer protection, it is crucial to determine hydrocarbons from mineral oil origin of inferior quality quickly and efficiently. /is publication presents a rapid method for quantifying MOAH by proton nuclear magnetic resonance spectroscopy (1H qNMR) in anhydrous cosmetics such as lipstick, lip gloss, and lip balm.
    [Show full text]
  • Mosh Research Paper
    Mosh: An Interactive Remote Shell for Mobile Clients Keith Winstein and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory, Cambridge, Mass. fkeithw,[email protected] Abstract Figure 1: Mosh in use. Mosh (mobile shell) is a remote terminal application that supports intermittent connectivity, allows roaming, and speculatively and safely echoes user keystrokes for better interactive response over high-latency paths. Mosh is built on the State Synchronization Protocol (SSP), a new UDP-based protocol that securely synchronizes client and server state, even across changes of the client’s IP address. Mosh uses SSP to synchronize a character- cell terminal emulator, maintaining terminal state at both client and server to predictively echo keystrokes. Our evaluation analyzed keystroke traces from six different users covering a period of 40 hours of real-world us- age. Mosh was able to immediately display the ef- fects of 70% of the user keystrokes. Over a commer- cial EV-DO (3G) network, median keystroke response mote servers feel more like the local computer, because latency with Mosh was less than 5 ms, compared with most keystrokes are reflected immediately on the user’s 503 ms for SSH. Mosh is free software, available from display—even in full-screen programs like a text editor http://mosh.mit.edu. It was downloaded more than or mail reader. 15,000 times in the first week of its release. These features are possible because Mosh operates at a different layer from SSH. While SSH securely con- 1 Introduction veys an octet-stream over the network and then hands it off to a separate client-side terminal emulator to be inter- Remote terminal applications are almost as old as packet- preted and rendered in cells on the screen, Mosh contains switched data networks.
    [Show full text]
  • TREATY with the CHIPPEWA, 1854. Sept
    TREATY WITH THE CHIPPEWA, 1854. Sept. 30, 1854. | 10 Stats., 1109. | Ratified Jan. 10, 1855. | Proclaimed Jan. 29, 1855. Indian Affairs: Laws and Treaties. Vol. II (Treaties). Compiled and edited by Charles J. Kappler. Washington: Government Printing Office, 1904. Home | Disclaimer & Usage | Table of Contents | Index Vol. II, Pages 648-652 | Page 649 | Page 650 | Page 651| Page 652 Vol. II, Page Images | Page 648 | Page 649 | Page 650 | Page 651 | Page 652 Margin Notes: Cession to the United States by the Chippewa of Lake Superior. Relinquishment to Chippewa of Mississippi by Chippewa of Lake Superior. Reservation for Chippewa of Lake Superior. Survey and patents of reservation. Payments for said cession. Blacksmiths and assistants. Annuities not to be withheld for debt, but may be for depredations. Spirituous liquors. Division between Chippewa of Mississippi and of Lake Superior of benefits of former treaties. Arrearages. Preemption. Annuities, how paid. Stipulations for Bois Forte Indians. Articles of a treaty made and concluded at La Pointe, in the State of Wisconsin, between Henry C. Gilbert and David B. Herriman, commissioners on the part of the United States, and the Chippewa Indians of Lake Superior and the Mississippi, by their chiefs and head- men. ARTICLE 1. The Chippewas of Lake Superior hereby cede to the United States all the lands heretofore owned by them in common with the Chippewas of the Mississippi, lying east of the following boundary-line, to wit: Beginning at a point, where the east branch of Snake River crosses the southern boundary-line of the Chippewa country, running thence up the said branch to its source, thence nearly north, in a straight line, to the mouth of East Savannah River, thence up the St.
    [Show full text]
  • Tools and Tricks for a Data Scientist
    Tools and tricks for a data scientist 03/09/2020 Ming (Tommy) Tang Oh-my-zsh! • https://ohmyz.sh/ https://divingintogeneticsandgenomics.rbind.io/post/set-up-my-new-mac-laptop/ Mosh: mobile shell • https://mosh.org/ • Mosh + screen/tmux to keep your session persistent. csvkit • https://www.datascienceatthecommandline.com/ cd /n/holyscratch01/informatics/mtang cat mtcars.csv | csvless –S cat mtcars.csv | head | csvless –S csvcut –n mtcars.csv body • https://github.com/jeroenjanssens/data-science-at-the-command- line/blob/master/tools/body Cat myfile.txt | body grep “pattern” Will retain the header cat mtcars.csv | body grep Ford | csvless -S csvtk • https://github.com/shenwei356/csvtk • E.g. cut out columns based on column names in another file. • csvtk cut -f $(paste -s -d, columns.txt) mtcars.csv • Unix cut can not arrange column orders, • I usually use awk. Csvtk can • Other tools: • https://github.com/crazyhottommy/getting-started-with-genomics- tools-and-resources#do-not-give-me-excel-files GNU parallel Most frequently used… • 1. readlink –e • 2. realpath • 3. less –S • 4. cat –A show hidden characters e.g. ^M, ^I, • 5. dos2unix One-liners • https://github.com/crazyhottommy/bioinformatics-one-liners Brename: rename your files without a mess • https://github.com/shenwei356/brename • Written in go, download the binary, ready to use. • Regular expression • undo last -u • Dry run -d • only renaming specific paths via include filters : • brename -p ":" -r "-" -f ".htm$" -f ".html$” • using capture variables, e.g., $1, $2… • brename -p "(m)" -r "\$1\$1" rmate editing remote files (I only know how to quit vim) • https://divingintogeneticsandgenomics.rbind.io/post/open-files-on- remote-with-sublime-by-ssh/ ncdu https://anaconda.org/coecms/ncdu • Ncdu, acronym of NCurses Disk Usage, is a curses-based version of the well-known ‘du’ command.
    [Show full text]
  • Pdf/Acyclic.1.Pdf
    tldr pages Simplified and community-driven man pages Generated on Sun Sep 26 15:57:34 2021 Android am Android activity manager. More information: https://developer.android.com/studio/command-line/adb#am. • Start a specific activity: am start -n {{com.android.settings/.Settings}} • Start an activity and pass data to it: am start -a {{android.intent.action.VIEW}} -d {{tel:123}} • Start an activity matching a specific action and category: am start -a {{android.intent.action.MAIN}} -c {{android.intent.category.HOME}} • Convert an intent to a URI: am to-uri -a {{android.intent.action.VIEW}} -d {{tel:123}} bugreport Show an Android bug report. This command can only be used through adb shell. More information: https://android.googlesource.com/platform/frameworks/native/+/ master/cmds/bugreport/. • Show a complete bug report of an Android device: bugreport bugreportz Generate a zipped Android bug report. This command can only be used through adb shell. More information: https://android.googlesource.com/platform/frameworks/native/+/ master/cmds/bugreportz/. • Generate a complete zipped bug report of an Android device: bugreportz • Show the progress of a running bugreportz operation: bugreportz -p • Show the version of bugreportz: bugreportz -v • Display help: bugreportz -h cmd Android service manager. More information: https://cs.android.com/android/platform/superproject/+/ master:frameworks/native/cmds/cmd/. • List every running service: cmd -l • Call a specific service: cmd {{alarm}} • Call a service with arguments: cmd {{vibrator}} {{vibrate 300}} dalvikvm Android Java virtual machine. More information: https://source.android.com/devices/tech/dalvik. • Start a Java program: dalvikvm -classpath {{path/to/file.jar}} {{classname}} dumpsys Provide information about Android system services.
    [Show full text]