XEDIT Commands and Macrosreference

Total Page:16

File Type:pdf, Size:1020Kb

XEDIT Commands and Macrosreference z/VM Version 7 Release 1 XEDIT Commands and Macros Reference IBM SC24-6337-00 Note: Before you use this information and the product it supports, read the information in “Notices” on page 533. This edition applies to version 7, release 1, modification 0 of IBM® z/VM (product number 5741-A09) and to all subsequent releases of this product until otherwise indicated in new editions. Last updated: 2019-03-06 © Copyright International Business Machines Corporation 1990, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About This Document..........................................................................................xiii Intended Audience.................................................................................................................................... xiii Syntax, Message, and Response Conventions..........................................................................................xiii Where to Find More Information...............................................................................................................xvi Links to Other Documents and Websites............................................................................................ xvi How to Send Your Comments to IBM................................................................... xvii Summary of Changes for z/VM XEDIT Commands and Macros Reference............ xviii SC24-6337-00, z/VM Version 7 Release 1............................................................................................. xviii SC24-6244-01, z/VM Version 6 Release 4 (December 2017)............................................................... xviii Chapter 1. Rules and Conventions..........................................................................1 Subcommand Name.....................................................................................................................................1 Subcommand Operands.............................................................................................................................. 1 Character Set Usage.....................................................................................................................................1 Understanding Byte File System (BFS) Path Name Syntax........................................................................ 2 Using the Online HELP Facility.....................................................................................................................6 Chapter 2. The XEDIT Command............................................................................ 9 XEDIT......................................................................................................................................................... 10 Chapter 3. XEDIT Subcommands and Macros....................................................... 25 ADD.............................................................................................................................................................26 ALL (Macro)................................................................................................................................................ 29 ALTER (Macro)............................................................................................................................................34 BACKWARD................................................................................................................................................ 36 BOTTOM..................................................................................................................................................... 38 CANCEL (Macro).........................................................................................................................................40 CAPPEND (Macro)...................................................................................................................................... 41 CDELETE.....................................................................................................................................................43 CFIRST....................................................................................................................................................... 46 CHANGE..................................................................................................................................................... 47 CINSERT.....................................................................................................................................................52 CLAST......................................................................................................................................................... 54 CLOCATE.....................................................................................................................................................55 CMS............................................................................................................................................................ 59 CMSG..........................................................................................................................................................61 COMMAND..................................................................................................................................................62 COMPRESS................................................................................................................................................. 63 COPY...........................................................................................................................................................67 COUNT........................................................................................................................................................70 COVERLAY.................................................................................................................................................. 72 CP............................................................................................................................................................... 74 CREPLACE.................................................................................................................................................. 76 CURSOR......................................................................................................................................................78 DELETE....................................................................................................................................................... 81 DOWN.........................................................................................................................................................84 DUPLICAT...................................................................................................................................................86 iii EMSG.......................................................................................................................................................... 88 EXPAND......................................................................................................................................................90 EXTRACT.................................................................................................................................................... 92 FILE.......................................................................................................................................................... 114 FIND......................................................................................................................................................... 122 FINDUP.................................................................................................................................................... 124 FORWARD................................................................................................................................................ 126 GET...........................................................................................................................................................128 HELP (Macro)........................................................................................................................................... 133 HEXTYPE (Macro).................................................................................................................................... 135 INPUT.......................................................................................................................................................137 JOIN (Macro)............................................................................................................................................140 LEFT......................................................................................................................................................... 143 LOAD.........................................................................................................................................................146 LOCATE.....................................................................................................................................................154
Recommended publications
  • Network Printing Guide
    Network Printing Guide Windows 95/98/Me Configuration Windows 2000 Configuration Windows XP Configuration Windows NT 4.0 Configuration NetWare Configuration Macintosh Configuration Appendix For safe and correct use of this machine, please be sure to read the Safety Information in the Operating Instructions that comes with the machine before you use it. Introduction To get maximum versatility from this machine all operators should carefully read and follow the instruc- tions in this manual. Please keep this manual in a handy place near the machine. Important Contents of this manual are subject to change without prior notice. In no event will the company be li- able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper- ating the machine. Software Version Conventions Used in this Manual • NetWare 3.x means NetWare 3.12 and 3.2. • NetWare 4.x means NetWare 4.1, 4.11 and IntranetWare. Trademarks Apple, AppleTalk, EtherTalk, LaserWriter, Macintosh and Mac are registered trademarks of Apple Computer, Inc. Ethernet is a registered trademark of Xerox Corporation. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation in the United States and/or other countries. Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corpora- tion. Novell, NetWare and NDS are registered trademarks of Novell, Inc. PostScript is a registered trademark of Adobe Systems, Incorporated. Sun is a registered trademark of Sun Microsystems, Inc. SunOS is a trademark of Sun Microsystems, Inc. Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
    [Show full text]
  • Arc Hydro Geoprocessing Tools - Tutorial
    Arc Hydro Geoprocessing Tools - Tutorial Version 2.0 – October 2011 ESRI 380 New York St., Redlands, CA 92373-8100, USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Arc Hydro GP Tools v 2.0 – Tutorial Copyright © 2011 Esri All rights reserved. Printed in the United States of America. The information contained in this document is the exclusive property of Esri. This work is protected under United States copyright law and other international copyright treaties and conventions. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, except as expressly permitted in writing by Esri. All requests should be sent to Attention: Contracts Manager, Esri, 380 New York Street, Redlands, CA 92373-8100, USA. The information contained in this document is subject to change without notice. October 2011 i Arc Hydro GP Tools v 2.0 – Tutorial Table of Contents Introduction 5 Objective 5 Loading Arc Hydro Tools Toolbox 5 Accessing the Arc Hydro Geoprocessing Tools Help 7 Arc Hydro Tools Configuration 9 Arc Hydro Setup 10 1. Set Target Locations 10 2. Set Batch Target Locations 13 3. Standard Geoprocessing Configuration 15 Terrain Preprocessing 16 1. Level DEM 17 2. DEM Reconditioning 22 3. Assign Stream Slope 25 4. Burn Stream Slope 27 5. Build Walls 28 6. Sink Prescreening 29 7. Sink Evaluation 29 8. Sink Selection 31 9. Fill Sinks 32 10. Flow Direction 33 11.
    [Show full text]
  • Teach Yourself TCP/IP in 14 Days, Second Edition
    Teach Yourself TCP/IP in 14 Days Second Edition Preface to Second Edition About the Author Overview Introduction 1. Open Systems, Standards, and Protocols 2. TCP/IP and the Internet 3. The Internet Protocol (IP) 4. TCP and UDP 5. Gateway and Routing Protocols 6. Telnet and FTP 7. TCP/IP Configuration and Administration Basics 8. TCP/IP and Networks 9. Setting Up a Sample TCP/IP Network: Servers 10. Setting Up a Sample TCP/IP Network: DOS and Windows Clients 11. Domain Name Service 12. Network File System and Network Information Service 13. Managing and Troubleshooting TCP/IP 14. The Socket Programming Interface Appendix A: Acronyms and Abbreviations Appendix B: Glossary Appendix C: Commands Appendix D: Well-Known Port Numbers Appendix E: RFCs Appendix F: Answers to Quizzes This document was produced using a BETA version of HTML Transit 2 Teach Yourself TCP/IP in 14 Days, Second Edition The second edition of Teach Yourself TCP/IP in 14 Days expands on the very popular first edition, bringing the information up-to-date and adding new topics to complete the coverage of TCP/IP. The book has been reorganized to make reading and learning easier, as well as to provide a more logical approach to the subject. New material in this edition deals with installing, configuring, and testing a TCP/IP network of servers and clients. You will see how to easily set up UNIX, Linux, and Windows NT servers for all popular TCP/IP services, including Telnet, FTP, DNS, NIS, and NFS. On the client side, you will see how to set up DOS, Windows, Windows 95, and WinSock to interact with a server.
    [Show full text]
  • Nhdplus User Guide Page Ii of 115 This Guide Is Intended for Use with the Following Nhdplus Schema Versions
    NNHHDDPPlluuss UUsseerr GGuuiiddee June 1, 2006 THIS PAGE LEFT BLANK INTENTIONALLY 2/3/2006 NHDPlus User Guide Page ii of 115 This guide is intended for use with the following NHDPlus schema versions. NHDPlus Component Schema Version Catchment Grid 01 Catchment Shape 01 Catchment Flowline Attributes 01 Elevation Grid 01 Flow Accumulation & Direction Grids 01 NHD 01 Stream Gage Events 01 2/3/2006 NHDPlus User Guide Page iii of 115 THIS PAGE LEFT BLANK INTENTIONALLY 2/3/2006 NHDPlus User Guide Page iv of 115 Table of Contents Acknowledgments.......................................................................................................................... ix Introduction to NHDPlus ................................................................................................................ 1 Data Package Content and Directory Structure .......................................................................... 3 NHDPlus Schema ....................................................................................................................... 5 Projection Information................................................................................................................ 7 NHDPlus Versioning System ..................................................................................................... 8 Feature Class Descriptions............................................................................................................ 11 Attribute Table Descriptions........................................................................................................
    [Show full text]
  • Rexx Hands-On Lab
    1 2 Welcome to the Introduction to Rexx Hands-on Lab. This lab will cover a series of topics about the Rexx language. At the end of each topic, there will be exercises that use the concepts covered in the charts and text for that topic. The solutions for the exercises are in Appendix A. This is not a graded class or lab so you are free to refer to the solutions if you would like or if you need help with any of the exercises. Also, if you need assistance with any of the lab material or exercises, please raise your hand and someone will come to assist you. 3 These are the exercises that you will be doing today. There are 2 PDF files on your desktop that you might find helpful as you work on the exercises: • REXX Reference will help you with statement syntax and usage • Appendix H is a summary of XEDIT commands that might be helpful when you are writing and updating your Rexx programs 4 This section introduces the Rexx Language and explains how to create and execute Rexx programs on z/VM and TSO systems. It also includes some z/VM hints to help you with today's exercises. 5 REXX is a nickname for Restructured eXtended eXecutor. The Rexx language was designed to be intuitive, easy to read, and easy to follow a program's logic. Rexx programs can be very simple, ranging from personal tools and utilities such as "scripts" of commands that you might run every day to set up your system or run test cases, to very complex programs that might be part of a licensed product.
    [Show full text]
  • Operating Instructions"
    Network Printing Guide 1 Windows Configuration 2 NetWare Configuration 3 Macintosh Configuration 4 Appendix For safety, please read this manual carefully before you use this product and keep it handy for future reference. Introduction To get maximum versatility from this machine all operators should carefully read and follow the instruc- tions in this manual. Please keep this manual in a handy place near the machine. Please read the Safety Information before using this machine. It contains important information related to USER SAFETY and PREVENTING EQUIPMENT PROBLEMS. Important Contents of this manual are subject to change without prior notice. In no event will the company be li- able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper- ating the machine. Software Version Conventions Used in this Manual • NetWare 3.x means NetWare 3.12 and 3.2. • NetWare 4.x means NetWare 4.1, 4.11 and IntranetWare. Trademarks Apple, AppleTalk, EtherTalk, LaserWriter, Macintosh and Mac are registered trademarks of Apple Computer, Inc. Ethernet is a registered trademark of Xerox Corporation. Microsoft®, Windows®, Windows Server®, and Windows Vista® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corporation. Novell, NetWare and NDS are registered trademarks of Novell, Inc. PostScript is a registered trademark of Adobe Systems, Incorporated. Sun is a registered trademark of Sun Microsystems, Inc. SunOS is a trademark of Sun Microsystems, Inc. PCL is a registered trademark of Hewlett-Packard Company. Solaris is a trademark or registered trademark of Sun Microsystems, Inc.
    [Show full text]
  • Using REXX to Build a Front-End User Interface Han-Li Lee, United Illuminating Company
    220 Host Operating Systems Using REXX to Build a Front-end User Interface Han-li Lee, United Illuminating Company present a problem fclo those who do not have any Abstract knowledge or training in SAS language. A user­ This paper presents the UISSP (UI Social Suppon friendly system is thus required. Since back in early Programs) System, a menu-driven reporting system 1986 UI had not installed SAS/AF yet, the author using IBM's REXX (Restructured EXtended eXecu­ then decided to use REXX to build a user-friendly tor) language, base SAS e, and SAS/FSP e (SAS front-end interface. UISSP system, to allow the user version 5.18 under CMS operating system) for the to enter the data and run reports easily. United lliuminating Company, an electric utility company located in New Haven, Connecticut. The Running the UISSP System System uses the REXX to write a front-end user REXX is a general pwpose, high-level language. interface to the SAS System. It creates new files, This interface program is written in a REXX lan­ updates existing files, and produces reports. This guage EXEC, with a filename UISSP and a filetype paper shows the techniques used for building such a EXEC. It contains CP and CMS commands. REXX user-friendly reporting system. It will also compare programs are executed by an interpreter without fiJ'St the use of REXX and SAS/AF ® in building menu­ being translated into another form. This program is driven systems. written under the host system CMS. To stan running the system, the user just types a word "uissp," the Background filename of the EXEC, at the command line.
    [Show full text]
  • Batch Files and Scripts Why Should You Care?
    CS140M Fall 2014 Why Should You Care? • Many easy‐to‐use, helpful little programs Batch Files and Scripts • Psychological satisfaction of not being totally under Windows control • Not for everybody but programming can be fun By Al Lake • Make you better prepared to avoid viruses Fall 2014 LBCC CS140M Fall 2014 CS140M Lake 2 General Program Types Common Scripts • Compiled • Batch files – Written in some coding language and then converted to binary – An old format with new power in XP – Executable that interacts with OS directly • VBScript – Examples of languages are C and Java – Related to visual basic and VBA • • Interpreted JavaScript (also JScript) – Common on Internet – Text files that require an interface – Not related to Java • Much slower but easy to write and edit • Generically called “scripts” • Special files with REG extension – Specifically to edit Registry Fall 2014 CS140M Lake 3 Fall 2014 CS140M Lake 4 What are Scripts Used For? What is a Batch File? • Repetitive operations • A text file with extension BAT containing a – System administration sequence of commands – Automation of common tasks • Interpreter is command.com in DOS/Windows 9x/Me • To carry out a series of operations in one step – Commands are DOS plus some additions for • To help with file management variables and branching • To make Registry changes • Interpreter is cmd.exe in XP – Available commands are more versatile than DOS and are 32‐bit Fall 2014 CS140M Lake 5 Fall 2014 CS140M Lake 6 Lake 1 CS140M Fall 2014 Example of Batch File Del Example Deletes one or more files. DEL [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names • “Cleantmp.bat” ERASE [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names names Specifies a list of one or more files or directories.
    [Show full text]
  • Command Prompt Commands with Syntax and Examples
    Command Prompt Commands With Syntax And Examples Is Chalmers unlatched or resinated when nose-dived some soapworts artificializes decent? Er stoppers dishearteningly if Heraclean Felicio trellis or sags. Basaltic Godard donating incandescently. The following command gives data from experimental channel that a page number of windows directory, and examples of lines for locating the content of Shows status of currently enabled and disabled options. There get some crossover in syntax between reading two platforms as PowerShell will accept. Cmd Line tight To File And Console Massimo Fregnani. Open a file for adding to improve depot. Lists the contents of the directory and all subdirectories recursively. This would require additional syntax elements for huge domain user name and password like this. Oct 02 2020 An confident of this command would history give Carpetfizz 1 64 This. We introduce shutdowns via CMD, which can encourage efficient, enough, but also create complex shutdown routines. A proper approach is where feed redis-cli a shark of commands written receipt a text file. Internal drivers and examples of a quick reference for every object types. Edit command line, recall commands. Command Examples 1Use Foxit Reader which is installed under. The tcp if run instruction has no sql script will see some powerful combination. When you use this option, the command is performed on all files or objects under the specified directory or prefix. Now, you will be able to see the HTML content of the page, similar to the screenshot below. It accepts a switch specifying the number of lines to view. This is where you type commands.
    [Show full text]
  • Real World Z/VSE to Z/OS Migration Experience from a Z/VSE Bigot
    Honesty | Loyalty | Integrity | Quality z/VSE to z/OS Migration Experience From a z/VSE Bigot’s Perspective Tony Thigpen – Senior System Programmer Agenda . Customer Background . Methods . Source Conversion . JCL Conversion . Utility Conversion . Operations Conversion . Data Conversion . Training . Issues that were discovered sooner or later . Discussion . Wrap Up Customer Background . Manufacturer located in Mississippi and North Carolina . Initial Configuration: o Z9 in MS running 4 z/OS LPARs (mix of 1.4 and 1.7) – 160mips o Z10 is NC running 5 VSE/ESA LPARs (1.5) – 70mips o Multiple AS/400s in different locations . First major changes o Both CPUs and some AS/400s were relocated to PZG facilities in FL . Second major changes o 3 of the VSE LPARs were slowly migrated off-platform o 2 VSE LPAR was merged into 1 VSE LPAR o All but one of the AS/400s located in FL were eliminated o All z/OS LPARs upgraded to 1.12 to allow them to run on a Z10 . Resulting Configuration: o Z9 in FL running 4 z/OS LPARs (all 1.12) – 150mips o Z10 in FL running 1 VSE/ESA LPAR (1.5) – 70mips Customer Background . Customer goal to cut costs o An os for each machine from IBM ($$) o Adabas for each machine ($$$) o Similar Third-party software on both machines ($$$) o Maintenance, floor space, HVAC costs ($$) o Operations (staff) costs ($) . Customer was concerned with older VSE/ESA o Out of Service o CICS/VS – CICS/TS conversion . The decision was to take the money budgeted for upgrading the VSE and use it instead to migrate the one remaining VSE LPAR to z/OS o Unpopular with VSE programmers but there were only 3 left.
    [Show full text]
  • Department of Veterans Affairs VA DIRECTIVE 0637 Washington, DC 20420 Transmittal Sheet December 2, 2020
    Department of Veterans Affairs VA DIRECTIVE 0637 Washington, DC 20420 Transmittal Sheet December 2, 2020 VA VEHICLE FLEET MANAGEMENT PROGRAM 1. REASON FOR ISSUE: This directive prescribes and updates the goals, policies, roles and responsibilities, and major requirements for Administration and Staff Office vehicle fleet management and reporting within the Department of Veterans Affairs (VA). 2. SUMMARY OF CONTENTS/MAJOR CHANGES: This directive updates and streamlines principles, policies, responsibilities and other key elements necessary to facilitate the continual improvement of VA’s vehicle fleet management and comply with Federal vehicle fleet management and reporting requirements. This directive: a. Consolidates content from VA Handbook 0637 into VA Directive 0637, largely by transferring specific procedures and resources to the VA Vehicle Fleet Management SharePoint Site. These online procedures have been updated for areas ranging from license plates to accidents to acquisition. b. Reorganizes sections by function for more convenient use by VA fleet managers, with headings such as Fleet Safety, Acquisition, and Fleet Operations. c. Removes references to revoked Executive Orders 13514 and 13423. d. Expands detail for roles and responsibilities in fleet management. The Veterans Integrated Services Networks (VISN) Fleet Manager role is newly specified. e. Updates processes for vehicle donations and vehicle disposals. f. Standardizes utilization across all vehicle types, allowing exemptions from utilization criteria for certain vehicle types. g. Reflects new information on VA Fleet Management Information Systems. h. Updates telematics information, including requiring all vehicles to have telematics if planned to be retained over two years without exception. i. Removes program management requirements, such as the Fleet Management Task Force, Handbook 0637, VA Vehicle Fleet Management Program, and Fleet Management Action Plan.
    [Show full text]
  • Programmable Command Languages for Window Systems Egie
    Programmable Command Languages for Window Systems Rlchard Joel Cohn CMU-CS-88-139 June 1988 _egie Programmable Command Languages for Window Systems Report number CMU-CS-88-139 Copyright © 1988 by Richard Joel Cohn. All rights reserved. This dissertation was submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at Carnegie Mellon University. The research in this dissertation was supported by the Information Technology Center, a joint project of Carnegie Mellon University and International Business Machines Corporation. This dissertation was produced with Scribe. Illustrations were produced with Pic, Troff, and TranScript. Aldus and PageMaker are trademarks of Aldus Corporation. Apple and Macintosh are registered trademarks of Apple Computer, Inc. Clads is a trademark of Clads Corporation. DEC is a trademark of Digital Equipment Corporation. Hypercard is a trademark of Apple Computer, Inc. IBM is a registered trademark of International Business Machines Corporation. MacDraw, MacPaint, and MacWrite are registered trademarks of Clads Corporation. NeWS and Sun-3 are trademarks of Sun Microsystems, Inc. PostScript and TranScript are trademarks of Adobe Systems, Inc. Scribe is a registered trademark of Scribe Systems. SmaUtalk-80is a trademark of Xerox Corporation. Tempo is a trademark of Affinity Microsystems, Ltd. UNIXis a registered trademark of AT&T Bell Laboratories. Abstract Programmable command and macro languages have long served as important tools for users of computer systems. This thesis describes the design and implementation of a general-purpose command language for a window system. This has never been tried be- fore because these systems are new and because the problems inherent in providing a command language for a window system are hard.
    [Show full text]