IBM Flashsystem A9000: Command-Line Interface (CLI) Reference Guide Triggering a Schedule

Total Page:16

File Type:pdf, Size:1020Kb

IBM Flashsystem A9000: Command-Line Interface (CLI) Reference Guide Triggering a Schedule IBM FlashSystem A9000 Version 12.0.3 Command-Line Interface (CLI) Reference Guide IBM SC27-8559-03 Note Before using this document and the product it supports, read the information in “Notices” on page 629. Edition notice Publication number: SC27-8559-03. This publication applies to version 12.0.3 of IBM FlashSystem A9000 and to all subsequent releases and modifications until otherwise indicated in a newer publication. © Copyright IBM Corporation 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this guide ........... ix Removing a volume from its performance class .. 46 Intended audience ............ ix Adding a domain to a performance class .... 47 Conventions used in this guide ........ ix Removing a domain from its performance class .. 48 Related information and publications ...... ix Setting the rate for a performance class ..... 48 IBM Publications Center .......... x Listing host profiles ........... 50 Sending or posting your comments ....... x Updating the host profile .......... 50 Getting information, help, and service ...... x Removing the profile of the specified host .... 51 Enabling the host profiler.......... 52 Chapter 1. Overview of the Disabling the host profiler ......... 52 command-line interface (CLI) ..... 1 Chapter 3. Volume management Overview of the XCLI utility ......... 1 Installing and starting the XCLI ....... 1 commands ............. 55 Exiting an interactive XCLI session ...... 3 Clearing reservations of a volume ....... 55 Using the CLI .............. 3 Listing reservation keys .......... 55 Interactive and basic modes ........ 4 Listing volume reservations ......... 56 Understanding the command syntax ..... 5 Copying volumes ............ 57 Using identification parameters ....... 7 Creating a volume ............ 60 Display options ............ 10 Deleting a volume ............ 62 Running commands in batch mode ..... 13 Formatting a volume ........... 64 Displaying CLI help and the XCLI utility version 14 Listing volumes ............. 65 Listing a volume's extended attributes ..... 67 Chapter 2. Host and cluster Locking a volume ............ 68 management commands ....... 15 Renaming a volume ........... 70 Resizing a volume ............ 71 Adding a host to a cluster ......... 15 Unlocking a volume ........... 73 Creating a cluster ............ 16 Deleting clusters............. 17 Chapter 4. Volume snapshot Listing clusters ............. 18 Removing a host from a cluster........ 19 management commands ....... 77 Renaming clusters ............ 20 Changing a snapshot deletion priority ..... 77 Adding a port to a host .......... 20 Creating a snapshot ........... 78 Defining a new host ........... 22 Deleting a snapshot ........... 81 Deleting a host ............. 23 Duplicating a snapshot .......... 83 Listing hosts .............. 24 Formatting a snapshot ........... 84 Listing ports .............. 25 Listing snapshot information ........ 86 Removing a port from a host ........ 26 Restoring a volume from a snapshot ...... 87 Renaming a host............. 27 Updating a host definition ......... 28 Chapter 5. Consistency group Mapping a volume to a host or cluster ..... 30 management commands ....... 91 Listing the mapping of volumes to hosts or clusters 32 Adding a volume to a consistency group .... 91 Setting the special type of hosts or clusters .... 33 Creating consistency groups ......... 93 Listing hosts/clusters to which a volume is mapped 34 Deleting a consistency group ........ 94 Unmapping a volume from a host or cluster ... 35 Listing consistency groups ......... 96 Setting the default idle time before unmapping a Removing a volume from a consistency group... 97 volume ................ 37 Renaming a consistency group ........ 98 Retrieving the default idle time before unmapping a Suspending I/O execution on a consistency group 99 volume ................ 37 Resuming I/O execution ......... 101 Creating a performance class ........ 38 Listing the status of consistency groups with Deleting a performance class ........ 38 paused I/O .............. 102 Renaming a performance class ........ 40 Creating a cross-system consistency group.... 103 Listing details of performance classes...... 40 Associating an existing consistency group with a Adding a host to a performance class...... 41 cross-system consistency group definition .... 104 Removing a host from its performance class ... 42 Removing a consistency group from a cross-system Adding a pool to a performance class ..... 43 consistency group ............ 105 Removing a pool from its performance class ... 44 Adding a volume to a performance class .... 45 © Copyright IBM Corp. 2017 iii Adding a remote system name to a cross-system Setting the time zone ........... 163 consistency group definition ........ 106 Printing the current system version ...... 164 Removing a remote system from a cross-system Displaying the values of VPD parameters .... 164 consistency group ............ 107 Setting VPD parameters .......... 165 Listing cross-system consistency group definitions 108 Displaying the system's MIB file ....... 167 Retrieving remote systems in a specified Retrieving the electronic license acceptance status 168 cross-system consistency group ....... 109 Retrieving a fragment of the electronic license file 169 Deleting a cross-system consistency group.... 110 Accepting the electronic license agreement ... 170 Listing cross-system consistency group definitions 110 Enabling command auditing ........ 170 Disabling command auditing ........ 171 Chapter 6. Snapshot set management Displaying the command audit state...... 172 commands ............ 113 Configuring audit servers ......... 172 Checking the command audit state ...... 173 Snapshotting a consistency group....... 113 Enabling CIM service........... 174 Changing a snapshot group deletion priority ... 116 Disabling the CIM service ......... 175 Deleting a snapshot group ......... 117 Displaying the CIM service state ....... 175 Disbanding a snapshot group ........ 118 Duplicating a snapshot group ........ 119 Formatting a snapshot group ........ 121 Chapter 9. Remote target connectivity Listing snapshot groups .......... 122 commands ............ 177 Locking a snapshot group ......... 123 Setting the threshold of a link disruption duration Renaming a snapshot group ........ 124 that triggers an event........... 177 Restoring a consistency group from a snapshot Updating the target's mirroring configuration .. 178 group ................ 125 Activating connectivity to a remote target .... 179 Unlocking a snapshot group ........ 127 Deactivating connectivity to a remote target ... 180 Setting a snapshot group descriptor ...... 128 Defining connectivity to a remote target .... 181 Returning a snapshot group's descriptor .... 129 Deleting connectivity to a remote target .... 183 Listing target connectivity definitions ..... 184 Chapter 7. Storage pool management Defining a remote target.......... 185 commands ............ 131 Deleting a remote target .......... 187 Listing remote targets .......... 187 Moving a consistency group between storage pools 131 Allowing remote mirroring access ...... 188 Changing the pool limitation, performance class, or Activating a port ............ 189 threshold parameters ........... 133 Adding a new port to a remote target ..... 190 Changing pool settings for snapshots ..... 135 Deactivating a port ........... 191 Creating storage pools .......... 136 Deleting a port from a remote system ..... 193 Deleting a storage pool .......... 138 Listing the ports of a remote target ...... 194 Listing storage pools ........... 139 Renaming a remote target ......... 194 Renaming a storage pool ......... 141 Updating the target configuration ...... 195 Resizing a storage pool .......... 142 Moving a volume between storage pools .... 143 Chapter 10. Remote mirroring Chapter 8. System management commands ............ 197 commands ............ 147 Canceling a snapshot mirror (ad hoc sync job) .. 197 Creating a snapshot mirror (ad hoc sync job) ... 199 Displaying the values of configuration parameters 147 Activating mirroring ........... 204 Setting configuration parameters ....... 148 Changing the RPO for local or remote system .. 206 Testing the DNS ............ 150 Changing the designation of mirroring peers ... 208 Displaying help ............ 151 Changing the mirroring schedule for remote slave Displaying the current maintenance urgency ... 152 peers ................ 210 Shutting down the system ......... 152 Changing the roles of a mirrored volume .... 212 Listing the operational state ........ 154 Changing a mirroring schedule for local peers .. 215 Displaying system usage and data reduction Creating a mirroring definition ....... 217 statistics ............... 154 Deactivating mirroring .......... 223 Displaying information about effective and Deleting a remote mirroring definition ..... 225 physical capacity ............ 155 Viewing the mirroring status ........ 227 Displaying information about effective capacity 157 Obtaining statistics on past sync jobs ..... 230 Displaying system capacity thresholds ..... 157 Switching roles between master and slave .... 232 Changing a system capacity threshold ..... 159 Retrieving RPO thresholds ......... 234 Resuming the system's normal operation .... 160 Setting an RPO threshold ......... 235 Displaying the current time ........ 161 Changing the interval of a schedule ...... 236 Setting the system's time ......... 161 Creating a schedule
Recommended publications
  • Volatility: Part 2 – Malware in Hiberfil.Sys
    Patrick Leahy Center for Digital Investigation (LCDI) Volatility: Part 2 – Malware in hiberfil.sys Written by Dan Doonan and Catherine Stamm Researched by Dan Doonan, Connor Hicks, David Leberfinger, and Catherine Stamm The Senator Patrick Leahy Center for Digital Investigation Champlain College December 4, 2012 Version: 0.1 – Volatility: – Review Date: 12/4/2012 Page 1 of 6 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents 1 Introduction ................................................................................................................................3 1.1 Background .........................................................................................................................3 1.2 Research Questions ..............................................................................................................3
    [Show full text]
  • Networker Jukebox Control Command Nsrjb
    Maintenance Procedures NSRJB ( 8 ) NAME nsrjb − NetWorker jukebox control command SYNOPSIS nsrjb [ −C ][−j name ][−s server ][−v ][−f device ][−S slots | −T Ta gs | volume names ] nsrjb −L [ −j name ][−s server ][−gimnqvG ][−Y | −N ][−R | −B ][−b pool ][−f device | −J hostname ][−e forev er ][−c capacity ][−o mode ][−S slots | −T tags | volume names ] nsrjb −l [ −j name ][−s server ][−nvqrG ][−R [ −b pool ]][−f device | −J hostname ][−S slot | −T tags | volume names ] nsrjb −u [ −j name ][−s server ][−qv ][−f device ][−S slot | −T tags | volume names ] nsrjb −I [ −j name ][−s server ][−Evpq ][−I | −f device ][−S slots | −T tags | volume_names ] nsrjb −p [ −j name ][−s server ][−vq ][−f device ][−S slot | −T tag | volume name ] nsrjb −o mode [ −j name ][−s server ][−Y ][−S slots | −T tags | volume names ] nsrjb −H [ −j name ][−s server ][−EHvp ] nsrjb −h [ −j name ][−s server ][−v ] nsrjb −U uses [ −j name ][−s server ][−S slots | −T tags ] nsrjb −V [ −j name ][−s server ] nsrjb −d [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots ][−T tags ][volume names ] nsrjb −w [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots | −T tags | volume names ] nsrjb −a [ −j name ][−s server ][−vd ][−T tags |[−T tags ] volume names ] nsrjb −x [ −j name ][−s server ][−vwX ][−T tags | −S slots ] nsrjb −F [ −j name ][−s server ][−v ] −f device DESCRIPTION The nsrjb program manages resources in two broad classes of jukeboxes, remotely managed jukeboxes and locally managed jukeboxes. Remotely managed jukeboxes are controlled through an external agent.
    [Show full text]
  • S.Ha.R.K. Installation Howto Tools Knoppix Live CD Linux Fdisk HD
    S.Ha.R.K. Installation Tools HowTo • Linux fdisk utility • A copy of Linux installation CD • A copy of Windows® installation CD Tullio Facchinetti University of Pavia - Italy • Some FreeDOS utilities • A copy of S.Ha.R.K. S.Ha.R.K. Workshop S.Ha.R.K. Workshop Knoppix live CD Linux fdisk Command action a toggle a bootable flag Download ISO from b edit bsd disklabel c toggle the dos compatibility flag d delete a partition http://www.knoppix.org l list known partition types m print this menu n add a new partition o create a new empty DOS partition table p print the partition table q quit without saving changes • boot from CD s create a new empty Sun disklabel t change a partition's system id • open a command shell u change display/entry units v verify the partition table • type “su” (become root ), password is empty w write table to disk and exit x extra functionality (experts only) • start fdisk (ex. fdisk /dev/hda ) Command (m for help): S.Ha.R.K. Workshop S.Ha.R.K. Workshop HD partitioning HD partitioning 1st FreeDOS FAT32 FreeDOS must be installed Primary 2nd Windows® FAT32 into the first partition of your HD or it may not boot 3rd Linux / extX Data 1 FAT32 format data partitions as ... Extended FAT32, so that you can share Data n FAT32 your data between Linux, last Linux swap swap Windows® and FreeDOS S.Ha.R.K. Workshop S.Ha.R.K. Workshop 1 HD partitioning Windows ® installation FAT32 Windows® partition type Install Windows®..
    [Show full text]
  • Command Control Interface Command Reference
    Command Control Interface Command Reference Hitachi Virtual Storage Platform G1000 Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS Contents Product Version Getting Help MK-90RD7009-19 © 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries.
    [Show full text]
  • Virtual Machine Part II: Program Control
    Virtual Machine Part II: Program Control Building a Modern Computer From First Principles www.nand2tetris.org Elements of Computing Systems, Nisan & Schocken, MIT Press, www.nand2tetris.org , Chapter 8: Virtual Machine, Part II slide 1 Where we are at: Human Abstract design Software abstract interface Thought Chapters 9, 12 hierarchy H.L. Language Compiler & abstract interface Chapters 10 - 11 Operating Sys. Virtual VM Translator abstract interface Machine Chapters 7 - 8 Assembly Language Assembler Chapter 6 abstract interface Computer Machine Architecture abstract interface Language Chapters 4 - 5 Hardware Gate Logic abstract interface Platform Chapters 1 - 3 Electrical Chips & Engineering Hardware Physics hierarchy Logic Gates Elements of Computing Systems, Nisan & Schocken, MIT Press, www.nand2tetris.org , Chapter 8: Virtual Machine, Part II slide 2 The VM language Goal: Complete the specification and implementation of the VM model and language Arithmetic / Boolean commands Program flow commands add label (declaration) sub goto (label) neg eq if-goto (label) gt previous this lecture lecture lt Function calling commands and or function (declaration) not call (a function) Memory access commands pop x (pop into x, which is a variable) return (from a function) push y (y being a variable or a constant) Method: (a) specify the abstraction (model’s constructs and commands) (b) propose how to implement it over the Hack platform. Elements of Computing Systems, Nisan & Schocken, MIT Press, www.nand2tetris.org , Chapter 8: Virtual Machine, Part
    [Show full text]
  • U.S. EPA, Pesticide Product Label, COMMAND 4E HERBICIDE, 09/02
    Don carlson, Ph.D. FMC corporation Agricultural Chemical Group 1735 Market street Philadelphia, PA 1910 3 Dear Dr. Carlson: Subject: Camand 4 EC Herbi,lde EPA Reg. No. 279-30~1 RE: Amended Labeling (tillage/nQ-tillage directions) Your Submission Dated August 13, 1992 ~he labeling refprred to above, submitted in connection with registration under the Federal Insecticide, Fungicide, and Rodenticide Act, as amended, is acceptable. A stamped copy is enclosed for your records. Sincerely yours, Robert J. Taylor Product I'anager (25) Fungicide-Herbicide Branch Registration Division (H7505C) CONCURRENCES SYMBOL;: l/7.)~.$P" ............... ... .................. ................. ................. ................................................... ::N£AM~, '%f:1; .... ........................................................................................................................ OFFICIAL FILE COPY _ i2 a a all a an a. .a $A 4SQS4 4t P ) ) Code 1139 Net Contents Command®4 E Herbicide For Agricultural or Commercial Use Only NOT FOR SALE OR USE IN CAUFORNIA EPA Reg. No. 279-3071 EPA Est. 279- Active Ingredient: By Wt. Clomazone: 2-(2-Chlorophenyl)methyl-4. 4-dimethyl-3-isoxazolidinone •...........••••..... 44.4% Inert Ingredients: .........•..............•......... 55.6% 100.0% Contains 4 pounds 01 active ingredient per gallon U.S. Patent No. 4.405,357 KEEP OUT OF REACH OF CHILDREN CAUTION FIRST AID " In SyH: Flush with plenty 0/ water. Get medical attention as AtlL.C OF CONTENTS 'Ossible. ' aI inlormations an pages 1-4 belore referring 10 specific ; swallowed: Drink prompUy large quatltities 01 crop use. alcohol. Do nol ind~'C8 vomiting. cau a physician, " Inh8led: Remove to fresh air. " Page lion. prelerably mouth·to-mouth.·. possible. ~~.::::::::::::::::::::::::::::::::::::::::::::: 1 Precautionary Statements ............................ ... 1 " on akin: Wash Skin Diredions lor Use ....................................... 1 allention. ~ and ~ ...............•.......•.......•... 2 For Emergency f!prayer CIeanuo ......................................
    [Show full text]
  • Application Note 007 at Command Reference Guide - ETH-M-LORA-AX
    Application Note 007 AT Command Reference Guide - ETH-M-LORA-AX Legal Notices: AT Command Reference Guide for Ethertronics LoRa modules ETH-M-LORA-AX Copyright © 2016 – 2017 by Ethertronics Inc. All rights reserved. The information presented in this document does not form part of any contract and may be changed without notice. No liability will be accepted by Ethertronics for any consequence of its use, and Ethertronics assumes no responsibility or liability whatsoever for any failure or unexpected operation resulting from using the information in this document. Table of Contents Preface .............................................................................. 1 AT+LORA@IM#RESET .................................................. 24 Definitions ....................................................................... 1 AT+LORA@IM#RUNDEBUG ............................................ 25 AT Command Line Syntax ..................................................... 1 AT+LORA@IM%THR ..................................................... 25 AT command prefix ........................................................ 1 AT+LORA@IM%RESULT ................................................. 26 Prefix extension ............................................................ 1 AT+LORA@IM%VERSION ............................................... 26 AT command body ......................................................... 1 AT+LORA@IM%CTRLFLAG ............................................. 27 Module name ..............................................................
    [Show full text]
  • Weed Control Guide for Ohio, Indiana and Illinois
    Pub# WS16 / Bulletin 789 / IL15 OHIO STATE UNIVERSITY EXTENSION Tables Table 1. Weed Response to “Burndown” Herbicides .............................................................................................19 Table 2. Application Intervals for Early Preplant Herbicides ............................................................................... 20 Table 3. Weed Response to Preplant/Preemergence Herbicides in Corn—Grasses ....................................30 WEED Table 4. Weed Response to Preplant/Preemergence Herbicides in Corn—Broadleaf Weeds ....................31 Table 5. Weed Response to Postemergence Herbicides in Corn—Grasses ...................................................32 Table 6. Weed Response to Postemergence Herbicides in Corn—Broadleaf Weeds ..................................33 2015 CONTROL Table 7. Grazing and Forage (Silage, Hay, etc.) Intervals for Herbicide-Treated Corn ................................. 66 OHIO, INDIANA Table 8. Rainfast Intervals, Spray Additives, and Maximum Crop Size for Postemergence Corn Herbicides .........................................................................................................................................................68 AND ILLINOIS Table 9. Herbicides Labeled for Use on Field Corn, Seed Corn, Popcorn, and Sweet Corn ..................... 69 GUIDE Table 10. Herbicide and Soil Insecticide Use Precautions ......................................................................................71 Table 11. Weed Response to Herbicides in Popcorn and Sweet Corn—Grasses
    [Show full text]
  • Patching DOS 5 and up for the Pcjr
    Patching DOS 5 and up for the PCjr November 29th, 2020 [email protected] Background Patching DOS 5+ Theory of operation Preparing a DOS 5 disk Patching the DOS 5+ disk Create FORMATJR.COM Hard drive installation Fdisk and create a DOS partition Format the hard drive partition Appendix A - Wiping out a boot sector Background The PCjr shipped in 1983 in two configurations: a 64KB machine with no floppy disk drive or a 128KB machine with a single floppy disk drive. The architecture of the machine has the video buffer “borrow” memory from the main memory of the machine. With the standard 16KB video buffer this makes the available RAM either 48KB or 112KB. IBM never offered a hard drive solution. Adding extra memory to a PCjr became possible, but it required a device driver to be loaded at boot time. Microsoft, Tecmar, and other vendors provided device drivers with their memory expansions. The best of the device drivers was a shareware program called jrConfig written by Larry Newcomb. jrConfig can be downloaded from http://www.brutman.com/PCjr/pcjr_downloads.html. The original version of DOS that shipped with the PCjr was PC DOS 2.1. DOS versions 2.1 through 3.3 work on the machine as is. To run DOS 5 or later two things are required: ● Extra memory is required. While extra memory is useful for DOS 2.1 - 3.3, DOS 5 won’t even boot on a small system. I BM formally states the requirement is 512KB and the PCjr is not supported. ● DOS 5 can be patched to work on a PCjr even though it is not supported.
    [Show full text]
  • Cheatsheet V2.4.Pdf
    ! ! 2.4!Edition! Cross!reference!processes!with!various!lists:! Scan!a!block!of!code!in!process!or!kernel!memory! psxview! for!imported!APIs:! ! impscan!! Show!processes!in!parent/child!tree:! !!!!Hp/HHpid=PID!!!!!!!!!Process!ID!! pstree! !!!!Hb/HHbase=BASE!!!Base!address!to!scan! & !!!!Hs/HHsize=SIZE!!!!!!!Size!to!scan!from!start!of!base! Process&Information& ! ! Logs&/&Histories& Specify!–o/HHoffset=OFFSET!or!Hp/HHpid=1,2,3!! ! ! Recover!event!logs!(XP/2003):! Display!DLLs:! evtlogs!! ! ! dlllist! !!!!HS/HHsaveHevt!!!!!!!!!!!!!!!!!!!!Save!raw!event!logs! Development!build!and!wiki:! ! !!!!HD/HHdumpHdir=PATH!!!Write!to!this!directory! github.com/volatilityfoundation!! Show!command!line!arguments:! ! ! cmdline! Recover!command!history:! Download!a!stable!release:! ! cmdscan!and!consoles!! volatilityfoundation.org!! Display!details!on!VAD!allocations:! ! ! vadinfo![HHaddr]! Recover!IE!cache/Internet!history:! Read!the!book:! ! iehistory!! artofmemoryforensics.com! Dump!allocations!to!individual!files:! ! ! vaddump!HHdumpHdir=PATH![HHbase]! Show!running!services:! Development!Team!Blog:! ! svcscan!! http://volatilityHlabs.blogspot.com!! Dump!all!valid!pages!to!a!single!file:! !!!!Hv/HHverbose!!!!Show!ServiceDll!from!registry! ! memdump!HHdumpHdir=PATH! ! (Official)!Training!Contact:! ! Networking&Information& Display!open!handles:! [email protected]!! ! handles!! ! Active!info!(XP/2003):! !!!!Ht/HHobjectHtype=TYPE!!!Mutant,!File,!Key,!etc…! Follow:!@volatility! connections!and!sockets!! !!!!Hs/HHsilent!!!!!!!!!!!!!!!!!!!!!!!!!!!Hide!unnamed!handles!
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • Keypad and Troubleshooting Under MS-DOS Read Through All Steps Before Beginning
    Keypad and troubleshooting under MS-DOS Read through all steps before beginning. Steps below are specific for COM port 1 and COM port 2 configurations. FIRST, some steps to set the environment into a known working state that we'll work from: 1. Remove all other connected devices from the notebook 2. Disconnect any other attached devices including the IO bar from the notebook 3. Run a virus checker on your notebook 4. If possible complete a back up of at least your data before proceeding (not necessary just a common step of cautionary troubleshooting) As the Toshiba notebook restarts get into the BIOS settings. The steps below will ensure that your serial port is enabled and configured for COM1 (3F8H / IRQ 4) in the BIOS. For Non-Toshiba notebooks, please refer to your notebook user's guide on enabling and configuring your COM ports. 1. Press and Hold ESC right after the notebook completes the shutdown from above. 2. You'll get a Check system. Then Press [F1] key. 3. Press F1 key 4. Locate the Serial Port setup information (on many notebooks, you'll need to press the PgDn key to get to a second page). 5. Make sure the Serial Port is enabled and configured for COM1. 6. Press [END] key to save any changes you made and restart the notebook. Perform a clean boot to troubleshoot a possible hardware conflict. Follow the appropriate section below to boot clean (without any Autoexec.bat or config.sys files) For Windows 98 Restart the computer system. After the system has completed its BIOS check, (just before the Windows 98 logo screen) press and hold the CONTROL key (Ctrl) until the "Windows 98 Startup Menu" appears.
    [Show full text]