Equity Iie User’S Guide

Total Page:16

File Type:pdf, Size:1020Kb

Equity Iie User’S Guide Reader Comment Card Equity IIe User’s Guide Please use this card to evaluate this manual. Your comments and suggestions will help us improve our publications. Please rate the following: Excellent Good Fair Poor W Organization of this manual Ll cl cl ci n Technical accuracy 0 Ll cl u W Completeness of instructions 0 cl cl cl W Clarity of concepts and wording Li Ll cl cl W Quality of examples and pictures Li cl cl Ll W Quantity of examples and pictures Ll Ll Ll Ll Comments : Name: Title: Company: Address: City: Please tear out and mail in. Thank you! EPSON PLACE STAMP HERE EPSON America, Inc. 2780 Lomita Blvd. Torrance, CA 90505 MS 4-1 Fold Here - - _ - - _ - _ _ _ _ _ _ _ _ - _ - _ - _ _ _ Tape Here. Do Not Staple .L EPSON® EQUITY™IIe User’s Guide Y18699100101 IMPORTANTNOTICE DISCLAIMER OF WARRANTY Epson America makes no representations or warranties, either express or implied, by or with respect to anything in this manual, and shall not be liable for any implied warranties of merchantability and fitness for a particular purpose or for any indirect, special, or consequential damages. Some states do not allow the exclusion of incidental or consequential damages, so this exclusion may not apply to you. COPYRIGHTNOTICE All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Epson America, Inc. No patent liability is assumed with respect to the use of information contained herein. While every precaution has been taken in the preparation of this publication, Epson America assumes no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Further, this publication and features described herein are subject to change without notice. TRADEMARKS Epson is a registered trademark of Seiko Epson Corporation. Equity is a trademark of Epson America, Inc. Centronics is a registered trademark of Centronics Data Corporation. Hercules is a registered trademark of Hercules Computer Technology Corporation. IBM is a registered trademark and AT and XT are trademarks of International Business Machines Corporation. Intel is a registered trademark of Intel Corporation. Lotus and 1-2-3 are registered trademarks of Lotus Development Corporation. Microsoft, MS-DOS, and MS are registered trademarks of Microsoft Corporation. Rampage Plus is a registered trademark of AST Research, Inc. Copyright 0 1989 by Epson America, Inc. Torrance, California ii IMPORTANT SAFETY INSTRUCTIONS 1. Read all of these instructions and save them for later reference. 2. Follow all warnings and instructions marked on the product. 3. Unplug this product from the wall outlet before cleaning. Do not use liquid cleaners or aerosol cleaners. Use a damp cloth for cleaning. 4. Do not use this product near water. 5. Do not place this product on an unstable cart, stand, or table. The product may fall, causing serious damage to the product. 6. Slots and openings in the cabinet and the back or bottom are provided for ventilation; to ensure reliable operation of the product and to protect it from overheating, these openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug, or other similar surface. This product should never be placed near or over a radiator or heat register. This product should not be placed in a built in installation unless proper ventilation is provided. 7. This product should be operated from the type of power source indicated on the marking label. If you are not sure of the type of power available, consult your dealer or local power company. 8. This product is equipped with a 3-wire grounding-type plug, a plug having a third (grounding) pin. This plug will only fit into a grounding type power outlet. This is a safety feature. If you are unable to insert the plug into the outlet, contact your electrician to replace your obsolete outlet. Do not defeat the purpose of the grounding type plug. 9. Do not locate this product where the cord will be walked on. 10. If an extension cord is used with this product, make sure that the total of the ampere ratings on the products plugged into the ex- tension cord do not exceed the extension cord ampere rating. Also, make sure that the total of all products plugged into the wall outlet does not exceed 15 amperes. 11. Never push objects of any kind into this product through cabinet slots, as they may touch dangerous voltage points or short out parts that could result in a risk of fire or electric shock. Never spill liquid of any kind on the product. 12. Except as specifically explained in the User’s Manual, do not attempt to service this product yourself. Opening or removing those covers that are marked “DO Not Remove” may expose you to dangerous voltage points or other risks. Refer all servicing in those compartments to service personnel. 13. Unplug this product from the wall outlet and refer servicing to qualified service personnel under the following conditions: A. When the power cord or plug is damaged or frayed. B. If liquid has been spilled into the product. C. If the product has been exposed to rain or water. D. If the product does not operate normally when the operating instructions are followed. Adjust only those controls that are covered by the operating instructions, since improper adjustment of other controls may result in damage and will often require extensive work by a qualified technician to restore the product to normal operation. E. If the product has been dropped or the cabinet has been damaged. F. If the product exhibits a distinct change in performance, indicating a need for service. Contents Introduction How to Use This Manual ..................... 2 Where to Get Help .......................... 4 Chapter 1 Setting Up Your System 1 Unpacking ...............................1-1 Removing the Diskette Drive Protector Card . 1-3 2 Choosing a Location. ......................1-4 3 Connecting a Monitor ..................... 1-5 4 Connecting a Printer or Other Device. ........1-8 Using the Parallel Interface ...............1-8 Using the Serial Interface. ................1-11 Using the Mouse Connector ..............1-12 5 Connecting the Power Cord. ................1-13 6 Connecting the Keyboard. ..................1-14 7 Turning On the Computer. .................1-16 Chapter 2 Running the Setup Program Starting the Setup Program. 2-2 Continuing From an Error Message . 2-3 Moving the Cursor Block . 2-5 Setting the Memory Configuration . 2-5 Changing the On-board Memory Setting . 2-7 Setting Extended Memory on a Memory Card . 2-8 Saving Your Memory Configuration Settings . 2-9 iii Setting the Display Adapter Card Type . .. 2-9 Setting the Power-on Password. 2-11 Setting the Auto Speed Function. .. 2-14 Changing the Math Coprocessor Setting . .. 2-15 Setting the Real-time Clock. .. 2-16 Setting the Hard Disk Drive Configuration . 2-19 Setting the Diskette Drive Type(s) . .. 2-23 Setting the Serial and Parallel Interfaces . .. 2-25 Reviewing Your Settings . 2-26 Leaving the Setup Menu. 2-29 Chapter 3 Using the Equity IIe Installing MS-DOS ....................... 3-1 Using a Power-on Password ................ 3-2 Changing a Power-on Password ......... 3-3 Deleting a Power-on Password .......... 3-4 Selecting the Operating Speed .............. 3-5 Special Keys on the Equity IIe Keyboard ...... 3-6 Stopping a Command or Program ........... 3-8 Resetting the Computer ................... 3-8 Using Disks and Disk Drives. ............... 3-9 How Disks Store Data ................ 3-10 Types of Diskette Drives. .............. 3-12 Caring for Diskettes and Diskette Drives,. 3-15 Inserting and Removing Diskettes ....... 3-16 Write-protecting Diskettes. ............ 3-18 Making Backup Copies. ............... 3-20 Using a Single Diskette Drive .......... 3-21 Using Two Diskette Drives ............ 3-22 Using a Hard Disk Drive .............. 3-22 Turning Off the Computer ................. 3-25 iv Chapter 4 Using MS-DOS with Your Equity IIe Starting and Exiting MS-DOS ......................... 4-2 Using Drive Designators .............................. 4-3 The Current Drive .............................. 4-4 Types of MS-DOS Commands ......................... 4-5 Entering an MS-DOS Command ....................... 4-7 Setting the Date and Time ............................ 4-8 Creating and Managing Files .......................... 4-9 Naming Files ................................... 4-9 Copying Files .................................. 4-11 Renaming Files ................................. 4-14 Deleting Files .................................. 4-15 Printing Text Files .............................. 4-16 Using Directories. ................................... 4-16 The Current Directory ........................... 4-19 Changing the Current Directory ................... 4-19 Using Pathnames ............................... 4-20 Including Filenames With Pathnames ............... 4-21 Including Drive Letters With Pathnames and Filenames.. ................................ 4-21 Creating Directories ............................. 4-23 Listing the Contents of a Directory ................. 4-23 Displaying a List of Directories .................... 4-25 Removing Directories. ........................... 4-27 Formatting Diskettes ................................. 4-27 Formatting Diskettes With a Hard Disk ............. 4-28 Formatting
Recommended publications
  • PGP Desktop for Mac OS X Quick Start Guide Version 10.0
    PGP Desktop for Mac OS X Quick Start Guide Version 10.0 In addition, use PGP Desktop to: What is PGP Desktop? y Use part of your hard drive space as an encrypted virtual disk volume with its own drive letter. PGP Desktop provides comprehensive security for desktops Create protected Zip archives. and laptops, making it possible for enterprises, workgroups, y and individuals to protect sensitive information without y Completely destroy files and folders so that nothing can changing the existing IT infrastructure or disrupting work recover them. processes. This award winning, easy-to-use solution encrypts email, files, virtual volumes, and entire disks from a single New to PGP Desktop? desktop application. Use this step-by-step guide to get started. You will find that, The PGP Desktop family of applications have been combined with PGP Desktop, protecting your data will be as easy as into several bundles. turning a key in a lock. y PGP Desktop Professional includes PGP Desktop Email y This Quick Start Guide helps you install PGP Desktop and and PGP Whole Disk Encryption get started. y PGP Whole Disk Encryption includes PGP Whole Disk y The PGP Desktop User’s Guide provides more detailed Encryption information on PGP Desktop. In it, you will learn what a keypair is, why you might want to create one, how to create one, and how to exchange keys with others so you can encrypt your own data and share data securely with Contents others. y What is PGP Desktop? (page 1) Note: A PGP Desktop license provides you with access to y New to PGP Desktop? (page 1) a certain set of PGP Desktop features.
    [Show full text]
  • TRSDOS 6.2 to LS-DOS 6.3.0 Manual Update
    LS-DOSÔ 6.3 UPDATE FOR TRSDOSâ 6.2.X The LS-DOS 6.3 release is an upgrade for the TRSDOS 6.2 operating system. Several important changes have been made to extend and enhance the operating system and its utilities. The date ranging has been expanded to accept dates through the year 1999. Files will now carry a modification time as well as a date. The DATECONV/CMD program is provided to translate version 6.2 or earlier disks to the 6.3 style dating. The user password has been eliminated from the system. The owner password still remains. The library command ID was added to display a customer service number. Several enhancements have been made to BASIC. The new DISKCOPY/CMD program will duplicate 5" double density floppy disks. Because the LS-DOS 6.3 update is a series of enhancements to TRSDOS 6.2, the primary documentation remains the 6.2 manual and Technical Reference manual. If you have a version of TRSDOS earlier than 6.2, you can obtain the manuals from Radio Shack under the catalog numbers 26-0316 (TRSDOS Version 6 [6.2 DOS manual and disk]), 26-2110 (Model 4/4D [6.2] Technical Reference Manual), or 26-1117 (6.2 DOS manual only). This documentation should be treated as an addendum to the TRSDOS 6.2 information. LS-DOS 6.3 installation instructions Before performing the upgrade, it is recommended that you make several backup copies of the 6.3 master disk. The simplest way to do this is to boot your system using the 6.3 diskette, insert a blank diskette to receive the copy in drive 1, and type the command: DISKCOPY :0 :1 When the copy finishes, you can insert another destination diskette and make another copy.
    [Show full text]
  • Instructions for Adept Utility Programs
    Instructions for Adept Utility Programs Version 12.1 ¨ Adept Utility Disk For use with V+ 12.1 (Edit D & Later) FLIST README.TXT for program information General-Purpose Utility Programs Robot/Motion Utility Programs AdeptVision Utility Programs Network Utility Programs AdeptModules SPEC Data 1984-1997 by Adept Technology, Inc. Instructions for Adept Utility Programs Version 12.1 ¨ Adept Utility Disk For use with V+ 12.1 (Edit D & Later) FLIST README.TXT for program information General-Purpose Utility Programs Robot/Motion Utility Programs AdeptVision Utility Programs Network Utility Programs AdeptModules SPEC Data 1984-1997 by Adept Technology, Inc. Part # 00962-01000, Rev. A September, 1997 ® 150 Rose Orchard Way • San Jose, CA 95134 • USA • Phone (408) 432-0888 • Fax (408) 432-8707 Otto-Hahn-Strasse 23 • 44227 Dortmund • Germany • Phone (49) 231.75.89.40 • Fax(49) 231.75.89.450 adept 41, rue du Saule Trapu • 91300 • Massy • France • Phone (33) 1.69.19.16.16 • Fax (33) 1.69.32.04.62 te c hnology, inc. 1-2, Aza Nakahara Mitsuya-Cho • Toyohashi, Aichi-Ken • 441-31 • Japan • (81) 532.65.2391 • Fax (81) 532.65.2390 The information contained herein is the property of Adept Technology, Inc., and shall not be reproduced in whole or in part without prior written approval of Adept Technology, Inc. The information herein is subject to change without notice and should not be construed as a commitment by Adept Technology, Inc. This manual is periodically reviewed and revised. Adept Technology, Inc., assumes no responsibility for any errors or omissions in this document.
    [Show full text]
  • Older Operating Systems
    Older Operating Systems Class Notes # 10 Batch Files (Part 2) October 23, 2003 IF Condition When a given condition is true, the statement is executed. When the given condition is false, the statement is not executed. Figure one illustrates the flow chart for the IF condition. IF entry point No Decision Yes Statement (perform some action) IF exit point Figure 1: IF condition flow chart The IF condition tests the following three conditions: • The ERRORLEVEL of a program • Whether a string is equal to another string • Whether a file exists Using IF to test ERRORLEVEL The syntax for testing the ERRORLEVEL is: IF ERRORLEVEL number command This form of the IF condition determines whether the value of ERRORLEVEL is greater than or equal to a number specified in the number parameter. IF NOT ERRORLEVEL number command This form of the IF condition determines whether the value of ERRORLEVEL is not greater than or equal to a number specified in the number parameter. 1 If the specified condition is true, DOS executes the command specified in the command parameter. Otherwise, DOS skips to the next line in the batch file without executing the command in the command parameter. The only DOS commands that leave an ERRORLEVEL (exit) code are: BACKUP, DISKCOMP, DISKCOPY, FORMAT, GRAFTABL, KEYB, REPLACE, RESTORE, and XCOPY. Many other programs generate exit codes, however. For example, table one contains codes that are generated by the DISKCOPY command. Table one: DISKCOPY codes Code Description 0 The operation was successful. 1 A read/write error occurred that did not terminate the disk copy operation.
    [Show full text]
  • External Commands
    5/22/2018 External commands External commands Previous | Content | Next External commands are known as Disk residence commands. Because they can be store with DOS directory or any disk which is used for getting these commands. Theses commands help to perform some specific task. These are stored in a secondary storage device. Some important external commands are given below- MORE MOVE FIND DOSKEY MEM FC DISKCOPY FORMAT SYS CHKDSK ATTRIB XCOPY SORT LABEL 1. MORE:-Using TYPE command we can see the content of any file. But if length of file is greater than 25 lines then remaining lines will scroll up. To overcome through this problem we uses MORE command. Using this command we can pause the display after each 25 lines. Syntax:- C:\> TYPE <File name> | MORE C:\> TYPE ROSE.TXT | MORE or C: \> DIR | MORE 2. MEM:-This command displays free and used amount of memory in the computer. Syntax:- C:\> MEM the computer will display the amount of memory. 3. SYS:- This command is used for copy system files to any disk. The disk having system files are known as Bootable Disk, which are used for booting the computer. Syntax:- C:\> SYS [Drive name] C:\> SYS A: System files transferred This command will transfer the three main system files COMMAND.COM, IO.SYS, MSDOS.SYS to the floppy disk. 4. XCOPY:- When we need to copy a directory instant of a file from one location to another the we uses xcopy command. This command is much faster than copy command. Syntax:- C:\> XCOPY < Source dirname > <Target dirname> C:\> XCOPY TC TURBOC 5.
    [Show full text]
  • Essentials Windows CMD Command You Should Know
    https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ https://www.makeuseof.com/tag/ 15-cmd-commands-every-windows-user-know/ https://www.makeuseof.com/tag/15-cmd-commands-every- Essentialwindows-user-know/ Windows https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ CMD https:// www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ https://www.makeuseof.com/tag/15-cmd- commands-every-windows-user-know/Commands You Should https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user- Know know/ https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ https:// www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ https://www.makeuseof.com/tag/15-cmd- ASSOC Displays or modifies file extension associations MD Creates a directory commands-every-windows-user-know/ https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user- ATTRIB Displays or changes file attributes MKDIR Creates a directory know/ https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/ https:// BREAK Sets or clears extended CTRL+C checking MKLINK Creates Symbolic Links and Hard Links www.makeuseof.com/tag/15-cmd-commands-every-windows-user-know/BCDBOOT Used to copy critical files to the system partition and to crate a MODE Configures https://www.makeuseof.com/tag/15-cmd- a system device new system BCD store commands-every-windows-user-know/ https://www.makeuseof.com/tag/15-cmd-commands-every-windows-user-MORE Displays output one screen at a time BCDEDIT Sets properties in boot database
    [Show full text]
  • Ch 7 Using ATTRIB, SUBST, XCOPY, DOSKEY, and the Text Editor
    Using ATTRIB, SUBST, XCOPY, DOSKEY, and the Text Editor Ch 7 1 Overview The purpose and function of file attributes will be explained. Ch 7 2 Overview Utility commands and programs will be used to manipulate files and subdirectories to make tasks at the command line easier to do. Ch 7 3 Overview This chapter will focus on the following commands and programs: ATTRIB XCOPY DOSKEY EDIT Ch 7 4 File Attributes and the ATTRIB Command Root directory keeps track of information about every file on a disk. Ch 7 5 File Attributes and the ATTRIB Command Each file in the directory has attributes. Ch 7 6 File Attributes and the ATTRIB Command Attributes represented by single letter: S - System attribute H - Hidden attribute R - Read-only attribute A - Archive attribute Ch 7 7 File Attributes and the ATTRIB Command NTFS file system: Has other attributes At command line only attributes can change with ATTRIB command are S, H, R, and A Ch 7 8 File Attributes and the ATTRIB Command ATTRIB command: Used to manipulate file attributes Ch 7 9 File Attributes and the ATTRIB Command ATTRIB command syntax: ATTRIB [+R | -R] [+A | -A] [+S | -S] [+H | -H] [[drive:] [path] filename] [/S [/D]] Ch 7 10 File Attributes and the ATTRIB Command Attributes most useful to set and unset: R - Read-only H - Hidden Ch 7 11 File Attributes and the ATTRIB Command The A attribute (archive bit) signals file has not been backed up. Ch 7 12 File Attributes and the ATTRIB Command XCOPY command can read the archive bit.
    [Show full text]
  • Command Line Interface
    Mastering AmigaDOS by Jeffrey Stanton and Dan Pinal RAARl,IS, Inc. 6711 Valjean Avenue Van Nuys, California 91406 Library of Congress Cataloging-in-Publication Data Stanton, Jeffrey. Mastering AmigaDOS. Includes index. 1. Amiga (Computer)--Programming. 2. AmigaDOS (Computer operating system) I. Pinal, Dan. II. Title. QA76.8.AI77S73 1986 005.4'465 86-10881 ISBN 0-912003-55-3 (pbk.) Editor Mia McCroskey 10987654321 ISBN 0-912003-55-3 Copyright @ 1986 by Arrays, Inc.lThe Book Division, Jeffrey Stanton and Dan Pinal. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, phot9copying,: recording, or otherwise, without the prior written permission of Arrays, Inc.lThe Book Division. Amiga and AmigaDOS are trademarks of Commodore Business Machines, Inc. TABLE OF CONTENTS Introduction 5 Chapter 1: Workbench and AmigaDOS 7 Similarity between Workbench's Icon Filing System and AmigaDOS 7 Workbench Operations 10 Duplicating, Copying, & Initializing Disks 12 Moving a Tool, Project or Drawer 14 Moving a Tool, Project or Drawer to Another Disk 15 Renaming Disk & Files 15 Info 15 Special Menu Items 16 Chapter 2: Command Line Interface (CLI) 19 Disk & Device Names 20 Other Device Names 21 Filenames 23 Directories 23 Setting the Current Directory 24 Rerouting Input & Output 25 Using Directory Conventions & Logical Devices 26 Creating a RAM disk 27 Running Commands in Background 29 Activating the Command
    [Show full text]
  • Amigados Command Reference
    AMIGA REFERENCE GUIDE THIRD EDITION SHELDON LEEMON AND ARLAN R. LEVITAN The complete guide and tutorial to the convenience, flexibilily, and power of ArnlgaDOS version 1.3. ~ . COMPUTE!'s I . , AmigaDOS i Reference Guide Third Edition Sheldon Leemon and Alan R. Levitan COMPUTEI Books Radnor, Pennsylvania Cover design: Anthony Jacobson Editors: Gregg Keiser and Stephen Levy Copyright 1986, 1987, 1989, COMPUTE! Publications, Inc. All rights reserved. Reproduction or translation of any part of this work beyond that permitted by Sections 107 and 108 of the United States Copyright Act without the permission of the copyright owner is unlawful. Printed in the United States of America lO987654321 Library of Congress Cataloging-in-Publication Data Leemon, Sheldon. AmigaOOS reference guide. Rev. ed. of: Compute!'s AmigaOOS reference guide / Arlan R. Levitan and Sheldon Leemon. c1986. Includes index. 1. Amiga (Computer)--Programming. 2. AmigaOOS (Computer operating system) I. Levitan, Arlan R. II. Levitan, Arlan R. Compute!'s AmigaOOS reference guide. III. Title. QA76.8.A177L36 1989 005.4465 89-42831 ISBN 0-87455-194-3 The authors and publisher have made every effort in the preparation of this book to ensure the accuracy of the information. However, the information in this book are sold without warranty, either express or im­ plied. Neither the authors nor COMPUTE! Publications, Inc. will be liable for any damages caused or alleged to be caused directlv, indirectly, incidentally, or consequentially by the programs or information in this book. The opinions expressed in this book are solely those of the authors and are not necessarily those of COMPUTE' Publications, Inc.
    [Show full text]
  • DOS to UNIX Translation
    DOS to UNIX Translation DOS to... UNIX notes attrib change file chmod attributes cd change cd chdir directories chkdsk display free df disk space cls clear screen clear comp compare files diff copy copy files cp cp to copy files, copy to copy directories, and tar to copy copy files or directories onto floppy disks or tapes. tar date display date date displays the date and time, cal displays the date, system date cal time, and a 3 month calendar. and time del delete files rm Use caution with rm and wildcards, rm * removes all (no undelete option)! deltree delete rm -r Recursively removes the specified directory and its files directory and and subdirectories and files. (no undelete option) files dir list contents ls There are several options to ls including ls -l to see long of a directory lists, ls -c to see a list in columns, and ls -f to see a list indicating file types. diskcomp make a track- diskcmp by-track comparison of two floppy disks diskcopy copy a source diskcp disk to a target disk edit to edit text vi vi is a full-screen text editor with powerful search and files replace functions. edlin line editor ed ed and ex are predecessors of vi. ex fc compare two cmp cmp to compare binary files, diff compares two text files, files diff and diff3 compares three text files. diff3 find find text grep The UNIX find command finds files on the system, within a file and grep (global regular expression parser) finds text within a file.
    [Show full text]
  • Volume Serial Numbers and Format Date/Time Verification
    Volume Serial Numbers and Format Date/Time Verification Written by Craig Wilson, MSc MBCS CITP Digital Detective Group October 2003 (updated June 2005) Table of Contents Table of Contents ............................................................................................................................... 2 Introduction......................................................................................................................................... 3 Format Date/Time............................................................................................................................................................3 Naming Conventions .......................................................................................................................................................3 Volume Serial Number ....................................................................................................................................................3 Date/Time Calculation – Method One .............................................................................................................................4 Alternative Verification – Method Two.............................................................................................................................5 FAT Directory Entry Structure .........................................................................................................................................6 Summary ...........................................................................................................................................
    [Show full text]
  • MS-DOS Commands
    Source is from http://www.usask.ca/its/online_docs/msdos.html MS-DOS Commands Disk Commands FORMAT: Prepares a disk so that MS-DOS can use it. Formatting a disk erases all the information on the disk, so be careful. Example: FORMAT A: CHKDSK: Checks for problems and repairs corrupted disks. A disk can sometimes get corrupted when, for example, the power is turned off while a program is still running. Example: CHKDSK C: DISKCOPY: Duplicates diskettes. Use this command to copy important diskettes, like newly purchased programs. Example: DISKCOPY A: B: Directory Manipulation Commands MKDIR (MD): Makes a directory on the disk. Example: MD C:\DOS RMDIR (RD): Removes empty directories from the disk. Example: RD C:\DOS CHDIR (CD): Changes the current working directory. Example: CD C:\DOS PATH: Provides a list of directories where MS-DOS can find programs. Put this in your AUTOEXEC.BAT file. Example: PATH C:\;C:\DOS File Copying & Backup Commands COPY: Copies files between disks or directories. Example: COPY C:\AUTOEXEC.BAT A: XCOPY: Copies files, or entire directories with their subdirectories, to other disks or directories. Example: XCOPY C:\DOS C:\OLD_DOS /S BACKUP: Copies entire hard disks onto many floppy diskettes to create a backup copy of the hard disk. Example: BACKUP C:\*.* A: /S /F RESTORE: Restores the BACKUP files back onto your hard disk. Example: RESTORE A: C:\*.* File Management Commands DIR: Lists the files in a directory or disk. It includes file and directory names, file sizes, and file creation dates. Example: DIR C:\ TYPE: Displays the contents of a file on your computer screen.
    [Show full text]