Digital PDFs
Documents
Guest
Register
Log In
XX-F03BA-68
October 1972
62 pages
Original
2.3MB
view
download
OCR Version
2.2MB
view
download
Document:
07 pip
Order Number:
XX-F03BA-68
Revision:
0
Pages:
62
Original Filename:
07_pip.pdf
OCR Text
- 367 - DEC-16-PPEO-D PDP-10 PIP | (PERIPHERAL INTERCHANGE PROGRAM) PROGRAMMER’S REFERENCE MANUAL DIGITAL EQUIPMENT CORPORATION « MAYNARD, MASSACHUSETTS PIP - 368 - 1lst Edition, October 2nd Edition (Rev) May, 3rd Edition (Rev) November, 4th Edition (Rev) November, 5th Edition 6th Copyright @ Edition (Rev) (Rev) The material in this manual is for information purposes and is subject to change without notice. The following are trademarks of Equipment Corporation, Maynard, DEC FLIP Digital Massachusetts: PDP CHIP DIGITAL FOCAL COMPUTER LAB 1968 1969 June, 1970 March, 1972 1967, 1968, 1969, 1970, 1972 by Digital Equipment Corporation 1967 1968 PIP - 369 PREFACE The functions provided the user by the DECsystem-10 change Program (PIP) and their use are described in Peripheral Inter- this manual. NOTE . Monitor commands are available which the common PIP functions of copying, protecting and deleting files. perform renaming, It was assumed in the preparation of this manual that the reader is familiar with or has access to the DECsystem-10 Monitor Calls manual and the DECsystem*lO Monitor Commands manual. as the and in a) PIP manual the are available in the These manuals as well DECsystem-10 Software Notebook following handbooks: DECsystem-10 User's Handbook Monitor commands manuals). (contains both PIP and b) < DECsystem-10 Assembly Language Handbook (contains Monitor calls manual). iii the PIP - 370 - PIP - 371 - CONTENTS SECTION 1. INTRODUCTION 1.1 INTRODUCTION SECTION 375 Controlling PIP Indirectly 1.1.1 375 1.2 WRITING CONVENTIONS 2. PIP COMMAND STRING AND ITS BASIC ELEMENTS 2.1 COMMAND STRING 376 379 2.1.1 Command Format 379 2.1.2 File 380 2.1.3 Command String Delimiters DEVICE 2.2 Specification 382 383 NAMES 2.2.1 Physical 2.2.2 Logical 383 Device Names 383 Device Names 384 FILENAMES 2.3 Naming Files with Octal Constants 2.3.1 385 386 - Wildcard Characters 2.3.2 2.3.2.1 The Asterisk Symbol 386 2.3.2.2 The Question Mark Symbol 386 2.3.2.3 Combining * and ? Wildcard Symbols 386 DIRECTORY 2.4 387 IDENTIFIER 388 , 2.4.1 UFD-Only Identifiers 2.4.2 SFD 2.4.3 Specifying Default and Current (Full Directory Path) Identifiers [Directory] Identifiers 2.5.1 SECTION 390 Digit Numeric Protection Code Values 391 3 STANDARD 3.1 OPTIONAL PIP 3.1.1 392 UFD AND SFD PROTECTION CODES 2.6 . 3.2 - 3.2.1 PIP SWITCHES FUNCTIONS 393 Adding Switches to PIP Commands 393 BASIC 394 TRANSFER FUNCTION X-Switch Copy Files Without Combining 3.2.1.1 Non-Directory to Directory Copy Operation 3.2.1.2 Assinging Names to DECtape 3.2.2 3.2.3 Transfer Without X-Switch U-Switch, 394 395 397 Tapes DX-Switch, Copy All but Specified Files 3.2.4 389 PROTECTION CODES FILE ACCESS 2.5 388 397 (Combine Files) 398 and 2 398 Copy DECtape Blocks @, 1, - 372 PIP CONTENTS Egge A-Switch, Integral Output Lines (Line Spaces and Blocking) 399 3.3.2 C-Switch, Delete Trailing 3.3.3 E-Switch, Ignore Card 3.3.4 N-Switch, Delete Sequence 3.3.5 S-Switch, Insert Sequence Numbers 3.3.6 O-Switch, Insert Sequence Numbers 3.3.7 P-Switch, Convert Multiple Increment Line 3.3.7.1 by Spaces Printer Binary T-Switch, Delete Converts 3.3.10 V-Switch, Match Angle 3.3.11 Y-Switch, DECtape FILE 3.5.1 3.5.3 3.5.3.1 400 Tabs to SWITCHES DIRECTORY SWITCHES 401 Spaces to 402 Spaces 402 Brackets 402 Paper Tape B, AND H 403 405 T 406 L-Switch, List Source Device F-Switch, List Limitgd R-Switch, Rename Directory Source Source Directory the Rename (R) D-Switch, Delete Z-Switch, Zero Directory Q-Switch, Print PERMITTED SWITCH SWITCHES PIP FUNCTIONS TAPE Switches PIP Functions Setting 415 415 Density and Parity 415 Parameters 4.2.2 Switches for Positioning Magnetic Tape 4.2.2.1 Backspace 4,2.2.2 Advance 411 413 SWITCHES for 408 411 Summary of PIP 407 409 COMBINATIONS SPECIAL MAGNETIC Function Files SPECIAL 406 407 Files Changing Source UFD or SFD Protection Code 3.5.5 SECTION for Files 3.5.4 3.6 Output Trailing MODE, Using 3.5.6 400 and Listing W-Switch, 3.5 399 399 400 3.3.8 DATA 399 Numbers Number FORTRAN 3.3.9 SET Tabs One Prepare Copy FORTRAN 3.4 to Sequence to to 4.3 G-SWITCH, ERROR 4.4 J-SWITCH, CARD Start End of of RECOVERY PUNCH vi Current Current File File 416 417 417 417 418 -373 - PIP CONTENTS SECTION 5 PIP 5.1 ERROR MESSAGES 5.2 I/0 ERROR MESSAGES 419 5.3 FILE 420 ERROR REPORTING REFERENCE AND ERROR MESSAGES ‘ ERRORS 419 5.4 PIP COMMAND ERRORS 421 5.5 Y-SWITCH 422 5.6 "GENERAL ERROR MESSAGES 422 5.7 TMPCOR (DEVICE TMP) 424 APPENDIX A STANDARD ERRORS ERROR MESSAGES FILENAME EXTENSIONS vii 425 PIP - 374 - - 375 - .SECTION PIP 1 INTRODUCTION 1.1 INTRODUCTION PIP (Peripheral Interchange Program) I/0 devices tape To transfers files between standard and can be used to perform simple editing and magnetic control operations during those call PIP into core (1) transfer operations. from the Monitor level, the user types the command .R When PIP is PIP <CR> loaded and the console. perform the ready for input it prints the character * at The user may then enter the command string needed to desired operations followed by -a carriage return input. On completion of the opefation or operations requested in a command string, PIP again prints the character * to indicate that it is ready for next the command string input. To exit from PIP, a Control C (4C) command. l.1.1 Controlling PIP the user types - Indirectly PIP is normally controlled‘by commands entered via the console keyboard. pared PIP, file tered via however, is also and executing the indirectly their identifying scription of these input console. cessed file tion FOO.CCL@ are capable commands PIP the specification specifications). identifies the reading as command identified by file of if commands they had been files which are addition of (see paragraph For example, file FOO.CCL as from a the the just file en- to be pro- symbol 2.1.2 pre- for @ a to de- specifica- an indirect command file. Any filename extension may be used in specifying an indirect command file, An however, indirect structured (1) of if PIP as none is command described given, file in the default consists Section of one extension or more .CCL PIP is assumed. commands 2. The PIP program operates in 4K pure core plus a minimum of 1K impure core in d11 DECsystem—10 systems. PIP - 376 - Once PIP command put is in core, file by command the passes file's control of filename. PIP to an indirect For example, the in- sequence .R PIP <CR> *FOO.CCL@ loads user entering the PIP and <CR> initiates the execution of the indirect PIP command file FOO.CCL. 1.2 WRITING The following CONVENTIONS symbols and abbreviations are used throughout this manual: Symbol or Abbreviation dev: Meaning . Any must logical or physical device name, be included when it is used as the colon part of a PIP command. file.ext Any filename and [directory] Identifies the directory of a specific file storage area within the system; it may also specify the location of specific file within the identified storage area. (See paragraph 2.4 for a detailed description of [directoryl].) filename extension. When the input terminal used is either a Model 33 or 35 Teletype unit, the right and left brackets are input in the following manner: To Obtain a) b) 4ch left bracket right bracket Type: ‘ SHIFT K SHIFT M A control character obtained by depressing the CTRL key and then the selected character key = a: (e.g. +2). An equals character is used in the PIP command to separate the destination and source command sections. NOTE PIP will also accept the back arrow (SHIFT-O) entry. A SHIFT-O entry is echoed on the terminal printer as the symbol <. * PIP's response to a command string to indicate that it is ready for the next input string. =377 - PIP Symbol or Abbreviation Meaning The Monitor's response to a dicate that it is ready- for <CR> This symbol represents a feed operation. a RETURN ally It keyboard used is command the carriage A to command. return, initiated by input. string next RETURN the terminate each PIP input ----- Underscoring indicates computer typeout. n A 4 number, This key either octal or line- entry of input to is The norm- command. decimal. up-arrow symbol entry. in- indicates the use of a up-arrow is used with other CTRL char- acter key inputs to produce special control entries such returned to to enclose DECtapes (see as 4C which requests the Monitor. identifiers using 3.2.1.2.). the that control Up-arrows which may facilities be are assigned provided be also. used by PIP to PIP - 378 - -379 - SECTION PIP 2.1 COMMAND PIP 2. STRING AND ITS BASIC ELEMENTS COMMAND STRING PIP'command strings may be of any length; both upper and lower case characters may be used. PIP commands are normally terminated and the requested operation is initiated by a RETURN keyboard entry (i.e.; <CR>). However, an ALT MODE, lihe feed, vertical TAB or form feed keyboard entry can also be used as a command terminator. Command Format 2.1.1 All PIP commands which involve the interchange must have the following format: DESTINATION=SOURCE (transfer) or data | <Terminator> where: a. The DESTINATION portion of a PIP command descrlbes the device and file(s) which are to receive the This portion of a command con‘transferred data. sists of either one file spec1f1catlon or a subset of a file specification. b. The equals sign is a required delimiter in all PIP commands to separate the DESTINATION and SOURCE portions of the command. c. The SOURCE side of the command describes the device from which the transferred data is to be taken. This portion of a command may contaln one Or more file specifications or subsets of file specifications. d. A A Terminator is required to end each PIP command. RETURN entry (symbolized as <CR>) is normally used, however, any other paper-motion command may be used as a terminator. PIP commands which do not require the transfer of information may be written using the form DESTINATION=Terminator a terminator are still required in commands The equals delimiter and PIP - 380 - formatted in portion of this the manner command 2.1.2 File A file specification fy a involved contains in a T V] I protection directory and a of the of a specification all function. that only the destination information It may needed consist PIP identifier; code which specified or a identifier on a command to identi- of: y (UFD), an mounted format fact name; filename; tory 5. PIP device either The the used. Specification W N file despite is is file, SubFile to be to be a User assigned Directory assigned specified to DECtape containing File all to Direc- (SFD) the tape unit. possible items of a file is: dev:nameé.ext[directory] <nnn>+identt=dev:name.ext [directory] <CR> where: l. DEV is etc.) 2. either or a a physical logical device name (e.g., name (refer to device the fies 3. destination an existing the command). of filenames.) EXT of is a a 1 file 4. to (i.e., may for is consist a the is to the a the of of (NAME command) on the paragraph character by UFD or MFD) Sub File details. 5. 3- 2.3 [DIRECTORY] side file (Refer either paragraph 2.2). for 6. for +IDENT+ to the a is a 1 DECtape unit. A User File Directory permitted access number; together to assigned to it. name extensions.) a specific directory identifier of system. the names. of system. This number (See DECtape to name reel to identifier and paragraph 2.4 is to be files or for as- to to paragraph a codes.) which is mounted paragraph (Refer pair (Refer protection character (Refer A the filename a (UFD) to of within 6 of description description (SFD) of a the description contents identi- side by <nnn> is a 3-digit protection code which signed to either one or more destination 2.5 which or project,programmer Directory or source 2.3 extension user specified User File Directory!. user DTAl, NAME is a 1 to 6 alphameric character identification which is either to be assigned to a new file (NAME is on grammer DSK, paragraph 3.2.1.2 to on be given a specified for details.) is contained by the system for each user user's it contains the with pointers to UFD is identified names of all the actual 2-2 files location by his project,pro- belonging of each to file. the - 381 - | PIP The manner in which each of the possible elements of a file specification may be used a PIP is command in either described Element the in destination the following or source portions of table: Destination ‘ Source dev. Name of device onto which the specified file is to be written. Name of device on which the specified file resides. name Name Name of the to be assigned copied to file. .ext User-~specified file-name file to be [directory] Identification of Current filename exten- extension. : the copied. sion. the disk storage area which is receive the file to transferred. ' be to Identification of the disk storage area which - contains copied. the file to be NOTE The [directory] identifier must include a full directory path specification whenever sub-file directories are involved. For example [proj,prog,SFDA...SFDn]. (See paragraph 2.4 for more details.) <nnn> Protection code to be assigned to either a copied file or a specified UFD. NOT PERMITTED IN SOURCE PORTION OF PIP COMMANDS. tidentt Name to be assigned to NOT PERMITTED IN SOURCE the PORTION tape mounted specified File specifications 1. may be on DECtape a OF PIP COMMANDS. unit. delimited by: an edquals character (=) if the'specification is on the destination side of the dev:iname.ext=...<CR>). command string (e.g. 'NOTE PIP will accept a back-arrow entry (<) in 2. place of the equals character (=). a comma (,),if the specification is on the source side of the command string and is specifications. For example one of a series of file dev=devl:name.ext,dev2:name.ext,name.ext,..name.ext<CR> 3. : a RETURN side of <CR> a entry command. if For it is the last item on the source example dev=devl:name.ext,dev2:name.ext,..devn:name.ext<CR> - 382 PIP 2.1.3 The Command delimiters String which command string are Delimiters may be described PIP used to separate in the following COMMAND Delimiter STRING the elements of a PIP table. DELIMITERS Use and Description The colon delimiter follows and identifies a device name. For example, the device DTAl is specified as DTAl: in PIP commands. [ ] < > Square brackets are used to enclose the user DIRECTORY numbers and SFD names (if SFDs are used). For example [40,633] or [40,633,SFD1,SFD2,...SFDn] represent the manner in which DIRECTORY numbers can be written. - r Angle brackets must be used to enclose a code (e.g. <@57> which is to be assigned a file or a user file directory (UFD). protection to either ' Ccmmas are used to separate user project and programmer numbers, and file specificaticn groups. For example dev:[4f,633]=dev:name.ext,name.ext<CR> +4 A name to be assigned as an identifier to a DECtape is enclosed within a set of up-arrows (e.g. +MACFLS1t) . . A period delimiter must be a filename extension. The the first character of form on an extension is .ext. # _ A number symbol is used as a flag to indicate the of an octal constant in a filename or a extension. ! An exclamation symbol may be used to delimit a file specification. When used, the ! symbol causes control to be returned to the Monitor from PIP and the specified file (or program) to be lcaded and run. This function is provided as a user convenience to eliminate the need for several control entries. : = The S~ ~~ presence filename equals character must used are used to enclose magnetic control switches, and one or switches. to The enclose of a separate Parentheses tions, PIP parentheses portions to and function source be destination PIP form of a command a series of dev:name.ext (swlsw2..swn)=...<CR> the command. tape more opPIP employing switches is: - 383 - 2.2 DEVICE _ PIP NAMES Both physical or lbgical device names may be used in PIP commands. The user must remember physical name when 2.2.1 Each Physical standard device unit name that both Device DECsystem-10 (0 to 777) logical used in name the peripheral a device 3-character is characters, 3) 4) an abbreviated disk name or, the name of a disk file structure. physical device names PERIPHERAL ‘Device ' TTY is . ) given below: CDR ‘ DTA DSK o Fixed-Head ’ DPx FHx ' Display Line Printer Magnetic Tape DIS LPT MTA Operator Terminal Paper-tape Paper-tape Punch Reader Plotter OPR : _PTP PTR PLT Pseudo-TTY PTY System Library Terminal . Pseudo-device TMPCO ,8YS TTY TMP Logical a CTY Disk 2.2.2 specific either CDP : DECtape Packs name plus Generic Physical Device Name Reader Console a DEVICES : Card Punch Card assigned a : 3 characters and a station number, the generic over or: 3 A list of precedence command. generic 1) 2) takes same Names consisting of number a are Device Names A logical device name is a usér—assigned designation which is employed in the preparation of a program in place of a épecific physical device name. The use of logical device names permits the program- mer to write programs which do not specify one. particular device but may use, at run time, any available device which can perform the required function. PIP - 384 - Logical device characters 2.2 the may consist user's choice. of from one to six alphanumeric FILENAMES Filenames system field of names are file programs) and identifiers or by an extension Whenever both fields A delimiter period sion. Filename 1. Name to the is user. field are assigned used Field. are a as Names of a the first by may name the it system consist field filename, defined six alphanumeric filename only in required fields A but either is has of (for a name required. the character form of the name.ext. exten- as: files may characters consist of from one or octal constants; in user-ass$igned names the characters may be arbitrarily selected by the user. Names generated by the user must be unique at least within the file structure in which the file is located. 2. Extension Field. up to three normally by the name and used file he the type has of extensions a specify the by transferred data each specifies are dealing none PIP at the the File- system given in filename with binary The indication as PIP If extension add one or files in extensions in tests be used following during succession to the for the order mode in type given whether the ASCII mode. filename tests no extension of should performed next the a file binary mode PIP performs determine requested determination until of a to a in file is to be If it is all mode PIP transfer tests obtains a required: presence of a a the data test. PIP tests for the presence of a known (standard) filename extension which specifies a binary mode of transfer (see Appendix A). If no binary extensions are found, PIP goes to the next test. is to mode switch (see paragraph 3.4.). 1If no switch is found, PIP goes to the b) Ap- operations. determine a all. system may to series which a) of are contained field. by the in operation. are data recognized or during utilizes mode of filename are possible, PIP will transfer since it is faster. In type the consist Extensions which filename, specification specific may characters. In filenames, users may specify a standard (one recognized by the system), one which devised, given in filename PIP to identified extensions pendix A. extension Filename alphanumeric firm - 385 ¢) ' PIP PIP tests both the input and output devices specified to determine if they are both capable of handling binary data. If either or both of the devices cannot handle binary, the transfer is made in the ASCII mode. If both devices can handle binary data, PIP goes to the next test, d) PIP tests for the presence of an X option switch (/X) in the command string; if it is found, the transfer is made in the binary mode. If an X option is not found, PIP goes to the next test. " e) 2.3.1 Naming PIP tests for the presence of commas (non-delimiters) in the ccommand string; if commas are found an ASCII mode is indicated. If no commas are found, the transfer is made in the binary moce. Files with Octal Constants Octal constants may be used as either a part of or all of a filename. In either of octal of the foregoing constants which cases, appear the first a filename in constant must of be each group preceded by the symbol #, and each group is delimited by a non-octal digit or a character. For example, 1. #124ABC.ext 2. #12AB#34.ext the filenames: (constants are used as part ofa filenane) (constants are intermixed with other characters) 3. are all " The #124679.#123 acceptable symbol # is only as a used (constants to to PIP to If # be even an to since odd the number filename expanded Names two to octal of or in a constants octal are examples an be is For octal filename but is constant. stored given, example, in a SIXBIT PIP will the add constant character. an extra #123 would PIP. comprised of octal constants following part of the filename or an extension should may constants extension. #123¢ by as indicate The. number of octal digits used be filename) PIP. not regarded by PIP flag form the whole of the use are of left-justified by PIP. octal DTAfll:#12467fl.BIN=DSK:filflflflflfl.BIN<CR> 2-17 filenames: The PIP - 386 - 2.3.2 The Wildcard two symbols complete to as Characters * fields wildcard and and ? may single characters; be used in PIP to represent, characters. These their described use is The asterisk symbols in respectively, are the referred following paragraphs. 2.3.2.1 to THE replace For SYMBOL a filename or field 1. name 2. extension 3. both example, language in ASTERISK the the file fields be used name,?*), (e.g., *.¥*). FILEA.MAC, which FILEA, *.MAC 2. FILEA.* 3. *.* gpecifies all specifies may QUESTION MARK THE a replaces characters acters of file. wild a ignores the user PIP the to have character name, When it be altered files with specifies by the the use of MACRO the For all of a source asterisk file filename a with the - The name .MAC. FILEA, to both mask the filename one TEST2.BIN, files that one any and and, or of be used The all includes of ? files DTAl TEST4.BIN; to symbol the ? char- fields of characters, capability positioned device and file may extension masking groups the TEST3.BIN with out which identically ? extensions. name This command, assume character names and characters. characters these with extension “ SYMBOL in processes example, files the files. or specify, TEST1.BIN, specify of all extension wildcard common filenames. all specifies 2.3.2.2 files may following manner: l. names * *.ext), (e.g. filename indicate a (e.g. named symkol extension: field filename - enables whcse within file- their contains the the can user specification: DTAl:TEST?.BIN 2.3.2.3 can be CCMBINING combined have common sion files. in * AND ? WILDCARD filenames characteristics to in SYMBOLS specify either or - The specific both of symbols * and groups of files their name or ? which exten- - 387 - ' PIP For example, the file specification ABC???.%* specifies all files having the character group ABC as the first three characters of its filename. Again, the file specification *¥ ,?27A specifies all files having an extension which has the character A as its third character. In combining the * and ? symbols, the user should remember that for: a. b. filenames, * is equivalent to 22?2?27, and extensions, * is equivalent to ??27?. For example, the filenames *.* and ??2?2??2.727 are equivalent. 2.4 DIRECTORY IDENTIFIER The [directory] identifier is used in PIP commands to identify a specific: a) User File Directory (UFD), b. Sub File Directory (SFD), or c) - a specific UFD-SFD directory path. The item identified by a given [directory] identifier can be a directory or an item 1ocatéd within a directory which belongs to either the current user or, when the protection code scheme permits, to another user. (Refer to paragraph 2.5 for a description of protection codes.) A [directory] identifier can consist of a project,programmer number pair (abbreviated as proj,prog) and the names of SFDs. The most expanded form of the [directory) identifier is: [proj,prog,SFD1,SFD2,...SFDn] As shown, a [directory] identifier is always enclosed within square brackets and its elements are delimited by commas. PIP - 388 - 2.4.1 UFD-Only Each UFD ber pair is Identifiers identified assigned [directory] to in the identifier the system user for a for UFD by whom has the the the project,programmer UFD was created. num- A form [proj,prog] UFD [directory] of a the project,programmer previously current in For the number specified. having any 3) [ SFD the in which has the 1In user or either cases, the the PIP number current one user that no can use [directory] default or assumes assigned and is both either to the logged identifier has identifiers formats: Which is Interpreted by PIP as: [57,124] [57,124} ,124] [57,124] Directory Directory (SFD) Path) is Identifiers identified project,programmer number it [directory] is without such that 1 (Full File written number [57,124] following 1 be assume current Format: [57, default pair The [, may numbers. example, The the 1) Sub pPlus of 2) 2.4,2 A specified user. under been identifiers located. A pair by its which user-assigned identifies identifier for an name the UFD SFD then form [proj,prog,SFDname] Whenever tory an SFD is arrangement, cluded tory] in the located the in a UFD which has a UFD containing the desired [directory] identifier for the identifier for an SFD in a multi-level direc- SFD must be in- desired SFD. .A [direc- multi-directory level UFD has the form [proj,prog,SFD1,SFD2,...SFDn] and is referred assuming pair that 57,124 to the and as a full current has the UFD directory is following path identified directory identifier. by the TFor proj,prog organization: example, number _ - 389 UFD Level 1 - Level 2 Level 3 Level 4 PIP . SFDA SFD1 SFDB SFD2 SFDC the [directory] identifier for SFD2 is written as ~ [57,124,SFDA, SFD1,SFD2] The proj,prog number pairs in full directory path identifiers may be written using the format variations described in paragraph 2.4.2. However, when no proj;prog numbers are specified by the user, two commas must be used in the identifier in the following manner - [,,SFDl,...SFDn] The first comma represents the delimiter between the proj,prog num- bers; the second represents the delimiter between the last number (prog) and the first SFD name. 2.4.3 Specifying Default and Current [Directory] Identifiers: The position in which a [directory] identifier is given in a PIP command determines if it is viewed as a default identifier for all subsequent file specifications given in that command or is the current identifier for an individual file specification. If a [Directory] identifier is given before one or more file speciof a command it regarded as the DEFAULT identifier for fications those specifications. For example, in a command segment having the form: [directory A] File Specification 1,File Specification 2 the identifier [directory Al is the default for both File Specifications 1 and 2. If a [Directory] identifier is given after the filename within a File Specification it -is viewed as the current identifier for that file specification and will override any given default [directoryl]. The form of a file specification with the current identifier specified is: dev:filename.ext [directory] 2-11 PIP -390 - Both in default the same and PIP current [directory] command. For identifiers example, the PIP can be command specified source seg- ment: =dev: [directory A]filename.ext,dev:filename.ext[ directory is valid. In the default act as the the default [directory B] rides is default the second file 2.5 FILE ACCESS Three-digit can that be access must contain a may tection to in the of = File = project c. n3 = OTHER a. b. as given, the if it over- identifier are codes are the or the which types of side specify users of a PIP written within (e.g., type files digits of access the angle a to for brackets Each digit specific Considering file access a MEMBER, system defined Users the same programmer UFD which contains logged number the as file; in under that of pro- for decision is as to made PROJECT MEMBER. same project UFD containing at which Users number the of Monitor as who that file. the above Generation are either: the or ' logged which as the items defines time. in under identifiers the the and within the code follows: are file of and who ac- type users. as of string. OWNER OWNERS. OWNER degree gain command <nnn>). involved. give the may the same project and programmer number associated with the UFD which contai ns The 2. specification is is will N file.. an file and users: nl FLLE second accepted positions file n2 1. codes specifies a. types is [directory A] specification; [directory B] destination digit b. user and identifier file the When possible the <nln2n3> types for protection three code code following The of three have first PROTECTION CODES protection protection user given. the specification. specified File the identifier (octal) each for example, identifier not the cess foregoing identifier B] <CR> the PIP -3913. OTHER USERS any user of the system whose project and programmer number do not match those of the UFD containing the file in question. File access protection codes are placed in PIP commands after the ‘destination filename of the file involved. For example, the command DPA3:FILEA.BIN<nnn>=DSK:SOURCE.BIN<CR> copies the contents of file SOURCE.BIN onto disk pack device DPA3 under the name FILEA.BIN with an assigned file protection code of nnn. 2.5.1 Digit Numeric Protection Code Values Each of the digits in a 3-digit file protection code may be assigned an encoded numeric value ranging from # to 7. The meaning of each octal value is: Permitted Operations Code Value File may be looked 7 No access privileges. 6 Execute only. 5 Read, execute. 4 Append, read, execute. 3 Update, append, read, execute. 2 Write, update, append, read, execute. ') protection, e.rename, write, update, ap: Change read, execut 1 up if the UFD permits. : Rename, write,'update; append, read, execute. pend, Files are afforded the greatest protectiofirby the code value 7; the of a least protection by #. It is always possible for the owner even file file to change the access protection associated with that if the owner- protectlon field is not set to @; thus, the values g and 1 are equivalent for the owner. Files with their owner-protection field set to 1 are preserved (i.e., saved by .KJOB/K). It is recommended that important files such as source files be as- signed an owner- protection code of 2. This level of protection will them prevent the file from being acc1dentally deleted by permitting to be edited. 2-13 PIP - 392 - 2.6 UFD AND When a user SFD directory 3-digit octal file or, type of by to Once by owner allowed), of the required The 0 by PIP access through which the system. permitted each of 2.5 a if users (i.e., OWNER, access other than the given in directory code The 2 CREATEs 7 code permits owner. (Refer paragraph or the The not OTHER) . may be (i.e. changed CREATES the description 3.5.3.1 for the may range user the class codes procedure and the from operations OPERATION (S) permitted. directory may be are read directory may be.read are permitféd. permitted. directory may be LOOKUPs are CREATEs and LOOKUPs a file. as a file and read as a file and permitted. directory CREATEs as permitted. LOOKUPs The (Refer to are The tne three codes.) each lists of code CREATEs both Revised specifies a the classes.) PERMITTED 1 6 code permits. Access s user assigned owner of each protection assigned table by is the MEMBER, protection 0 4 3-digit of it either directory protection following by The description the created, the CODE 3 is code option change the a directory and, protection 7; to users for rename to SFD) default, assigned, the or protection classes paragraph (UFD access access possible PROTECTION CODES may and be are both read LOOKUPs as are permitted. a file and permitted. June 1972 -393 - SECTION STANDARD 3.1 OPTIONAL PIP be provides executed PIP the PIP ' PIP 3 SWITCHES FUNCTIONS user during with the a group of optional functions performance of the primary PIP which can transfer func- tion. Each optional function is assigned an identifier which, when added as a "switch" to a PIP command, initiates the execution of the identi- fied function. For the purposes of this manual, the PIP optional functions are divided into standard and special groups. tions All described in this section 1. determine which 2. edit 3. define 4. manipulate optional all files the data the mode the functions are of switches which: transferred; contained of The standard group of op- consist by each source file; transfer; directory which deal of a with directory-type device. non-directory devices and which perform functions other than those listed above are considered special 3.1.1 and are Adding described Switches in Section 4. to PIP Commands All switches in PIP commands must be preceded by a slash for to example, a PIP the optional function identified by the (i.e., /sw); letter w is added command: *DTAl:DESTFL.BIN/w=DSK:FILEA.BIN,FILEB.BIN<CR> When more listed than either parentheses one switch separated (e.g., by (BX)). is be added slashes to (e.g., to a command, /B/X....) or they may be enclosed in PIP , 3.2 BASIC The basic write two TRANSFER FUNCTION function performed by PIP transfer) types 1. of 3.2.1 The the files or the data blocks interchange (i.e., between devices. read/ There are group of operations: destination device. A non-X type in which all files or blocks transferred from the source device are combined (i.e., concatenated) into a single file on the destination device. X-Switch Copy files Without Combining use source of the files X-switch enables onto changing their extensions. in of transfer is An optional X-switch transfer in which the source files or blocks are transferred as separate files to 2. - 394 - the user to move the destination device as creation dates, time dates, (copy) individual filenames a files without and filename The following'are examples of how the X-switch is used PIP: 1. To transfer all the user's disk files type: to a DECtape, - DTAl:/X=DSK:*, L *<CR> Assuming that there are three files on the user's disk area named FILEA, FILEB, FILEC.REL, these files will be transferred to DTAl and can be referenced on DTAl by those names. One significant difference between the disk and all other devices is file protection. If the the source device, PIP will by-pass those files to which the current user is disk is protected not permitted access. A suitable message is then issued by PIP if the rest of the command string is successfully executed. Similar processing is described later for the L., Z and D switches. If none of these switches is given, a requested DSK file which is protected will cause termination of the request. 2. To transfer all the files from card reader to disk, type: DSK:/X+CDR: *<CR> When the transferring * wholly command, ASCII or the files input from the files wholly binary. card must reader with either be 3. To transfer two specific files from user disk area to a PIP ' - 395 - [11,7]'s type: DECtape, DTA2:/X=DSK:[11,7]FILEA,REL.FILEA.MAC<CR> 4. To copy files from a paper tape onto a directorytype device, the user may employ either: A copy command in which the number of files to be read are specified by adding a series a. of commas to the command after the source The number device name (i.e., PTR,,,sss+)+ of commas required is always one less than the total number of files to be transferred. For example, the command: DSK:/X=PTR:,,,,<CR> (5) specifies that five files are to be indicopied from paper tape and written, ~vidually, into the current user's disk area. b. A copy command in which all the files contained by a paper tape are to be copied onto a specified device. For example, the command DSK:/X=PTR:*<CR> specifies that all files contained on the paper tape loaded as PTR are to be copied into the Whenever a command current user's disk area. of this type is used, the last file on the paper tape must be followed by two consecutive - end-of-file codes. NOTE In both the foregoing examples, PIP will generate any needed destination This function is described filenames. in paragraph 3.2.1.1. Whenever the X-switch is used and is not combined with an editing option, PIP transfers any file involved as it appeared on the source device. to as s copy operations and are referred are X-switch operation such. NON-DIRECTORY TO DIRECTORY COPY OPERATION - 1In copying ; files from a non-directory device onto a directory-type device, PIP 3.2.1.1 must perform special operations in naming the destination files. example, a special case of source and destination filenames arises in the command: : *<CR> DTA2 :FNME.EXT/X=MTA{ For PIP - 396 - Here, to a every file directory destination (MTA@) may each contain 1. name the is second decimal each For is non-directory combining files (i.e., FNME.EXT) but one file. If necessary for PIP generate PIP in generates which three to the filenames first characters more of three a (/X). the than a by device Only source one unique one device file is filename developing characters given (MTaAZ) a are 6- either: destination or in portion filename a without given characters filename from than field numbers copied (DTA2) is file. given destination be more the first filename, 2. The it copied character to filename transferred, for is device of @@l "XXX" the if the 999 developed during extensions, PIP or destination PIP-generated through filename no command. a which the uses null name are /X if field added, copy either field filename consists in of sequence, the to operation. the extension no filename are present is of a given given in the command . For example, assuming that three files on MTAg, the command : DTA2:FNME.EXT/X=MT *<CR> Af: transfers the DECtape 1. If, the files to DTA2 directory establishes the files example, the command the following did not names in copied: FNM@@1.EXT, 2. FNM@@2.EXT, 3. FNM@g@3.EXT. in and for the above tion filename been named: (i.e., 1. XXX@ggl 2. XXX@gg2 3. XXX@gg3 given DTA2:/X=MTA@:*<CR>) the copied include files a destina- would have PIP ' - 397 - e characters The use of the 3-digit decimal number for the last thre files from of the filename name gives the user 999 possible input on the non-directory devices. If PIP finds more than 999 files r the afte source device it will terminate the transfer operation r message 999th file is copied and will issue the erro ?TERMINATE/X,MAX OF 999 FILES PROCESSED. PIP (either Any error messages referring to individual files named by . input or output) will use the generated filename mounted on a 3.2.1.2 ASSIGNING NAMES TO DECTAPE TAPES - A tape ng copy specified DECtape unit can be assigned an identifier durl (any SIXBIT operations. Tdentifiers are from 1 to 6 character names be used) character - except 4+ .- within the code range 40-137 can). = DECtape which are added to the DECtape's directory (128th word ; the identifiers can be read by PIP, FILEX and DIRECT programs er is assigned Monitor does not read identifiers. A DECtape identifi the DECtape to be by adding the selected name to a PIP command when ce. named is mounted on the specified destination devi The format required for a DECtape identifier is +namet owing the A DECtape identifier is inserted intoa PIP command foll given destination device name: dev:tnamet=source file specification(s) For example, the command *DTA3: tMYFILE+/X=DTAl:.** the identifier specifies that the DECtape on device DTA3 be givenaine d by the tape "MYFILE" and receive coples of all the files cont on device DTAl. 3.2.2 DX-Switch, Copy All But Specified Files es all the files When the DX-switch is added to a PIP command it causion device except to be copied from the source device to the destinat 3-5 PIP - 398 - those files device is Only is which DSK, a are maximum directory-type made Only on one named of devices the existence source device of is in the 10 source-file command are allowed the files string. the specifications as source which are permitted; for If source are devices; not example, to the be allowed. no check copied. command DTAl:(ZDX)=DSK:*.LST ,*.SAV,CREF.CRF<CR> zeroes out disk, all sion .LST 3.2.3 When directory or the except X-switch the l. To DTAl CREF.CRF Without is transferred on of and transfers and all files to DTAl, with from either the the exten- .SAV. Transfer blocks file the files not from destination combine X-Switch (Combine included the device. three in source PIP device For bPaper a Files) command are all combined files into or a single example: tape files into one, type BTP:=PTR:, ,<CR> 2. To combine DECtape, two files on type DECtape into one on another DTA3:FILCOM=DTA2:FIL A,FILB<CR> 3. To combine the files user's disk from area, two DECtapes type into cne on DSK:DSKFIL=DTA2:ONE, DTA4:TWO.MAC<CR> 4. To combine all the user's disk the files area, on MTAF into type one file on DSK:TAPL.MAC=MT : *<CR> Af (This assumes Point) . 3.2.4 The U-Switch, U-switch specify that onto the This switch another. is Copy used Blocks destination is For that MTAZ DECtape during g, 1 and is positioned Blocks g, 1 and at of the source Load 2 DECtape-to~-DECtape 2 the copy tape operation are to be to copied tape. commonly example, used the to transfer command: DTBOOT from one tape to -399f 7 PIP DTALl:/U=DTA5:<CR> transfers blocks # through 2 of DTA5 to DTAL. 3.3.1 A-Switch, The use of the A-switch output buffer are to be required 3.3.2 Integral Output'Lines is (/A) (Line Blocking) in a PIP command specifies to contain an integral number of split between physical output buffers. for FORTRAN ASCII C-Switch, to Tabs input. .- Each line lines, that each no lines Line blocking starts with is a new word. Delete Trailing Spaces and Convert Multiple Spaces : ’ The addition of a C-switch (/C) to a PIP command causes groups of multiple spaces in the material being copied to be'replaced by one or more TAB codes; trailing spaces are deleted. The conversion of the spaces to TAB codes is performed-in relation to the standard line TAB "stop" intervals throughout the line. which precede a TAB "stop" [spacell[stop]l--will not produce a TAB code. 2. [space] [space] [stop]--will produce 3. [space][space][stop][space][space]?—will produce [TAB] [TAB]. [space] [space] \ done with replaced by one space when this switch The C-switch is used to save space when storing card images in DSK file structures. care since The conversion of it could alter spaces Hollerith to tabs must be text. E—Switch,'Ignore Card Sequence Numbers switch, normally used when a card reader is the source device, causes characters (i.e., to spaces. be For example: 1. is used. This 8-character Only those groups of multiple spaces will produce a TAB code. A totally blank input line is 3.3.3 positions located at replaced by - 3.3.4 N-Switch, Delete This switch causes columns) 73 through 8% of each input line Segquence Number line sequence numbers to be deleted from any ASCII file being transferred. Line sequence numbers are recognized 3-7 PIP - 400 - as any word in the file in which bit 35 is a binary 1 and follows a carriage return, cation. Nulls used to £fill the last word(s) If a line vertical sequence number TAB, is form feed for followed by a start-of-file identifi- of a line are ignored. TAB, the TAB is also deleted. 3.3.5 This as S-Switch, switch the Insert causes output indicated by a line buffer a 1 vertical TAB or Sequence numbers in Sequence sequence at the bit 35 start of assigned by PIP g@gl¥ and ranging through 999¢ output buffer on the Sequence switch causes (see 3.3.7 This switch which 3.3.5) 1 causes PIP on a to character in following table. the input inserted Sequence numbers are carriage return, a nnnnn, of and 1@. to starting at Approximately facilitate Increment By performed as assigned output sequence than performs the line the data is for Line editing 1 those for numbers are Printer Listing generated by other needed when each form left blank Numbers that take and a and 14. device intended, interpretations the operations to be except computed line. following Prepare FORTRAN Output output it was same instead of P-Switch, which was the each increments is Insert This S, in (DTA only). O-Switch, incremented by take file 3.3.6 switch of to be indicator. one-third of operations number a word start-of-file each Numbers is the line carriage sent interpreted to by a FORTRAN program, printer (LPT), control character the PIP LPT. The according for first to the - 401 - FORTRAN Carriage CONTROL CHARACTER INTERPRETATION Control Character by CARRIAGE PIP Produced FORTRAN © ASCII Character (s) Substituted . Program space ' Line Printer Action . Skips to next (single FORM 68 * g23 + : 215 with FEED. after a every lines. Skips to no line space) next line with FORM FLEED. Precede line with a car- riage return only (i.e., over—-print previous line). _ , (comma) . g21 Skips to next 1/3@th page. = g15,012,912 . @22 . of : Skips two Skips to lines. next 1/2@th of page. / | §24 | Skips to next 1/6th of ' 2 page. 215,912 Skips ' 1 : g14 2 3 3.3.7.1 ) COPY FORTRAN combined with a of copy a FORTRAN line (double Skips to page (page g29 Skips to g13 Skips to next 1/3 page - can be 1 space) . BINARY /P in binary a of next eject). next 1/2 page. (also vertical tab). FILES PIP top - The command file. The binary mode to /B/P enable switch the switch (/B) user obtain to combination is needed when copying FORTRAN binary file(s) frop a DECtape source onto a Disk in order The /B/P to insert a switch needed combination control word is not destination devices ‘have the FORTRAN command binary file copy needed same buffer into each physical if both size. is dev:name.ext/B/P=dev:name.ext...<CR> the The buffer. source format and for a PIP - 402 - 3.3.8 This T-Switch, switch being then in Delete causes all transferred. single space the copied file. 3.3.9 The W-Switch, addition contained more by trailing If a Trailing a and spaces transfer to line be deleted consists a line terminator will Converts Tabs to of a W-switch (/W) the material being sequential Spaces of be from the file nothing but retained in spaces, its place Spaces to a PIP copied command to be causes converted each TAB to one code or spaces. The ndmber of spaces produced when a TAB code is converted is determined by the "stops". throughout switch position Each line the length operation, sequential of has line of only TAB the TAB TAB the relation to the positioned at 8-character line. enough stop in stops When spaces position. a are For TAB is converted produced example, standard to reach the series line TAB intervals in the a /W next [TAB] op] ABCD [st is converted to [stop]ABCDspspspsp[stop] where: Sp The of use a of 3.3.10 the be causes restored files to previously their edited by original form because the the use the deleted file is not (less V-Switch, Match Angle Brackets edited. in to spaces). switch tains space. the W-switch C-switch trailing This = The the is not use of results input a file. of true this edit switch, switch cumulative If a line in generates matching the an of input input output angle file file which brackets contains con- located brackets which are not needed to match earlier brackets and which match each other, no output occurs. In all other cases where brackets occur, - 403 - PIP a cumulative total and the line currently considered are printed. The symbol count. > scores a negative count; A typical use for the MACRO-1f# Assembler; this switch for example, the symbol is to check < scores source assuming that the a positive input to file A contains: ONE<<> TWO< THREE> FOUR<>> - FIVE<> SIX> The request LPT:=DTA2:A/V<CR> RN results in the Line Printer output: From this is general either a FIVE example, ONE<<L> TWO< THREE> FOUR<>> CSIX>. the most < missing or an extra likely conclusion > in this file. is Line that five there (i.e., <>) was not printed bgéause the brackets which it contained were matched. 3.3.11 Y-Switch, DECtape The Y-switch enables to Paper Tape the user to transfer DECtape files having the filename extension .RMT, .RTB or .SAV onto SAVE-formatted RIM1g or RIM1g@ paper tapes. The type and contents of the paper tape produced in a Y-transfer is determined by the source file filename extensiog. If the extension is: 1. .RMT, fer 2. - A RIM1f paper tape word) .RTB, is - A RIM1g¢ paper terminating 3. (with terminating trans- produced; tape transfer word) (with RIM loader and is produced; .SAV, - A RIM1@B paper tape is produced (with neither RIM loader nor terminating transfer word). For example, the command PTP:/Y=DTA2:TESTI.RTB<CR> 3-11 PIP - 404 - will punch description Switches It is RIM1gB .RMT file tape as from DECtape and assumed "save" an D a X may be that .RTB, format. In saved file described file used in .RMT and a at The switch assembly functions .SAV 1 of the foregoing is are the Y-switch. all in assumed that the no standard block of one. NOTE Y time performed files it preceding . Optional item conjunction with particular, overlaps in TESTI.RTB. is obtained by setting (see source file by PIP during /Y RIMSW=1 PIP.CTL.). transfers in response to each possible type of source file filename extension are: 1. An .RTB file a. Punch b. Punch an a causes RIM PIP to: loader. I/O word (-n,x) at the variable n is data block. The data words punched in each start the block of each number and has of the octal value 17, or less. The variable x is the starting address-1 for loading the following data. Successive values of x are derived from the pointer words in the DECtape blocks. The first value of x is the value of the right side of the first pointer word in the DECtape file. 2. c. The complete DECtape scriked in item b. d. The 3. is punched as de- final block punched is followed by a block containing a transfer word. If the right half of .JBSA contains @ then a halt is punched. If the right half of .JBSA contains a non-zero value, a jump to that address is punched. A .SAV file is .RTB extension word file are treated in the except that no same RIM way as one having loader and no transfer punched. An .RTM file initiates to those described for following differences: a. Only data one IOWD is words and a b. The first of from the saved logical block the PIP functions which are similar .RTB files but which have the ' produced, (-n,x) where (n-1) transfer instruction follow. (n-1l) file which is data words the first contains (i.e., the first location the JOBDATA area). punched word location after the of the .JBDA end of S - 405 - PIP -~ 3.4 SET c. The variable x is then set to the starting address (address-1l) of the first data word found. The effective program length is determined by the relationship n=(.JBFF)-x. Data is now transferred from (x+1) until (n-1) words have been punched. d. Zero fill is used if a pointer word in a source block indicates noncontinuous data. The transfer word, calculated as described for .RTB files terminates the output file. DATA MODE, SWITCHES B, H AND I The addition of optional data mode switches to a PIP command specifies the mode in which the file(s) involved must be transferred. Data modes are device dependent; complete descriptions of their use and effect on different devices are given in the DECsystem-1§ Monitor Calls manual. I1f both input and output devices can do binary I/0, no editing switches are in force and no concatenation is required. are transferred in binary mode that requires is used. 1. The data mode /B - (36-bit bytes). PIP to do character processing switches initializes binary the All files If an editing switch is used, ASCII mode are: input and output devices in mode. NOTE Since PIP recognizes the following as binary extension, /B is not required when these extensions are used in the PIP command. Binary Extensions .BIN .CHN .CKP .DAF 2. /H & ' ‘ . HGH +INT .LOW .QuUC Recognized by PIP . . RES .SAV +.SFD .SHR .DAT .QUD .SYS «DCR .QUE .UFD . DMP .QUF initializes the input and output devices in image binary mode. ‘3. /I - initializes the input and output devices in image mode. PIP . 3.5 - 406 - FILE Optional are DIRECTORY PIP switches described 3.5.1 SWITCHES in whose functions paragraphs L-Switch, 3.5.1 affect through user file directories 3.5.6. List Source Device Directory NOTE The Monitor command DIRECT provides the user with more facilities for obtaining directory-type information than the PIP L-switch option (refer to the DECsystem19 Monitor Command Manual for details). This switch directory. ing as enables The the type of user to output obtain device a listing used affects the directory If the output device is TTY, formats for directory-type a. DTA source For n FREE BLOCKS filename.ext b. For DSK (e.g., of blocks Asterisk or number of is list- used only only Blks in either those creation date requested to be those tory listing. in | DATE) directory. symbols specified the listed. files (TODAY'S project-programmer creation date n the files listing are: (CURRENT TIME) the question mark wildcard extension causes directory TTY:=DSK:/L<CR>) [directory] [directory] Total or device TTY:=DTA4:/L<CR>) (e.g., where the devices .filename.ext<protection>no.of blocks be the scurce LEFT no. source DIRECTORY can the follows: 1. cause of with disk Thus, (refer to paragraph filename or extension directory of a the extension command .REL to 2.3.2.2) fields particular to filename TTY:/L=DSK:*.REL<CR> be printed in the direc- 2. If the output is not TTY, the directory listing is printed in one of the. following For DTA, b. For DSK, source format is as in paragraph 1. (b) but includes access date and mode as well as the creation time and access date. If any disk file is protected, as much information as pos- F-Switch, source format is formats: a. sible is 3.5.2 PIP “ ~ - 407 - as in paragraph 1. (a) given about it. List Limited Source Directory the L-switch; This switch performs, essentially, the same function-as however, only the filenames and extensions of the files in the‘speci— fied disk or DECtape directory are listed. NOTE The Monitor command DIRECT provides the user with more facilities for obtaining directory-type information than the PIP F-switch option (refer to the DECsystem1¢ Monitor Command Manual for details). Only DSK: and DTAn: are permitted as source device; device is given, DSK: is assumed. if no source ) & 1 For example, the command | TTY : /F=<CR> lists the directory of the user's disk area as described. The /F switch may work in cases where /L will not because of file access protection. 3.5.3 R-Switch, Rename Source Files The use of this switch causes PIP to rename the source file to the name given as the destination file name. specification can be givénu Only one source file If more than one is given, the error message PIP COMMAND ERROR is printed and no action is taken. The destination file specification can take the following forms (protection can always be specified): 1. Filename.extension 2. Filename.* 3. 4, *,Extension *,*<protection> PIP . 22?2722.2°27? O x In fact, has no file name 2727 ??7???22.% <protection> effect to output a rename be can without protection During - 408 - Filename * ~Jovn ' is it. not 1If exists the .following be no specified protection but is the request specified, *.* the (47} current altered. operation changed always on device on more message ?AMBIGUOUS [file to DSK, than the if one user's structure PIP file finds that the file- structure, PIP will terminal: list] [filename.ext] The following are examples of the proper use of the /R switch: 1. DSK:MONI.F4/R=MONI.MAC<CR> Rename 2. the file MONI.MAC as MONI.F4. DSK:MON2,* /R=MONA., *<CR> Rename to all retain files the of name extensions MONA and any extension but take the new to retain MON2. 3. DSK:*,EXT/R=* Rename own 4. all names name MAC<CR> files but of take extension the MAC extension their EXT. DSK:*.*<g77>/R=%*_ SAV<CR> Give all files of extension g77 5. SAV the protection _ DTAl:MON2/R=MONA.REL<CR> Rename and 3.5.3.1 the the file null MONA.REL to have the name MON2 extension. CHANGING SOURCE (R) FUNCTION UFD OR SFD PROTECTION CODE USING THE RENAME - The access protectidn codes assigned to UFDs or SFDs can be changed using the rent user Calls PIP rename permits manual for privileges.) the PIP rename The the a switch (/R) operation. detailed owner function. of if the privileges (Refer description a directory to of is the user always assigned the DECsystem-10 UFD and SFD permitted cur- Monitor access the use of ~ 409 The command format required to change code PIP a directory access protection 1is *dev: [directory] .UFD<nnn>/R=[directory] .UFD<CR> where <nnn> represents the desired (new) protection code. [directofy] must be the same on both sides of the command. The user indicates to PIP that the protection code of the identified directory (UFD or SFD) is to be changed by specifying the extension .UFD without a filename. Note that the same ex- tension, .UFD, is used when changing the access protection of an SFD as well as for changing the protection of a UFD, The following examples illustrate the use of the /R switch in changing the access protection codes l. The of directories. command: DSKA:[57,123] .UFD<222>/R=[57,123] .UFD<CR> changes the access code of the UFD identified by the number pair 57,123 to /222.. The command DSKA:[57,123,AAA,BBB,111] .UFD<222>/R={57,123,AAA,BBB,111].UFD<CR> changes the access code of the SFD named 111 to the value 222. .Note that the last name given in the [directory] identifier is the SFD which is affected by the /R operation. ’ 3.5.4 D-Switch, Delete Files This switch causes PIP to delete one or more specified files the device given in the destination side of the PIP command. one device can be specified in a delete command; the following command DSK:/D=FILFA,FILEB,FILEC.MAC, * .REL<CR> Only it is assumed that the source and destination devices are the same device. For example, from PIP - 410 - causes PIP FILEC.MAC If a to delete and all nonexistent from files file the user's having the is specified disk area extension in a files FILEA, FILEB, .REL. delete command, PIP prints the error message ¢2filename.ext FILE WAS NOT FOUND and continues to process deletions of the existing specified files. If an the existing file is found to be protected it will be skipped and message ?filename.ext is printed. from other If a user users' (2) has PROTECTION the correct FAILURE privileges he can delete files areas. NOTE An attempt to write-locked DEVICE dev.name‘OPR REQUESTED printed operator he message the BY will printed completion of a files deleted For example, disk and assume exists subsequent in at that * terminal. the that user's terminal. is no. When DECtape requested the operation, total number file three a current UFD: messages printed by DLELETED: BLOCKS station the the FILEAN.MAC 3 DECtape message operator user's start delete the *DSK:/D=FILEA.MAC IFILES a error a sys- unit actiocn and OPER be the the the from the write-enabled involved, to FILEA.MAC at has cause CONT On files in ACTION being tem delete results FREED <CR> of PIP blocks the PIP lists blocks in command would the names freed by length and for appear (user command) (PIP response) (PIP responsea) (PIP responsc) its as: the of deletion. named deletion and - 41 - 3.5.5 The Z Switch, use of - PIP Zero Directdry this switch causes PIP to zero out the directory of the destination's device; a source device does not have to be specified in the command. A Z-switch request is implemented before any other operation specified in the command string in which it occurs. Thus, DTA2:CARDS/Z=CDR:<CR> zeroes out the directory of DTA2 before transferring one file from CDR onto DTA2. The command DTA2:/Z=<CR> zeroes out If destination device the all the directory of DTA2. is the disk, the files whose names are an attempt is made to delete found in the directory specified. protection codes prohibit the deletion of some of the files, If the re- gquest will terminate after as many files as possible have been deleted, and the message ?filename.ext (2) PROTECTION is printed. The user tected files and repeat his example, the command For FAILURE should then change request the protection of the pro- if he wants all files deleted. DSK:FLOUT/Z=DTA2 : CARY <CR> zeroes from DTA2 3.5.6 This out the directory of to the disk, and the user's names the disk disk area, transfers file CARY file FLOUT. Q-Switch, Print Summary of PIP Functions switch causes device PIP to file SYS:PIP.HLP. print on a This file of all PIP switches and functions. specified device contains the system an alphabetical For example, list the command LPT: /Q=<CR> causcs the.followinq summary to be listed on the line printer: PIP - 412 - PIP Switches (Alphabetic QW Line Blocking Binary Processing Suppress Trailing HEOD Multiple Delete File (Card) List Disk (Mode) Spaces, Spaces Treat order) to Convert TABs Columns or 73-80 Directory DTA Summary as Spaces *Filenames GHIm® and Ext. only) Ignore I/0 Errors Image Binary Image Processing Punch Cards o=zt must be in 029 Directory See MTA Switches Sequence Same as /S is by 1 FORTRAN (Mode) (Mode) (Output Device CDP) List Delete " Processing switch, output Convert Below Numbers except Increment Conversion format control assumed. character for LPT listing. /B/P FORTRAN Binary Print (this) List of Switches and Meanings Rename File 0 Resequence, or to File; Add Sequence increment RN EgaAd Match parentheses Convert TABs to Copy Specified RIM, DTA to Destination MTA only. If tion format Zero Out in parentheses Spaces Files if format source source is extension RIM Loader, is RTB RIM 1g¢ source extension is is as RTB - RIM 1¢B extension is RMT SAV file destina- RIM1g. Directory by 8 means ). select cCHE"MDOMHENDW, followed ( (M#NA) , files, an Density Density Advance MTAl File Advance MTAl Record Backspace MTAl Backspace MTAl switch File Record Rewind MTA or DTA Skip to Logical EOT Rewind and Unload MTA or (M#ND), records. optional B.P.I. B.P.I. Mark (M#NB), or 8f¢ 556 2¢¢ B.P.I. Density Even Parity El is Only (<>) Multiple PIP is Number 14 switches: Enclose *This by Suppress Trailing Spaces Copy Block @ (DTA) file transfer. If destination format M is (M#NP) mean obtained by 3-20 : DTA EOF advance setting or backspace MTAn RIMSW=1 at assembly time. - 413 - 3.6 PERMITTED SWITCH COMBINATIONS The combinations of are permitted PIP A a B C D (N B cC ¢ V 4 v v v VvV Hog % T 4 in EF GH A A B v/ I I A IR D E PIP A T IR I PIP's standard commands J KL M N A A A A and special option are illustrated in O Q P A I R A A AR AR AN AR U v w A 2 /Sy T # A A S S g A X Y following 2 * # Delete only N2 Tt ASCII mode A v Always legal List Directory only % A v/ vV ¥ % ¢ ¢ 4 v 4 % % % 7/ A A v vV v # 4 A /Y Y A I $ Y 4 Binary mode AR T o4 ¢ 7 4 Binary mode Y2 o2 82 g 2 ASCII mode 2 7y = Unused # v vV A S A P /oy VA A A A A 2 A v T A 4 A ) 2 Yok A A 2 /42 2 Vo A A o4 A A A B A A 2 /A ¥ 2 Magnetic Tape Only Y /oY 4 ASCII mode Y o/ v ASCII 4 FORTRAN VY o/ # vV T o3 v v 4 # u 4 4 # 4 # V.V W 3 X v/ /g s v 4 /xSy Y /A oy /A LEGEND: Prints file PIP.HLP # Rename only v/ ASCII mode Y ASCII mode 4 A 2 e VY g VY VYA /AN g A A VYV o4 7Y v v # v List Directory only A # R z / Yoy * R s Notes Binary mode K M matrix. ASCII mode F G which ASCII mode Y A # % the switches ASCII mode v ASCII mode v/ ASCII or Binary mode v A A Yoy Symbol A permitted combination * Special Blank A A A Binary mode Output only Meaning v ? # A DTA only /' A permitted but unlikely combination Not permitted purpose Untested or combination unused combination , PIP - 414 - - 415 SECTION ~ PIP 4 SPECIAL PIP SWITCHES 4.1 SPECIAL This section contains magnetic 4,2 PIP tape, MAGNETIC FUNCTIONS error TAPE When magnetic descriptions of optional recovery and card punch PIP functions used in operations. SWITCHES tape .is used in a file transfer, PIP can set the périty and density parameters and position the tape reels. tape In PIP commands, magnetic tape switches apply to only one particular magnetic ‘tape The unit or optional file specification. PIP magnetic tape (MTA) switches are written enclosed in parentheses; the letter M is used as the first character of all optional switches or series of switches (e.g. (Msw) or (Mswlsw2..). "MTA switches must appear within the command file specifications of the particuvlar file to to a particular device to a particular file 4.2.1 which they refer. and, except for specification of Thus, density that MTA and switches parity refer selections, device. Switches for Setting Density and Earity Parameters ‘The default Monitor density of 8¢¢*bits—per-word‘(bpi) and odd parity are assumed unless either the Monitor SET DENSITY command was given or one of the following switches is included in the PIP command file specifications: Switch Meaning (M8) (M5) (M2) (ME) The to 8@ bpi density (default value) 556 bpi density 20@ bpi density Even parity (odd parity is default) following command MTA2 at 2@ bpi, string with even causes parity MTA2: (M2E) =MTAl (ME2) <CR> 4-1 PIP to (and transfer in ASCII a file from MTAl line mode) PIP - 416 - 4.2.2 The Switches following tape for Positioning switches are Magnetic used in PIP Tape command strings for magnetic handling: Switch Function (MA) Advance (MB) Backspace (MD) Advance (MP) Backspace (MW) (MT) Rewind tape reel. Skip to logical End-of-Tape. (MU) (MF) Mark Rewind In PIP MTA commands, example, to the tape reel Performed tape tape reel tape and one reel one reel file. one file. record. one record. unload. End-of-File. source device need not be rewind MTAl:, given. For type MTAl: (MW)=<CR> If a source transfer load device will a magnetic magnetic string. Density specification. and specified except in when the PIP command is string, requested to information rewind and un- tape. Several parity is occur, tape or In is even, the fifth files on functions parity, the be specified in a single when changed, will following example, density is and first, tape that may is to reel be are rewound to be appear the printed on in the set to the command file 20@ third, line bpi, fourth printer. LPT:=MTAl: (M2EW) , (MA) ,, <CR> If multiple the number decimal). related by three 1. backspace, of advance movements file required or is record movements specified by #n are needed, (interpreted as All positiéning switches are implemented before any file transfers files If a before are made; thus transferring backspace file a (M#nB) MTAl: (M#3A)-PTR: paper tape file request is given, will to it. after completion of "n+l" backspace files one advance file request is made unless the tape is at Load Point. 1In this way the tape is always initially positioned at the command : MTA@ : (MB) =<CR> beginning of a file. Thus, the advance MTAl - 417 will backspace MTA@Z file. 2. to the | start of ‘ the | PiP previous If the Load Point is reached before a backspace file or record request is completed, an error diagnostic will terminate the run and the following error message is printed ?LOAD POINT BEFORE END OF 3. BACKSPACE REQUEST? Only one MTA movement per file specification is - allowed in a command string. Thus: MTAQ : (MT#2B) =. . . <CR> is illegal since it requests two distinct types of MTA movement. 4.2.2.1 h BACKSPACE TO START OF CURRENT FILE - The specification of 2 as the value of n in a multiple backspace command (e.g., M#@B) the tape to be backspaced to the start of the current file. of M#@B is not the same as MB, 4.2.2.2 causes The use switch MB is equivalent to M#l1B. ADVANCE TO END OF CURRENT FILE ~ the value of n in a multiple advance command The specification of § as (e.g., M#@A) causes the tape to be moved to a point just before the EOF marker of the current filé. The use of M#gA is not the same as MA, switch MA is equivalent to M#lA. ’ NOTE The advance and backspace record requests are available as a convenience for the knowledgeable user, and should be approached with caution. Always remember that PIP typically has multiple input and output buffers and the physical position of the tape need not correspond to the physical position of the record currently being processed. 4,3 G-SWITCH, ERROR ' RECOVERY If the error recovery switch /G is present in a command string, a specific set of I/0 errors will‘be'acknowledged by error messages. The I/O errors affected by the presence or absence of /G are listed in Section 5, paragraph 5.2, flagged by an asterisk (*). item 3 of the error messages, and are Processing will continue after the error message is printed as though no error had occurred. errors occurring within a file may be overridden. Thus, must I/0 However, if the same error condition occurs in each buffer of the file, the error PIP - 418 - message occurs 1is or repeated the as an is obtained input subject I1/0 on if as core the errors can a error level will close J-SWITCH, J-switch each is image for a the to from current CARD PUNCH causes cards the current command be the disk end or or G-switch and, request in string must are written. is PIP. @29 mode. be the is is is, used, printing The used and not However, diagnosed not after it PIP. This to file searched therefore, and of directory diagnosed by file punched the listed Monitor; read If be A directories is output to either either the DECtape the be which may request. terminate until disappears. directory RELEAS specified by buffer read errors occur or 4.4 it input LOOKUP message, vice a when able The for condition file to Monitor error at typically, any a I/0 suit- output card -punch the de- (CDP). - 419 - PIP SECTION 5 PIP 5.1 ERROR MESSAGES This section error ERROR describes messages that REPORTING the various can occur types during The special treatment of the current job being prematurely AND recoverable PIP ERROR MESSAGES of error error messages terminated when Batch Processor is also described. When put an error message devices are terminates released. conditions and operations. which prevent running under the . a PIP This means run, that both all the input files, and out- fully or partly created, are available on the destination device. NOTE 5.2 TI/O All error (?) indicate a preceded fatal by a question (non-recoverable) mark error. ERROR MESSAGES I/0 error messages device and file; l. messages are opened with a description of the relevant for exampie, INPUT DEVICE DTA3:FILE FILNAM.EXT... 2. OUTPUT DEVICE DTA3:FILE FLNAM.EXT... 3. DISK DIRECTORY READ... Device Message DTA,DKS,MTA WRITE *CDR 7-9 ERROR MISSING *OTHER BINARY DATA *ALL DEVICE ERROR DEVICES *ALLL, DEVICES DTA BLOCK a G-switch : OR BLOCK ERROR NUMBER TOO LARGE ' INPUT - BUFFER OVERFLOW PHYSICAL EOT *MTA if INCOMPLETE . CHECKSUM OR PARITY : *OTHER *Recoverable error description of /G. (LOCK) PUNCH is used, read paragraph 4.3 for a PIP - 420 - Thus, for the command DTA4:CON.REL=DTA3:CON.REL, LOCKed, PIP prints ?0UTPUT Other 5.3 The messages FILE DEVICE for are: 7?DEVICE dev ?DEVICE dev NOT AVAILABLE REFERENCE request DOES EXIST (DEVCHR (INIT can occur (filename.ext) during then NOT FOUND or enter errors (1) NO (2) PROTECTION DIRECTORY (g) one a LOOKUP, RENAME or of the following: ILLEGAL FILE NAME (used only) FOR PROJECT-PROGRAMMER NUMBER FAILURE FILE WAS BEING MODIFIED RENAME FILE NAME ALREADY EXISTS ILLEGAL SEQUENCE OF UUOS BAD UFD OR BAD RIB NOT A SAV FILE NOT ENOUGH CORE DEVICE NOT AVAILABLE NO SUCH DEVICE NOT TWO RELOC REG. CAPABILITY NO ROOM OR QUOTA EXCEEDED WRITE LOCK ERROR NOT ENOUGH MONITOR TABLE SPACE (17) PARTIAL ALLOCATION (2¢) 'BLOCK NOT FREE ON ALLOCATION (21) CAN'T ONLY SUPERSEDE (ENTER) AN EXISTING DIRECTORY CAN'T DELETE (RENAME) A NON-EMPTY DIRECTORY SFD NOT FOUND SEARCH LIST EMPTY SFD NESTED TOO DEEPLY NO-CREATE ON FOR SPECIFIED SFD PATH (22) (23) (24) (25) (26) error request) request) disk. FILE WAS (3) (4) -(5) (6) (7) (19) (11) (12) (13) (14) (15) (16) NOT ERRORS error messages on for code ? (V) (V) is greater LOOKUP,ENTER, OR than RENAME 268’ the error message: ERROR printed. values the these used DECsystem-10 by the Monitor UUO's Calls LOOKUP, manual UUO's. | to of are S Error N is CON,REL WRITE (LOCK)ERROR 1. (@) the message: DTA4:FILE devices message:? If error 2. following ENTER the if DTA4 is WRITE ENTER for and complete RENAME. Refer descriptions - 421 The following. error messages request on may be PIP givén on a reject to an ENTER DECtape: The error message printed if there is no room for l. an entry in a DECtape directory is ?DIRECTORY FULL: The error message printed if a zero given for a DECtape output .file is ?ILLEGAL The tory NAME: following message is given search of ?NO 5.4 FILE PIP disk or FILE COMMAND filename is if a filename is not found in a direc- DECtape NAMED filename.ext ERRORS The following error messages are output by PIP on the detection of errors 1. in the user command. string: ?PIP COMMAND Some of the ERROR possible causes of this type of error are: a. an illegal format for a command sfiring, b. a nonexistent switch was requested, c.. a filename other than * or *.* was given for a non-directory (source) device. ?INCORRECT PROJECT—PROGRAMMER NUMBER: The project-programmer number must be in the form [number , number] where @<number<777777,, must be made if SFD's @ are full path specification involved. ?SFD LIST TOO LONG: Too many SFD's were listed in the full directory path. the A maximum of UFD) is five permitted levels fication. ?ILLEGAL (not including in a directory path speci' PROTECTION: The protection number must be in the form <number>, where: ¢<=number<=7778. 5-3 PIP - . 5. - 422 - 7?NO BLOCK The /U COPY switch was sembled 6. @ to ?TOC MANY allow REQUESTS Conflicting given. 5.5 Y-SWITCH The following in the PIP 1. 2. specified, but PIP was not as- this. FOR...(magnetic density tape) and/or parity occur only when requests were ERRORS error messages command the Y-switch is included string: ?DTA to Only DECtape PTP ONLY: input and paper tape output are permitted. ?/Y SWITCH NOT AVAILABLE THIS ASSEMBLY: 3. The /Y to allow FILE The extensions or but PIP was not assembled ILLEGAIL of the EXTENSION: filenames given must be .RMT, .SAV. Filename.ext The specified, this. filename.ext .RTB 4, switch was reasons ILLEGAL for FORMAT:. getting the diagnostic ILLEGAL FORMAT are: a. a zero length file was found, b. the required job data information was not avail- able, c. a d. an e. block a EOF was pointer word file. MESSAGES GENERAL ERROR The following is a of the 1. in any ?DISK This list of is is a previous when data the PIP block was expected but preceding OR DECTAPE message device a found source 5.6 cluded overlapped not (RIM 18), expected, found error messages in the which are not categories: INPUT printed specified for directory-type source REQUIRED: when a PIP a non~directory function which device. 5-4 source requires in- - 423 ?filename.ext ILLEGAL FILE ‘ PIP NAME: This message is output if an attempt is made to ENTER without giving a .filename. Errors found during /X, /%Z, /D, and /R operations result in error messages which pertain to the specific error found. Error messages for these operations are printed only if no other fatal error occurs before the command string is processed. If another error does occur, its diagnostic takes precedence over the diagnostics for the above switch functions. ?4K NEEDED: 4K not currently available but is needed reentrant ?DECTAPE disk (for non- system). I/O ONLY: The I/0 devicé for a block @ copy (/U switch) must be a DECtape. ?TERMINATE /X.MAX.'OF 999 FILES PROCESSED: PIP, during a /X copy function from a non-directory device, has processed 999 files. This is the maximum number of files which such a /X request can handle. ?TOO0 MANY' INPUT DEVICES: This error is for the /D and /DX functions; only one input device is allowed when these switches are used. If more than one device is specified in a /D command and the first device given is DSK, the disk files are deleted when this diagnostic is given. ?NO FILE NAMED PIP.HLP: The data file requested by a PIP Q- sw1tch is not available on the system device. ?LINE TOO LONG: During an ASCII mode file transfer a line containing more than 18f characters was detected. This occurs only when switches entailing line processing are ' given 10. (i.e., /A or /S). ?LOAD POINT BEFORE END OF BACKSPACE REQUEST: This diagnostic occurs only if either the MTA (M#nB) or (M#nP) switch is used. If the Load Point is sensed before the "n" backspace files or records function is completed, an error is assumed to have been made by the user. PIP - 424 - 5.7 If TMPCOR the used ing (DEVICE temporary or are TMP) ERROR MESSAGES storage attempted €rror messages facilities to can be used ?TMPCOR NOT AVAILABLE: 2., ?NOT 3. ?COMMAND 4. nn NOT ROOM YET TMPCOR WORD? Number of during PIP by the UUO operations, TMPCOR the are follow- occur: 1. ENOUGH provided word IN TMPCOR: SUPPORTED FOR TMPCOR: FREE locations free in the TMPCOR manual for storage area. Refer the to UUO the DECsystem-1§ TMPCOCR. Monitor Calls a description of - 425 - . APPENDIX STANDARD Filename Filename Type Extension A FILENAME Table PIP EXTENSIONS A-1 Extensions of File Meaning AID Source ALG Source ALP ASCII BAC Object Output from the BASIC Compiler. BAK Source Backup Source | Source file in BASIC languége. BIN Object Binary BLB ASCII Blurb BLI Source Source BNC ASCII BUG Object Saved CAL Object CAL data CBL Source Source ASCII Alternate convention for command file (@ construction for programs other BAS ' CCL : CKP . CHN ) Source file Source file - \ in AID language. in ALGOL language. Printer forms alignmeht. file from TECO or LINED. file. file. file in BLISS language. - BINCOM output. ‘ CCoO CMD , than to show a program error. and program files. file in COBOL language. COMPIL). ASCII Listing of modifications Binary Checkpoint core image Obiect CHAIN file, resident software. by COBOL operating ASCII ] file created system. Command file for indirect commands (@ construction for COMPIL). CMP ASCII COR ASCII Correctioh file for SOUP. ASCII CREF (cross-reference) input file. CRF | ~ to non- Complaint file by GRIPE. PIP - 426 - Table Filename Filename Extension Type A-1 Extensions (Cont'd) of _File Meaning CTL ASCII MP DAE Binary Default batch control output for dump. DAT ASCII, file. DAEMON-taken core : Data (FORTRAN) file. Binary DCR Binary Core image DDT ASCII Input file DIR ASCII Directory save (DCORE). to FILDDT. from FILE command or DIRECT program. DMP DOC PDP-6 ASCII PDP-6 format SAVE command. Listing recent of for a file created modifications version ERR ASCII Error message F4 Source Source file FLO ASCII English FRM ASCII Form. FUD ASCII FUDGE2 HGH Object a of the to the most software. file. in FORTRAN language listing Nonsharable by ‘ language. flowchart. output. high segment of a two-segment program. HLP ASCII Help s files containing switch explanations, etc. INI ASCIT, Initialization file. Binary LOG ASCII MP Low Object Low L.SD ASCIT Default output for DUMP program. L.SQ ASCII Queue LST ASCIT Listing Source Source file ASCII Manual (documentation) MAN batch log segment file. of a two-segment program. listing. data. in MACRO language. file. - 427 - PIP Table A-1 (Cont'd) Filename Extensions Filename Extensions Type of File Meaning file. MAP ASCII Loader map MEM ASCII Memorandum file.. MSB Object Music compiler binary output. MUS Source Music compiler input. OLD Source OPR ASCII Installation and assembly instructions. PAL Source Source file in PAL 1¢ PBT ASCII P-batch control PLG ASCII P-batch QuC Binéry QUD ASCITI, Binary * source Backup log program. (PDP-8 assembler). file. file. Queue change reéuest.file. Qfieued data file. ) ¢ file, request QUE Binary Queue QUF Binary Master queue and request file. REL Object Relocatable binary RIM Object RIM loader file. RMT Object Read-In mode (RIM)‘format file (PIP). RNC ASCIT RUNOFF input for producing a .CCO file. RND ASCII RUNOFF input for producing a RNO ASCII Programming specifications RNP ASCII RUNOFF input for producing a RSP ASCTI Script response time log file. RTB Object Read-In mode SAV Object Low segment from a one-segment program. SCP ASCIifi SCRIPT control SFD Binary Sub-file directory SHR Object Sharable high segment segment program. file. .DOC file. in RUNOFF input. (RIM1@B) .OPR file. format file (PIP). file. (restricted usage).. file of a two- PIP - 428 - Table Filename Filename Extension A-1 Extensions Type of __File (Cont'd) Meaning SNO Source Source SNP ASCII Snapshot SRC ASCII SRCCOM output. SVE Object .SAVed file SYS Binary Special TEC ASCII TECO TMP ASCII, Temporary file of in SNOBOL disk by from a System language. DSKLST. single user Monitor. files. macro. files. Binary TXT ASCII Text file. UFD Binary User file UPD ASCII Updates WCH ASCII SCRIPT XPN Object Expanded directory flagged Monitor save in (restricted margin (WATCH) file usage). (SRCCOM). file. (FILEX).
Home
Privacy and Data
Site structure and layout ©2025 Majenko Technologies