musicmarkup.info Readers MASTERING IBM I PDF

MASTERING IBM I PDF

Monday, July 29, 2019 admin Comments(0)

Download musicmarkup.info MASTERING IBM i The Only IBM i book you will ever need. Your best. [KINDLE] Mastering IBM i: The Complete Resource for Today's IBM i System by Jim Buck, Jerry. Fottral. Book file PDF easily for everyone and every device. mastering ibm i the pdf. Mastering Strategic Management is designed to enhance student engagement in three innovative ways. The first is through visual.


Author:LEIF LEATHERS
Language:English, Spanish, Arabic
Country:Uzbekistan
Genre:Health & Fitness
Pages:800
Published (Last):24.07.2015
ISBN:709-8-15598-767-5
ePub File Size:17.52 MB
PDF File Size:17.46 MB
Distribution:Free* [*Sign up for free]
Downloads:28154
Uploaded by: DODIE

Jim Buck and Jerry Fottral. MASTERING IBM i. The Only IBM i book you will ever need. Your best resource for today's IBM i. Jim Buck Jerry Fottral. MC Press. Jim Buck and Jerry Fottral MASTERING IBM i The Only IBM i book you will ever need. Your best resource for Views 14MB Size Report. DOWNLOAD PDF . A comprehensive introduction to IBM i—the operating system that runs on IBM's Mastering IBM i and millions of other books are available for site Kindle.

Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website. Please help us to share our service with your friends. Luis Panao Category: Share Embed Donate.

IBM i Access for Web. IBM i Access for Windows: Installation and setup. IBM i client partition considerations. IBM Infoprint Fonts: Font Summary. Introduction to Type Transformer and Utilities for Windows. Japanese Font Library Technical Reference. Korean Font Library Technical Reference. Simplified Chinese Font library Technical Reference.

IBM Toolbox for Java. ICF Programming. IDDU Use. ILE Concepts. Implementing high availability. Infoprint Fonts: Creating User Defined Characters. Infoprint Server for iSeries: Introduction and Planning Guide.

User's Guide. Installing, upgrading, or deleting IBM i and related software. Integrated file system. Intrasystem Communications Programming. Intrusion detection.

IP filtering and network address translation. Journal management. Local Device Configuration. Maintaining and managing IBM i and related software. Management Central. Maximum capacities. Memo to users. About IBM i information. Multithreaded applications. Network authentication service. Object signing and signature verification. Operations Console. Optical device programming.

Integrated operating environments. Performance Tools for iSeries. Planning for and setting up system security. Planning a backup and recovery strategy. Quality of service. Query Management Programming. Query Manager Use. CPYF Enter. You should now see an entry or command prompt display with a message appearing at the bottom of the screen. What does the message say? To get to the additional message text, move the cursor down to the message line and press Page down.

What does the next message say? This happens whenever you run a command by pressing Enter without providing necessary parameter values. Normally, if you realize that parameter values are required, you would use the prompt function F4 instead of pressing Enter. The command prompt screen shows you information that the system needs to execute the command. For many parameters, the system provides default values.

Those values are already entered on the line when the command is initially prompted. Notice the indentation of Library under From file and To file. So Library is not a separate parameter but is part of the From file or To file object name. We explore the important concept of a library list in more detail in Chapter 2. Also notice that the only valid choice listed for From file is Name in other words, no special values are allowed for this parameter.

What is the default for Print format? For other parameters, you can simply type over any defaults that need to be changed. You can use the online Help facility when you need to know what a certain display is for, what a particular command does, or what value a certain parameter requires. Now press Help F1 to get information from the system about the meaning of the From file parameter. You can get extended Help in one of two ways. Place the cursor in a part of the screen that is not sensitive to an entry or zone.

Now press F1 or Help. You should see the same Copy File Help screen that you saw when you pressed F2 for extended Help previously.

Aligning MDM and BPM for Master Data - IBM Redbooks

We should review the organization of extended Help. First, there is an explanation of the general topic—in this case, the CPYF command. Now page down and you see restrictions to the use of the command, followed by error messages that could result. F3 F3. From the Main menu, you can select choice 90 to sign off. Doing so will return you to the IBM i sign-on screen. Along the way. Armed with that knowledge. Using IBM i. You can key in CL commands and execute them directly from a command line.

Most command names consist of a verb. You use spaces to separate a command name from its parameters and to separate multiple parameters when a command requires them. All CL commands consist of a command name.

IBM i does not make you select one mode or the other—the system is not exclusively menu driven or command driven. Unlike some OSs. In general. Command Names Let us examine the structure of command names in more detail. You use CL to interact with and get work done on the system. A general rule for CL command naming is most verb. Table 2. As you can see. For now. We discuss these two CL commands in more detail later. Neither can you Display a Description.

Open or do not contain three consonants e. Each keyword-value set is a single parameter. When you use parameter keywords. Figure When you use keyword notation. After you press F Figure 2. Library type.

Yet if you use keyword notation. But if you know that a function key is active for a certain screen. F11 acts as a toggle between the initial Choices command prompt screen Figures 2. When many function keys are active and they cannot all be displayed on the two lines allowed.

Lab 1. In the command prompt context.

Mastering IBM i | Computer: Operating Systems | MC Press Online

F11 works from any command prompt screen. If you enter values for the parameters. If the values you enter are valid and the command is executed successfully. After you type in the necessary parameter values. You can recall an earlier command one lower in the stack by repeatedly pressing F9. If you press F9 from the screen you see in Figure 2. To recall the most recently executed command. Each command has a maximum positional parameter attribute. To illustrate. The values you enter for a particular parameter correspond exactly by position to the sequence of parameters as shown on the command prompt screen or in the documentation at the IBM Information Center Web site.

Using positional notation. You do not exceed the maximum number of positional parameters allowed for a particular command. When you use positional notation. Positional notation works as long as a. Do not worry too much about all these abbreviations and commands—there is no need to try to memorize a long list of them. Once you have found a command. The most productive time to study them is when you will be using them. As you gain experience. We suggest that.

You will be able to recall commands you use often without much effort. Verb Commands. The easiest way to reach the highest level of the command-menu hierarchy is simply to press Prompt F4 from any empty command line.

If you press F4 without typing anything else. Work Management. The menu names of these latter categories. As you can see by looking again at the options available from the Major Command Groups menu Figure 2. It shows the actual command name. Both contextual and extended Help are available from this screen. The menus are also helpful if you know the noun but are not sure how to specify the verb or whether the intended verb is permitted for that noun.

Reaching the Clear Commands Menu. This CL command always has one required parameter: Display User Profile. To see how this process works. Press PgDn. On any command line. For this example. Notice that once again More. In the common case of an object name being required as a parameter e. Even though this is an information display. A library list consists of four parts. You have seen a reference to the library list in several commands we have already examined.

Library Lists When using any system object or an object you have created e. A library list is created for each job. If you press PgDn. The screen in Figure 2. System value is required. To check the possibilities for the Output parameter. The shipped system libraries should include the following: Objects Within Libraries You should now understand the following points about the relationship among objects. User Library List The user library list names the libraries that organize the programs.

The OS handles this adding and removing of the appropriate product libraries automatically with no user intervention. For most jobs. Current Library The current library is a specially designated user library into which.

Because different users perform different types of work and have different requirements. Once you have done this. The user library list is customized in a number of ways: As an alternative. Unless you specify otherwise. We examine these library-list concepts again. This association is logical—object storage locations are assigned by the system. This chapter also has covered keyword and positional notation. It is important to remember that a command normally consists of a verb CRT.

When objects are created. Every individual user on the system may have a unique. The needs of the individual user determine the libraries included in the user library list. More commonly. If no current library is designated. A few object types are always created in QSYS.

For user applications. The user library list is composed of four parts: The library list is searched in the following order: In the following lab.

List the rules for using positional notation. You should not hesitate to use Help in the future whenever a question arises or you need more information than a lab exercise provides. After you have completed the lab. What libraries are usually in the system portion of a library list? When a user requests an object. When a user creates a new object. If you are not already signed on. Lab 2 Introduction This lab concentrates on some basic skills that every programmer. Ignore the last three entries and press Enter.

Main menu. Why is the current library important? As you work through the lab. Remember that pressing Field Exit on a PC. For Password. Press Help from an empty command line or other nonsensitive area of the Main menu.

What is the maximum number of libraries in the system library list? You display and change your library list. You use the GO command to get to a command menu and to shortcut a menu path. How would you display the libraries that make up the system library list? Which option or options would you use to display the history log? Which menu option or options would you use to display the status of a device? Read through the Main menu Help screens. Which Main menu option would you use to change your password?

Which option lets you work with the hardware resources of the system? It also describes the range of operations available with each Main menu choice. Hypertext links are provided for additional information about the highlighted topics. Which command key function key pulls up the last command run from the command line? Because the cursor is now on the command line. Now move the cursor up to the line for option 6 Communications.

If you have questions about a certain menu selection. To get more information about using this command. Please do this now. You can also use the GO command to reach a menu of related commands.

Use Tab instead of moving the cursor up or down to return the cursor to the command line. Then return to the Main menu. Use context-sensitive Help. Doing so gives you contextual. As you have learned. You could also use New line on this screen or press F9 to move the cursor there directly.

What value would you enter to display a list of menus related to both programming and problem handling? From this menu. Now return to the Main menu. Who can use the command? You can run execute any of the commands from the menu either by typing the command itself or by entering its option number on the command line. Using one of these techniques. Although you reached this screen by going to a menu of related commands.

To obtain a description of any of these commands. If you wanted to go directly to the Programming menu option 5 on the Main menu after you sign on.

Caution Complete Part 3 of this lab entirely before you sign off. Press F Now press F1. Doing so should bring you to the Change Profile command prompt screen Figure 2.

Obtain additional message text. We would like each student to have his or her own library in which to store objects created during the course. If you have just signed back on at this time. Study the entries on this screen. With the Current library parameter value as it is. According to the screen. What is listed as your current library? You normally. Create a user library. Exit Help. Press Help on the message line. Now press Enter.

I pdf ibm mastering

Press Field Exit if your name is shorter. This message type means the message does not require a response. What does the message at the bottom of the screen say? Severity level 00 is the lowest level. The Additional Message Information display Figure 2. When a message is not clear. Move the cursor down to the message line. When you are keying the following parameter values. You have just used the menu-selection path to arrive at a command prompt screen.

But in this case. Select option 4 and press Enter. The Recovery information indicates that you should check the spelling of the library name you used for the Current library value. This will take you to the Files. Exit Help and then press F3 if necessary to return to the Main menu.

What is the actual command name? Note It is important to realize that instead of reaching this screen through the menu path. Case does not matter. Type your user name as for sign-on as the value for the Library parameter..

What is displayed on the message line at the bottom? So you need to take the second piece of advice from Recovery and create the library. To which screen have you returned? For Text description. Even if you type in lower case.. If you were not at the screen you see in Figure 2. Related commands.

This feature saves you from having to specify the particular library in which the object is stored whenever you need to reference it. On the resulting screen. You should now be looking at a screen similar to the one in Figure 2. Is the library you just created on the list? Unless you have signed off and back on again since you completed Part 3 of this lab. To get your newly created test library into the library list. How many libraries are currently in your library list?

From this screen. An additional parameter lets you change the current library. What is the keyword for this parameter? Can you remember the function key that toggles between choices and keywords? The library list here is a typical student library on our system.

Unless you misspelled your library name. Find the command to change your library list. Type your old password. If this is not so. The password. You should now see your library designated as the current library list type is CUR. For security purposes. USER menu. Type your new password twice. Record on your answer sheet all libraries in your library list that belong to each library list type. Recall from the text that a library list can comprise four list types: Now that you have created a library and made it your current library.

Caution Before you go on. But not all library-list types are always present in a particular library list. Which type is not represented in your list. A potter who studied in Japan. It is easy to change your password. These are not passwords the average hacker would be likely to hit upon.

The system you are using will probably have a list of password rules. But if you do get in a jam. Passwords are not made available to anyone on the system. Here are some additional rules for user-generated passwords: IBM i has several security system values that limit password format and use.

Caution One thing you should remember about IBM i passwords is that if you change yours and then forget it. A good way to select a secure but easy-to-remember password is to start with a sentence. The password must be at least 8 characters long. A good candidate for a password would be some personal or technical term.

Type in your current password. Doing so takes you to the Change Password screen Figure 2. To change your password. If all goes well. If this is not the case. When you have changed your password. Now repeat your new password on the New password to verify line.

Carefully type your new password. Explain the purpose of object types and list several common ones. Almost every named entity in the OS is an object.

In this chapter. Describe how the system uses a library list to locate a requested object. Hardware devices are not objects. Objects are the internal structures on which the instruction set of the OS operates. Figure 3. The diagram in Figure 3. This interface protects each object.

You might also like: THE MASTERY OF LOVE PDF

The TIMI layer serves the very useful purpose of insulating the logical machine from the physical machine so that programs are not dependent on the hardware. New code more than 1 million lines of the total. As you can see from Figure 3. This independence also protects the knowledge investment of programmers and users because the screens they use to do their work at the level of the logical machine may change only slightly. The internal code translates the object-based instructions of the logical machine i..

OS upgrades from one version and release to another accomplish this task. This translation of the high-level machine instruction set by SLIC to carry out hardware operations is called layered machine architecture. Software written for the older machines is quickly converted without recompilation in most cases and runs as true bit software on the newer RISC boxes— with no need for slowed-down emulation or costly rewrites—even though at the processor hardware level as well as in many other hardware components.

The old high-level machine interface. It provides a consistent approach to object management and security hacking and viruses. Among other advantages. Real memory management both main and secondary becomes a function of the internal code and not of the applications. Because programs do not deal directly with hardware and are therefore not concerned with physical storage addresses.

With each new release of the OS. The Power System hardware of tomorrow will be a very different machine from that of today. The OS provides more than 75 object types that encompass all applications and system resources.

What a great return on software development costs. IBM makes available expanded communications. IBM adds new object types as required. In addition to program—hardware independence.. IBM i. A library provides a logical reference to objects by using address pointers. It is important to realize that a library is not a physical collection of objects but a single-level directory to a group of related objects.

When you create an object. In addition to address pointers. RPG — — When you create an object. For example.. In this way.

Some CL commands work with any type of object. You can use libraries to organize objects by owner. Table 3. When you specify a simple object name i..

If your library list looks like the one in Figure 3. Sample Library Search. Requesting an Object When you request an object. When you add new libraries to the library list. Notice also that another program of the same name. By including the object type in the library entry.

The system does not search any part of the library list.. Library-List Commands Often during an interactive job it may be necessary to add or remove libraries from the library list. We introduce several of these commands in this section.

Attempting to add to your library list a library to which you are not authorized will cause an error. A library that has been removed from the library list still exists on the system. The OS has several CL commands that let you work with a library list. The system determined that you were authorized to use the library-list libraries when your job began. In summary. You can use several different commands to change the current library or the user part of your library list.

Sample Library List The library list in Figure 3. One of these commands. The old current library is not added to the user part of the list. For this reason. Sometimes you need to change the relative order of libraries already on the list or add or remove several libraries at a time. Let us look at how you can use this command to change the library list to run.

If you wanted to remove a single library from the user library list. You can type over an existing name to replace it with a different library name.

Ibm i pdf mastering

Because the system searches the library list from top to bottom. If you tried to run a command without supplying the required values, the entry fields of the required parameters would be displayed in reverse image, along with an error message. For other parameters, you can simply type over any defaults that need to be changed.

You can use the online Help facility when you need to know what a certain display is for, what a particular command does, or what value a certain parameter requires. On many displays, you can obtain specific information about a given entry from context-sensitive Help by moving the cursor to that area or line and then pressing Help. Now press Help F1 to get information from the system about the meaning of the From file parameter. The file you name must be one of four types of files—what are they?

General Help that explains the purpose of the screen, the command, entry fields, and perhaps function keys is called extended Help. You can get extended Help in one of two ways.

The first way is to press F2 from a field Help screen like the one you are looking at now. F2 The second way is to press F1 or Help from a non—field-sensitive area of the screen. For example, move the cursor up so it is on a line anywhere above the first input field line. Now press F1 or Help. We should review the organization of extended Help. First, there is an explanation of the general topic—in this case, the CPYF command. Now page down and you see restrictions to the use of the command, followed by error messages that could result.

Following the error messages, you begin to see field Help—in this case, an explanation of the parameters of the CPYF command and their possible values. Page Down several times Many screens of Help information are available for the CPYF command because it has a large number of parameters and therefore many fields. F3 F3 1. From the Main menu, you can select choice 90 to sign off.

Doing so will return you to the IBM i sign-on screen. Armed with that knowledge, you will create a user library and then change your user profile so it will recognize your newly created library as the current library. Along the way, you gain knowledge about libraries and library lists and about how they are used in IBM i.

You use CL to interact with and get work done on the system. Using IBM i, you have a choice: You can key in CL commands and execute them directly from a command line, or you can follow a menu path to a command prompt screen, a workwith list screen, or an information screen. Unlike some OSs, IBM i does not make you select one mode or the other—the system is not exclusively menu driven or command driven. For example, within an interactive job, you can use a command when it is convenient, or you can use a menu path if you cannot determine the appropriate command.

In addition, because most screens have a command line, it is usually not necessary to switch to a different environment to run a CL command. Control Language Syntax As you begin working with CL commands, you need to understand the syntax of the language. In general, syntax refers to the proper arrangement of words to form phrases, clauses, and sentences.

A somewhat more rigorous definition of syntax would be the selection and ordering of language elements to form meaningful expressions. Luckily, the syntax of CL is simple and straightforward.

All CL commands consist of a command name, and most CL commands require one or more parameters. You use spaces to separate a command name from its parameters and to separate multiple parameters when a command requires them.

A simplified syntax notation for a CL command entered on a command line would look like this: Command Names Let us examine the structure of command names in more detail.

In addition, some command names use a third segment, which functions as an adjective modifier to the noun. A general rule for CL command naming is most verb, noun, and modifier abbreviations in CL commands are three characters long, and many skip the vowels and use the first consonants of the English word. As you can see, however, the use of LIB to represent Library is an obvious exception to this rule.

Table 2. However, two commonly used command verbs are exceptions to this rule: We discuss these two CL commands in more detail later. For now, as we look at the command names in the Example column of the table, we can make some observations about the use of the noun and modifier parts of a command name: Not all nouns and modifiers use three letters. Some nouns always need a modifier. The List commands L as a noun are usually attached to a modifier: Some nouns and modifiers are the names of utilities or language compilers: When you use parameter keywords, the parameter value must immediately follow the keyword, and the value must be enclosed in parentheses, as the following syntax statement illustrates: Each keyword-value set is a single parameter.

One or more spaces must separate the command name from the first parameter and separate each parameter from the next parameter. When you use keyword notation, the order of parameters is not essential. Figure 2. Yet if you use keyword notation, either of the following commands, or any of the several other possible permutations, entered on a command line or in a CL program, would work: After you press F24, the screen in Figure 2.

In the command prompt context, F11 acts as a toggle between the initial Choices command prompt screen Figures 2. But if you know that a function key is active for a certain screen, you can use the key even if it does not appear in the two-line function-key list. If you enter values for the parameters, the command prompt screen looks like the one in Figure 2.

After you type in the necessary parameter values, you can press Enter to execute the command. If the values you enter are valid and the command is executed successfully, a message indicating a successful result is displayed, as you see at the bottom of the screen in Figure 2. To recall the most recently executed command, you can press the F9 Retrieve command function key on any screen that has a command line. You can recall an earlier command one lower in the stack by repeatedly pressing F9.

If you press F9 from the screen you see in Figure 2. When you use positional notation, the order in which you specify parameters is very important. Positional notation works as long as a. The values you enter for a particular parameter correspond exactly by position to the sequence of parameters as shown on the command prompt screen or in the documentation at the IBM Information Center Web site, http: You do not exceed the maximum number of positional parameters allowed for a particular command.

Each command has a maximum positional parameter attribute, which sets the limit for that command. As you can see, using positional notation can be tricky. We suggest that, in general, and especially until you get used to the commands and parameters you use frequently, you should rely on command prompting and just enter or change the parameter values in the entry fields of the command prompt screen.

As you gain experience, you will find it more convenient to type commands directly on a command line without prompting—particularly for those commands that use the defaults or require you to enter only one parameter. Do not worry too much about all these abbreviations and commands—there is no need to try to memorize a long list of them. We cover specific commands in more detail when we need to introduce them in the text and labs. The most productive time to study them is when you will be using them.

You will be able to recall commands you use often without much effort. Once you have found a command, you can easily get to a command prompt screen. The easiest way to reach the highest level of the command-menu hierarchy is simply to press Prompt F4 from any empty command line. If you press F4 without typing anything else, the screen in Figure 2. The Major Command Groups MAJOR menu arranges its choices in broad categories so that if, for example, you wanted to peruse a list of all the verb or action commands, you could select option 2, Verb Commands.

As you can see by looking again at the options available from the Major Command Groups menu Figure 2. Both contextual and extended Help are available from this screen. The menus are also helpful if you know the noun but are not sure how to specify the verb or whether the intended verb is permitted for that noun. This CL command always has one required parameter: For example, as the diagram in Figure 2. To see how this process works, suppose you want to check the current values of your user profile, but you are not sure which command to use.

You can deduce from what we have already covered that the abbreviation for profile is likely to be PRF. In this case, the shortest route is to use the GO command to have the system list all commands related to profiles. Press PgDn, and on the second page of this menu you will find the command you need: Display User Profile, which is option For this example, use the defaults for these parameters.

Notice that once again More. If you press PgDn, you can view additional information about this user. Even though this is an information display, you can get field Help for parameters and extended Help about the command or display.

Library Lists When using any system object or an object you have created e. A library list is the definition of the path of libraries a job searches when trying to find commands, programs, files, or other IBM i objects. You have seen a reference to the library list in several commands we have already examined.

97866533-Mastering-IBM-i-Mcpress-2011-Ed1.pdf

In the common case of an object name being required as a parameter e. A library list consists of four parts, which Table 2. To check the possibilities for the Output parameter, you would move the cursor to the Output field line and press Help F1. The screen in Figure 2. The shipped system libraries should include the following: Product Library The OS inserts a product library when the library is needed for some task a user has requested.

The OS handles this adding and removing of the appropriate product libraries automatically with no user intervention. Current Library The current library is a specially designated user library into which, by default, newly created objects are placed.

When a current library is specified, it follows the product library in the library list. The current library is significant because it is searched before other user libraries when an object is requested.

It is helpful for each user to have his own library to keep track of test files, programs, screen layouts, query reports, and so on.

Having individual libraries prevents conflicts with other users about object names because all objects of the same type must have unique names within a single library. Once you have done this, all objects you create will go into your library automatically unless you specify otherwise. User Library List The user library list names the libraries that organize the programs, screens, data files, and applications that users need to do business on the system; the user portion of the library list can contain up to library names.

Because different users perform different types of work and have different requirements, the user library list can be customized for each user or for groups of users that have similar needs. The user library list is customized in a number of ways: Normally, many different users need to share objects in user libraries; objects in the current library tend to belong to, and are used by, an individual.

Follow the Author

For most jobs, several IBMsupplied libraries, which begin with the letter Q, also are included in the user list. Objects Within Libraries You should now understand the following points about the relationship among objects, libraries, and library lists: This association is logical—object storage locations are assigned by the system; objects are not physically stored within a library area on disk.

Unless you specify otherwise, most new objects are placed in the current library, if one is designated for the job. A few object types are always created in QSYS. If no current library is designated, a default IBM-supplied user library is used. Unless you specify otherwise, the system searches the library list for requested objects. The library list is searched in the following order: Individual libraries are searched in the order specified in the library list, from top to bottom.

The needs of the individual user determine the libraries included in the user library list. Every individual user on the system may have a unique, personally tailored library list. More commonly, groups of users with similar work requirements have the same or a similar library list with, perhaps, only the current library being unique. We examine these library-list concepts again, and in more detail in the following chapters, and you apply them in lab exercises from this chapter on.

This chapter also has covered keyword and positional notation, along with the important differences and rules used when users are submitting commands in each format. IBM i menu commands help users find the commands they need. The hierarchical menu design allows even novice users to find and execute the commands they want. For example, if they do not know the noun of a command but know the verb, and they want to display an object DSP , they can find a menu that contains all of the display commands by typing the command GO CMDDSP.

The library list is an important IBM i concept used to efficiently locate requested objects; the list can be changed to accommodate the needs of a job. The user library list is composed of four parts: In the following lab, you will use both extended Help and field Help to answer questions about menu choices and command parameters.

You should not hesitate to use Help in the future whenever a question arises or you need more information than a lab exercise provides. You will also discover how to change your user profile, display additional message information, create a library, display your library list, and change your library list.

After you have completed the lab, you will be able identify and describe the following additional commands not covered in the text: What is the first library that is searched when a user requests use of an IBM i object? List the rules for using positional notation. What is the significance of the system library list? What is the maximum number of libraries in the system library list? What libraries are usually in the system portion of a library list?

How would you display the libraries that make up the system library list? Why is the current library important? When a user creates a new object, what is the default location of the object? Lab 2 Introduction This lab concentrates on some basic skills that every programmer, operator, or technical user often needs.

As you work through the lab, you become more familiar with using online Help to get information about a display or input field. You use the GO command to get to a command menu and to shortcut a menu path. You display and change your library list. You also change the password of your user profile. Part 1 Goals Use Help to get information about a display.

Start at Main menu. Procedure Press Help from an empty command line or other nonsensitive area of the Main menu.

If you are not already signed on, sign on as before, entering the user profile your instructor gave you up to 10 characters total as the User value. Remember that pressing Field Exit on a PC, Tab serves the same function jumps you down to the beginning of the next entry field when you are finished entering characters on the current line.

For Password, enter your user password. Ignore the last three entries and press Enter. At this time, you should see the Main menu display. Because the cursor is now on the command line, press Help from there to get extended Help. It also describes the range of operations available with each Main menu choice.

Hypertext links are provided for additional information about the highlighted topics. Read through the Main menu Help screens, and answer the following questions on the answer sheet: Which command key function key pulls up the last command run from the command line?

Which Main menu option would you use to change your password? Which menu option or options would you use to display the status of a device? Which option or options would you use to display the history log? Which option lets you work with the hardware resources of the system? What value would you enter to display a list of menus related to both programming and problem handling? When you are finished, return to the Main menu.

If you have questions about a certain menu selection, you can move the cursor to that area of the screen before you press Help, as you did on the entry fields of a command prompt screen.

Doing so gives you contextual, or field-sensitive, Help. Now move the cursor up to the line for option 6 Communications , and press Help to see how this option is used. Then return to the Main menu. Use Tab instead of moving the cursor up or down to return the cursor to the command line. You could also use New line on this screen or press F9 to move the cursor there directly, which will recall the previous command if there was one. Part 2 Access a menu using the GO command.

Goals Display your user profile. Use context-sensitive Help. As you have learned, you can use the GO command to go directly to a menu. To get more information about using this command, type GO on the command line, and then press Help. Now return to the Main menu. You can also use the GO command to reach a menu of related commands.

From this menu, you can select the specific command you need and then prompt for parameters. The format of this GO command is GO CMDxxx, where xxx is either the verb part of the command or the noun subject on which the command will perform its action. Please do this now. How many different user-profile commands are there? To obtain a description of any of these commands, you can move the cursor to the selection and press Help, or just type the selection number on the command line and then press Help.

Whose profile is changed? Who can use the command? You can run execute any of the commands from the menu either by typing the command itself or by entering its option number on the command line. For example, select the Change Profile not Change User Profile command by entering its option number on the command line and pressing Enter.

The profile here is a typical student profile on our system; your profile values will be different. Although you reached this screen by going to a menu of related commands, you also could have gotten here by entering the command itself, CHGPRF, and then requesting prompting F4 from any command line.

What values are allowed in this field? Press F Now press F1.

List the meanings of the values allowed in this field. What is listed as your current library? With the Current library parameter value as it is, what actual library will be used as your default current library? Exit Help, returning to the Change Profile screen. Study the entries on this screen. According to the screen, which menu will you first see after you sign on?

If you wanted to go directly to the Programming menu option 5 on the Main menu after you sign on, what would you change this parameter value to? Remember how a menu is identified? Part 3 Goals Change your user profile. Obtain additional message text. Create a user library. Press Help on the message line. Caution Complete Part 3 of this lab entirely before you sign off. Your instructor or the system administrator will need to fix your profile before you can log on.

Doing so should bring you to the Change Profile command prompt screen Figure 2. We would like each student to have his or her own library in which to store objects created during the course, so try to change the value of the Current library parameter to a library with the same name as your user name sign-on user ID. With the cursor on the Current library entry field, type your user name first initial and last name over the default value.

Press Field Exit if your name is shorter. Notice that if your first initial plus last name exceeds 10 characters, the cursor jumps down to the next entry field; if this happens, be careful not to erase anything by typing over it. Now press Enter. What does the message at the bottom of the screen say? Move the cursor down to the message line, and press Help. The Additional Message Information display Figure 2. Severity level 00 is the lowest level, an informational or warning message.

This message type means the message does not require a response. In addition, the information screen gives some explanation about the cause of the message and provides steps to take for recovery. The Recovery information indicates that you should check the spelling of the library name you used for the Current library value. So you need to take the second piece of advice from Recovery and create the library. Exit Help and then press F3 if necessary to return to the Main menu.

Select option 4 and press Enter. You have just used the menu-selection path to arrive at a command prompt screen. What is the actual command name? Note It is important to realize that instead of reaching this screen through the menu path, you could have typed the command itself assuming you knew it on any command line and then pressed F4 for prompting. When you are keying the following parameter values, remember not to press Enter until you have completed the command prompt screen and are ready to run the command.

Type your user name as for sign-on as the value for the Library parameter. Case does not matter. Even if you type in lower case, the OS converts all CL parameter values, except quoted character strings, to upper case.

When you enter a parameter shorter than the maximum length of the input field, pressing Field Exit moves the cursor ahead to the next field. For Text description, enter your full name and the course name e. To which screen have you returned? What is displayed on the message line at the bottom?

Now you have changed your user profile and created a library. If you were not at the screen you see in Figure 2. You should now be looking at a screen similar to the one in Figure 2. How many libraries are currently in your library list? Is the library you just created on the list?

Unless you have signed off and back on again since you completed Part 3 of this lab, you will not find your new library in the library list. When you change the Current library parameter of your user profile, the library list of the current job is not immediately changed; the change takes effect the next time you sign on.

To get your newly created test library into the library list, you can use one of several commands to change the library list during your interactive job. Find the command to change your library list, enter its option number on the command line, and press Enter. The library list here is a typical student library on our system; your library list values will be different. From this screen, you can add or remove libraries from the Libraries for current thread parameter.

Use Help to find out which part of the library list is affected by changes to this parameter value. An additional parameter lets you change the current library. What is the keyword for this parameter? Can you remember the function key that toggles between choices and keywords? You should now see your library designated as the current library list type is CUR. Caution Before you go on, you must be sure that your test library has been added to your library list.

Recall from the text that a library list can comprise four list types: But not all library-list types are always present in a particular library list. Record on your answer sheet all libraries in your library list that belong to each library list type. Which type is not represented in your list, and why do you suppose that is so? When you have finished recording your library-list information, press F3 until you have returned to the Main menu.

Type your old password. Type your new password twice; press Enter. Now that you have created a library and made it your current library, it may be time to establish a little security over your work environment. Because the security of a user profile is in many cases extremely important, IBM i has several security system values that limit password format and use.

For example, individual passwords may be required to be changed every certain number of days, may be limited to a certain minimum or maximum length, may not use repeating characters, and may not be able to be used twice within a set number of changes. A good candidate for a password would be some personal or technical term, perhaps in a foreign language. A potter who studied in Japan, for example, might use the Japanese names of some of his favorite stoneware and porcelain glazes.

These are not passwords the average hacker would be likely to hit upon. It is easy to change your password, and some installations require you to do so regularly.

Pdf i mastering ibm

Caution One thing you should remember about IBM i passwords is that if you change yours and then forget it, nobody can find it for you. Passwords are not made available to anyone on the system, regardless of special authority.

Not even the system security officer can find out your password should you forget it. But if you do get in a jam, the security officer can change your user profile to recognize a different password so you can get back on the system. A good way to select a secure but easy-to-remember password is to start with a sentence.

The system you are using will probably have a list of password rules. Here are some additional rules for user-generated passwords: The password must be at least 8 characters long. The sequence of the first 3 characters cannot be in your login ID.

To change your password, first select User tasks from the Main menu. Then, from the USER menu, select option 8 to change your password. Doing so takes you to the Change Password screen Figure 2.

Change Password Screen with Cursor on Current Password The cursor will be positioned on the Current password entry field, but you cannot see the field entry area, and nothing you key on this screen will be displayed.

Do not press Enter until you are finished supplying all values. Type in your current password, and press Field exit. Carefully type your new password, and then press Field exit.

Now repeat your new password on the New password to verify line, and press Enter. When you have changed your password, return to the Main menu and sign off. Objects are the internal structures on which the instruction set of the OS operates. Almost every named entity in the OS is an object, including libraries, source files, commands, programs, database files, user profiles, authorization lists, device descriptions, and many others. In this chapter, we see how objects are identified to the OS i.

We also introduce a few library-list commands that can help ensure that the system can find an object. Finally, we introduce the concept of work management and examine job scheduling, batch processing, and how spooled output is managed and eventually printed.

Explain the purpose of object types and list several common ones. Describe how the system uses a library list to locate a requested object. Demonstrate the use of a qualified name to reference an object. This interface protects each object. Applications and the OS relate to the object through this interface and never deal with hardware-specific details.

Figure 3. The diagram in Figure 3. The internal code translates the object-based instructions of the logical machine i. As you can see from Figure 3. The TIMI layer serves the very useful purpose of insulating the logical machine from the physical machine so that programs are not dependent on the hardware.

This translation of the high-level machine instruction set by SLIC to carry out hardware operations is called layered machine architecture. OS upgrades from one version and release to another accomplish this task. However, existing applications and OSs deal with hardware only through the TIMI and so are not directly affected by changes in the hardware.

This independence also protects the knowledge investment of programmers and users because the screens they use to do their work at the level of the logical machine may change only slightly, even though massively significant changes may occur at the hardware level. Software written for the older machines is quickly converted without recompilation in most cases and runs as true bit software on the newer RISC boxes— with no need for slowed-down emulation or costly rewrites—even though at the processor hardware level as well as in many other hardware components , the new Power System is an entirely different machine!

New code more than 1 million lines of the total, which exceeds 2. This code is firmware that is shipped with the hardware; it resides in the flash memory on the service processor. The hypervisor software performs configuration, initialization, and virtualization support for the Power System hardware. With each new release of the OS, IBM makes available expanded communications, networking, and language support e.

The Power System hardware of tomorrow will be a very different machine from that of today; and the ability of the OS to adapt so quickly, taking advantage of new hardware technology, makes the IBM i OS virtually obsolescence-proof! It provides a consistent approach to object management and security hacking and viruses , protection against inadvertent misuse of an object, and the capability to reference an object by its simple name.

Because programs do not deal directly with hardware and are therefore not concerned with physical storage addresses, the OS treats all storage, both main and secondary, as a single homogenous mass called single-level storage.

When objects are created, they are written to this single-level storage and are assigned a permanent virtual address. An address-translation algorithm at the microcode level provides efficient, direct addressing of the object in real memory. Real memory management both main and secondary becomes a function of the internal code and not of the applications.

Among other advantages, this design lets different jobs share the same object concurrently. The OS provides more than 75 object types that encompass all applications and system resources, including programs, data, and hardware; IBM adds new object types as required. Table 3. Some CL commands work with any type of object, but each object type has certain CL commands that are used only for that type.

It is important to realize that a library is not a physical collection of objects but a single-level directory to a group of related objects. You can use libraries to organize objects by owner, by application category e. A library provides a logical reference to objects by using address pointers. In addition to address pointers, the type and authorization of each object is associated with the library entry for that object. Requesting an Object When you request an object, either by selecting a menu option or by entering a command, often it is not necessary to specify the name of the library in which the object resides.

When you specify a simple object name i. For example, say you want to use the CALL command to execute a program. If your library list looks like the one in Figure 3. By including the object type in the library entry, the system can determine immediately, without ever having to locate and load the actual object, whether its type is appropriate for the requested operation in this case, a program CALL. When you add new libraries to the library list, it is very important to keep this top-to-bottom search order in mind.

You can use a qualified name for the object, or you can change the library list. The most direct approach is to use a qualified name to explicitly identify the object. A qualified name includes a reference to a library as well as the character object name. The system does not search any part of the library list, whether or not it successfully locates a suitable object in the named library. You should remember the following three points about the use of qualified names: