HP OpenVMS Systems Documentation
OpenVMS User's Manual
Previous
Contents
Index
F
F$CONTEXT lexical function
F$CVTIME lexical function
F$DIRECTORY lexical function
F$ELEMENT lexical function
F$ENVIRONMENT lexical function
changing default file protections with
F$EXTRACT lexical function
F$FAO lexical function
F$GETQUI lexical function
obtaining queue information
F$GETSYI lexical function
obtaining information
system
F$INTEGER lexical function
converting data types #1
converting data types #2
F$LENGTH lexical function
with F$LOCATE
F$LOCATE lexical function
with F$LENGTH
F$LOGICAL lexical function
F$MODE lexical function
in login procedures
F$PARSE lexical function
F$PID lexical function
obtaining process information
F$SEARCH lexical function
searching for files
using with DELETE command
F$STRING lexical function
converting data types #1
converting data types #2
F$TRNLNM lexical function
LNM$DCL_LOGICAL logical name
translating logical names
F$TYPE lexical function
identifying symbols #1
identifying symbols #2
F$VERIFY lexical function #1
F$VERIFY lexical function #2
Fields
File access
from remote nodes
using control strings
File browsers
FILE command
in Mail
File I/O
redirecting #1
redirecting #2
File protection #1
File protection #2
changing default with F$ENVIRONMENT lexical function
confidential files
required for proxy access
File specifications
alternate form for magnetic tapes
list of included fields
networks
node names #1
node names #2
rules for entering
specifying a list of
using a percent sign (%) wildcard character in
using an asterisk (*) wildcard character in
valid characters in
with null values
File type field
definition
using a percent sign (%) wildcard character in
using an asterisk (*) wildcard character in
with null values
File types
list of defaults #1
list of defaults #2
rules for entering
File version numbers
using an asterisk (*) wildcard character in
Files
accessing
on a private device
on volume sets
adding ACEs for security auditing
appending to Mail messages
applying an alarm to
auditing access to #1
auditing access to #2
closing from command procedures
concatenating
controlling the number of versions
copying
between nodes #1
between nodes #2
from remote account
creating
from Mail messages
with COPY command
with CREATE command
deciding when to use security auditing
definition
deleting
deleting from within command procedures
displaying
contents #1
contents #2
contents #3
using wildcard characters
initialization
MAIL.MAI
mailing
from DCL level
using Mail utility
modifying
printing
process-permanent
protecting #1
protecting #2
protection of confidential
protection required for proxy access
purging
renaming
specifying wildcard characters
using F$SEARCH lexical function to locate
using the /VERSION_LIMIT qualifier
version numbers #1
version numbers #2
Files--11 On-Disk Structure
Foreign commands
automatic
character limit #1
character limit #2
Foreign file specifications
on networks
FORTUSER.COM command procedure
sample execution
FORWARD command
in Mail
Full names
G
General identifiers
example
Generic device names
GET FILE command
$GETDVI lexical function
GETPARMS.COM command procedure
sample execution
H
Help
for commands
for system messages
HELP command
in EVE
HELP/MESSAGE command
Help Message utility (MSGHLP)
invoking
Hyphen (-)
in a directory name
I
Identifiers
displaying process
environmental
general
UIC
IF command
using in command procedures
Images
invoking with automatic foreign commands
invoking without using symbols
redirecting output from
INCLUDE FILE command
Initialization files
INITIALIZE command
Files--11 On-Disk Structure
format
Initializing
disk volumes
volumes
disk volumes
Input
prompting for from command procedures
to batch jobs #1
to batch jobs #2
Input files
temporary defaults in a parameter list
Input stream
Input streams
redirecting
INQUIRE command
compared to READ command
using in command procedures
with symbols and batch jobs
Insert mode
definition
Interactive mode
logins
Internet
specifying transport
ISO Latin-1 character set
Iterations
definition
Previous
Next
Contents
Index