bu￿ering, 2-79

changing identities, 2-204 changing names, 2-204 copying, 2-53, 2-73 declaring attributes, 2-76 deleting, 2-181 printing, 2-178 purging, 2-181

record size, 2-78 recovering, 2-213

removing MPE/iX security, 2-202 restoring security, 2-236 restoring to disk, 2-213 security, 2-236

sharing, 2-79

storing to tape, 2-277

G

group name providing, 2-84 using, 2-84

groups

capability classes, 2-19 changing to another group, 2-46 creating, 2-19, 2-158

creating the group structure, 2-160 deleting, 2-184, 2-194 displaying information, 2-135 logon, 2-84

passwords, 2-19, 2-158 PUB group, 2-160 purging, 2-194 switching to another, 2-46

H

HELLO command, 2-82

access permissions and restrictions, 2-85

examples, 2-86 passwords, 2-85

providing a group name, 2-84

help

getting online information, 2-87 information access methods, 2-89

HELP command, 2-87 examples, 2-90

Help Facility, 2-87

I

input devices

displaying status information, 2-247 input priority

jobs, 2-99 interactively streamed jobs

terminating, 2-293

J

job and session limits, rede￿ning, 2-106 JOB command, 2-96

command process, 2-100 examples, 2-101 requirements, 2-100

jobfence

displaying limit, 2-251

JOBFENCE command, 2-103 examples, 2-104 overriding the jobfence, 2-103

job numbers, 2-100 jobs

aborting, 2-2 creating a job, 2-71 creating a job ￿le, 2-96 de￿ning priorities, 2-103 displaying spooled jobs, 2-251 displaying status, 2-251, 2-258 displaying streamed jobs, 2-251 execution priorit y, 2-99, 2-103 input priority, 2-99 limiting, 2-106

logging on, 2-96 overriding job errors, 2-52

Index-4