IBM SG24-5360-00 Manuale Utente
/*
// DLBL OUTPUT,
// DLBL OUTPUT,
′
TEST.DATA.1
′,1998/300,
SD
// EXTENT SYS005,PATEV1,1,1,135,450
// LOG
*
// LOG
*
BUILD EXPIRED SEQUENTIAL FILE ON 80E
*
5,000 RECORDS, 4,000 BYTES LONG,
″1″
FILL CHARACTER
// NOLOG
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=5000,FILLCHAR=1,
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=5000,FILLCHAR=1,
X
$$DITTO
BLKFACTOR=1
$$DITTO EOJ
/*
// DLBL OUTPUT,
/*
// DLBL OUTPUT,
′
TEST.DATA.2
′ , ,
SD
// EXTENT SYS005,PATEV1,1,1,585,450
// LOG
*
// LOG
*
BUILD SEQUENTIAL FILE ON 80E
*
5,000 RECORDS, 4,000 BYTES LONG,
″2″
FILL CHARACTER
// NOLOG
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=5000,FILLCHAR=2,
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=5000,FILLCHAR=2,
X
$$DITTO
BLKFACTOR=1
$$DITTO EOJ
/*
// DLBL OUTPUT,
/*
// DLBL OUTPUT,
′
TEST.DATA.3
′ , ,
SD
// EXTENT SYS005,PATEV1,1,1,1035,1500
// LOG
*
// LOG
*
BUILD SEQUENTIAL FILE ON 80E
*
17,000 RECORDS, 4,000 BYTES LONG,
″3″
FILL CHARACTER
// NOLOG
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=17000,FILLCHAR=3,
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=17000,FILLCHAR=3,
X
$$DITTO
BLKFACTOR=1
$$DITTO EOJ
/*
*
/*
*
BUILD SEQUENTIAL FILE ON 80E
*
5,000 RECORDS, 4,000 BYTES LONG,
″1″
FILL
// LOG
*
*
BUILD SEQUENTIAL FILE ON 80E
*
17,000 RECORDS, 4,000 BYTES LONG, RANDOM FILL CHARACTER
// NOLOG
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=17000,FILLCHAR=RAND,
// EXEC DITTO,SIZE=AUTO
$$DITTO BSQ FILEOUT=OUTPUT,RECSIZE=4000,NLRECS=17000,FILLCHAR=RAND,
X
$$DITTO
BLKFACTOR=1
$$DITTO EOJ
/*
// LOG
*
/*
// LOG
*
DISPLAY RVA DATA FOR PATEV1 (80E) -- AFTER DATA LOAD.
// NOLOG
// EXEC DTRIATTN,PARM=
// EXEC DTRIATTN,PARM=
′
IXFP REPORT,PATEV1
′
// EXEC IESWAIT
// EXEC LISTLOG
/&
// EXEC LISTLOG
/&
The result (Figure 39 on page 58) is six sequential files with varying types of
data. Two of the files are data secured to prevent
data. Two of the files are data secured to prevent
″
unauthorized
″
access. Three
of the files are highly compressible because they contain a repeating data
character, and the other three have random fill characters.
character, and the other three have random fill characters.
Appendix B. IXFP Command Examples
57