Download Print this page

Motorola EXORdisk II User Manual page 42

Advertisement

GENERAL SYSTEM OPERATION
2.8 -- Typical Command Usage Examples
D
W
X
Thus,
protected
be used:
Set delete protection
Set write protection
Set no protection (remove existing protection)
if the
file
TESTPROG
(source
file)
is
to
be
against deletion,
the following command line would
NAME TEST?ROG;D
I~
the memory-image file
that
~as
produced
from
the
source
OT
TESTPROG
were
to
be
write protected and delete
protected, the following command line would be used:
NAME TESTPROG.LOiOW
The protection on this file could later be removed
with
the command line:
NAME TEST?ROG. LO;X
Chapter
20
describes in more detail the other features
o~
the
NAME
command.
2.8.9 COpy -- File copying
The COpy command is used to make a duplicate copy
of
a
file
on
a
single
diskette,
to
move
a
file between two
di-Pferent diskettes,
or to move
a
file
between
the
console
reader/punCh (record) device and"
a
diskette.
To make a duplicate copy
or
a
file on the same disketteJ
the following command line is used:
COpy <name l>,<name 2>
where <name 1> specifies the
current
name
of
an
existing
file,
and <name 2> specifies the name of the duplicate
cop~.
The default suffix
liSA"
and the default logical
unit
number
zero
are
supplied
for
<name
1>
if those parts of the file
name
specification are omitted.
NormallYJ
the
destination
file,
<name
2>,
does not exist.
The
COPY
command, however,
will alert the operator if <name 2/ does exist, and
ask
him
if
that
file
should
be
overwritten.
If
<name 2> has
a
different logicai unit number than
the
original
Tile:
the
rile
will
be
duplicated
on
the
specified drive.
If the
TESTPROG source file from the above examples is to
be
saved
i n '
a
f i
1
e
call
e
d
TEMP
I
the foIl
ow
i
n
9
comma n d
1
in e
wo
u
1
d
b e
used:
COpy TESTPROQ,TEMP
The
file
TEMP
will be
created
on
the
same
drive
as
Page
02-23

Advertisement

loading

This manual is also suitable for:

Exordisk iii