0% found this document useful (0 votes)
47 views3 pages

Session 4

1. AS/400 systems have transitioned from 48-bit CISC to 64-bit RISC architectures, with layers that allow applications to run on different hardware versions. Software is embedded as firmware. 2. OS/400 integrates all components needed for robust business solutions, treating everything as objects for machine independence. Security levels range from 10 with no authentication to 50 with enhanced DoD-level security. 3. User profiles identify users and control authorities like special privileges. The QSECOFR profile has the most authority. System-supplied profiles establish default users. Object authorities govern access to read, delete, update, and execute objects.

Uploaded by

earth v moon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views3 pages

Session 4

1. AS/400 systems have transitioned from 48-bit CISC to 64-bit RISC architectures, with layers that allow applications to run on different hardware versions. Software is embedded as firmware. 2. OS/400 integrates all components needed for robust business solutions, treating everything as objects for machine independence. Security levels range from 10 with no authentication to 50 with enhanced DoD-level security. 3. User profiles identify users and control authorities like special privileges. The QSECOFR profile has the most authority. System-supplied profiles establish default users. Object authorities govern access to read, delete, update, and execute objects.

Uploaded by

earth v moon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

SESSION -4

QDFTJOBD- DEFAULT JOB DESCRIPTION


NOTES TO BE PATCHED
The earliest machine were based on CISC computing(48-bit) architecture. Right now
they are 64 bit RISC architecture. They are layers called as Technology Independent Machine
interface(TIMI) that convert the applications to run on the hardware irrespective of the
version of the hardware in which it ran pervious. The software that is embedded in the
hardware in firmware.
API – Application Programming Interface.
Call qcmd – to display all commands since we have logged in
9402 – type and E- 02 is the model (refer 1.11).
Software that are installed on AS/400 are called Licensed Program Product. To find all the
licensed programs installed GO LICPGM to list all software installed on the server. The
database can be defined using DDS and SQL.
All the components that are required to support robust business solution are
integrated into OS/400.Anything that occupies space in OS/400 are objects.
Consequences of object –based design:
*supports machine independence.
DSPOBJD-used to display the object component description.
Objects need not to be added to the virtual memory …..
DSPNETA –To display network attributes. There are five levels of security.10,20,30,40,50.We
have a system value called QSECURITY . 10 is no more supported and doesn’t even has a
username and password. Default shipped security is 40. In 20 we have username and
password where the objects can be deleted. In thirty in addition we have resource security.
In 40 we have system integrity along with the existing three features. 50 are enhanced
system security which is called as C2 security defined by DOD of U.S.
DSPSYSVAL QSECURITY – To display the server security level.
User profile identifies the user to the system. QSECOFER is the most important
profile… The default user profiles are called system supplied user profiles. To know the users
of any particular group
DSPUSRPRF <profile name>(press F4). Then choose the group members option. DFU(Data
file Utility) is a utility under ADTS(Application Development Toolset) using which the user can
insert, delete and modify records in a database file. DFU automatically generates the data
and it cant be used to create a database.
System authority is divided in two:
Special and special authority
Special authority may be: The authority associated with user profile are called special
authority
-*ALLOBJ
-*SECADM
-*SAVSYS
-*JOBCTL
-*SERVICE
-*SPLCTL (spool control)
-*AUDIT
-*IOSYSCFG
Every object has the descriptional and functional rights.
Specific rights
Functional rights may be
*read
*delete
*update
*execute
The other specific AUTHORITY may be
OBJOPR
OBJMGT
OBJEXIST
OBJALTER
OBJREF
THE COMMAND STANDS AS :CRTUSRPRF (F4) PAGE DOWN TO SPECIAL AUTHORITIES AND
PRESS FI
TO EDIT OBJECT AUTHORITY
EDTOBJAUT
Writer is a system program that sends spooled output to a printer

TO GET THE DESCRIPTION OF A OBJECT : DSPOBJD


TO MOVE THE OBJECT :MOVOJB
TO COPY :CPYF (OR) CRTDUPOBJ (OR) WRKOBJ to copy
TO CHECEK THE OBJECT LOCK STATUS: WRKOBJLCK
TO CHECK THE OBJECT EXIST :WRKOBJ or CHKOBJ
Type of library can be test and production. In production we cant update files in the debug
mode.
TO CHANGE FROM TEST TO PRODUCTION TYPE:CHGLIB
Library list is a run time attribute
TO WORK DIRECTLY WITH MEMBERS: OPTION 14 WRKMBRPDM
TO ASSIGN THE OBJECT DESCRIPTION IN A CL PROGROM :RTVOBJD( to retreive the
information within the programs) . MONMSG is used for error handling in CL programming

DB2
The recent RDBMS is ORDBMS. The largest databases rely on DB2.Every product
should stick on to the preamble or standards. It is integrated with OS in AS/400.SQL is a
fourth generation language where specification to needs is meet in a effectively. Initially it
was called SEQL developed by IBM.
CHRONOLOGY
File Management
Hierarchical Database Management System(one to one is possible whereas one to many is
not possible).
Network Database Management System(NDMS).(many to many relationship is possible).
RDBMS( formulated by Cott)
RDBMS is a two dimensional database with attributes and tuple.
There are two ways of implementing any database. SQL and DDS (Data Description
Specification).AS/400 relies upon DDS.

You might also like