Brian Kernighan
Brian Wilson Kernighan (, the 'g' is silent; born January 1942 in Toronto) is a Canadian computer scientist who worked at Bell Labs alongside Unix creators Ken Thompson and Dennis Ritchie and contributed greatly to Unix and its school of thought. He is also coauthor of the AWK and AMPL programming languages. The 'K' of K&R; C and the 'K' in AWK both stand for 'Kernighan'. Brian Kernighan is currently a Professor at the Computer Science Department of Princeton University, where he is also the Undergraduate Department Representative.
http://wn.com/Brian_Kernighan
Microsoft
Microsoft Corporation is a public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions. Established on April 4, 1975 to develop and sell BASIC interpreters for the Altair 8800, Microsoft rose to dominate the home computer operating system (OS) market with MS-DOS in the mid-1980s, followed by the Microsoft Windows line of OSs. The ensuing rise of stock in the company's 1986 initial public offering (IPO) made an estimated four billionaires and 12,000 millionaires from Microsoft employees. Microsoft would come to dominate other markets as well, notably the office suite market with Microsoft Office.
http://wn.com/Microsoft
command line n 1: commands that a user types in order to run an application
I made this video years ago when I first started learning command prompt and one thing I don't mention in this is that if you want to remote shutdown, BOTH computers must be on the same network and all the remote setting on each computer must be configured correctly. This is a tutorial on using the command promp and cmd commands. its kinda hard to understand but i find it usefull. it will also show you lots of cmd tricks with ip addresses. command prompt cmd commands
Author: Christopher B Schenk. Description: A demo of the 'lsof' utility on unix-based systems. We look at three different ways to use 'lsof'- 1) We use the utility to see which processes have which files or directories open by referencing a location on the filesystem, 2) (At 2m42s) We look at using lsof to look at which process is bound to port 22, and 3) (At 4m35s) We look at using lsof to see which files a specific process has open.. Disclaimer: The views expressed in this video are those of the authors and do not necessarily represent, and should not be attributed to, CAETE, or The University of Colorado at Boulder.
This is a video on the command ipconfig and many of the things that it does. Ipconfig can release/renew your IP address It will also show information about your network card. It also allows you to create specialized scope options if you have a Windows DHCP server. It will register your machine with the DNS server and show DNS records stored by your machine. Providing training videos since last Tuesday. technoblogical.com Thanks for watching.
Have a problem? Ask in the forum: www.mob3.co.uk or the live chat: www.mob3.co.uk Here I show part 1 of 3 of my Command Prompt Basics Video. I answer a submitted question from ppm1122. I talk about both CMD and Command.com (which was used in the early versions of DOS). CD = Change Directory (Folder) DIR = Directory Listing(List Folder Files) H: = Change Drive (Replace with drive letter)
This is a video on the netstat command available on many Microsoft Windows operating systems. Netstat will display network statistics. In doing so, it will also show all my current connections to the network and what they are doing. I use it to check for viruses, spyware, bots, or other horrible programs that may be making connections to the internet. Providing training videos since last Tuesday. technoblogical.com Thanks for watching.
See our entire index of CompTIA A+ videos: www.FreeAPlus.com There is a wealth of Windows utilities that can be run directly from the command line or launched from the Start menu. In this video, well examine utilities like telnet, ping, msconfig, dxdiag, and many more.
Cisco IOS Command Line Interface: Introduction - Part 1 Logging into an ISR router through the console port and configuring options. User mode and Privileged mode.
See our entire index of CompTIA A+ videos at www.FreeAPlus.com - The Windows command line can be a powerful troubleshooting environment if you know what to type. In this video, you'll learn the important commands that will allow you to manipulate files, format disks, troubleshoot the network connection, and much more.
Have a problem? Ask in the forum: www.mob3.co.uk or the live chat: www.mob3.co.uk Here is my final (Part 3 of 3) Command Prompt Basics video, I could show more but I don't want to spam videos. echo = Display contents on a screen @echo off = Put in the beginning of a .BAT file to hide the displaying of commands in the file cls = Clear Screen color = Change colour of the box ping = Send a signal to a server to see if it responds www.internetfrog.com - find location of IP Address tracert = shows path to a website net user password = Change User Password net send = Send message as popup systeminfo = System Information
Sending messages using command prompt. If it does not work go to Control Panel, then Administrative Tools and then click services. Scroll down to Messenger, right click and press properties. Change the box that says manual or disabled to enable.
This is a program that orders pizza. Judging from its description on the website, and from the video, it only works with UNIX-like Operating Systems (though they appeared to be using an old version of Windows) and the pizza is only from Domino's. I haven't downloaded it, so I don't know. Anyways, this video shows the designers using the software to order a pizza, and how to do so. It's quite interesting.
Hey there fellow minecraftians, today I bring you the Single player Command line mod. Amazing huh. Intro music is made by Kevin Macleod, Royalty free music. Download the mod here: www.minecraftforum.net
This video shows how to open the Command Prompt in Windows 7, and how to use the directory (dir) command. It shows how to type /? for help on command syntax and how to output to a file.
An introduction to working in Unix. The tutorial covers GUIs vs. command line interfaces, absolute vs. relative paths, how to start Terminal, the parts of a Unix command prompt, and six Unix commands: pwd, ls, ls -l, cd, mkdir, mv, cp, and rm. Written and Produced by Christina Bergey.
Series of Java Programming Tutorial.Beginner guide to Java programming.Java Tutorial on programming,in depth explanation including examples In this Tutorial I will Explain about Taking Values from user through Command line
Read more. How to install Single Player Commands V3.1 and above. This video shows how to install Single Player Commands using the new automated installer which is available from V3.1 and above. 1. Download Single Player Commands 2. Double click the file to run it. Note that if double clicking the file doesn't open it you can also run it from command line/console/terminal as described below: Open command line (Windows) /console (Unix/Linux) /terminal (MAC) Navigate to where the installer is, for example it might be: cd C:\Users\Example\My Documents\Downloads Type in the following: java -cp SPCInstaller.jar com.sijobe.installer.Installer 3. Once the installation screen is up verify that the filepath that is displayed is pointing to where Minecraft is installed. 4. Click the Install button and the installation will start, a popup message will appear when the installation is finished. Once this has finished (should only take a few seconds) the mod should be successfully installed correctly, including WorldEdit.jar and Minecraft should be ready to play. Configurable options are: Backup MCJAR - Creates a backup of your Minecraft.jar into .minecraft/backup/bin Backup Worlds - Creates a backup of all your Worlds, ZIPs them then puts them into .minecraft/backup/saves Browse - If you wish to change where Minecraft is installed to you can browse for a different directory Troubleshooting: If you encounter any issues with the installer you can always install the mod like you <b>...</b>
I made this video years ago when I first started learning command prompt and one thing I don't mention in this is that if you want to remote shutdown, BOTH computers must be on the same network and all the remote setting on each compute...
Linux command line - lsof
Linux command line - lsof
6:13
Author: Christopher B Schenk. Description: A demo of the 'lsof' utility on unix-based systems. We look at three different ways to use 'lsof'- 1) We use the utility to see which processes have which files or directories open ...
Operating Systems - 1 - Command Line Introduction
Operating Systems - 1 - Command Line Introduction
6:45
Make sure to Subscribe to my Channel for all my latest videos!!! support my website too by registering at thenewboston.com...
Windows command line networking: ipconfig
Windows command line networking: ipconfig
8:52
This is a video on the command ipconfig and many of the things that it does. Ipconfig can release/renew your IP address It will also show information about your network card. It also allows you to create specialized scope options if you hav...
Have a problem? Ask in the forum: www.mob3.co.uk or the live chat: www.mob3.co.uk Here I show part 1 of 3 of my Command Prompt Basics Video. I answer a submitted question from ppm1122. I talk about both CMD and Command.com (which was used i...
Windows command line networking: netstat
Windows command line networking: netstat
8:48
This is a video on the netstat command available on many Microsoft Windows operating systems. Netstat will display network statistics. In doing so, it will also show all my current connections to the network and what they are doing. I use i...
Cisco Router IOS - Command Line basics
Cisco Router IOS - Command Line basics
6:25
Video about the navigating the Cisco command line Southern California RouterGods www.routergods.com...
CompTIA A+ 220-701 - Command Line Utilities - Part 1 of 2
CompTIA A+ 220-701 - Command Line Utilities - Part 1 of 2
7:11
See our entire index of CompTIA A+ videos: www.FreeAPlus.com There is a wealth of Windows utilities that can be run directly from the command line or launched from the Start menu. In this video, well examine utilities like telnet, ping, msc...
How to open command Prompt
How to open command Prompt
2:09
This is an example to how to open the command Prompt www.t3po.com...
Command Prompt Hack- Remote Shutdown
Command Prompt Hack- Remote Shutdown
2:25
Command Prompt Hack- Remote Shutdown How to do this. FUNFUNFUN...
Cisco IOS Command Line Interface: Introduction - Part 1
Cisco IOS Command Line Interface: Introduction - Part 1
28:34
Cisco IOS Command Line Interface: Introduction - Part 1 Logging into an ISR router through the console port and configuring options. User mode and Privileged mode....
CompTIA A+ 220-702: 2.1 - Command Line Troubleshooting
CompTIA A+ 220-702: 2.1 - Command Line Troubleshooting
29:46
See our entire index of CompTIA A+ videos at www.FreeAPlus.com - The Windows command line can be a powerful troubleshooting environment if you know what to type. In this video, you'll learn the important commands that will allow you to ...
Command Prompt Basics 3 - File, Internet & Useful Commands
Command Prompt Basics 3 - File, Internet & Useful Commands
9:56
Have a problem? Ask in the forum: www.mob3.co.uk or the live chat: www.mob3.co.uk Here is my final (Part 3 of 3) Command Prompt Basics video, I could show more but I don't want to spam videos. echo = Display contents on a screen @echo o...
Sending messages using command prompt. If it does not work go to Control Panel, then Administrative Tools and then click services. Scroll down to Messenger, right click and press properties. Change the box that says manual or disabled to en...
Pizza Party: A Command Line Program for Ordering Pizza
Pizza Party: A Command Line Program for Ordering Pizza
2:13
This is a program that orders pizza. Judging from its description on the website, and from the video, it only works with UNIX-like Operating Systems (though they appeared to be using an old version of Windows) and the pizza is only from Dom...
Minecraft Mod Showcase ep. 12 - Single Player Command Line (SPC)
Minecraft Mod Showcase ep. 12 - Single Player Command Line (SPC)
13:14
Hey there fellow minecraftians, today I bring you the Single player Command line mod. Amazing huh. Intro music is made by Kevin Macleod, Royalty free music. Download the mod here: www.minecraftforum.net...
How to Open the Command Line in Windows 7
How to Open the Command Line in Windows 7
2:57
This video shows how to open the Command Prompt in Windows 7, and how to use the directory (dir) command. It shows how to type /? for help on command syntax and how to output to a file....
Command-line Lesson 3 Mr. Mike
Command-line Lesson 3 Mr. Mike
47:39
More use of DIR command, learning how to make directories from the command line and much more...
Basic Unix Commands
Basic Unix Commands
10:01
An introduction to working in Unix. The tutorial covers GUIs vs. command line interfaces, absolute vs. relative paths, how to start Terminal, the parts of a Unix command prompt, and six Unix commands: pwd, ls, ls -l, cd, mkdir, mv, cp, and ...
AutoCAD 2008 - Tutorial 06
AutoCAD 2008 - Tutorial 06
9:39
AutoCAD 2008 Tutorial, Working with Command Line Options....
Java Tutorial For Beginners 10 Taking values from Command Prompt.wmv
Java Tutorial For Beginners 10 Taking values from Command Prompt.wmv
14:17
Series of Java Programming Tutorial.Beginner guide to Java programming.Java Tutorial on programming,in depth explanation including examples In this Tutorial I will Explain about Taking Values from user through Command line...
How to install Single Player Commands using the Installer
How to install Single Player Commands using the Installer
2:51
Read more. How to install Single Player Commands V3.1 and above. This video shows how to install Single Player Commands using the new automated installer which is available from V3.1 and above. 1. Download Single Player Commands 2. Double c...
Belfast TelegraphIsrael has set up a specialist commando unit designed to carry out missions deep inside enemy territory amid growing consensus in government circles that military strikes must be contemplated if economic sanctions do not halt Iran's nuclear programme. The "DepthCorps" has been organised with the...(size: 3.2Kb)
Indian ExpressStarting this month, the senior echelons of Maharashtra StatePolice have started an initiative to set the issue of propriety, discipline and hierarchy in place. In a new system, officers with any grievance are supposed to call on the Directorate General of Police only if...(size: 1.8Kb)
The ExaminerBecause the Air Force Academy invited cadets by e-mail to participate in Operation Christmas Child (a program which sends gifts to impoverished children around the world at Christmas time), it is accused of religious intolerance. Following is from the e-mail sent "to the entire cadet wing:"...(size: 7.6Kb)
Business WireDUBLIN - Research and Markets(http://www.researchandmarkets.com/research/3674d5/linux_command_line) has announced the addition of John Wiley and Sons Ltd's new book "LinuxCommand Line and ShellScriptingBible, 2nd Edition" to their offering. “Linux Command Line and Shell Scripting Bible, 2nd...(size: 5.3Kb)
The Daily MailA senior Iranian military commander sent panic through the world today after making a chilling claim today that his country has the ability to produce even longer range missiles than those currently in its arsenal. Amir Ali Hajizadeh, commander of the Guard's Aerospace Force, said that the U.S. and...(size: 7.0Kb)
A command-line interface (CLI) is a mechanism for interacting with a computer operating system or software by typing commands to perform specific tasks. This text-only interface contrasts with the use of a mouse pointer with a graphical user interface (GUI) to click on options, or menus on a text user interface (TUI) to select options.
This method of instructing a computer to perform a given task is referred to as "entering" a command: the system waits for the user to conclude the submitting of the text command by pressing the "Enter" key (a descendant of the "carriage return" key of a typewriter keyboard). A command-line interpreter then receives, parses, and executes the requested user command. The command-line interpreter may be run in a text terminal or in a terminal emulator window as a remote shell client such as PuTTY. Upon completion, the command usually returns output to the user in the form of text lines on the CLI. This output may be an answer if the command was a question, or otherwise a summary of the operation.
The concept of the CLI originated when teletypewriter machines (TTY) were connected to computers in the 1950s, and offered results on demand, compared to batch oriented mechanical punched card input technology. Dedicated text-based CRT terminals followed, with faster interaction and more information visible at one time, then graphical terminals enriched the visual display of information. Currently personal computers encapsulate all three functions (batch processing, CLI, GUI) in software.
A CLI is used whenever a large vocabulary of commands or queries, coupled with a wide (or arbitrary) range of options, can be entered more rapidly as text than with a pure GUI. This is typically the case with operating system command shells. CLIs are also used by systems with insufficient resources to support a graphical user interface. Some computer language systems (such as Python, Forth, LISP and many dialects of BASIC) provide an interactive command-line mode to allow for experimentation.
CLIs are often used by programmers and system administrators, in engineering and scientific environments, and by technically advanced personal computer users. CLIs are also popular among people with visual disability, since the commands and feedbacks can be displayed using Refreshable Braille displays.
A program that implements such a text interface is often called a command-line interpreter, command processor or shell, whereby the term shell, often used to describe a command-line interpreter, can be in principal any program that constitutes the user-interface, including fully graphically oriented ones—for example, the default Windows GUI is created by a shell program named EXPLORER.EXE, as defined in the SHELL=EXPLORER.EXE line in the WIN.INI configuration file.
Examples of command-line interpreters include the various Unix shells (sh, ksh, csh, tcsh, bash, etc.), the historical CP/M CCP, and MS-DOS/IBM-DOS/DR-DOS's COMMAND.COM, as well as the OS/2 and the Windows CMD.EXE programs, the latter groups being based heavily on DEC'sRSX and RSTS CLIs. Under most operating systems, it is possible to replace the default shell program by more specialized or powerful alternatives, some widespread examples include 4DOS for DOS, 4OS2 for OS/2, and 4NT or Take Command for Windows.
In November 2006, Microsoft released version 1.0 of Windows PowerShell (formerly codenamed ''Monad''), which combined features of traditional Unix shells with their object-oriented .NET Framework. MinGW and Cygwin are open-source packages for Windows that offer a Unix-like CLI. Microsoft provides MKS Inc.'s ksh implementation ''MKS Korn shell'' for Windows through their Services for UNIX add-on.
The latest versions of the Macintosh operating system are based on a variation of Unix called Darwin. On these computers, users can access a Unix-like command-line interface called Terminal found in the Applications Utilities folder. (This terminal uses bash by default.)
Some applications provide both a CLI and a GUI. The engineering/scientific numerical computation package MATLAB provides no GUI for some calculations, but the CLI can handle any calculation. The three-dimensional-modelling program Rhinoceros 3D provides a CLI as well as a distinct scripting language. In some computing environments, such as the Oberon or Smalltalk user interface, most of the text which appears on the screen may be used for giving commands.
Anatomy of a shell CLI
A CLI can generally be considered as consisting of syntax and semantics. The ''syntax'' is the grammar that all commands must follow. In the case of operating systems (OS), MS-DOS and Unix each define their own set of rules that all commands must follow. In the case of embedded systems, each vendor, such as Nortel, Juniper Networks or Cisco Systems, defines their own proprietary set of rules that all commands within their CLI conform to. These rules also dictate how a user navigates through the system of commands. The ''semantics'' define what sort of operations are possible, on what sort of data these operations can be performed, and how the grammar represents these operations and data—the symbolic meaning in the syntax.
Two different CLIs may agree on either syntax or semantics, but it is only when they agree on both that they can be considered sufficiently similar to allow users to use both CLIs without needing to learn anything, as well as to enable re-use of scripts.
A simple CLI will display a prompt, accept a "command line" typed by the user terminated by the Enter key, then execute the specified command and provide textual display of results or error messages. Advanced CLIs will validate, interpret and parameter-expand the command line before executing the specified command, and optionally capture or redirect its output.
Unlike a button or menu item in a GUI, a command line is typically self-documenting, stating exactly what the user wants done. In addition, command lines usually include many defaults that can be changed to customize the results. Useful command lines can be saved by assigning a character string or alias to represent the full command, or several commands can be grouped to perform a more complex sequence — for instance, compile the program, install it, and run it — creating a single entity, called a command procedure or script which itself can be treated as a command. These advantages mean that a user must figure out a complex command or series of commands only once, because they can be saved, to be used again.
The commands given to a CLI shell are often in one of the following forms:
''doSomething'' is, in effect, a verb, ''how'' an adverb (for example, should the command be executed "verbosely" or "quietly") and ''toFiles'' an object or objects (typically one or more files) on which the command should act. The '>' in the third example is a redirection operator, telling the command-line interpreter to send the output of the command not to the screen but to the file named on the right of the '>'. This will overwrite the file. Using '>>' will redirect the output and append it to the file. Another redirection operator is the pipe ('|'), which tells the CLI to use the output of one command as the input to the next command; this "operator-stream" mechanism can be very powerful.
CLI and resource protection
In some CLIs, the commands issued are not coupled to any conceptual place within a command hierarchy. A user can specify relative or absolute paths to any command or data. Examples of this include DOS, OS/2, Windows, and UNIX, which provide forms of a change directory command which allows access to any directory in the system. In some systems, protection of resources is provided by a system of resource ownership by privileged groups, and password-protected user accounts which are members of specific groups. MS-DOS/PC-DOS provides no such resource protection, nor do versions of Windows prior to the Windows NT family. (Both of these were designed as single-user systems, where it was assumed that the owner would simply not allow people that she/he did not fully trust to have physical access to the computer at all. UNIX, by contrast, originated as a time-sharing system in corporate and university environments. Similarly, Concurrent CP/M, Concurrent DOS, Multiuser DOS, REAL/32 and the members of the DR-DOS family offer various user- as well as file/directory-oriented protection schemes as well.)
Other CLIs (such as those in network routers) limit the set of commands that a user can perform to a subset, determined by location within a command hierarchy, grouped by association with security, system, interface, etc. The location within this hierarchy and the options available are often referred to as a mode. In these systems the user might traverse through a series of sub-hierarchies, each with their own subset of commands. For example, if the CLI had two modes called ''interface'' and ''system'', the user would enter the word 'interface' at the command prompt and then enter an interface mode, where a certain subset of commands and data are available. At this point system commands are not accessible and would not be accessible until the user explicitly exits the interface mode and enters the system mode.
===Command prompt===
A command prompt (or just ''prompt'') is a sequence of (one or more) characters used in a command-line interface to indicate readiness to accept commands. Its intent is to literally prompt the user to take action. A prompt usually ends with one of the characters $, %, #, :, > and often includes other information, such as the path of the current working directory.
On many Unix system and derivative systems, it is common for the prompt to end in a $ or % character if the user is a normal user, but in a # character if the user is a superuser ("root" in Unix terminology).
It is common for prompts to be modifiable by the user. Depending on the environment, they may include colors, special characters, and other elements like variables and functions for the current time, user, shell number or working directory, in order, for instance, to make the prompt more informative or visually pleasing, to distinguish sessions on various machines, or to indicate the current level of nesting of commands. On some systems, special tokens in the definition of the prompt can be used to cause external programs to be called by the command-line interpreter while displaying the prompt.
In DOS's COMMAND.COM and in the Windows NT's command-line interpreter cmd.exe the prompt is modifiable by issuing a prompt command or by directly changing the value of the corresponding %PROMPT%environment variable. The default of most modern systems, the C:\> style is obtained, for instance, with "prompt $P$G". The default of older DOS systems, C> is obtained by just "prompt", although on some systems this produces the newer C:\> style, unless used on floppy drives A: or B:; on those systems "prompt $N$G" can be used to override the automatic default and explicitly switch to the older style.
On many Unix systems, the $PS1 variable can be used, although other variables also may have an impact on the prompt (depending on what shell is being used). In the bash shell, a prompt of the form
:[time] user@host: work_dir $
could be set by issuing the command
:export PS1='[\t] \u@\H: \W $'
In zsh the $RPROMPT variable controls an optional "prompt" on the right hand side of the display. It is not a real prompt in that the location of text entry does not change. It is used to display information on the same line as the prompt, but right justified.
In RISC OS, the command prompt is a '*' symbol, and thus (OS)CLI commands are often referred to as "star commands". It is also possible to access the same commands from other command lines (such as the BBC BASIC command line), by preceding the command with a '*'.
Arguments
A command-line argument or parameter is an argument sent to a program being called. In principle a program can take many command-line arguments, the meaning and importance of which depend entirely upon the program.
When a command processor is active a program is typically invoked by typing its name followed by command-line arguments (if any). For example, in Unix and Unix-like environments, an example of a command-line argument is:
"file.s" is a command-line argument which tells the program rm to remove the file "file.s".
Programming languages such as C, C++ and Java allow a program to interpret the command-line arguments by handling them as string parameters in the main function.
Command-line option
A command-line option or simply option (also known as a flag or switch) modifies the operation of a command; the effect is determined by the command's program. Options follow the command name on the command line, separated by spaces. A space before the first option is not always required.
For example, in the OpenVMS operating system, the command ''directory'' is used to list the files inside a directory. By default—that is, when the user simply types ''directory''—it will list only the names of the files. By appending the ''/owner'' option (to form the command ''directory/owner''), the user can instruct the ''directory'' command to also display the ownership of the files.
The format of options varies widely between operating systems. In most cases the syntax is by convention rather than an operating system requirement; the entire command line is simply a string passed to a program, which can process it in any way the programmer wants.
Sometimes different programs use different syntax in the same operating system. For example:
Sometimes options and their arguments are run together, sometimes separated by whitespace, and sometimes by a character, typically : or =. Thus "Prog -fFilename", "Prog -f Filename", "Prog -f:Filename", "Prog -f=Filename".
Some programs allow single-character options to be combined; others do not. The switch "-fA" may mean the same as "-f -A", or it may be incorrect, or it may even be a valid but different parameter.
In Unix-like systems, the ASCII hyphen–minus is commonly used to specify options. The character is usually followed by one or more letters. An argument that is a single hyphen–minus by itself without any letters usually specifies that a program should handle data coming from the standard input or send data to the standard output. Two hyphen–minus characters ( -- ) are used on some programs to specify "long options" where more descriptive option names are used. This is a common feature of GNU software.
In DOS, OS/2 and Windows the forward slash ('/') is more prevalent, although the hyphen–minus is also sometimes used there. In many versions of DOS (MS-DOS/PC-DOS 2.xx and higher, all versions of DR-DOS since 5.0, as well as in PTS-DOS and FreeDOS) the current switch character to be used is defined by a value returned from a system call (INT 21/AH=37h). The default character returned by this API is '/', but can be changed to a hyphen-minus on all above-mentioned systems (except for MS-DOS/PC-DOS 5.0 and higher). In some of these systems (MS-DOS/PC-DOS 2.xx/3.xx, DR-DOS 7.02 and higher, and FreeDOS), the setting can not only be controlled by programs, but also pre-configured by a SWITCHAR directive in CONFIG.SYS. While applications should retrieve this setting before parsing command line arguments, many existing programs don't adhere to this standard and are hardwired to use '/' only. Under DR-DOS, if the setting has been changed from '/', the first directory separator '\' in the display of the PROMPT parameter $G will change to a forward slash '/' (also a valid directory separator in DOS, OS/2 and Windows) as a visual clue to indicate the change. Some command-line interpreters (including newer versions of DR-DOS COMMAND.COM and 4DOS) also provide pseudo-environment variables named %/% or %SWITCHAR% to allow portable batchjobs to be written.
It is impossible to know what arguments a program can recognise, and what syntax to use without consulting program documentation. It is usual for a program to display a brief summary of its parameters when invoked with a command-line which is typically one of: no parameters; ?; -?; -h; /?; /h; -help; or --help. Entering a program name without parameters in the hope that it will display parameters can be hazardous, as some programs and scripts execute without further ado.
The space character
In many areas of computing, but particularly in the command line, the space character can cause problems as it has two distinct and incompatible functions: as part of a command or parameter, or as a parameter or name separator. Ambiguity can be prevented either by prohibiting embedded spaces in file- and directory names in the first place (for example, by substituting them with underscores '_'), or, if supported by the command-line interpreter and the programs taking these parameters as arguments, by enclosing a name with embedded spaces between quote characters. For example
Long path/Long program name Parameter one Parameter two ...
is ambiguous (is "program name" part of the program name, or two parameters?);
Long_path/Long_program_name Parameter_one Parameter_two ...,
LongPath/LongProgramName ParameterOne ParameterTwo ...
and
"Long path/Long program name" "Parameter one" "Parameter two" ...
are not. Unix-based operating systems tend not to use embedded spaces; Microsoft Windows tends to use quotes.
Command-line interpreter
A command-line interpreter (also called a command line shell, command language interpreter, or abbreviated as CLI) is a computer program that reads lines of text entered by a user and interprets them in the context of a given operating system or programming language.
Command-line interpreters allow users to issue various commands in a very efficient (and often terse) way. This requires the user to know the names of the commands and their parameters, and the syntax of the language that is interpreted.
Early history
From the 1960s onwards, user interaction with computers was primarily by means of command-line interfaces, initially on machines like the TeletypeModel 33 ASR, but then on early CRT-based computer terminals such as the VT52.
All of these devices were purely text based, with no ability to display graphic or pictures. For business application programs, text-based menus were used, but for more general interaction the command line was the interface.
From the early 1970s the Unix operating system on minicomputers pioneered the concept of a powerful command-line environment, which Unix called the "shell", with the ability to "pipe" the output of one command in as input to another, and to save and re-run strings of commands as "shell scripts" which acted like custom commands.
The command-line was also the main interface for the early home computers such as the Commodore PET, Apple II and BBC Micro - almost always in the form of a BASIC interpreter. When more powerful business orientated microcomputers arrived with CP/M and later MSDOS computers such as the IBM PC, the command-line began to borrow some of the syntax and features of the Unix shells such as globbing and piping of output.
The command-line was first seriously challenged by the new GUI approach in 1984 with the Apple Macintosh 128K, but it took until 1990 and Windows 3.0 before most users converted.
While most computer users now use a GUI almost exclusively, more advanced users have access to powerful command-line environments:
MS Windows users have the classic cmd.exe "DOS"-like environment, but also the new PowerShell interfaces
Apple (Mac OS X) and Linux users have the classic Unix bash shell
Routers from CiscoJuniper Networks and many others are commonly configured from the command-line.
Scripting
Most command-line interpreters support scripting, to various extents. (They are, after all, interpreters of an interpreted programming language, albeit that in many cases the language is unique to the particular command-line interpreter.) They will interpret scripts (variously termed shell scripts or batch files) written in the language that they interpret. Some command-line interpreters also incorporate the interpreter engines of other languages, such as REXX, in addition to their own, allowing the executing of scripts, in those languages, directly within the command-line interpreter itself.
Conversely, scripting programming languages, in particular those with an evalfunction (such as REXX, Perl, Python, Ruby or Jython), can be used to implement command-line interpreters. For a few operating systems, most notably DOS, such a command interpreter provides a more flexible command line interface than the one supplied. In other cases, such a command interpreter can present a highly customised user interface employing the user interface and input/output facilities of the language.
Sending messages using command prompt. If it does not work go to Control Panel, then Administrative Tools and then click services. Scroll down to Messenger, right click and press properties. Change the box that says manual or disabled to en...
2:13
Pizza Party: A Command Line Program for Ordering Pizza
TheKitchenSinkII
Pizza Party: A Command Line Program for Ordering Pizza
This is a program that orders pizza. Judging from its description on the website, and from the video, it only works with UNIX-like Operating Systems (though they appeared to be using an old version of Windows) and the pizza is only from Dom...
13:14
Minecraft Mod Showcase ep. 12 - Single Player Command Line (SPC)
MinecraftScorpion
Minecraft Mod Showcase ep. 12 - Single Player Command Line (SPC)
Hey there fellow minecraftians, today I bring you the Single player Command line mod. Amazing huh. Intro music is made by Kevin Macleod, Royalty free music. Download the mod here: www.minecraftforum.net...
2:57
How to Open the Command Line in Windows 7
burlingamepj
How to Open the Command Line in Windows 7
This video shows how to open the Command Prompt in Windows 7, and how to use the directory (dir) command. It shows how to type /? for help on command syntax and how to output to a file....
47:39
Command-line Lesson 3 Mr. Mike
vanderl2796
Command-line Lesson 3 Mr. Mike
More use of DIR command, learning how to make directories from the command line and much more...
10:01
Basic Unix Commands
bergeycm
Basic Unix Commands
An introduction to working in Unix. The tutorial covers GUIs vs. command line interfaces, absolute vs. relative paths, how to start Terminal, the parts of a Unix command prompt, and six Unix commands: pwd, ls, ls -l, cd, mkdir, mv, cp, and ...
show more
add to playlist
clear
Video Suggestions
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
1. Personal Information Collection and Use
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
2. E-mail addresses
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.
If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
3. Third Party Advertisers
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
4. Business Transfers
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.