DataMuseum.dk

Presents historical artifacts from the history of:

CR80 Wang WCS documentation floppies

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CR80 Wang WCS documentation floppies

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦749adbe2c⟧ Wang Wps File

    Length: 16769 (0x4181)
    Types: Wang Wps File
    Notes: DN SAC ACCESS; HS-1/57    
    Names: »3439A «

Derivation

└─⟦ab79d1adb⟧ Bits:30006221 8" Wang WCS floppy, CR 0269A
    └─ ⟦this⟧ »3439A « 

WangText

…02……00……00……00……00…D…02…D
D D…07…C…09…C…0c…C…0e…C…00…C…01…C…02…C C…06…C…07…B…09…B…0b…B…0c…B…0e…B…86…1         …02…   …02…   …02…   …02…                                           



SAC ACCESS, AFCAC Project 211                       SYS/1983-03-18
















C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-1

The Intelligent Data Base Language, IDL exist in two versions.
 On the IDM itself the IDL is represented by machine code, but
 on the front end system including VDU's and CGDU the IDL is
 represented in an English-like notation.

Examples:

"CREATE CLUSTERED INDEX ON PARTS" means that the relation PART
 will have a special index created to speed up the processing
 of that relation.

"LOAD DATABASE INVENTORY FROM FILE INV1"

means that the data base INVENTORY IS CREATED by loading the
 file INV1.

"RETRIEVE (PART.NAME, PART.COST)"

means that the PART relation is accessed to retrieve all names
 and costs.



P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:

I-B-33








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-2

Two different ways of storing queries for rense is provided.
 The first one, allows the actual entried text to be stored.
 The other principle enables the stored query to be stored under
 a single name on the IDM and reused in a fast way and to be
 reused as inserts in new query developments.


















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:

I-B-36







C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-3



The report writer provided by the ACCESS is in reality an exhanced
 query capability which provided more editing capability and
 count of various fields.

The editing capabilities compise, page numbering heading, and
 spacing between columns. All processing in connection with page
 break is performed.

The query language and the report writer can perform aggregates
 like min, max, count sum and average on fields retrieved from
 the database in order to present more user friendly information.










P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

I-B-54








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-4 


The shell provided with ACCESS will be a general shell
 to interface users to all functions and features. The
 content of the shell is easily modifiable so that future
 applications can be incorporated.


















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

I-B-57








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-5 


Two different methods will be implemented, namely, a
 six character unnumeric code, which will allow the experienced
 user to go directly to the function he requests.

The other method only requires two keystrokes, namely
 a number, representing the function and a enter key.
















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

II-D-97








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-6 


A function key can also be used to retrieve the help
 function.





















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

II-D-112, II-D-114








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-8



The System Administrator only has capabilities to interactively
 change passwords.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (6e)
                                                                 
                                                                 23








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-9



The checkpointing mechanism is not controlled by the
 user, but is automatically executed by the system and
 a checkpoint stored on disk at predefined points of each
 transaction execution.

At system recovery all tasks are resumed from the latest
 stored checkpoint.













P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (6s)
                                                                 
                                                                 23









C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-10



The System Administrator has the capability to monitor
 any selected user's input and output in real time.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (13d)
                                                                 
                                                                 25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-11



The System Administrator has the capability to assign
 and change passwords.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (13f)
                                                                 
                                                                 25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-13



The System Operator has the capability to logically remove
 and replace individual devices from the configuration
 without disrupting the continuity of operation.
















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (14a)
                                                                 
                                                                 25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-14



Any change in the system file and the system software
 identifiers can only be accomplished via the system initialization
 procedure.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (16a1)
                                                                 
                                                                 26







C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-15



Passwords must be alphabetic and between 6 and 8 characters
 in length.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (16a3)
                                                                 
                                                                 26








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-16



The wording of the referenced para will be changed. Passwords
 in the proposed system need not to be unique.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (16b1)
                                                                 
                                                                 26








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-17



The user access rights can be designated read only, read-write
 or execute only.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (16b3b)
                                                                 
                                                                 27








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-20


The IDM Software Reference Manual is a propriatary document
 to Britton Lee, but if the government is prepared to
 sign a none-disclosure agreement with Britton Lee, the
 document can be provided.


















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

None








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-21



For a more detailed description of most of the proposed
 general utilities see the CR80 Handbook.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (16b3b)
                                                                 
                                                                 27








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-22



A more detailed description of the proposed graphics
 software:
MEGATEK TEMPLATE is given in the enclosed technical litterature.



















                                







C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-23


Your request for an automatic carriage return/line feed
 after a character position is covered by the: RM, Right
 Margin command.

The decimal alignment will be covered by a special command
 called

                        :DA
















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

II-D-89








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-24



The description of the required statistical functions
 has erroneous been given on p. 52 and will be moved to
 p. 56.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7k
                                                                 (1)-(3)
                                                                 
                                                                 52,
                                                                 56








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-25


Please refer to the answer given to HS-54.



















                       

      








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-26



The mentioned functions are contained in the proposed
 graphics software. The proposal will be updated accordingly.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                    I, B, C7f (1)-(3)
                                           51, 52







C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-27


The spelling corrector will be adaptive in the sense
 that it can collect information of the most often made
 misspelling and provide the user with possible correct
 spelling.



















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

I-B-56








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-28



The application programs will be written in PASCAL. A
 PASCAL compiler will be furnished with the proposed system.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7d
                                                                 (1)-(2)
                                                                 
                                                                 49







C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-31





O̲f̲f̲e̲r̲o̲r̲ ̲R̲e̲s̲p̲o̲n̲s̲e̲:



a)    In order to clearly indicate that our proposal
      specifies locations for junction boxes necessary
      to support at least 1800 terminal device connections
      evenly distributed within building 500/501. We
      have updated our proposal to show "taps" on each
      junction/pull box as follows:

  -   terminal device connections (taps) for C1/C2 terminals
      are indicated with room number.

  -   additional terminal device connections (taps) on
      each X-net are specified by a number of possible
      connections per junction/pull box (the number is
      written within a circle attached to each junction
      box on the conduit/cable plan drawings).

  -   the sum of terminal device connections for C1/C2
      and encircled connections exceeds 1800.


b)    Please note that the number of possible connections
      (encircled number) to a junction/pull box can be
      varied within a X-net branch i.e. the number of
      connections to a junction/pull box can be adjusted
      to the need for terminal devices connected to the
      X-net within a certain area of the building.

c)    Please also note that the junction/pull boxes indicated
      on the conduit/cable plan drawings are "distribution
      boxes" only. The termination box for connection
      of each terminal device is to be installed on the
      wall in the terminalroom. The termation box contains
      the XTA/XWO units.







C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-31 (continued)





d)    We have also updated our proposal so that the network
      is prepared for, without Hardware modifications
      to the network, to support up to 1068 terminal
      devices (8 X-net, each with 246 terminal devices)
      instead of the C1, C2, C3 quantity asked for in
      the IFB. This has been achieved by adding X-net
      branch units.


e)    The following pages of Part I, subpart C of proposal
      have been updated to reflect above clarification:

  Section 3.3.2.1, page 26, 27; Figure I. 3.3.2-1 thru
  13 page 28 thru 40. New table added table I. 3.3.2-1.







C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-36



The proposed COBOL compiler has not yet been validated according
 to FIBS PUB 21-1, however, if it turns out that the compiler
 will not meet the required specification it will either be updated
 or an alternative compiler will be furnished.









C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-38



The operating system will provide interactive display
 of all jobs in the different queues.

Per queue status information containing job priority
 and program name will be displayed.














P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (6h)
                                                                 
                                                                 23








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-39



A user controlled logging function will be provided.


















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (6t)
                                                                 
                                                                 23








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-40



The calender clock displayed on the user terminals will
 have the format HHMMSS for the time and YYMMDD for date.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (8)
                                                                 
                                                                 24








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-41



Upon a System Administrator command all input/output
 to/from a specified terminal will also be directed the
 System Administrator's terminal.
















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (13d)
                                                                 
                                                                 25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-42



The System Administrator can override or modify system
 generated passwords.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (13n)
                                                                 
                                                                 25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-43


Please refer to answer and update given to HS-41.





















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

I-B-25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-43



Any user can request assistance from the System Administrator.

The System Administrator can assist any user by having
 all input/output to/from a selected user directed to
 his terminal.















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (13p)
                                                                 
                                                                 25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-44



The operating sytem will provide interactive display
 of all jobs in the different queues.

Per queue status information containing job priority
 and program name will be displayed.














P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7b
                                                                 (14d)
                                                                 
                                                                 25








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-46



The general utility programs will contain facilities
 for automatic sequencing of source files.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7e
                                                                 (6c)
                                                                 
                                                                 49








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-47



Typographical errors will be corrected as follows:
      "light" shall be changed to "eight"
      "36"    shall be changed to "96"
















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7e
                                                                 (7g)
                                                                 
                                                                 50








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-48



The referenced paras ensurethat all required functions
 of the File Management System will be provided. A more
 detailed description of the proposed File Management
 System is given in: II, D, (b.5)  35.


















                            








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-50


The text editor is uded directly on the displayed information,
 which might be a retrieved file. All terminal functions
 like cursor movements, insert/delete character/lines
 can be performed.



















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

I-B-53








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-51


The OCR will be controlled and monitored by the host
 in order fulfill your requirement for programmability.
 However CR can also provide more intelligent OCR, but
 the price will be two to three times the price of the
 basic OCR.


















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

None








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-52


The relational data base concept implemented on the IDM
 is very well suited for a data dictionary, because this
 can be implemented as a data base itself. This means
 that all the normal data base features are available
 in handling the data dictionary. Field names and description
 can be grouped and retrieved as normal data base entries.
 Making sorted list of all or parts of the data dictionary
 is provided by standard data base features.















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

I-B-39








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-53



The proposed operating system provides facilities for
 automatic execution of any valid command or command-file
 at login.

The exact number of definable environmental parameters
 will depend on the detailed implementation of the application
 software.








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-54


The electronic mail system will be implemented on the
 IDM database. In order to minimize the use of disc storage,
 a message with multiple addressees will not be copied
 before there is a specific need for it. This means that
 initially the users only have a reference to the message
 in question. Only if the user requests a personel copy
 for modification will the system create a new copy of
 the message.















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           

I-B-66








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-55


Please refer to the answer given to HS-3.




















                      

      








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-56


The user may change default values in the user profile,
 however certain parameters like security classifications
 are only changed by the system administrator.

The capability by a command to override the menu selection
 is in reality the menu bypass capability, where the experienced
 user may go directly to the requested function.















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                    

I-B-24








C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲:  HS-57



A more detailed description of the proposed graphics
 software:
MEGATEK TEMPLATE is given in the enclosed technical litterature.

















P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:                                           I,
                                                                 B,
                                                                 C7f,
                                                                 
                                                                 51