top - download
⟦749adbe2c⟧ Wang Wps File
Length: 16769 (0x4181)
Types: Wang Wps File
Notes: DN SAC ACCESS; HS-1/57
Names: »3439A «
Derivation
└─⟦ab79d1adb⟧ Bits:30006221 8" Wang WCS floppy, CR 0269A
└─ ⟦this⟧ »3439A «
WangText
…02……00……00……00……00…D…02…D
D D…07…C…09…C…0c…C…0e…C…00…C…01…C…02…C C…06…C…07…B…09…B…0b…B…0c…B…0e…B…86…1 …02… …02… …02… …02…
SAC ACCESS, AFCAC Project 211 SYS/1983-03-18
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-1
The Intelligent Data Base Language, IDL exist in two versions.
On the IDM itself the IDL is represented by machine code, but
on the front end system including VDU's and CGDU the IDL is
represented in an English-like notation.
Examples:
"CREATE CLUSTERED INDEX ON PARTS" means that the relation PART
will have a special index created to speed up the processing
of that relation.
"LOAD DATABASE INVENTORY FROM FILE INV1"
means that the data base INVENTORY IS CREATED by loading the
file INV1.
"RETRIEVE (PART.NAME, PART.COST)"
means that the PART relation is accessed to retrieve all names
and costs.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-33
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-2
Two different ways of storing queries for rense is provided.
The first one, allows the actual entried text to be stored.
The other principle enables the stored query to be stored under
a single name on the IDM and reused in a fast way and to be
reused as inserts in new query developments.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-36
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-3
The report writer provided by the ACCESS is in reality an exhanced
query capability which provided more editing capability and
count of various fields.
The editing capabilities compise, page numbering heading, and
spacing between columns. All processing in connection with page
break is performed.
The query language and the report writer can perform aggregates
like min, max, count sum and average on fields retrieved from
the database in order to present more user friendly information.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-54
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-4
The shell provided with ACCESS will be a general shell
to interface users to all functions and features. The
content of the shell is easily modifiable so that future
applications can be incorporated.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-57
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-5
Two different methods will be implemented, namely, a
six character unnumeric code, which will allow the experienced
user to go directly to the function he requests.
The other method only requires two keystrokes, namely
a number, representing the function and a enter key.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
II-D-97
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-6
A function key can also be used to retrieve the help
function.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
II-D-112, II-D-114
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-8
The System Administrator only has capabilities to interactively
change passwords.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(6e)
23
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-9
The checkpointing mechanism is not controlled by the
user, but is automatically executed by the system and
a checkpoint stored on disk at predefined points of each
transaction execution.
At system recovery all tasks are resumed from the latest
stored checkpoint.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(6s)
23
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-10
The System Administrator has the capability to monitor
any selected user's input and output in real time.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(13d)
25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-11
The System Administrator has the capability to assign
and change passwords.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(13f)
25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-13
The System Operator has the capability to logically remove
and replace individual devices from the configuration
without disrupting the continuity of operation.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(14a)
25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-14
Any change in the system file and the system software
identifiers can only be accomplished via the system initialization
procedure.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(16a1)
26
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-15
Passwords must be alphabetic and between 6 and 8 characters
in length.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(16a3)
26
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-16
The wording of the referenced para will be changed. Passwords
in the proposed system need not to be unique.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(16b1)
26
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-17
The user access rights can be designated read only, read-write
or execute only.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(16b3b)
27
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-20
The IDM Software Reference Manual is a propriatary document
to Britton Lee, but if the government is prepared to
sign a none-disclosure agreement with Britton Lee, the
document can be provided.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
None
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-21
For a more detailed description of most of the proposed
general utilities see the CR80 Handbook.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(16b3b)
27
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-22
A more detailed description of the proposed graphics
software:
MEGATEK TEMPLATE is given in the enclosed technical litterature.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-23
Your request for an automatic carriage return/line feed
after a character position is covered by the: RM, Right
Margin command.
The decimal alignment will be covered by a special command
called
:DA
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
II-D-89
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-24
The description of the required statistical functions
has erroneous been given on p. 52 and will be moved to
p. 56.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7k
(1)-(3)
52,
56
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-25
Please refer to the answer given to HS-54.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-26
The mentioned functions are contained in the proposed
graphics software. The proposal will be updated accordingly.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I, B, C7f (1)-(3)
51, 52
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-27
The spelling corrector will be adaptive in the sense
that it can collect information of the most often made
misspelling and provide the user with possible correct
spelling.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-56
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-28
The application programs will be written in PASCAL. A
PASCAL compiler will be furnished with the proposed system.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7d
(1)-(2)
49
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-31
O̲f̲f̲e̲r̲o̲r̲ ̲R̲e̲s̲p̲o̲n̲s̲e̲:
a) In order to clearly indicate that our proposal
specifies locations for junction boxes necessary
to support at least 1800 terminal device connections
evenly distributed within building 500/501. We
have updated our proposal to show "taps" on each
junction/pull box as follows:
- terminal device connections (taps) for C1/C2 terminals
are indicated with room number.
- additional terminal device connections (taps) on
each X-net are specified by a number of possible
connections per junction/pull box (the number is
written within a circle attached to each junction
box on the conduit/cable plan drawings).
- the sum of terminal device connections for C1/C2
and encircled connections exceeds 1800.
b) Please note that the number of possible connections
(encircled number) to a junction/pull box can be
varied within a X-net branch i.e. the number of
connections to a junction/pull box can be adjusted
to the need for terminal devices connected to the
X-net within a certain area of the building.
c) Please also note that the junction/pull boxes indicated
on the conduit/cable plan drawings are "distribution
boxes" only. The termination box for connection
of each terminal device is to be installed on the
wall in the terminalroom. The termation box contains
the XTA/XWO units.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-31 (continued)
d) We have also updated our proposal so that the network
is prepared for, without Hardware modifications
to the network, to support up to 1068 terminal
devices (8 X-net, each with 246 terminal devices)
instead of the C1, C2, C3 quantity asked for in
the IFB. This has been achieved by adding X-net
branch units.
e) The following pages of Part I, subpart C of proposal
have been updated to reflect above clarification:
Section 3.3.2.1, page 26, 27; Figure I. 3.3.2-1 thru
13 page 28 thru 40. New table added table I. 3.3.2-1.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-36
The proposed COBOL compiler has not yet been validated according
to FIBS PUB 21-1, however, if it turns out that the compiler
will not meet the required specification it will either be updated
or an alternative compiler will be furnished.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-38
The operating system will provide interactive display
of all jobs in the different queues.
Per queue status information containing job priority
and program name will be displayed.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(6h)
23
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-39
A user controlled logging function will be provided.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(6t)
23
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-40
The calender clock displayed on the user terminals will
have the format HHMMSS for the time and YYMMDD for date.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(8)
24
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-41
Upon a System Administrator command all input/output
to/from a specified terminal will also be directed the
System Administrator's terminal.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(13d)
25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-42
The System Administrator can override or modify system
generated passwords.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(13n)
25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-43
Please refer to answer and update given to HS-41.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-43
Any user can request assistance from the System Administrator.
The System Administrator can assist any user by having
all input/output to/from a selected user directed to
his terminal.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(13p)
25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-44
The operating sytem will provide interactive display
of all jobs in the different queues.
Per queue status information containing job priority
and program name will be displayed.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7b
(14d)
25
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-46
The general utility programs will contain facilities
for automatic sequencing of source files.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7e
(6c)
49
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-47
Typographical errors will be corrected as follows:
"light" shall be changed to "eight"
"36" shall be changed to "96"
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7e
(7g)
50
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-48
The referenced paras ensurethat all required functions
of the File Management System will be provided. A more
detailed description of the proposed File Management
System is given in: II, D, (b.5) 35.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-50
The text editor is uded directly on the displayed information,
which might be a retrieved file. All terminal functions
like cursor movements, insert/delete character/lines
can be performed.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-53
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-51
The OCR will be controlled and monitored by the host
in order fulfill your requirement for programmability.
However CR can also provide more intelligent OCR, but
the price will be two to three times the price of the
basic OCR.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
None
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-52
The relational data base concept implemented on the IDM
is very well suited for a data dictionary, because this
can be implemented as a data base itself. This means
that all the normal data base features are available
in handling the data dictionary. Field names and description
can be grouped and retrieved as normal data base entries.
Making sorted list of all or parts of the data dictionary
is provided by standard data base features.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-39
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-53
The proposed operating system provides facilities for
automatic execution of any valid command or command-file
at login.
The exact number of definable environmental parameters
will depend on the detailed implementation of the application
software.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-54
The electronic mail system will be implemented on the
IDM database. In order to minimize the use of disc storage,
a message with multiple addressees will not be copied
before there is a specific need for it. This means that
initially the users only have a reference to the message
in question. Only if the user requests a personel copy
for modification will the system create a new copy of
the message.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-66
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-55
Please refer to the answer given to HS-3.
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-56
The user may change default values in the user profile,
however certain parameters like security classifications
are only changed by the system administrator.
The capability by a command to override the menu selection
is in reality the menu bypass capability, where the experienced
user may go directly to the requested function.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲:
I-B-24
C̲o̲n̲t̲r̲o̲l̲ ̲N̲u̲m̲b̲e̲r̲: HS-57
A more detailed description of the proposed graphics
software:
MEGATEK TEMPLATE is given in the enclosed technical litterature.
P̲r̲o̲p̲o̲s̲a̲l̲ ̲C̲h̲a̲n̲g̲e̲ ̲P̲a̲g̲e̲s̲: I,
B,
C7f,
51