DataMuseum.dk

Presents historical artifacts from the history of:

CR80 Wang WCS documentation floppies

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CR80 Wang WCS documentation floppies

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦dca0f4b4c⟧ Wang Wps File

    Length: 1466 (0x5ba)
    Types: Wang Wps File
    Notes: Spelunked
    Names: »~ORPHAN36.05«

Derivation

└─⟦c2ca659c9⟧ Bits:30006002 8" Wang WCS floppy, CR 0037A
    └─ ⟦this⟧ »~ORPHAN36.05« 

WangText

n accomplishing the task.

 k) A space for the instructor's initials.

 l) A space for the instructor to record the task completion date.



10.5.5 A comprehensive examination, designed to enable the student to demonstrate
       his mastery of skills andknowledges necessary for successful accomplishment
       of the assigned task, shall follow each worksheet.


A̲N̲N̲E̲X̲ ̲A̲:̲ ̲ ̲E̲X̲A̲M̲P̲L̲E̲S̲ ̲O̲F̲ ̲O̲P̲E̲R̲A̲T̲O̲R̲(̲U̲S̲E̲R̲)̲/̲S̲U̲P̲E̲R̲V̲I̲S̲O̲R̲ ̲F̲U̲N̲C̲T̲I̲O̲N̲S̲


1.       G̲E̲N̲E̲R̲A̲L̲
         a)  Operation of VDU, printers, paper tape punch and
             reader.

         b)  Starting, stepping and emergency operation.

         c)  Security procedures.

         d)  General command info and explanations or system
             generated display information.

2.       M̲E̲S̲S̲A̲G̲E̲ ̲P̲R̲O̲C̲E̲S̲S̲I̲N̲G̲
         a)  Message composition, editing and dispatch.

         b)  Reception and processing of incoming messages.

         c)  Storage ad retrieval.

         d)  Use of logs.

3.       D̲A̲T̲A̲ ̲B̲A̲S̲E̲ ̲F̲U̲N̲C̲T̲I̲O̲N̲S̲
         a)  Creation and deletion of data base records.

         b)  Updating of data base.

         c)  Correction of errors.

         d)  Creation of displays and new message formats.

4.       I̲N̲T̲E̲R̲F̲A̲C̲E̲ ̲F̲U̲N̲C̲T̲I̲O̲N̲S̲
         a)  Descriptionof interfaces with other systems.

         b)  Limitations of use.

5.       S̲U̲P̲E̲R̲V̲I̲S̲O̲R̲Y̲ ̲F̲U̲N̲C̲T̲I̲O̲N̲S̲
         a)  Password Management.

         b)  Operator assignments and message distribution.

         c)  Software Program Loading.

         d)  System Recovery.

         e)  Message Preparation, Release Reeipt, and Correction.

NOTE:  THIS IS NOT INTENDED TO BE AN EXHAUSTIVE LIST OF ALL
 
       FUNCTIONS BUT ONLY AN EXAMPLE.