|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - download
Length: 100992 (0x18a80) Types: TextFile Names: »D103«
└─⟦2520239fd⟧ Bits:30005867/disk13.imd Dokumenter (RCSL m.m.) └─⟦this⟧ »D103«
i C_O_N_T_E_N_T_S_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _P_A_G_E_ 1. INTRODUCTION ........................................ 1 2. CORRECTIONS ......................................... 2 A_P_P_E_N_D_I_X_: A. REFERENCES .......................................... 46 \f ii \f 1_._ _ _ _ _ _ _ _ _I_N_T_R_O_D_U_C_T_I_O_N_ 1. This manual describes corrections to the first edition of the RC BASIC PROGRAMMING GUIDE (RCSL No 42-i 0671). Some corrections are due to printing errors, most of the changes are, however, a consequence of new features that have been implemented in the RC BASIC system. The most important new features are: - STRING ARRAYS: It is now possible to work with two-dimensional strings. - LOWBOUND: The lower bound of arrays can be set to zero or one. - RESET: The effect of an ON ERR/ESC-statement can be cancelled. - IMPROVED FILE SYSTEM: On systems with moving head disc, subcatalogs are used instead of logical discs. Several users can have write-access to the same logical disc/subcatalog, and one logical disc/subcatalog can be used as a program-library accessable from all terminals. - LOGON/LOGOFF: On configurations with some kind of disc, the system will make an attempt to load a program from the disc when a terminal is logged on/off. This makes it possible for the user to implement an account-system. - PROTECT: It is possible (by means of the above mentioned facility) to prevent a user from changing subcatalogs, saving programs into existing files etc. - CALL ROUTINES: It is now possible to call assembler-coded subroutines from RC BASIC programs. - EXTENDED PRECISION: The system can be delivered with extended precision-arithmetic corresponding to 10 decimals digits in\f output. The number of digits to be output can be defined by the user by means of the DIGITS-statement. Many of the corrections in this manual have been described in the previous manuals: "Corrections (no 1 (2)) to the RC BASIC Programming Guide", RCSL No 43-GL6940 (7914) which are replaced by the present manual. Changes or new information are marked with a vertical bar in the margin. Most of the corrections are mentioned by a page number and a line number. A positive line number means that lines should be counted from the top of the page, a negative line number means that lines should be counted from the buttom. With these corrections included, the Programming Guide corresponds to rev. 02.00 of the RC BASIC System. \f F_2_._ _ _ _ _ _ _ _ _C_O_R_R_E_C_T_I_O_N_S_ 2. In the list of reserved words on the second page: word use section CALL S App. H DIGITS C,S 3.6.A LOWBOUND C,S 9.10.A PROTECT C,S 3.26.A RESET C,S 3.30.A CONTENTS, Last page, replace line -3 by: G LOGON/LOGOF FUNCTIONS. CONTENTS, Last page, insert after line -2: I EXTENDED PRECISION IN RC BASIC. Page 13, insert after line -6: <subcatname': The name of a subcatalog. Page 17, line 4: The lower bound of a dimension is usually 1, it may, however, be set to 0 by means of the LOWBOUND statement (see Ch. 9). Page 17, line 10: 32 767 -' 16 380. Page 21, line -5 through -1: 1. A string variable, e.g. ANSWER 2. An element of a string array, e.g. TEXT(5) \f 3. A part of a string variable or a part of an element of a string array. 4. A string literal, e.g. "PETER" 5. The CHR(X) function, e.g. CHR(65) 6. A concatenation of the above items, e.g. "JOHN SMITH", ADDRESS Page 22, line -7: block -' blocks. Page 25, line -10, -8, -6: 0250 LET MONTH="OCTOBER"; DAYS=31 0270 LET MONTH="NOVEMBER"; DAYS=30 0290 LET MONTH="DECEMBER"; DAYS 31 Page 29, line 6 through 9: 2. If the SAVEd program is on disc, the system searches the logical disc/subcatalog to which the terminal is con- nected for <filename' (see Ch.8). If <filename' is not found then the system searches for a logical disc called LIB and if this is found then a search is made in this logical disc for <filename'. If <filename' is not found, the system outputs the error message 0100: FILE UNKNOWN. Page 29, line 12 and 13: The statement: "If <filename' is not found ..." should be deleted. Page 29, insert after line -12: 7. When the CHAINed program is executed, it is done without clearing the state of the program. This means that all variables have the values they had, when the program was\f SAVEd. If a CHAINed program should be executed as if the user had started it by means of the command RUN, then the user must bring the program into "neutral" state be- fore it is SAVEd: 1 stop ; insert STOP as the first statement RUN ; execute the program 1 ; delete STOP-statement SAVE "<filename'" ; SAVE the program Page 30, insert after line -4: 4. The number of items in each DATA-statement is limited. Each list may contain 22 (in extended precision systems 15) numeric items. If the list contains string elements the maximal number of items depends on the length of the strings. If the list has too many elements, error message no. 0009: LINE TOO LONG will be output when the DATA-state- ment is entered. Page 31, line -3: more that -' more than. \f F_ Page 33, insert after line 14: 3.6A DIGITS F_o_r_m_a_t_ DIGITS = <expr' <expr': a numeric expression which evaluates to an integer, 1 <= <expr' <= 10. U_s_e_ As a statement or command to define the maximal number of digits output in PRINT-statements in systems with extended precision arithmetic. R_e_m_a_r_k_s_ 1. The default value of DIGITS is 6. 2. The statement/command has no effect in systems with normal precision arithmetic. 3. If <expr' evaluates to a number smaller than 1 or greater than 10, DIGITS is set equal to 1 respectively 10. 4. For further remarks, see appendix I. \f F_ Page 33, line -12 through -1: <svar'(<l') <svar'(<l') DIM <sarray'(<n',<l') , <sarray'(<n',<l')... <array'(<m') <array'(<m') <array'(<row',<col') <array'(<row',<col') <svar': a string variable <l': a numeric expression, which evaluates to the length of a string variable or the length of each element in a string array. <sarray': a string array name. <n': a numeric expression, which evaluates to the num- ber of elements in a string array. <array': an array name <m': a numeric expression, which evaluates to the num- ber of the last element in a one-dimensional ar- ray. <row': a numeric expression, which evaluates to the num- ber of the last row in a two-dimensional array. <col': a numeric expression, which evaluates to the num- ber of the last column in a two-dimensional ar- ray. Page 34, line 1 through 4: U_s_e_ As a statement or command to define explicitly the size of one or more numeric variable arrays, string variables or string arrays. (For the dimensioning of string variables, see Chapter 5). \f F_ Page 34, line 15: 1 <= value -' 0 <= value Page 34, line -8: Less than 1 -' less than the lower bound (as defined by means of the LOWBOUND-statement, see Chapter 9.) Page 35, line -9: 32767 -' 16380 Page 54, insert after line -13: 3.18A: LOWBOUND For description, see Chapter 9. Page 55, insert after line 8: 3. Execution of a RESET ERR statement (see sect. 3.30A) will restore normal error action. Page 56, insert after last line: 6. Execution of a RESET ESC statement (see sect. 3.30A) will restore the normal ESCape key function. \f F_ Page 73, insert after line -3: 3.26A PROTECT F_o_r_m_a_t_ PROTECT = <expr' <expr': a numeric expression specifying a protection mask. U_s_e_ As a statement or command to protect certain statements or commands from being executed on the terminal. An attempt to execute a protected facility will cause an error message to be output. R_e_m_a_r_k_s_ 1. Protection codes: 1. PROTECT 2. CONNECT 4. RELEASE 8. COPY 16. COPY to existing file 32. LIST in existing file 64. SAVE in existing file 2. If PROTECT=1 has been executed, the protection-mask cannot be changed. The mask will be cleared when the terminal is logged off. 3. The PROTECT statement is especially useful in LOGON-pro- grams. For further details see APP. G. \f E_x_a_m_p_l_e_ PROTECT = 1+2+4 The CONNECT and RELEASE statements and commands cannot be executed on the terminal. \f F_ Page 79, insert after line 19: 3.30A RESET F_o_r_m_a_t_ ESC M_ RESET ERR P_ U_s_e_ As a statement to cancel the effect of an ON-ESC or ON-ERR statement. R_e_m_a_r_k_s_ 1. After execution of a RESET statement the normal action is restored. See ON-ERR, sect. 3.20 and ON-ESC, sect. 3.21. \f m_ Page 92, line -10: 2 16 -' 2 15 Page 103, insert after line -13: 5.1.8 S_t_r_i_n_g_ _a_r_r_a_y_s_ The array-concept can be used in connection with strings. Dimensioning of a string array is accomp- lished by means of the DIM statement, (see Chapter 3), for example: DIM TEXT(20,40) The string array TEXT consists of 20 string-elements each 40 characters long. The i>th element can be re- ferenced as TEXT(i). TEXT(i,j) is a reference to the j>th character in the i>th element, and TEXT(i,j,k) points our character number j through k in the i>th element of the string array. The lower bound of a string array (i.e. the number of the first element) is usually 1. By means of the LOW- BOUND-statement (see Chapter 9) the lower bound may, however, be set to zero. The first character in a string element will always be number 1. E_x_a_m_p_l_e_ C_o_m_m_e_n_t_ 0010 TAB=4 The 5 names are 0020 DIM NAME(5,8) stored in the string 0030 LEFT I=1 array NAME 0040 REPEAT 0050 READ NAMES (I) 0060 LEFT I=I+1 0070 UNTIL I'5 0080 FOR I=1 TO 5 0090 PRINT NAME(I) 0100 NEXT I 0110 DATA "PETER,"JOHN","ROBERT","ROBERTA","DIANA" p_ PETER JOHN ROBERT ROBERTA DIANA \f E_x_a_m_p_l_e_ C_o_m_m_e_n_t_ 0010 DIM TEXT(6,5) 0020 FOR I=1 TO 6 0030 LET TEXT(I)="TEXT",CHR(48+I) 0040 NEXT I 0050 FOR I=6 TO 2 STEP -1 0060 PRINT TEXT(I) print string element 6 to 2 0070 NEXT I 0080 FOR I=1 TO 5 0090 PRINT TEXT(1,I); print string element 1, cha- 0100 NEXT I racter by character 0110 PRINT 0120 PRINT TEXT(2,3,LEN(TEXT(2))) print string element 2, from character no. 3. TEXT6 TEXT5 TEXT4 TEXT3 TEXT2 TEXT1 XT2 \f F_ Page 108, insert after line 1: If the lower bound of arrays has been set to zero (by means of the LOWBOUND-statement, see Chapter 9), then MATRIXA will have 11 rows (no. 0 through 10) and 21 columns (0 through 20). Page 124, line 1 and 2: 7. Logical Discs/Subcatalogs and Related Commands. 7.1. Introduction. 7.1.1. Logical Discs. Page 126, line 5: protection key -' protection key ('0) \f F_ Page 126, insert before line 14: 7.1.2. Subcatalogs. The logical discs described in Sect. 7.1.1. are always used on systems with flexible discs. On systems with moving-head disc (systems running under the DOMUS operating system) RC BASIC will usually use s_u_b_c_a_t_a_l_o_g_s_ in stead of logical discs. The subcatalogs can be considered as being a part of the DOMUS system, and therefore they will not be described in this manual. The reader is referred to ref. 1 and 2. Once a subcatalog has been created (by means of the DOMUS utility program SUBCA, see ref. 1) it may from the BASIC- users point of view be looked at as a logical disc, except for a few minor differences that will be mentioned in the following: - The name of a subcatalog consists of max. 5 characters. - The name of a file contained in a subcatalog consists of max. 5 characters. - A subcatalog does not have a fixed size. Files may be created within the subcatalog as long as there is space on the disc holding the subcatalog. - The INIT-, LOCK- and USERS-command (Sect. 7.4, 7.5 and 7.8) are blind, i.e. they have no effect when used in subcatalog-systems. - The concept "exclusive user" does not exist in connection with subcatalogs. When a user connects his terminal to a subcatalog and he specifies a correct protection key, he will be allowed to perform all kinds of operations on the files contained in the subcatalog. This does not mean, that other users are excluded from the actual subcata- logs. In other words: all users may perform all kinds of\f operations at the same time. It is, however, not possible for two or more users to write into or delete the same file at the same time. - If a subcatalog does not have a protection key, a user is allowed to perform a_l_l_ operations (including "DELETE") if he knows the name of the subcatalog. - The main catalog of the system can be looked at as a sub- catalog named CAT with protection key equal to zero. If a user has not connected his terminal to a subcatalog, he will be connected to CAT. The user is then allowed to r_e_a_d_ all files described in CAT, but he may only c_h_a_n_g_e_ files, that have been created from BASIC. This means, that all system-files are protected against destruction. \f F_ Page 126, line -10: R_e_m_a_r_k_s_ _(_l_o_g_i_c_a_l_ _d_i_s_c_-_s_y_s_t_e_m_s_)_ 1. If the user CONNECT>s to a logical disc which has a pro- tection key (<'0) without specifying this, he may only read from the logical disc. 2. If the user specifies a protection key (<'0) and the va- lue is correct, he becomes the exclusive user of <ldname' and may now write to as well as read from <ldname', whereas no other user may connect his terminal to <ldname'. 3. If a CONNECT-command is given from a termimal which is already connected to a logical disc, a RELEASE-command (see Sect. 7.7) will automatically be executed. 4. If the protection key of a logical disc is equal to zero, this logical disc can be used by s_e_v_e_r_a_l_ _u_s_e_r_s_ _a_t_ t_h_e_ _s_a_m_e_ _t_i_m_e_. The users will be able to CREATE, RENAME, read from and write to files on the logical disc, if they do not specify a protection key when CONNECTing. If a file is to be DELETE>d, this can only be done by a user, who is exclusive user of the logical disc. One be- comes exclusive user of a logical disc with protection key e_q_u_a_l_ to zero by specifying any protection key n_o_t_ e_q_u_a_l_ to zero when CONNECTing. The following table shows which kind of access the user will have depending on the protection key of the logical disc and the key specified in the CONNECT-command. \f F_ T_ Key specified in CONNECT- command =0 '0 Protec- i.e. no key tion key of _t_h_e_ _l_o_g_i_c_a_l_ _d_i_s_c_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ W_r_i_t_e_-_a_c_c_e_s_s_: E_x_c_l_u_s_i_v_e_ _u_s_e_: =0 all kind of access all kind of ac- is allowed except cess is allow- _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _D_E_L_E_T_E_ _ _ _ _ _ _ _ _ _ _ _ _ _ _e_d_ _ ____________ '0 R_e_a_d_-_a_c_c_e_s_s_ onlyE_x_c_l_u_s_i_v_e_ _u_s_e_:_ all kind of ac- cess is allowed. &_ R_e_m_a_r_k_s_ _(_s_u_b_c_a_t_a_l_o_g_-_s_y_s_t_e_m_s_)_ 1. If the user CONNECT>s to a subcatalog which has a pro- tection key (<'0) without specifying this, he may only read from files contained in the subcatalog. 2. If the user specifies a protection key and the value is correct, he is allowed to perform all kinds of opera- tions on files contained in the subcatalog. 3. If a CONNECT-command is given from a terminal which is already conncted to a subcatalog, a RELEASE-command (see Sect. 7.7) will automatically be executed. 4. If a subcatalog does not have a protection key, a user is allowed to perform all kinds of operations on files contained in the subcatalog, if he CONNECT>s to the sub- catalog. \f T_ The following table shows which kind of access the user will have depending on the protection key of the subcatalog and the key specified in the CONNECT-command. Key specified in CONNECT- =0 '0 Protec- command i.e. no key tion key of t_h_e_ _s_u_b_c_a_t_a_l_o_g_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ =0 all kinds of all kinds of access is access is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _a_l_l_o_w_e_d_ _ _ _ _ _ _ _ _ _ _a_l_l_o_w_e_d_ _ _ _ _ _ _ '0 read-access all kinds of only access is allowed (if the key is correct) &_ \f F_ Page 127-132: <ldname' -' <ldname'/<subcatname' logical disc -' logical disc/subcatalog Page 127, line 14: user"s -' user>s Page 127, line -11: 1. A file can be copied to a logical disc/subcatalog only if the user has write-access to the files of that logical disc/subcatalog (see Sect. 7.2). Page 128, insert after line -12: 4. The INIT-command has no effect in subcatalog-systems. Page 129, insert after line 13: 5. The LOCK-command has no effect in subcatalog-systems. \f m_ Page 130, Remarks to LOOKUP. Remarks 1-6 only applies to logical-disc systems. In subcatalog-systems the listing of files will look as follows: (The headings will only be printed, if the LOOKUP "LPT" form of the command is used). NAME ATTRIBUTE LENGTH INDEX RLENGTH LBYTE LBLOCK SEQ RECSIZE NO.REC RAN PROG1 ........V 3 576 6 133 3 S DATA1 ........F 7 666 12 80 42 R LENGTH, INDEX and RLENGTH are usually of no interest for the user of BASIC. For further information, see ref. 2. NAME: The name of file. ATTRIBUTES: V: The file is extendable. F: The file has a fixed length i.e. it is not extendable. LENGTH: The length of the file. INDEX: The number of the sector, where the indexblock of the file is placed. RLENGTH: The reserved length of the file. LBYTE: (sequential files). The number of bytes used in the last block written. LBLOCK: (sequential files). The number of the last block written. RECSIZE: (random access files). The length (in bytes) of the record. NO.REC: (random access files). The number of records in the file. SEQ/RAN: S: a sequential file. R: a random access file. Only the files that have been created from BASIC will be listed although other files will be accessable for read- p_ ing. \f F_ Page 132, insert after line 6: 3. The USERS-command has no effect in subcatalog-systems. Page 133, line 6: L_o_g_i_c_a_l_ _d_i_s_c_s_ -' l_o_g_i_c_a_l_ _d_i_s_c_s_/_s_u_b_c_a_t_a_l_o_g_s_. Page 133-150: Logical disc -' logical disc/subcatalog. Page 133, insert after line -10: Serial printer (SP) Page 134, line 2-4: In logical disc-systems a RC BASIC file comprises a number of consecutive blocks in a logical disc. Each file is de- scribed separately by an entry in the subcatalog of the lo- gical disc (see Sect. 7.1). In subcatalog-systems an RC BASIC file consists of a number of s_l_i_c_e_s_ that can be pla- ced anywhere on the disc. A slice is a number of consecu- tive blocks; the number depends on how the DOMUS-disc has been generated, but it is usually 6 (see also ref. 2.) Page 134, line 6: Logical disc -' logical disc/subcatalogs. Page 134, line 13-14: In logical disc-systems the name consists of 1 to 8 charac- ters, and in subcatalog-systems 1 to 5 character. Only cha- racters with decimal values between 32 and 127 (see appen- dix D) are legal. \f Page 135, line 13 and Page 137, line -16 and Page 149, line 2: Replace "correctly specified the protection key of the lo- gical disc/subcatalog in the CONNECT-command" by "has write-access to the files of the logical disc/subcata- log to which the terminal is connected" Page 135: Replace lines -5 through -3 by A discfile can only be CREATEd, RENAMEd or written into if the user has write-access to the logical disc/subcatalog (see Chapter 7, CONNECT). A discfile can only be DELETEd if the user is exclusive user of the logical disc/subcatalog. \f F_ Page 137, line 4: <filename': the name of the disc file to be created, ex- pressed as a string literal or by means of a variable. In logical disc-systems the name con- sists of 1 to 8 characters, and in subcatalog- systems 1 to 5 character. Only characters with decimal value between 32 and 127 (see appendix D) are legal. Page 137, line -9 - -1: 3. In subcatalog-systems a file that is created with size equal to 0 will be extendable. This means that the file will be extended if the user writes more data into the file, than can be held in the blocks actually allocated to the file. If <size' is '0 the length of the file will be fixed, i.e. the file can not be extended. 4. In logical disc-system a file that is created with <size' equal to 0 will be given a length corresponding to the number of free blocks in the logical disc. The file can then be used for output, and when it is CLOSEd (see Sect. 8.2), the system will truncate it. No more than one file (in logical disc-systems) created with <size' equal to 0 can be used, unless the files in question have already been CLOSEd once. 5. <size' must be positive, if the file is a random access file. \f F_ Page 138, line 1: 5 -' 6 Page 138, line 7: 6 -' 7 Page 138, line -5 through -3: 1. A file can be deleted only if the user is exclusive user of the logical disc containing the file to be deleted (see Chapter 7, CONNECT). Page 138, DELETE: Remarks 1-3 only applies to logical disc-system. In sub- catalog-systems a file can be deleted, if the user has write-access to the subcatalog. Page 143, line 5: mode 0 or 3 -' mode 0, 2 or 3. Page 149, line -13: mode 0 or 3 -' mode 0, 2 or 3. Page 160, line -8 and Page 170, line -3: disc file -' disc file (only possible if the user has write-access to a logical disc/subcatalog). \f Page 161, insert after last line, and Page 170, insert after line 5: 3. If the SAVEd program is on disc, the system searches the logical disc/subcatalog to which the terminal is connected for <filename' (see Chapter 8). If <filename' is not found then the system searches for a logical disc/ subcatalog called LIB and if this is found then a search is made in this logical disc/subcatalog for <filename'. If <filename' is not found, the system outputs the error message 0100: FILE UNKNOWN. \f F_ Page 162, insert before line 5: 9.10A LOWBOUND F_o_r_m_a_t_ LOWBOUND=<expr' <expr': a numeric expression which evaluates to 0 or 1 U_s_e_ As a command or statement to change the lower bound of numeric and string arrays. R_e_m_a_r_k_ 1. The default lower bound is 1 (i.e. the number of the first element in an array is one). By means of the LOWBOUND-statement the lower bound may, how- ever, be set to zero. 2. If lowerbound is zero, the row and column no. zero is included in all matrix-operations. 3. The LOWBOUND-statement can be placed anywhere in an RC BASIC program. Each time an array element is referenced the current lower bound will be taken as the first element of the array. \f F_ E_x_a_m_p_l_e_ C_o_m_m_e_n_t_ 0010 LOWBOUND =1 0020 DIM A(5) 0030 FOR I=1 TO 5 0040 LET A(I)=I 0050 NEXT I 0060 FOR I=1 TO 5 lower bound of A-array is 1 0070 PRINT A(I); 0080 NEXT I 0090 LOWBOUND =0 0100 DIM B(5) 0110 PRINT 0120 FOR I=0 TO 4 now lower bound of A-array is 0 0130 PRINT A(I) 0140 NEXT I 0150 PRINT 0160 FOR I=0 to 5 B-array has 6 elements (0 to 5) 0170 PRINT B(I); 0180 NEXT I 1 2 3 4 5 1 2 3 4 5 0 0 0 0 0 0 Page 165, line 3, 8 and 9: NUL -' STX \f F_ N_e_w_ _E_r_r_o_r_ _M_e_s_s_a_g_e_s_ _(_p_a_g_e_ _1_7_6_-_1_8_7_)_ 0047: PARAMETER ERROR The actual parameters used in a call of an assembler-coded subroutine do not correspond to the formal parameters as specified in the subroutine. 0049: FACILITY PROTECTED The statement or command is protected and cannot be executed at the terminal. 0090: USER CALL ERROR 1 0091: USER CALL ERROR 2 These messages can be used by the programmer of assembler- coded subroutines if an error is detected during the exe- cution of the subroutine. 0098: PAGING ERROR. This error will only occur on a system running under the DOMUS-operating system. The reason is, that (part of) the virtual storage cannot be read from the disc. The user>s current program is destroyed. If the error occurs regularly the reason is probably malfunctioning hardware. 0099: STACK OVERFLOW. A stack overflow may occur, if the user has recursive functions or procedures in his program, for instance 10 DEF FNA(X) = FNA(X). If this is not the reason, then please contact RC. No 0105, 0110, 0115: LD -' LD/SUBCATALOG 0160: CATALOG I/O ERROR Some kind of inconsistence was discovered in the catalog. Contact RC. \f 0161: SUBCATALOG UNKNOWN The user attempted to connect his terminal to a subcatalog which does not exist or to which no link has been made (see ref. 1). 0165: DISC WRITEPROTECTED An attempt has been made to write data on a (flexible) disc which is writeprotected. 0166: ILLEGAL OPERATION 1) A wrong protection key was specified or 2) The disc-unit containing a subcatalog has not been initialized or 3) An attempt has been made to connect to a file which is not a subcatalog. 0167: This error message means that NO FREE AREAPROCESSes are a- vailable for the time being (see ref. 3 and 2). As er- ror messages are fetched from a discfile, and as this ope- ration requires an areaprocess, the text cannot be fetched. Therefore the text that is written in connection with error no. 0167 is random. 0172: INDEXBLOCK FULL In connection with each file an indexblock is used. This indexblock can be filled up, if a file is very large. Usually the disc must be reorganized. 0180: Same as 0160 0181: DISC OFF-LINE An attempt has been made to access a disc, which was not ON-LINE. 0185: Same as 0165. \f 0186: ILLEGAL OPERATION ON FILE The file is reserved by another user i.e. by a program running simultaneously with the BASIC-system. 0187: DISC FULL The disc on which a file is created or extended is full. 0192: Same as 0172. As it can be seen, many of the messages 0160-0172 and 0180-0192 are alike each other. In general it can be said, that errors 0160-0172 occur in connection with operations on (sub)catalogs, while 0180-0172 occur in connection with operations on files. Page 189, line 5: Disc write-protected -' Skip block \f F_ Page 211: Insert DIGITS, LOWBOUND, PROTECT and RESET as reserved words. Page 212, insert after line 4: <var' <svar' <svar' CALL , <mvar' ... H <slit' <sarray' <slit' <expr' Invokes the execution of anSTATEMENT assembler-coded subroutine. Page 213, insert before line 4: DIGITS = <expr' 3.6A Specifies the maximal number digits STATEMENT output in PRINT-statements in systems or COMMAND with extended precision. Page 213, line 4 through 8: <svar' (<l') <svar' (<l') 3.7 DIM <sarray' (<n',<l') , <sarray' (<n',<l') <array' (<m') <array' (<m') <array' (<row',<col') <array' (<row',<col') Defines the size of string variables, STATEMENT string arrays or numeric arrays. or COMMAND \f Page 215, insert after line -10: PROTECT = <expr' 3.26A Protects certain statements and commands so STATEMENT that they cannot be executed at the terminal. M_ Page 216, insert after line 12: P_ ERR RESET 3.30A ESC Restores normal function of the ESCape key and STATEMENT normal error action. or COMMAND Page 225, insert efter line -5: LOWBOUND = <expr' 9.10.A Sets the lower bound of arrays COMMAND or to 0 or 1 STATEMENT \f F_ Page 228: G LOGON/LOGOF Functions. The LOGON/LOGOF functions are implemented to enable the user to write his own programs to be invoked in the log on and log off situations, thus facilitating e.g. pass-word control, accounting and "hot-news". When the terminal is logged on, the system searches for a program-file named "LOGON". In logical disc-systems the search is made on the logical disc "LIB". In subcatalog- systems the search is made on the maincatalog, and if the file is not found, a new search is made in the subcatalog "LIB". If the file is found, the program is loaded and executed automatically before the text "REV. XX.XX READY" is output. When the terminal is logged off (i.e. the BYE-statement is executed) the system will in the same way search for a program named "LOGOF". The program will, if it is found, be loaded and executed before the terminal is logged off. The LOGON/LOGOF programs are ordinary BASIC programs written by the user himself. When writing the programs, some statements are particularly useful: - In order to make it impossible for the user at the ter- minal to interrupt the programs by pressing the ESC-key, the first statement (which will always be executed) should be an ON ESC-statement, as shown in the example. - The PROTECT-statement (see sect. 3.26A) makes it possible to protect certain statements from being executed from the terminal. If for instance the user is allowed to access one specific logical disc/subcatalog only, the\f user can be connected to that logical disc/subcatalog by means of a CONNECT-statement in the LOGON-program, and the CONNECT- and RELEASE-statements can then be protec- ted. - The last statement executed in the LOGON-program should be NEW. This will make it impossible for the user at the terminal to study the program (it may contain passwords and/or filenames which the user should not know). - By using some of the SYS-functions it is possible to make the LOGOF-program write information about how long time the user has spend at the terminal into a discfile. An account system is very easy to implement, if the LOGON program outputs information such as username, terminal number (SYS(4)), date and time (SYS(1-3), (11-13)) into a discfile. The LOGOF program may then output terminal number, date and time and/or time used (SYS(5)). W_A_R_N_I_N_G_: The LOGOF-program should not contain a BYE-statement, as execution of this statement during log off will course an error (STACK OVERFLOW), no 99). If this error occurs, the terminal will not be logged of, and the protection mask will be equal to zero which means that the user can ac- cess any logical disc/subcatalog. Once the LOGOF-program has been started, the terminal will unconditionally be logged off when the program terminates, even if the ESC-key is pressed or an error occurs. E_x_a_m_p_l_e_ 0010 ON ESC THEN EXEC ESCPROC 0020 ON ERR THEN EXEC ERRPROC \f 0030 PROC ESCPROC 0040 ON ESC THEN BYE 0050 PRINT "DON>T PRESS ESCAPE!" 0060 PRINT "IF YOU DO IT AGAIN THE TERMINAL WILL BE LOGGED OFF" 0070 ENDPROC 0080 PROC ERRPROC 0090 PRINT "ERROR IN LOGON PROCEDURE" 0100 BYE 0110 ENDPROC 0120 DIM NAME(5),USER(5) 0130 PRINT 0140 PRINT "WELCOME TO RC BASIC/COMAL" 0150 PRINT 0160 INPUT "TYPE USER NAME: ",NAME 0170 IF LEN(NAME)=0 THEN GOTO 0160 0180 LET TRUE=1; FALSE=0 0190 LET FOUND=FALSE 0200 OPEN FILE(1,1)"USERS" 0210 REPEAT 0220 READ FILE(1)USER 0230 IF NAME=USER THEN LET FOUND=TRUE 0240 UNTIL FOUND OR EOF(1) 0250 CLOSE 0260 IF NOT FOUND THEN 0270 PRINT "THAT NAME IS NOT IN THE USER CATALOG" 0280 BYE 0290 ENDIF 0300 IF SYS(4)<'32 THEN 0310 PRINT "CONNECTED TO SUBCATALOG: "; 0320 CASE SYS(4) OF 0330 CONNECT "DISC3" 0340 PRINT "DISC3" 0350 PROTECT =1+2+4 0360 WHEN 1,2,3 0370 CONNECT "DISC1" 0380 PRINT "DISC1" 0390 PROTECT =1+2+4 \f 0400 WHEN 4,5,6 0410 CONNECT "DISC2" 0420 PRINT "DISC2" 0430 PROTECT =1+2+4+8 0440 ENDCASE 0450 ENDIF 0460 NEW \f F_ C_o_m_m_e_n_t_s_ LINE 10 The first statement should be ON-ESC. 30-70 ON-ESC procedure. The user is warned the first time. The next time ESCape is pressed, the termi- nal is logged off. 20-110 In case an error occurs a message is printed and the terminal logged off. 130-150 >HOT NEWS> may be printed here. 200 User catalog file is opened (this file is assumed to be created in advance). 160 User types his name. 170 In case ESCape has been pressed, repeat the input statement. 210-240 The user name is searched for in the catalog. 260-290 If not found then log off the terminal. 300 At the console (terminal 32) everything is allowed. 360 Terminals 1, 2, and 3 are not allowed to CONNECT and RELEASE, and PROTECT cannot be changed. 400-430 Terminals 4, 5, and 6 are in addition not allowed to COPY from other subcatalogs. 460 The program is removed. \f F_ Page 229: H Calling an Assembly Language Subroutine from RC BASIC. F_o_r_m_a_t_ <var' <svar' CALL <subr.name' , <mvar' .... <sarray' <slit' <expr' <subr.name': the name of an assembler-coded sub- routine expressed as a string literal or by means of a variable. <var': a numeric variable <svar':a string variable <mvar': a matrix variable <sarray': a string array <slit': a string literal <expr': a numeric or relational expression U_s_e_ As a statement to invoke the execution of an assembler- coded subroutine included in the system. R_e_m_a_r_k_s_ 1. When the CALL-statement is executed the following happens: a. If a module containing user-coded subroutines is present in core, then the subroutine table in this module is searched for the name of the subroutine. If the name is found operation continues at point c. b. As a. except that the searching is carried out in the\f F_ module containing subroutines coded by RC. If the subroutine is not found then the BASIC program is in- terrupted with error no. 0046: PROCEDURE DOES NOT EX- IST. c. Now the number and the type of the actual parameters are checked against the parameter specifications in the subroutine. If a conflict is found then the BASIC program is interrupted with error no. 0047: PARAMETER ERROR. d. The actual parameters are organized in a way which makes it possible to access them from the subroutine and then a jump is made to the subroutine. 2. When the subroutine is terminated, return to BASIC can occur in two different ways. In case of normal return execution of the BASIC program continues from the state- ment following the CALL-statement. If an error has oc- cured during execution of the subroutine, the BASIC pro- gram will be interrupted (unless an ON ERR-statement has been executed), and an error message is printed. Ref. 4 describes how to program subroutines to be called from RC BASIC. E_x_a_m_p_l_e_ 0010 DIM A(20), B(3) 0020 CALL "PUSH", A, 3 0030 B = "POP" 0040 CALL B, A, X The two routines "PUSH" and "POP" are shown as examples in ref. 4. \f F_ I Extended Precision in RC BASIC I.1 Numbers In the extended precision version of RC BASIC/COMAL arithmetic operations are carried out to a significans of 10 decimals digits. The syntax is exactly the same as in the normal precision version except a greater number range. An extended precision number may be in the range: 1.6 * 10UU-616DD < n < 1.6 * 10UU616DD Numbers may as in the normal precision version be expressed as integers, fixed-point, or floating point (E-type notation). Internally all numbers are represented as 48 bit floating-point numbers. A 12 bit 2>s complement exponent and a 36 bit 2>s complement fraction. The fraction is normalized (the exponent is adjusted so that the most significant bit in the fraction is 1). The error introduced in the conversion is less than 3 * 2UU-11DD The numbers are stored in 3 consecutive 16-bit words (in normal precision 2). This means that the formats are different, so that programs and numeric data in binary form produced by the normal precision version cannot be used in the extended precision version, but have to be converted. I.2 Output Format The number of digits output by a PRINT statement may be specified by the DIGITS statement/command. This number and the number of digits in the number to be output determines how the number is formatted by the PRINT statement. If the number can be represented using the number of digits specified in the DIGITS command or less, the number is output as integer (if the digits\f after the decimal point are all zero) or fixed-point number, otherwise E-type notation is used. N_u_m_b_e_r_ DIGITS = 3 DIGITS = 6 2 000 000 2E+06 2E+06 108.999 109 108.999 .00123 1.23E+03 .00123 24E4 24E4 240000 I.3 Functions The same functions which exist in the normal precision version are also available in the extended precision version. The notes in Section 4 on arguments and results applies as well except for EXP(x). Because of the greater number range the EXP function accepts a greater argument range. The argument x of EXP(x) should satisfy the relation: -1420.25 <= x <= 1418.86 I.4 Changing from normal to extended precision When changing from a system with normal precision to a system with extended precision, the user should notice the following: S_A_V_E_d_ _p_r_o_g_r_a_m_s_: Programs which have been SAVEd in a normal precision system can not be LOADed in an extended precision system. This means, that before changing systems the user must store his programs in ASCII-format (by means of the LIST-command). This "conversion" can be done in the following way: \f - Load a normal precision system - For each SAVEd program execute the following commands: LOAD <filename 1' LIST <filename 2' - Load an extended precision system - For each LISTed program execute the following commands: NEW ENTER <filename 2' SAVE <filename 1' <filename 1' and <filename 2' may be the same file. C_A_L_L_-_r_o_u_t_i_n_e_s_: Assembler coded subroutines must be changed and re-assembled, if they have numeric parameters. Ref. 4 describes how the subrou- tines can be programmed. D_a_t_a_-_f_i_l_e_s_: In extended precision system numeric items takes up 6 bytes (4 bytes in normal precision system). This means, that the user when changing system will have to reconsider the size of sequential files and the length of records in random access files. Binary files which have been written from programs running in a normal precision system c_a_n_n_o_t_ be read from programs running in extended precision systems. Binary sequential files can be converted into ASCII-files (i.e. they must be written by means of PRINT in stead of WRITE and read by means of INPUT in stead of READ). Binary random access files can not be converted, they must be re-created. \f D_A_T_A_ _-_ _s_t_a_t_e_m_e_n_t_s_: The maximal number of elements in DATA - statements is smaller in extended precision systems than in normal precision systems. This may result in error message no. 0009: LONE TOO LONG, when programs containing DATA - statements are ENTERed. If this happens, you will have to split "long" DATA - statements into two or more statements with fewer elements (see also page 5 in this manual).\f F_ C_o_r_r_e_c_t_i_o_n_s_ _t_o_ _t_h_e_ _I_n_d_e_x_ _(_p_a_g_e_ _2_3_0_-_2_3_9_)_ Page 231: CALL, H Page 232: DIGITS, 3.6A, I Page 234: LIB, 3.3, 9.10, 9.16 Logical discs - write access, 7.2 LOGON/LOGOF functions, G LOWBOUND, 2.4, 3.7, 5.1, 6.2, 9.10A Page 237 PROTECT, 3.26A, G RESET, 3.20, 3.21, 3.30A Page 238: Strings - arrays 3.7, 5.1, 9.10A Page 238: line -14 is replaced by: subcatalog, see Logical disc. subcatalog (in a logical disc), see Catalog. \f F_A_._ _ _ _ _ _ _ _ _R_E_F_E_R_E_N_C_E_S_: A. 1 :DOMUS-utility SUBCA User>s Guide Keywords: RC3600, DOMUS, utility, catalog system, subcatalog Abstract: This manual is a user>s guide for the DOMUS utility program SUBCA used for maintenance of subcatalogs. 2 :RC3600 Catalog System System Programmer>s Guide edition 78.09.05 or later Keywords: Catalog system, file system, area process. Abstract: This manual describes how to use the RC3600 Catalog System from assembled programs. Also the organiza- tion of discs is described. The user must be fami- liar with the MUS system. 3 :RC BASIC Operating Guide edition October 1978 or later Keywords: RC BASIC, DOMUS, MUS, Logical Disc, Subcatalog, Flexible Disc. Abstract: This manual describes how to use the RC BASIC sy- stem under the DOMUS/MUS operating system. The cre- ation and use of logical discs and subcatalogs is shortly described. \f 4 :Assembler Coded Subroutines (CALL-routines) in RC BASIC (RC3600/RC7000) Programmer>s Guide Edition : December 1979 or later Keywords : RC3600, RC7000, RC BASIC, DOMAC, DOMUS, COPS, Assembler Routines Abstract : This guide describes how to program assembler routines that can be called from BASIC programs \f \f RC855 Betjeningsvejledning A/S REGNECENTRALEN af 1979 Maj 1982 Informationsafdelingen RCSL Nr. 42-i2046 \f Forfatter: Henning Christensen Nøgleord: RC855, system, betjening Resum: Betjeningsvejledning til RC855 work station/ display station. Beskrivelse af: sammenkob- linger og betjeningskontakter; tastatur; start-procedurer. Dækker de generelle aspek- ter og skal anvendes i sammenhæng med den øvrige dokumentation til applikationen. (28 trykte sider) CP/M er et varemærke indregistreret af Digital Research. \f i I_N_D_H_O_L_D_S_F_O_R_T_E_G_N_E_L_S_E_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _S_I_D_E_ 1. INTRODUKTION ........................................... 1 1.1 Ergonomi .......................................... 2 1.2 Betjening ......................................... 2 2. BESKRIVELSE AF SKÆRMTERMINALEN ......................... 4 2.1 Sammenkoblinger ................................... 4 2.1.1 Printer .................................... 5 2.1.2 Diskettestation ............................ 5 2.2 Betjeningskontakter ............................... 7 2.3 Vedligeholdelse ................................... 9 3. BESKRIVELSE AF TASTATUR ................................ 10 3.1 Generelle funktioner .............................. 10 3.2 Alfanumeriske taster .............................. 12 3.2.1 Numerisk tastaturblok ...................... 12 3.3 Attention-taster .................................. 13 3.4 Redigeringstaster ................................. 14 4. BETJENING .............................................. 15 4.1 Start og genstart ................................. 15 4.2 Programindlæsning ................................. 16 4.3 Programmelbetjening ............................... 18 B_I_L_A_G_: A. REFERENCER ............................................. 19 \f ii \f 1_._ _ _ _ _ _ _ _ _I_N_T_R_O_D_U_K_T_I_O_N_ 1. Figur 1: RC855 skærmterminal og tastatur. RC855 fås enten som en work station (programmerbar, intelligent terminal) med en eller to diskettestationer, hvorfra forskellige programmelsystemer kan indlæses, eller som en display station (dedikeret terminal), der arbejder med et forudvalgt programmel. RC855 work station'en med diskettestation kan arbejde med programmelsystemer såsom: - CP/M-baserede applikationer - IBM 3270 BSC emulator til interaktive opgaver - IBM 3780 BSC emulator til overførsel af filer (batch) RC855 display station'en leveres med IBM 3270 BSC emulatoren indbygget i form af et internt lagerkort, der er fast monteret i terminalen. \f Et system kan påbegyndes med blot en enkelt, selvstændig enhed og kan siden i takt med behovet udbygges til en klynge-struktur. Mulighederne i konfigureringen er beskrevet i RC855 Konfigura- tionsvejledningen 1. 1_._1_ _ _ _ _ _ _ _E_r_g_o_n_o_m_i_ 1.1 Ergonomi har været en central faktor i udformningen af RC855 skærmterminalen. Understellet er udformet, så det tillader vipning og højdeind- stilling af skærmterminalen, som også nemt kan flyttes og drejes efter behov. Tastaturet er tilkoblet med et kabel og kan lige- ledes nemt flyttes, så det netop passer til brugerens situation. Skærmbilledet på RC855 er ikke-reflekterende og forhindrer så- ledes effektivt alle irriterende reflektioner, der ellers kunne nedsætte læseligheden af den viste tekst. Lysstyrke og kontrast kan indstilles efter lysforholdene omkring terminalen, hvorved øjentræthed og hovedpine kan undgås. 1_._2_ _ _ _ _ _ _ _B_e_t_j_e_n_i_n_g_ 1.2 Pånær forskelle i programmel-indlæsning, så betjenes RC855 work station'er og RC855 display station'er på samme måde. Indlæsningen af programmel fra diskettestationen på work sta- tion'en er beskrevet i installations- eller brugervejledninger til de konkrete programmelpakker. Indlæsningen af programmel fra det interne lagerkort i display station'en foregår automatisk som led i start-procedurerne. RC855 har indbyggede selvtest funktioner, som udføres ved hver start eller genstart (reset). Resultatet af selvtesten vises som status-meddelelser på den nederste linie i skærmbilledet. Indlæs- ningen af programmel giver ligeledes anledning til meddelelser, der angiver status for indlæsningen. \f Afhængig af programmelsystemet kan det være påkrævet at inddatere et antal konfigurationsparametre, ligesom yderligere diagnostice- rende testprogrammer kan være til rådighed. Disse forhold og fremgangsmåden i betjeningen er beskrevet i den dokumentation, der følger programmellet. \f F_ 2_._ _ _ _ _ _ _ _ _B_E_S_K_R_I_V_E_L_S_E_ _A_F_ _S_K_Æ_R_M_T_E_R_M_I_N_A_L_E_N_ 2. 2_._1_ _ _ _ _ _ _ _S_a_m_m_e_n_k_o_b_l_i_n_g_e_r_ 2.1 Figur 2: Bagpanel. 1) KEYBOARD - forbindelse til tastatur. 2) RESET - jvf. 2.2 og 4.1. trykknap 3) CIRCUIT - forbindelse til RC-CIRCUIT i klynge- konfigurationer. 4) LINE II - forbindelse til printer. Se også 2.1.1. 5) LINE I - forbindelse til værtsdatamat (evt. via modem); i klynge-konfiguratio- ner normalt kun benyttet på den primære terminal. 6) Diskettestation - forbindelse til diskettestation. Se også 2.1.2. \f 7) Netledning og - sikringen kan skiftes ved først at sikring trække netledningen ud og derefter sikringsholderen øverst i stikket. En ekstra sikring findes i holde- ren. 8) POWER ON/OFF - jvf. 2.2 og 4.1. vippekontakt Yderligere information vedrørende installering af udstyret findes i RC855 Installationsvejledningen 2. 2_._1_._1_ _ _ _ _ _P_r_i_n_t_e_r_ 2.1.1 Som ekstraudstyr kan der tilkobles en printer til skærmtermina- len. Betjeningen af printerne er beskrevet i vejledninger, der følger særskilt med de forskellige typer af printere. Hvis der tilkobles en printer, skal et antal konfigurationspara- metre i skærmterminalen tildeles værdier i overensstemmelse hermed. Fremgangsmåden er beskrevet i de konkrete vejledninger, der følger programmellet. Ved brug af visse programmelsystemer og klynge-konfigurationer er printeren til rådighed som en fælles ressource i klyngen, dvs. den kan benyttes af flere terminaler i klyngen. Sådanne forhold bør undersøges førend betjeningen af terminal og printer påbegyn- des. 2_._1_._2_ _ _ _ _ _D_i_s_k_e_t_t_e_s_t_a_t_i_o_n_ 2.1.2 Mindst en diskettestation skal være tilkoblet, for at udstyret skal kunne benyttes som work station; to diskettestationer kan tilkobles. \f Betjeningen af diskettestationen er enkel og ligetil: trykkes på den aflange knap lige under lågen, springer lågen op og disketten kan forsigtigt skubbes ind i diskettestationen indtil fast an- slag. Ved ilægning af disketten skal etiketterne på diskettens omslag vende opad og væk fra diskettestationen. Efter ilægning holdes disketten automatisk på plads og lågen kan lukkes ved at trykke nedad på dens forkant. Skal en diskette tages ud, trykkes på den aflange knap igen og disketten springer frem i åbningen. Disketter, der ikke bruges, skal altid opbevares i beskyttelses- omslaget og godt beskyttet mod skadelige påvirkninger fra omgi- velserne, f.eks. magnetiske felter, støv og sollys. Disketterne bør lagres opretstående og helst i en lukket plastkasse. Disket- tens overflade (synlig gennem det aflange hul i omslaget) må ikke berøres! Skriv aldrig på etiketterne, når disse er klæbet på om- slaget! En diskette kan skrivebeskyttes, dvs. data kan kun læses fra disket- ten, ved at lave et hak i omslaget som vist på tegningen (mål i mil- limeter). En skrive-beskyttelse kan ophæves ved at klæbe et stykke uigennemsigtigt tape over hakket. Før diskettestationen kan benyttes, skal den tilsluttes en stik- kontakt og tændes med kontakten foran. Foran på diskettestationen findes desuden en indikator, der lyser, når der læses/skrives på disketten. Ilægning/udtagning af disketter må ikke foretages, mens indikatoren lyser. \f 2_._2_ _ _ _ _ _ _ _B_e_t_j_e_n_i_n_g_s_k_o_n_t_a_k_t_e_r_ 2.2 Figur 3: Betjeningskontakter. 1) POWER ON/OFF - tænder/slukker for terminalen. Se vippekontakt også 4.1. (bagpanel) 2) RESET - genstarter terminalen. Se også 4.1. trykknap (bagpanel) 3) Kontrast - kontrastregulering af skærmbillede. fingerhjul Se nedenfor. (under monitor) 4) Lysstyrke - lysstyrkeregulering af skærmbille- fingerhjul de. Se nedenfor. (under monitor) Reguleringskontakterne til lysstyrke og kontrast er placeret un- der monitoren, foran i højre side. De benyttes for at opnå den\f mest behagelige visning af tegn i skærmbilledet. Gå frem som føl- ger: indstil lysstyrken så rasterpunkterne netop ikke mere ses og indstil så kontrasten, således at tegnene fremtræder mest behage- ligt. B_e_m_æ_r_k_: Høj lysstyrke reducerer monitorens levetid og kan desuden være kilde til hovedpine og øjenirritationer. Skærmbilledets lys- forhold bør efterindstilles i takt med ændringer i de omgivende lysforhold. ADVARSEL: Længere tids påvirkning fra høj lysstyrke (generelt høj intensitet eller highlight-felter) kan resultere i gennembrænding af skærmens fosforlag. 5) Højdeindstilling - indstillinger i højden foretages trykknap ved hjælp af en lille motor. Den kan kun arbejde, hvis terminalen er tændt. Tryk på kontakten for at ændre indstilling; slip kontakten, når ændringen skal stoppe. : Hæver monitoren. : Sænker monitoren. Vipning - monitoren kan vippes ved at skubbe let opad/nedad på bageste del af monitoren. 6) VOLUME - den indbyggede højttaler (der be- drejekontakt nyttes til de hørbare signaler) kan (tastatur, bagpanel) indstilles til den ønskede lydstyr- ke ved brug af denne kontakt. 7) KEY-CLICK ON/OFF - tastaturet udsender en klik-lyd ved vippekontakt korrekt tasteanslag. Klik-lyden kan (tastatur, bagpanel) tændes/slukkes med denne kontakt. \f 2_._3_ _ _ _ _ _ _ _V_e_d_l_i_g_e_h_o_l_d_e_l_s_e_ 2.3 Brugeren har ingen vedligeholdelsesopgaver i forbindelse med terminalen udover den regulære rengøring. Brug en fugtig, hårdt opvredet klud. NB: Benyt kun mild sæbevand til rengøringen. \f F_ 3_._ _ _ _ _ _ _ _ _B_E_S_K_R_I_V_E_L_S_E_ _A_F_ _T_A_S_T_A_T_U_R_ 3. Tastaturet leveres i forskellige versioner afhængig af ønsket (nationalt) tegnsæt. Danske tastaturer fås endvidere i en modificeret udgave. Figur 4: RC855 tastatur, dansk/norsk. Figur 5: RC855 tastatur, dansk offs. 3_._1_ _ _ _ _ _ _ _G_e_n_e_r_e_l_l_e_ _f_u_n_k_t_i_o_n_e_r_ 3.1 Taste-klik - ved korrekt tasteanslag høres en klik-lyd. Lydstyrken kan reguleres ligesom funktionen helt kan slukkes. (jvf. 2.2). \f Alarmsignal - et alarmsignal høres, hvis der fo- retages betjeninger, der er ugyl- dige. Signalet kan også udsendes på initiativ fra værtsdatamaten. Lydstyrken kan reguleres, men funk- tionen kan ikke slukkes. (jvf. 2.2). Automatisk repetition - når en taste holdes nedtrykket læn- gere end trekvart sekund, bliver den pågældende tegnkode repeteret (med en hastighed af 10 tegn/sek.). Gælder dog ikke de hjælpetaster som nævnes lige herefter. De taster, som beskrives i det følgende, er hjælpetaster, der altid benyttes sammen med en anden "regulær" taste. De benyttes for at kunne generere alternative koder sammen med de regulære taster (f.eks. store bogstaver). Hjælpetaster skal holdes nede, mens den regulære taste slås an. SHIFT - bemærk de forskellige måder, tasten benyttes: I: Benyttes SHIFT sammen med en tegn- taste, genereres store bogstaver eller tegn fra det "øvre" tegnsæt (svarende til øverste tegn på tas- ter med to symboler). II: Benyttes SHIFT sammen med andre specifikke taster, modificeres den normale funktion, disse taster har. De alternative funktioner, der der- ved opnås, er beskrevet i forlæn- gelse af beskrivelsen af tastens normale funktion, dvs. i de for- skellige vejledninger til program- mellet. \f LOCK - som SHIFT i tilfælde I, dog kun med virkning på de alfabetiske taster. Når tasten trykkes ned, træder funktionen i kraft (indikatoren ly- ser) og forbliver i kraft, indtil man igen trykker på tasten. I for- bindelse med nogle programmelsy- stemer findes en konfigurations- parameter som indvirker på benyt- telsen af tasten. Bemærk: LOCK funktionen påvirker kun taster med t symbol. Taster med to symboler kan, uanset brugen af LOCK tasten, altid generere øvre tegn ved brug af SHIFT tasten. CTRL - benyttes overvejende sammen med andre funktionstaster for at opnå særlige system-funktioner. Brugen af to taster er i disse tilfælde anvendt som et værn mod utilsigtet aktivering af disse system funktio- ner. 3_._2_ _ _ _ _ _ _ _A_l_f_a_n_u_m_e_r_i_s_k_e_ _t_a_s_t_e_r_ 3.2 De alfabetiske og numeriske tegntaster betjenes på tilsvarende måde som kendt fra almindelige skrivemaskiner. Hvis der er re- striktioner i benyttelsen, er dette omtalt i de respektive vejledninger til programmellet. 3_._2_._1_ _ _ _ _ _N_u_m_e_r_i_s_k_ _t_a_s_t_a_t_u_r_b_l_o_k_ 3.2.1 Tastaturet omfatter en særskilt blok med numeriske taster for at lette inddatering af numeriske data. Tasten med decimalkomma-teg-\f net kan i forbindelse med nogle applikationssystemer virke på forskellig måde, bestemt af den værdi, der tildeles en konfigura- tionsparameter. Bemærk også følgende: N_o_r_m_a_l_ _f_u_n_k_t_i_o_n_: Som numeriske taster. S_æ_r_l_i_g_ _f_u_n_k_t_i_o_n_: Hvis en af de numeriske taster (1, 2, ..., 9) benyttes sammen med SHIFT tasten, genereres de tilsva- rende program-funktioner (PF1, PF2, ..., PF9); se også 3.3. 3_._3_ _ _ _ _ _ _ _A_t_t_e_n_t_i_o_n_-_t_a_s_t_e_r_ 3.3 Anvendelsen af attention-tasterne afhænger helt af det givne applikationssystem. Her følger en liste med tasterne: SELCT (taste/indikator) Select (= vælge/udpege) CLEAR (= slette) PA Program Access (= program valg/til- gang) P_A_1_,_ _P_A_2_,_ _._._._,_ _P_A_5_: Disse taster er indeholdt i tasta- turets layout. P_A_6_,_ _P_A_7_,_ _._._._,_ _P_A_1_0_: Brug SHIFT tasten sammen med PA1, PA2, ..., PA5 for at opnå henholds- vis PA6, PA7, ..., PA10. USM (taste/indikator) Unsolicited Message (= uopfordret meddelelse fra værtsdatamat) PF Program Function (= program funk- tion) P_F_1_,_ _P_F_2_,_ _._._._,_ _P_F_9_: Brug SHIFT tasten sammen med de numeriske taster 1, 2, ..., 9 i d_e_n_ n_u_m_e_r_i_s_k_e_ _t_a_s_t_a_t_u_r_b_l_o_k_ for at opnå henholdsvis PF1, PF2, ..., PF9. P_F_1_0_,_ _P_F_1_1_,_ _._._._,_ _P_F_1_4_: Disse taster er indeholdt i tasta- turets layout. \f CURSR SELCT Cursor Select (= cursor lyspen valgbar) PRINT (taste/indikator) (= udskrift) ESC Escape (= undslippe) RESET (= nulstille/genstarte) SEND (= afsende) 3_._4_ _ _ _ _ _ _ _R_e_d_i_g_e_r_i_n_g_s_t_a_s_t_e_r_ 3.4 Disse taster benyttes til flytning af cursor og til redigering af data. Den konkrete måde disse taster anvendes på, afhænger af programmelsystemet og er beskrevet i applikationsvejledningerne. Her følger en liste med tasterne: -> <- -> <- <- TEGN IND (taste/indikator) LINIE IND FM feltmærkning DUP duplikering SLET TEGN SLET LINIE SLET FELT SLET DATA MARKER FLYT \f F_ 4_._ _ _ _ _ _ _ _ _B_E_T_J_E_N_I_N_G_ 4. Meddelelser fra RC855 systemet, der kan forekomme under betje- ningen, vises i statuslinien. Begyndelsespositionen for en meddelelse indikerer, hvilken slags meddelelse, der er tale om: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _x_x_x_._._._ _ _ _ _ _ _x_x_x_._._._ _ _ _ _ _ _ _ _ _ _ _ _ _ _x_x_x_._._._ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _x_x_ _ 1) 2) 3) 4) 1) meddelelser med relation til systemidentifikation og -status; se også applikationsvejledninger. 2) meddelelser med relation til udskrivningsaktiviteter; se applikationsvejldninger. 3) meddelelser med relation til kommunikation med værtsdatamat og internt i klynge; se applikationsvejledninger. 4) statusmeddelelser under programindlæsningsfasen. 4_._1_ _ _ _ _ _ _ _S_t_a_r_t_ _o_g_ _g_e_n_s_t_a_r_t_ 4.1 Strømmen tændes/slukkes med POWER ON/OFF kontakten på bagpanelet. En genstart (reset) følger hver gang strømmen tændes samt hver gang RESET kontakten på bagpanelet aktiveres. Samme virkning kan i forbindelse med nogle programmelsystemer opnås ved at benytte tasterne CTRL CLEAR, når programmelsystemet arbejder. Efter en (gen)start aktivering udføres den indbyggede selvtest. Når selvtesten er afsluttet, vises følgende meddelelse: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _R_C_8_5_5_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Dermed indikeres, at der ikke er sporet nogen fejlfunktioner. \f Hvis der opspores en fejlfunktion, vil en af de følgende meddel- elser blive vist i ca. 10 sek., hvorefter en ny programindlæsning forsøges: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _R_C_8_5_5_ _c_h_e_c_k_s_u_m_ _e_r_r_o_r_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _R_C_8_5_5_ _m_e_m_o_r_y_ _e_r_r_o_r_ _<_a_d_r_e_s_s_e_>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Såfremt der opspores en fejl, tilkaldes en servicetekniker (notr en eventuel <adresse> information, idet en sådan vil være nyttig i fejlfindingsarbejdet). 4_._2_ _ _ _ _ _ _ _P_r_o_g_r_a_m_i_n_d_l_æ_s_n_i_n_g_ 4.2 Efter afslutning af selvtesten vil RC855 fortsætte med indlæsning af programmel til arbejdslageret, hvor det skal være indlæst for at kunne udføres. Programmelsystemerne fås enten til indlæsning fra en tilkoblet diskettestation eller fra et internt lagerkort. Skal programmellet indlæses fra en diskettestation, skal denne tilkobles og tændes. Systemdisketten (normalt CP/M operativsyste- met) sættes i og diskettestationens låge lukkes. Kort efter vises systemets response (system prompt = særligt tegn der angiver, at systemet er rede til fortsættelse af betjeningsforløbet), hvilket indikerer, at andre programmer nu kan indlæses. De konkrete be- tjeningsforløb i indlæsning og start af applikationsprogrammer fra diskette findes beskrevet i installations- og brugervejled- ninger til programmellet. Skal programmellet indlæses fra det interne lagerkort, sker dette automatisk efter afslutningen af selvtesten. \f De enkelte faser af progamindlæsningen kan overvåges ved hjælp af statusmeddelelser. De to tegn yderst til højre i statuslinien angiver forløbet og skal forstås som følger: LI: indlæsning fra internt lagerkort LD: indlæsning fra diskette (vises i tre faser) SA: valg af applikation; på dette trin kan indlæsningsproceduren afbrydes ved at trykke på mellemrumstangenten og et alterna- tivt program kan indlæses fra disketten LA: indlæsning af applikation; det aktuelle applikationsprogram indlæses _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _R_C_8_5_5_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<_x_x_>_ _ Opstår der en fejl under indlæsningen af programmellet, vises en af følgende meddelelser: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _R_C_8_5_5_ _L_O_A_D_ _S_T_A_T_U_S_:_ _<_f_e_j_l_å_r_s_a_g_>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<_x_x_>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _R_C_8_5_5_ _L_O_A_D_ _S_T_A_T_U_S_:_ _d_i_s_k_e_t_t_e_ _e_r_r_o_r_ _-_ _<_f_e_j_l_å_r_s_a_g_>_ _ _ _ _ _ _ _<_x_x_>_ _ <_f_e_j_l_å_r_s_a_g_>_ <_x_x_>_ hard error LI time out LD checksum error SA deleted data encountered LA recalibrate time out recalibrate status read-id error seek error seek time out read status fdc error \f Når gentagne forsøg på indlæsning af programmel fra diskette mis- lykkes, så prøv med en anden diskette (hvis muligt). Mislykkes indlæsningen fortsat, tilkaldes en servicetekniker (notr eventu- elle informationer fra <fejlårsag> og <xx> felterne, idet sådanne vil være nyttige i fejlretningsarbejdet). Når der indlæses fra diskette, vises meddelelsen: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _R_C_8_5_5_ _-_ _I_n_s_e_r_t_ _d_i_s_k_e_t_t_e_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - hvis diskettestationen ikke er tilkoblet eller tændt; - hvis der ikke er sat en diskette i, eller lågen ikke er lukket. Kon- trollr diskettestation og ret fejlen. 4_._3_ _ _ _ _ _ _ _P_r_o_g_r_a_m_m_e_l_b_e_t_j_e_n_i_n_g_ 4.3 Efter indlæsning af et programmelsystem, vises en identifikati- onsmeddelelse for det givne programmelsystem. Den videre betjening af programmellet er beskrevet i betjenings- vejledninger og øvrig dokumentation gældende for de konkrete sy- stemer. \f F_ A_._ _ _ _ _ _ _ _ _R_E_F_E_R_E_N_C_E_R_ A. 1 RCSL Nr. 42-i2048: RC855 Konfigurationsvejledning 2 RCSL Nr. 42-i2047: RC855 Installationsvejledning - Forskellig programmel-relateret dokumentation: RCSL Nr. 42-i1826: RC855 IBM 3270 BSC Emulator, Installation Guide RCSL Nr. 42-i2041: RC855 IBM 3270 BSC Emulator, Betjeningsvejledning RCSL Nr. 42-i1692: RC855 IBM 3780 BSC Emulator, Users Guide RCSL Nr. 42-i1700: RC855 CP/M Work Station, Users Guide \f F_ \f «eof»