DataMuseum.dk

Presents historical artifacts from the history of:

CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download

⟦9e7b683c4⟧ TextFile

    Length: 100992 (0x18a80)
    Types: TextFile
    Names: »D103«

Derivation

└─⟦2520239fd⟧ Bits:30005867/disk13.imd Dokumenter (RCSL m.m.)
    └─⟦this⟧ »D103« 

TextFile

            i 
 
          C_O_N_T_E_N_T_S_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _P_A_G_E_ 
             
                   1.  INTRODUCTION ........................................  1 
           
          2.  CORRECTIONS .........................................  2 
           
           
          A_P_P_E_N_D_I_X_: 
           
          A.  REFERENCES .......................................... 46 \f

            ii \f

1_._ _ _ _ _ _ _ _ _I_N_T_R_O_D_U_C_T_I_O_N_ 1.
           
          This manual describes corrections to the first edition of the RC
          BASIC PROGRAMMING GUIDE (RCSL No 42-i 0671). 
           
          Some corrections are due to printing errors, most of the changes
          are, however, a consequence of new features that have been
          implemented in the RC BASIC system. 
           
          The most important new features are: 
           
          - STRING ARRAYS: It is now possible to work with two-dimensional
            strings. 
           
          - LOWBOUND: The lower bound of arrays can be set to zero or one. 
           
          - RESET: The effect of an ON ERR/ESC-statement can be cancelled. 
           
          - IMPROVED FILE SYSTEM: On systems with moving head disc,
            subcatalogs are used instead of logical discs. Several users
            can have write-access to the same logical disc/subcatalog, and
            one logical disc/subcatalog can be used as a program-library
            accessable from all terminals. 
           
          - LOGON/LOGOFF: On configurations with some kind of disc, the
            system will make an attempt to load a program from the disc
            when a terminal is logged on/off. This makes it possible for
            the user to implement an account-system. 
           
          - PROTECT: It is possible (by means of the above mentioned
            facility) to prevent a user from changing subcatalogs, saving
                 programs into existing files etc. 
                
          - CALL ROUTINES: It is now possible to call assembler-coded
                 subroutines from RC BASIC programs.
           
          - EXTENDED PRECISION: The system can be delivered with extended
            precision-arithmetic corresponding to 10 decimals digits in\f

            output. The number of digits to be output can be defined by the
                     user by means of the DIGITS-statement. 
             
          Many of the corrections in this manual have been described in the
          previous manuals: "Corrections (no 1 (2)) to the RC BASIC
          Programming Guide", RCSL No 43-GL6940 (7914) which are replaced
          by the present manual. 
           
          Changes or new information are marked with a vertical bar in the
          margin. 
           
          Most of the corrections are mentioned by a page number and a line
          number. A positive line number means that lines should be counted
          from the top of the page, a negative line number means that lines
          should be counted from the buttom. 
           
          With these corrections included, the Programming Guide
          corresponds to rev. 02.00 of the RC BASIC System. 
           \f

F_2_._ _ _ _ _ _ _ _ _C_O_R_R_E_C_T_I_O_N_S_ 2.
           
          In the list of reserved words on the second page: 
           
                    word             use           section 
                    CALL             S             App. H 
                    DIGITS           C,S           3.6.A 
                    LOWBOUND         C,S           9.10.A 
                    PROTECT          C,S           3.26.A 
                RESET            C,S           3.30.A 
                     
          CONTENTS, Last page, replace line -3 by: 
                 
                G   LOGON/LOGOF FUNCTIONS. 
           
          CONTENTS, Last page, insert after line -2: 
 
                I   EXTENDED PRECISION IN RC BASIC. 

          Page 13, insert after line -6: 
           
                <subcatname': The name of a subcatalog. 
           
          Page 17, line 4: 
           
                The lower bound of a dimension is usually 1, it may,
                however, be set to 0 by means of the LOWBOUND statement
                (see Ch. 9). 
           
          Page 17, line 10: 
           
                32 767 -' 16 380. 
           
          Page 21, line -5 through -1: 
           
                1. A string variable, e.g. ANSWER 
                2. An element of a string array, e.g. TEXT(5) \f

                3. A part of a string variable or a part of an element of a
                   string array. 
                4. A string literal, e.g. "PETER" 
                5. The CHR(X) function, e.g. CHR(65) 
                6. A concatenation of the above items, e.g. "JOHN SMITH",
                   ADDRESS 
                 
          Page 22, line -7: 
           
                block -' blocks. 
           
          Page 25, line -10, -8, -6: 
           
                0250  LET MONTH="OCTOBER"; DAYS=31 
                0270  LET MONTH="NOVEMBER"; DAYS=30 
                0290  LET MONTH="DECEMBER"; DAYS 31 
           
          Page 29, line 6 through 9: 
           
                2. If the SAVEd program is on disc, the system searches the
                   logical disc/subcatalog to which the terminal is con-
                   nected for <filename' (see Ch.8). If <filename' is not
                   found then the system searches for a logical disc called
                   LIB and if this is found then a search is made in this
                   logical disc for <filename'. If <filename' is not found,
                   the system outputs the error message 0100: FILE UNKNOWN.
                    
          Page 29, line 12 and 13: 
                 
                The statement: "If <filename' is not found ..." should be
                deleted. 
                 
          Page 29, insert after line -12: 
                 
                7. When the CHAINed program is executed, it is done without
                   clearing the state of the program. This means that all
                   variables have the values they had, when the program was\f

                   SAVEd. If a CHAINed program should be executed as if the
                   user had started it by means of the command RUN, then
                   the user must bring the program into "neutral" state be-
                   fore it is SAVEd: 
                    
                   1 stop               ; insert STOP as the first 
                                          statement 
                   RUN                  ; execute the program 
                   1                    ; delete STOP-statement 
                   SAVE "<filename'"    ; SAVE the program 
 
          Page 30, insert after line -4: 
           
                4. The number of items in each DATA-statement is limited.
                   Each list may contain 22 (in extended precision systems
                   15) numeric items. If the list contains string elements
                   the maximal number of items depends on the length of the
                   strings. 
                   If the list has too many elements, error message no.
                   0009: LINE TOO LONG will be output when the DATA-state-
                   ment is entered. 

          Page 31, line -3: 
                    
               more that -' more than. 

           
           
           
           
           
           
           
           
           
 
             
             \f

F_          Page 33, insert after line 14: 
                 
                3.6A DIGITS 
                 
                F_o_r_m_a_t_ 
                DIGITS = <expr' 
                     <expr': a numeric expression which evaluates to an
                             integer, 1 <= <expr' <= 10. 
                 
                U_s_e_ 
                As a statement or command to define the maximal number of
                digits output in PRINT-statements in systems with extended
                precision arithmetic. 
                 
                R_e_m_a_r_k_s_ 
                1. The default value of DIGITS is 6. 
                2. The statement/command has no effect in systems with
                   normal precision arithmetic. 
                3. If <expr' evaluates to a number smaller than 1 or
                   greater than 10, DIGITS is set equal to 1 respectively
                   10. 
                4. For further remarks, see appendix I. 
                    \f

F_          Page 33, line -12 through -1: 
           
                     <svar'(<l')                 <svar'(<l') 
                DIM  <sarray'(<n',<l')      ,    <sarray'(<n',<l')...
                     <array'(<m')                <array'(<m')
            <array'(<row',<col')        <array'(<row',<col') 
           
                <svar':   a string variable 
                <l':      a numeric expression, which evaluates to the
                          length of a string variable or the length of each
                          element in a string array. 
                <sarray': a string array name. 
                <n':      a numeric expression, which evaluates to the num-
                          ber of elements in a string array. 
                <array':  an array name 
                <m':      a numeric expression, which evaluates to the num-
                          ber of the last element in a one-dimensional ar-
                          ray. 
                <row':    a numeric expression, which evaluates to the num-
                          ber of the last row in a two-dimensional array. 
                <col':    a numeric expression, which evaluates to the num-
                          ber of the last column in a two-dimensional ar-
                          ray. 
           
          Page 34, line 1 through 4: 
           
                U_s_e_ 
                As a statement or command to define explicitly the size of
                one or more numeric variable arrays, string variables or
                string arrays. (For the dimensioning of string variables,
                see Chapter 5). 
 \f

F_          Page 34, line 15: 
           
                1 <= value -' 0 <= value 
           
          Page 34, line -8: 
           
                Less than 1 -' less than the lower bound 
                (as defined by means of the LOWBOUND-statement, see Chapter
9.) 
                      
          Page 35, line -9: 
           
                32767 -' 16380 
           
          Page 54, insert after line -13: 
           
                3.18A: LOWBOUND 
                       For description, see Chapter 9. 
           
          Page 55, insert after line 8: 
           
                   3. Execution of a RESET ERR statement (see sect. 3.30A)
                   will restore normal error action. 
           
          Page 56, insert after last line: 
           
                6. Execution of a RESET ESC statement (see sect. 3.30A)
                   will restore the normal ESCape key function. 
           \f

F_          Page 73, insert after line -3: 
           
                3.26A PROTECT 
           
                F_o_r_m_a_t_ 
                 
                PROTECT = <expr' 
                          <expr': a numeric expression specifying a
                                  protection mask. 
                 
                U_s_e_ 
 
                As a statement or command to protect certain statements or
                commands from being executed on the terminal. An attempt to
                execute a protected facility will cause an error message to
                be output. 
                 
                R_e_m_a_r_k_s_ 
                 
                1. Protection codes: 
                      1. PROTECT 
                      2. CONNECT 
                      4. RELEASE 
                      8. COPY 
                     16. COPY to existing file 
                     32. LIST in existing file 
                     64. SAVE in existing file 
                      
                2. If PROTECT=1 has been executed, the protection-mask
                   cannot be changed. The mask will be cleared when the
                   terminal is logged off. 
                      
                3. The PROTECT statement is especially useful in LOGON-pro-
                   grams. For further details see APP. G. 
                    
                    
                    \f

                E_x_a_m_p_l_e_ 
 
                   PROTECT = 1+2+4 
                    
                   The CONNECT and RELEASE statements and commands cannot
                   be executed on the terminal. 
                    \f

F_          Page 79, insert after line 19: 
                    
                   3.30A  RESET 
                    
                   F_o_r_m_a_t_ 
                    
                           ESC 
M_                        RESET 
                               ERR 
P_                        
                   U_s_e_ 
                 
                   As a statement to cancel the effect of an ON-ESC or
                   ON-ERR statement. 
                    
                   R_e_m_a_r_k_s_ 
                    
                   1. After execution of a RESET statement the normal
                      action is restored. 
                      See ON-ERR, sect. 3.20 and ON-ESC, sect. 3.21. 
                       \f

m_          Page 92, line -10: 
                       
                   2  16 -' 2  15 
 
          Page 103, insert after line -13: 
           
                5.1.8 S_t_r_i_n_g_ _a_r_r_a_y_s_ 
                      The array-concept can be used in connection with
                      strings. Dimensioning of a string array is accomp-
                      lished by means of the DIM statement, (see Chapter
                      3), for example: 
                                  DIM TEXT(20,40) 
                      The string array TEXT consists of 20 string-elements
                      each 40 characters long. The i>th element can be re-
                      ferenced as TEXT(i). TEXT(i,j) is a reference to
                      the j>th character in the i>th element, and
                      TEXT(i,j,k) points our character number j through k
                      in the i>th element of the string array. 
                      The lower bound of a string array (i.e. the number of
                      the first element) is usually 1. By means of the LOW-
                      BOUND-statement (see Chapter 9) the lower bound may,
                      however, be set to zero. The first character in  a
                      string element will always be number 1. 
            
            E_x_a_m_p_l_e_                                     C_o_m_m_e_n_t_ 
           
          0010 TAB=4                                  The 5 names are 
           
          0020 DIM NAME(5,8)                          stored in the string
          0030 LEFT I=1                                array NAME 
          0040 REPEAT 
          0050   READ NAMES (I) 
          0060   LEFT I=I+1 
          0070 UNTIL I'5 
          0080 FOR I=1 TO 5 
          0090   PRINT NAME(I) 
          0100 NEXT I 
              0110 DATA "PETER,"JOHN","ROBERT","ROBERTA","DIANA" 
           
p_          PETER   JOHN    ROBERT  ROBERTA DIANA \f

          E_x_a_m_p_l_e_                                  C_o_m_m_e_n_t_ 
           
          0010 DIM TEXT(6,5) 
          0020 FOR I=1 TO 6 
          0030   LET TEXT(I)="TEXT",CHR(48+I) 
          0040 NEXT I 
          0050 FOR I=6 TO 2 STEP -1 
          0060   PRINT TEXT(I)                    print string element 6 to 2
          0070 NEXT I 
          0080 FOR I=1 TO 5 
          0090   PRINT TEXT(1,I);                 print string element 1, cha-
          0100 NEXT I                              racter by character 
          0110 PRINT 
          0120 PRINT TEXT(2,3,LEN(TEXT(2)))      print string element 2,
                                                   from character no. 3.
           
          TEXT6 
          TEXT5 
          TEXT4 
          TEXT3 
          TEXT2 
          TEXT1 
          XT2 
           \f

F_          Page 108, insert after line 1: 
           
                If the lower bound of arrays has been set to zero (by
                means of the LOWBOUND-statement, see Chapter 9), then
                MATRIXA will have 11 rows (no. 0 through 10) and 21 columns
                (0 through 20). 
           
          Page 124, line 1 and 2: 
           
                7. Logical Discs/Subcatalogs and Related Commands. 
                7.1. Introduction. 
                7.1.1. Logical Discs. 
           
          Page 126, line 5: 
           
                protection key -' protection key ('0) 
           \f

F_          Page 126, insert before line 14: 
           
                7.1.2. Subcatalogs. 
                The logical discs described in Sect. 7.1.1. are always used
                on systems with flexible discs. On systems with moving-head
                disc (systems running under the DOMUS operating system) RC
                BASIC will usually use s_u_b_c_a_t_a_l_o_g_s_ in stead of logical
                discs. The subcatalogs can be considered as being a part of
                the DOMUS system, and therefore they will not be described
                in this manual. The reader is referred to ref. 1 and 2.
                 
                Once a subcatalog has been created (by means of the DOMUS
                utility program SUBCA, see ref. 1) it may from the BASIC-
                users point of view be looked at as a logical disc, except
                for a few minor differences that will be mentioned in the
                following: 
                 
                - The name of a subcatalog consists of max. 5 characters. 
                 
                - The name of a file contained in a subcatalog consists of 
                  max. 5 characters. 
                 
                - A subcatalog does not have a fixed size. Files may be
                  created within the subcatalog as long as there is space
                  on the disc holding the subcatalog. 
                   
                - The INIT-, LOCK- and USERS-command (Sect. 7.4, 7.5 and
                  7.8) are blind, i.e. they have no effect when used in
                  subcatalog-systems. 
                   
                - The concept "exclusive user" does not exist in connection
                  with subcatalogs. When a user connects his terminal to a
                  subcatalog and he specifies a correct protection key, he
                  will be allowed to perform all kinds of operations on the
                  files contained in the subcatalog. This does not mean,
                  that other users are excluded from the actual subcata-
                  logs. In other words: all users may perform all kinds of\f

                  operations at the same time. It is, however, not possible
                  for two or more users to write into or delete the same
                  file at the same time. 
                          
                - If a subcatalog does not have a protection key, a user is
                  allowed to perform a_l_l_  operations (including "DELETE")
                  if he knows the name of the subcatalog. 
                   
                - The main catalog of the system can be looked at as a sub-
                  catalog named CAT with protection key equal to zero. If a
                  user has not connected his terminal to a subcatalog, he
                  will be connected to CAT. The user is then allowed to
                  r_e_a_d_ all files described in CAT, but he may only c_h_a_n_g_e_
                  files, that have been created from BASIC. This means,
                  that all system-files are protected against destruction. 
                   \f

F_          Page 126, line -10: 
           
                R_e_m_a_r_k_s_ _(_l_o_g_i_c_a_l_ _d_i_s_c_-_s_y_s_t_e_m_s_)_ 
           
                1. If the user CONNECT>s to a logical disc which has a pro-
                   tection key (<'0) without specifying this, he may only
                   read from the logical disc. 
                    
                2. If the user specifies a protection key (<'0) and the va-
                   lue is correct, he becomes the exclusive user of
                   <ldname' and may now write to as well as read from
                   <ldname', whereas no other user may connect his terminal
                   to <ldname'. 
                    
                3. If a CONNECT-command is given from a termimal which is
                   already connected to a logical disc, a RELEASE-command
                   (see Sect. 7.7) will automatically be executed. 
                    
                4. If the protection key of a logical disc is equal to
                   zero, this logical disc can be used by s_e_v_e_r_a_l_ _u_s_e_r_s_ _a_t_
                   t_h_e_ _s_a_m_e_ _t_i_m_e_. The users will be able to CREATE, RENAME,
                   read from and write to files on the logical disc, if
                   they do not specify a protection key when CONNECTing. If
                   a file is to be DELETE>d, this can only be done by a
                   user, who is exclusive user of the logical disc. One be-
                   comes exclusive user of a logical disc with protection
                   key e_q_u_a_l_ to zero by specifying any protection key n_o_t_
                   e_q_u_a_l_ to zero when CONNECTing. 
                    
                The following table shows which kind of access the user
                will have depending on the protection key of the logical
                disc and the key specified in the CONNECT-command. 
                 \f

F_       T_               Key specified in 
                     CONNECT- 
                         command            =0                  '0 
                 Protec-                i.e. no key 
                 tion key of 
                 _t_h_e_ _l_o_g_i_c_a_l_ _d_i_s_c_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
                 
                                        W_r_i_t_e_-_a_c_c_e_s_s_:       E_x_c_l_u_s_i_v_e_ _u_s_e_: 
                 
                 =0                     all kind of access  all kind of ac-
                                        is allowed except   cess is allow- 
                      _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _D_E_L_E_T_E_ _ _ _ _ _ _ _ _ _ _ _ _ _ _e_d_ _ ____________
                 
                 '0                     R_e_a_d_-_a_c_c_e_s_s_ onlyE_x_c_l_u_s_i_v_e_ _u_s_e_:_ 
                 
                                                            all kind of ac-
                                                            cess is allowed.
                 
  &_             
                R_e_m_a_r_k_s_ _(_s_u_b_c_a_t_a_l_o_g_-_s_y_s_t_e_m_s_)_ 
                 
                1. If the user CONNECT>s to a subcatalog which has a pro-
                   tection key (<'0) without specifying this, he may only
                   read from files contained in the subcatalog. 
                    
                2. If the user specifies a protection key and the value is
                   correct, he is allowed to perform all kinds of opera-
                   tions on files contained in the subcatalog. 
                    
                3. If a CONNECT-command is given from a terminal which is
                   already conncted to a subcatalog, a RELEASE-command (see
                   Sect. 7.7) will automatically be executed. 
                    
                4. If a subcatalog does not have a protection key, a user
                   is allowed to perform all kinds of operations on files
                   contained in the subcatalog, if he CONNECT>s to the sub-
                   catalog. \f

         T_              The following table shows which kind of access the user
                         will have depending on the protection key of the subcatalog
                and the key specified in the CONNECT-command. 
                 
                        Key specified 
                          in CONNECT-           =0               '0 
                Protec-       command        i.e. no key 
                tion key of 
                t_h_e_ _s_u_b_c_a_t_a_l_o_g_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
                 
                        =0                   all kinds of     all kinds of 
                                             access is        access is 
                 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _a_l_l_o_w_e_d_ _ _ _ _ _ _ _ _ _ _a_l_l_o_w_e_d_ _ _ _ _ _ _
                 
                        '0                   read-access      all kinds of 
                                             only             access is 
                                                              allowed (if 
                                                              the key is 
                                                              correct) 
 &_              \f

F_          Page 127-132: 
           
                <ldname' -' <ldname'/<subcatname' 
                logical disc -' logical disc/subcatalog 
           
          Page 127, line 14: 
           
                user"s -' user>s 
           
          Page 127, line -11: 
           
                1. A file can be copied to a logical disc/subcatalog only
                   if the user has write-access to the files of that
                   logical disc/subcatalog (see Sect. 7.2). 
           
          Page 128, insert after line -12: 
                  
           
                4. The INIT-command has no effect in subcatalog-systems. 
           
          Page 129, insert after line 13: 
           
                5. The LOCK-command has no effect in subcatalog-systems. 
           \f

m_          Page 130, Remarks to LOOKUP. 
           
                Remarks 1-6 only applies to logical-disc systems. 
                 
                In subcatalog-systems the listing of files will look as
                follows: (The headings will only be printed, if the LOOKUP
                "LPT" form of the command is used). 
                 
          NAME  ATTRIBUTE  LENGTH  INDEX  RLENGTH  LBYTE  LBLOCK  SEQ 
                                                 RECSIZE  NO.REC  RAN 
           
          PROG1 ........V    3      576      6      133     3      S 
          DATA1 ........F    7      666     12       80    42      R 
           
          LENGTH, INDEX and RLENGTH are usually of no interest for the user
          of BASIC. For further information, see ref. 2. 
           
                NAME:    The name of file. 
                ATTRIBUTES: 
                      V: The file is extendable. 
                      F: The file has a fixed length i.e. it 
                         is not extendable. 
                LENGTH:  The length of the file. 
                INDEX:   The number of the sector, where the 
                         indexblock of the file is placed. 
                RLENGTH: The reserved length of the file. 
                LBYTE:   (sequential files). The number of 
                         bytes used in the last block written. 
                LBLOCK:  (sequential files). The number of 
                         the last block written. 
                RECSIZE: (random access files). The length (in 
                         bytes) of the record. 
                NO.REC:  (random access files). The number of 
                         records in the file. 
                SEQ/RAN: 
                     S: a sequential file. 
                     R: a random access file. 
 
                Only the files that have been created from BASIC will be
                   listed although other files will be accessable for read-
p_                ing. 
                    \f

F_          Page 132, insert after line 6: 
           
                3. The USERS-command has no effect in subcatalog-systems. 
           
          Page 133, line 6: 
           
                L_o_g_i_c_a_l_ _d_i_s_c_s_ -' l_o_g_i_c_a_l_ _d_i_s_c_s_/_s_u_b_c_a_t_a_l_o_g_s_. 
           
          Page 133-150: 
           
                Logical disc -' logical disc/subcatalog. 
           
          Page 133, insert after line -10: 
           
                Serial printer (SP) 
           
          Page 134, line 2-4: 
           
                In logical disc-systems a RC BASIC file comprises a number
                of consecutive blocks in a logical disc. Each file is de-
                scribed separately by an entry in the subcatalog of the lo-
                gical disc (see Sect. 7.1). In subcatalog-systems an RC
                BASIC file consists of a number of s_l_i_c_e_s_ that can be pla-
                ced anywhere on the disc. A slice is a number of consecu-
                tive blocks; the number depends on how the DOMUS-disc has
                been generated, but it is usually 6 (see also ref. 2.) 
                 
          Page 134, line 6: 
           
                Logical disc -' logical disc/subcatalogs. 
           
          Page 134, line 13-14: 
           
                In logical disc-systems the name consists of 1 to 8 charac-
                ters, and in subcatalog-systems 1 to 5 character. Only cha-
                racters with decimal values between 32 and 127 (see appen-
                dix D) are legal. \f

          Page 135, line 13 and 
          Page 137, line -16 and 
          Page 149, line 2: 
           
                Replace "correctly specified the protection key of the lo-
                gical disc/subcatalog in the CONNECT-command" by 
                "has write-access to the files of the logical disc/subcata-
                log to which the terminal is connected" 
                 
          Page 135: 
           
                Replace lines -5 through -3 by 
                A discfile can only be CREATEd, RENAMEd or written into if
                the user has write-access to the logical disc/subcatalog
                (see Chapter 7, CONNECT). 
                A discfile can only be DELETEd if the user is exclusive
                user of the logical disc/subcatalog. 
           \f

F_          Page 137, line 4: 
           
                <filename': the name of the disc file to be created, ex-
                            pressed as a string literal or by means of a
                            variable. In logical disc-systems the name con-
                            sists of 1 to 8 characters, and in  subcatalog-
                            systems 1 to 5 character. Only characters with
                            decimal value between 32 and 127 (see appendix
                            D) are legal. 
           
          Page 137, line -9 - -1: 
           
                3. In subcatalog-systems a file that is created with size
                   equal to 0 will be extendable. This means that the file
                   will be extended if the user writes more data into the
                   file, than can be held in the blocks actually allocated
                   to the file. If <size' is '0 the length of the file will
                   be fixed, i.e. the file can not be extended. 
                    
                4. In logical disc-system a file that is created with
                   <size' equal to 0 will be given a length corresponding
                   to the number of free blocks in the logical disc. The
                   file can then be used for output, and when it is CLOSEd
                   (see Sect. 8.2), the system will truncate it. No more
                   than one file (in logical disc-systems) created with
                   <size' equal to 0 can be used, unless the files in
                   question have already been CLOSEd once. 
                    
                5. <size' must be positive, if the file is a random access
                   file. 
                    \f

F_          Page 138, line 1: 
           
                5 -' 6 
           
          Page 138, line 7: 
           
                6 -' 7 
           
          Page 138, line -5 through -3: 
           
                1. A file can be deleted only if the user is exclusive user
                   of the logical disc containing the file to be deleted
                   (see Chapter 7, CONNECT). 
                    
          Page 138, DELETE: 
                    
                   Remarks 1-3 only applies to logical disc-system. In sub-
                   catalog-systems a file can be deleted, if the user has
                   write-access to the subcatalog. 
                    
          Page 143, line 5: 
                    
                   mode 0 or 3 -' mode 0, 2 or 3. 
                    
          Page 149, line -13: 
                    
                   mode 0 or 3 -' mode 0, 2 or 3. 
                    
          Page 160, line -8 and 
          Page 170, line -3: 
                    
                   disc file -' disc file (only possible if the user has
                   write-access to a logical disc/subcatalog). 
                    \f

          Page 161, insert after last line, and 
          Page 170, insert after line 5: 
             
            3. If the SAVEd program is on disc, the system searches the
               logical disc/subcatalog to which the terminal is connected
               for <filename' (see Chapter 8). If <filename'  is not found
               then the system searches for a logical disc/ subcatalog
               called LIB and if this is found then a search is made in
               this logical disc/subcatalog for <filename'. If <filename'
               is not found, the system outputs the error message 0100:
               FILE UNKNOWN. 
                \f

F_          Page 162, insert before line 5: 
           
                9.10A LOWBOUND 
 
                      F_o_r_m_a_t_ 
                      LOWBOUND=<expr' 
                               <expr': a numeric expression which evaluates
                                       to 0 or 1 
                      U_s_e_ 
                      As a command or statement to change the lower bound
                      of numeric and string arrays. 
                       
                      R_e_m_a_r_k_ 
                      1. The default lower bound is 1 (i.e. the number of
                         the first element in an array is one). By means of
                         the LOWBOUND-statement the lower bound may, how-
                         ever, be set to zero. 
                          
                      2. If lowerbound is zero, the row and column no. zero
                         is included in all matrix-operations. 
                          
                      3. The LOWBOUND-statement can be placed anywhere in
                         an RC BASIC program. Each time an array element is
                         referenced the current lower bound will be taken
                         as the first element of the array. 
           \f

F_          E_x_a_m_p_l_e_                             C_o_m_m_e_n_t_ 
           
          0010  LOWBOUND =1 
          0020  DIM A(5) 
          0030  FOR I=1 TO 5 
          0040    LET A(I)=I 
          0050  NEXT I 
          0060  FOR I=1 TO 5                  lower bound of A-array is 1 
          0070    PRINT A(I); 
          0080  NEXT I 
          0090  LOWBOUND =0 
          0100  DIM B(5) 
          0110  PRINT 
          0120  FOR I=0 TO 4                  now lower bound of A-array is 0
          0130    PRINT A(I) 
          0140  NEXT I 
          0150  PRINT 
          0160  FOR I=0 to 5                  B-array has 6 elements (0 to 5)
          0170    PRINT B(I); 
          0180  NEXT I 
           
          1  2  3  4  5 
          1  2  3  4  5 
          0  0  0  0  0  0 
           
          Page 165, line 3, 8 and 9: 
           
                NUL -' STX 
           \f

F_          N_e_w_ _E_r_r_o_r_ _M_e_s_s_a_g_e_s_ _(_p_a_g_e_ _1_7_6_-_1_8_7_)_ 
           
              0047: PARAMETER ERROR 
                The actual parameters used in a call of an assembler-coded
                subroutine do not correspond to the formal parameters as
                specified in the subroutine. 
                 
          0049: FACILITY PROTECTED 
                The statement or command is protected and cannot be
                executed at the terminal. 
                 
          0090: USER CALL ERROR 1 
          0091: USER CALL ERROR 2 
                These messages can be used by the programmer of assembler-
                coded subroutines if an error is detected during  the exe-
                cution of the subroutine. 
                 
          0098: PAGING ERROR. 
                This error will only occur on a system running under the
                DOMUS-operating system. The reason is, that (part of) the
                virtual storage cannot be read from the disc. The user>s
                current program is destroyed. If the error occurs regularly
                the reason is probably malfunctioning hardware. 
                 
          0099: STACK OVERFLOW. 
                A stack overflow may occur, if the user has recursive
                functions or procedures in his program, for instance 10 DEF
                FNA(X) = FNA(X). If this is not the reason, then please
                contact RC. 
                 
          No  0105, 0110, 0115: 
                LD -' LD/SUBCATALOG 
                 
          0160: CATALOG I/O ERROR 
                Some kind of inconsistence was discovered in the catalog.
                Contact RC. 
                 \f

          0161: SUBCATALOG UNKNOWN 
                The user attempted to connect his terminal to a subcatalog
                which does not exist or to which no link has been made (see
                ref. 1). 
                 
          0165: DISC WRITEPROTECTED 
                An attempt has been made to write data on a (flexible) disc
                which is writeprotected. 
                 
          0166: ILLEGAL OPERATION 
                1) A wrong protection key was specified or 
                2) The disc-unit containing a subcatalog has not been 
                   initialized or 
                3) An attempt has been made to connect to a file which 
                   is not a subcatalog. 
                 
          0167:  
                This error message means that NO FREE AREAPROCESSes are a-
                vailable for the time being (see ref. 3 and 2). As er-
                ror messages are fetched from a discfile, and as this ope-
                ration requires an areaprocess, the text cannot be fetched.
                Therefore the text that is written in connection with error
                no. 0167 is random. 
                 
          0172: INDEXBLOCK FULL 
                In connection with each file an indexblock is used. This
                indexblock can be filled up, if a file is very large.
                Usually the disc must be reorganized. 
                 
          0180: Same as 0160 
                 
          0181: DISC OFF-LINE 
                An attempt has been made to access a disc, which was not
                ON-LINE. 
                 
          0185: Same as 0165. 
                 \f

          0186: ILLEGAL OPERATION ON FILE 
                The file is reserved by another user i.e. by a program
                running simultaneously with the BASIC-system. 
                    
          0187: DISC FULL 
                The disc on which a file is created or extended is full. 
                 
          0192: Same as 0172. 
                 
          As it can be seen, many of the messages 0160-0172 and 0180-0192
          are alike each other. In general it can be said, that errors
          0160-0172 occur in connection with operations on (sub)catalogs,
          while 0180-0172 occur in connection with operations on files. 
           
          Page 189, line 5: 
           
                Disc write-protected -' Skip block 
           \f

F_          Page 211: 
           
                Insert DIGITS, LOWBOUND, PROTECT and RESET as reserved
                words. 
           
          Page 212, insert after line 4: 
           
                                             <var' 
                         <svar'              <svar' 
                CALL                 ,       <mvar'         ...      H 
                         <slit'              <sarray'
                                             <slit' 
                                             <expr' 
           
                Invokes the execution of anSTATEMENT 
                assembler-coded subroutine. 
                
Page 213, insert before line 4: 
                 
                DIGITS = <expr'                                       3.6A 
                 
                Specifies the maximal number digits              STATEMENT 
                output in PRINT-statements in systems            or COMMAND 
                with extended precision. 
                 
          Page 213, line 4 through 8: 
           
                         <svar' (<l')               <svar' (<l')           3.7 
                DIM      <sarray' (<n',<l')    ,    <sarray' (<n',<l') 
                         <array' (<m')              <array' (<m') 
                         <array' (<row',<col')      <array' (<row',<col') 
           
                Defines the size of string variables,            STATEMENT 
                string arrays or numeric arrays.                 or COMMAND
           \f

Page 215, insert after line -10: 
 
     PROTECT = <expr'                                      3.26A 
      
     Protects certain statements and commands so       STATEMENT 
     that they cannot be executed at the terminal. 
      
M_    Page 216, insert after line 12: 
      
P_        ERR 
     RESET     3.30A 
     ESC 
      
     Restores normal function of the ESCape key and    STATEMENT 
     normal error action.                              or COMMAND
      
Page 225, insert efter line -5: 
 
      LOWBOUND = <expr'                                    9.10.A
                Sets the lower bound of arrays                   COMMAND or
                to 0 or 1                                        STATEMENT 
 \f

F_          Page 228: 
           
                G   LOGON/LOGOF Functions. 
           
                The LOGON/LOGOF functions are implemented to enable the
                user to write his own programs to be invoked in the log on
                and log off situations, thus facilitating e.g. pass-word
                control, accounting and "hot-news". 
                 
      When the terminal is logged on, the system searches for a
      program-file named "LOGON". In logical disc-systems the
      search is made on the logical disc "LIB". In subcatalog-
      systems the search is made on the maincatalog, and if the
      file is not found, a new search is made in the subcatalog
      "LIB". 
       
      If the file is found, the program is loaded and executed
      automatically before the text "REV. XX.XX READY" is output.
       
      When the terminal is logged off (i.e. the BYE-statement is
      executed) the system will in the same way search for a
      program named "LOGOF". The program will, if it is found, be
      loaded and executed before the terminal is logged off. 
       
      The LOGON/LOGOF programs are ordinary BASIC programs
      written by the user himself. When writing the programs,
      some statements are particularly useful: 
       
      - In order to make it impossible for the user at the ter-
        minal to interrupt the programs by pressing the ESC-key,
        the first statement (which will always be executed)
        should be an ON ESC-statement, as shown in the  example. 
         
      - The PROTECT-statement (see sect. 3.26A) makes it possible
        to protect certain statements from being executed from
        the terminal. If for instance the user is allowed to
        access one specific logical disc/subcatalog only, the\f

        user can be connected to that logical disc/subcatalog by
        means of a CONNECT-statement in the LOGON-program, and
        the CONNECT- and RELEASE-statements can then be protec-
        ted. 
                        
      - The last statement executed in the LOGON-program should
        be NEW. This will make it impossible for the user at the
        terminal to study the program (it may contain passwords
        and/or filenames which the user should not know). 
         
      - By using some of the SYS-functions it is possible to make
        the LOGOF-program write information about how long time
        the user has spend at the terminal into a discfile. An
        account system is very easy to implement, if the LOGON
        program outputs information such as username, terminal
        number (SYS(4)), date and time (SYS(1-3), (11-13)) into a
        discfile. The LOGOF program may then output terminal
        number, date and time and/or time used (SYS(5)). 
         
      W_A_R_N_I_N_G_: 
         
        The LOGOF-program should not contain a BYE-statement, as
        execution of this statement during log off will course an
        error (STACK OVERFLOW), no 99). If this error occurs, the
        terminal will not be logged of, and the protection mask
        will be equal to zero which means that the user can ac-
        cess any logical disc/subcatalog. 
         
        Once the LOGOF-program has been started, the terminal
        will unconditionally be logged off when the program
        terminates, even if the ESC-key is pressed or an error
        occurs. 
         
         
            E_x_a_m_p_l_e_ 
      0010 ON ESC THEN EXEC ESCPROC 
      0020 ON ERR THEN EXEC ERRPROC \f

      0030 PROC ESCPROC 
      0040   ON ESC THEN BYE 
      0050   PRINT "DON>T PRESS ESCAPE!" 
      0060   PRINT "IF YOU DO IT AGAIN THE TERMINAL WILL BE LOGGED OFF" 
      0070 ENDPROC 
      0080 PROC ERRPROC 
      0090   PRINT "ERROR IN LOGON PROCEDURE" 
      0100   BYE 
      0110 ENDPROC 
      0120 DIM NAME(5),USER(5) 
      0130 PRINT 
      0140 PRINT "WELCOME TO RC BASIC/COMAL" 
      0150 PRINT 
      0160 INPUT "TYPE USER NAME: ",NAME 
      0170 IF LEN(NAME)=0 THEN GOTO 0160 
      0180 LET TRUE=1; FALSE=0 
      0190 LET FOUND=FALSE 
      0200 OPEN FILE(1,1)"USERS" 
      0210 REPEAT 
      0220   READ FILE(1)USER 
      0230   IF NAME=USER THEN LET FOUND=TRUE 
      0240 UNTIL FOUND OR EOF(1) 
      0250 CLOSE 
      0260 IF NOT FOUND THEN 
      0270   PRINT "THAT NAME IS NOT IN THE USER CATALOG" 
      0280   BYE 
      0290 ENDIF 
      0300 IF SYS(4)<'32 THEN 
      0310   PRINT "CONNECTED TO SUBCATALOG: "; 
      0320   CASE SYS(4) OF 
      0330     CONNECT "DISC3" 
      0340     PRINT "DISC3" 
      0350     PROTECT =1+2+4 
      0360   WHEN 1,2,3 
      0370     CONNECT "DISC1" 
      0380     PRINT "DISC1" 
      0390     PROTECT =1+2+4 \f

      0400   WHEN 4,5,6 
      0410     CONNECT "DISC2" 
      0420     PRINT "DISC2" 
      0430     PROTECT =1+2+4+8 
      0440   ENDCASE 
      0450 ENDIF 
      0460 NEW \f

F_      C_o_m_m_e_n_t_s_ 
       
      LINE 
       
      10       The first statement should be ON-ESC. 
      30-70    ON-ESC procedure. The user is warned the first
               time. The next time ESCape is pressed, the termi-
               nal is logged off. 
                
                   20-110   In case an error occurs a message is printed and
               the terminal logged off. 
                
                   130-150  >HOT NEWS> may be printed here. 
                
      200      User catalog file is opened (this file is assumed
               to be created in advance). 
                
                   160      User types his name. 
                
      170      In case ESCape has been pressed, repeat the input
               statement. 
                
      210-240  The user name is searched for in the catalog. 
                
      260-290  If not found then log off the terminal. 
                
      300      At the console (terminal 32) everything is
               allowed. 
                
      360      Terminals 1, 2, and 3 are not allowed to CONNECT
               and RELEASE, and PROTECT cannot be changed. 
                          
      400-430  Terminals 4, 5, and 6 are in addition not allowed
               to COPY from other subcatalogs. 
                
      460      The program is removed. \f

F_          Page 229: 
           
                H   Calling an Assembly Language Subroutine 
                    from RC BASIC. 
           
                F_o_r_m_a_t_ 
                 
                                   <var' 
                                   <svar' 
                CALL <subr.name' ,    <mvar'      .... 
                                   <sarray'
                                   <slit' 
                                   <expr' 
                      
                     <subr.name':  the name of an assembler-coded sub-
                                   routine expressed as a string literal or
                                       by means of a variable. 
                     <var':        a numeric variable 
                     <svar':a string variable 
                     <mvar':       a matrix variable 
                     <sarray':     a string array 
                     <slit':       a string literal 
                     <expr':       a numeric or relational expression 
                      
                U_s_e_ 
                As a statement to invoke the execution of an assembler-
                coded subroutine included in the system. 
                 
                R_e_m_a_r_k_s_ 
                 
                1. When the CALL-statement is executed the following
                   happens: 
           
                   a. If a module containing user-coded subroutines is
                      present in core, then the subroutine table in this
                      module is searched for the name of the subroutine. If
                      the name is found operation continues at point c. 
 
                            b. As a. except that the searching is carried out in the\f

F_                      module containing subroutines coded by RC. If the
                      subroutine is not found then the BASIC program is in-
                      terrupted with error no. 0046: PROCEDURE DOES NOT EX-
                      IST. 
                 
                   c. Now the number and the type of the actual parameters
                      are checked against the parameter specifications in
                      the subroutine. If a conflict is found then the BASIC
                      program is interrupted with error no. 0047: PARAMETER
                      ERROR. 
 
                   d. The actual parameters are organized in a way which
                      makes it possible to access them from the subroutine
                      and then a jump is made to the subroutine. 
                       
                2. When the subroutine is terminated, return to BASIC can
                   occur in two different ways. In case of normal return
                   execution of the BASIC program continues from the state-
                   ment following the CALL-statement. If an error has oc-
                   cured during execution of the subroutine, the BASIC pro-
                   gram will be interrupted (unless an ON ERR-statement has
                   been executed), and an error message is printed. 
                    
                   Ref. 4 describes how to program subroutines to be
                   called from RC BASIC. 
                    
                E_x_a_m_p_l_e_ 
                 
                   0010  DIM A(20), B(3) 
                   0020  CALL "PUSH", A, 3 
                   0030  B = "POP" 
                   0040  CALL B, A, X 
                    
                   The two routines "PUSH" and "POP" are shown as examples
in ref. 4. \f

F_           I   Extended Precision in RC BASIC 
             
          I.1   Numbers 
           
          In the extended precision version of RC BASIC/COMAL arithmetic
          operations are carried out to a significans of 10 decimals
          digits. The syntax is exactly the same as in the normal precision
          version except a greater number range. 
           
          An extended precision number may be in the range: 
           
                1.6 * 10UU-616DD < n < 1.6 * 10UU616DD 
           
          Numbers may as in the normal precision version be expressed as
          integers, fixed-point, or floating point (E-type notation).
          Internally all numbers are represented as 48 bit floating-point
          numbers. A 12 bit 2>s complement exponent and a 36 bit 2>s
          complement fraction. The fraction is normalized (the exponent is
          adjusted so that the most significant bit in the fraction is 1). 
           
          The error introduced in the conversion is less than 3 * 2UU-11DD
           
          The numbers are stored in 3 consecutive 16-bit words (in normal
          precision 2). This means that the formats are different, so that
          programs and numeric data in binary form produced by the normal
          precision version cannot be used in the extended precision
          version, but have to be converted. 
                    
           
                   I.2   Output Format 
             
          The number of digits output by a PRINT statement may be specified
          by the DIGITS statement/command. This number and the number of
          digits in the number to be output determines how the number is
          formatted by the PRINT statement. If the number can be
          represented using the number of digits specified in the DIGITS
          command or less, the number is output as integer (if the digits\f

          after the decimal point are all zero) or fixed-point number,
          otherwise E-type notation is used. 
           
          N_u_m_b_e_r_
               
               DIGITS = 3       DIGITS = 6 
           
          2 000 000       2E+06            2E+06 
          108.999         109              108.999 
          .00123          1.23E+03         .00123 
          24E4            24E4             240000 
           
 
                   I.3   Functions 
           
                   The same functions which exist in the normal precision version
          are also available in the extended precision version. The notes
          in Section 4 on arguments and results applies as well except for
          EXP(x). Because of the greater number range the EXP function
          accepts a greater argument range. The argument x of EXP(x) should
          satisfy the relation: 
           
                -1420.25 <= x <= 1418.86 
           
I.4   Changing from normal to extended precision 
             
          When changing from a system with normal precision to a system
          with extended precision, the user should notice the following: 
           
          S_A_V_E_d_ _p_r_o_g_r_a_m_s_: 
           
          Programs which have been SAVEd in a normal precision system can
          not be LOADed in an extended precision system. This means, that
          before changing systems the user must store his programs in
          ASCII-format (by means of the LIST-command). This "conversion"
          can be done in the following way: 
           \f

                   - Load a normal precision system 
           - For each SAVEd program execute the following commands: 
             LOAD <filename 1' 
            LIST <filename 2' 
          - Load an extended precision system 
          - For each LISTed program execute the following commands: 
            NEW 
            ENTER <filename 2' 
            SAVE  <filename 1' 
           
                   <filename 1' and <filename 2' may be the same file. 
               
          C_A_L_L_-_r_o_u_t_i_n_e_s_: 
           
          Assembler coded subroutines must be changed and re-assembled, if
          they have numeric parameters. Ref. 4 describes how the subrou-
          tines can be programmed. 
           
          D_a_t_a_-_f_i_l_e_s_: 
           
          In extended precision system numeric items takes up 6 bytes (4
          bytes in normal precision system). This means, that the user when
          changing system will have to reconsider the size of sequential
          files and the length of records in random access files. 
          Binary files which have been written from programs running in a
          normal precision system c_a_n_n_o_t_ be read from programs running in
          extended precision systems. 
          Binary sequential files can be converted into ASCII-files (i.e.
          they must be written by means of PRINT in stead of WRITE and read
          by means of INPUT in stead of READ). 
          Binary random access files can not be converted, they must be
          re-created. 
           \f

                   D_A_T_A_ _-_ _s_t_a_t_e_m_e_n_t_s_: 
                    
                   The maximal number of elements in DATA - statements is smaller
                   in extended precision systems than in normal precision systems. 
                   This may result in error message no. 0009: LONE TOO LONG, when
   programs containing DATA - statements are ENTERed. If this
                   happens, you will have to split "long" DATA - statements into
                   two or more statements with fewer elements (see also page 5 in
                   this manual).\f

F_          C_o_r_r_e_c_t_i_o_n_s_ _t_o_ _t_h_e_ _I_n_d_e_x_ _(_p_a_g_e_ _2_3_0_-_2_3_9_)_ 
           
          Page 231: 
           
                CALL, H 
           
Page 232: 
                DIGITS, 3.6A, I 
 
          Page 234: 
           
                LIB, 3.3, 9.10, 9.16 
                Logical discs 
                - write access, 7.2 
LOGON/LOGOF functions, G
                LOWBOUND, 2.4, 3.7, 5.1, 6.2, 9.10A 
           
Page 237 
                PROTECT, 3.26A, G 
                RESET, 3.20, 3.21, 3.30A 
 
          Page 238: 
           
                Strings 
                - arrays 3.7, 5.1, 9.10A 
           
          Page 238: 
           
                line -14 is replaced by: 
                subcatalog, see Logical disc. 
                subcatalog (in a logical disc), see Catalog. 
             \f

F_A_._ _ _ _ _ _ _ _ _R_E_F_E_R_E_N_C_E_S_: A.
           
           1 :DOMUS-utility SUBCA 
           
              User>s Guide 
           
              Keywords: RC3600, DOMUS, utility, catalog system, 
                        subcatalog 
           
              Abstract: This manual is a user>s guide for the DOMUS 
                        utility program SUBCA used for maintenance of 
                        subcatalogs. 
           
           2 :RC3600 Catalog System 
           
              System Programmer>s Guide 
              edition 78.09.05 or later 
           
              Keywords: Catalog system, file system, area process. 
           
              Abstract: This manual describes how to use the RC3600 Catalog
                        System from assembled programs. Also the organiza-
                        tion of discs is described. The user must be fami-
                        liar with the MUS system. 
           
           3 :RC BASIC 
               
              Operating Guide 
              edition October 1978 or later 
               
              Keywords: RC BASIC, DOMUS, MUS, Logical Disc, 
                        Subcatalog, Flexible Disc. 
                         
              Abstract: This manual describes how to use the RC BASIC sy-
                        stem under the DOMUS/MUS operating system. The cre-
                        ation and use of logical discs and subcatalogs is
                        shortly described. \f

                   4 :Assembler Coded Subroutines (CALL-routines) in RC BASIC
             (RC3600/RC7000) 
             Programmer>s Guide 
           
             Edition  : December 1979 or later 
           
             Keywords : RC3600, RC7000, RC BASIC, DOMAC, DOMUS, COPS,
                        Assembler Routines 
           
             Abstract : This guide describes how to program assembler
                        routines that can be called from BASIC programs \f

           
           \f

                    
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
                                        RC855 
                                Betjeningsvejledning 
                
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
          A/S REGNECENTRALEN af 1979                              Maj 1982 
          Informationsafdelingen                         RCSL Nr. 42-i2046 \f

                    
          Forfatter:          Henning Christensen 
                                         
                   Nøgleord:           RC855, system, betjening 
                                         
                   Resum:             Betjeningsvejledning til RC855 work station/
                              display station. Beskrivelse af: sammenkob-
                              linger og  betjeningskontakter; tastatur;
                              start-procedurer. Dækker de generelle aspek-
                              ter og skal anvendes i sammenhæng med den
                              øvrige dokumentation til applikationen. 
                                         
                              (28 trykte sider) 
                                         
                                         
                                         
               CP/M er et varemærke indregistreret af Digital Research. 
                                         \f

                                                 i 
           
                   I_N_D_H_O_L_D_S_F_O_R_T_E_G_N_E_L_S_E_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _S_I_D_E_ 
           
          1.  INTRODUKTION ...........................................   1 
              1.1  Ergonomi ..........................................   2 
              1.2  Betjening .........................................   2 
           
          2.  BESKRIVELSE AF SKÆRMTERMINALEN .........................   4 
              2.1  Sammenkoblinger ...................................   4 
                   2.1.1  Printer ....................................   5 
                   2.1.2  Diskettestation ............................   5 
              2.2  Betjeningskontakter ...............................   7 
              2.3  Vedligeholdelse ...................................   9 
           
          3.  BESKRIVELSE AF TASTATUR ................................  10 
              3.1  Generelle funktioner ..............................  10 
              3.2  Alfanumeriske taster ..............................  12 
                   3.2.1  Numerisk tastaturblok ......................  12 
              3.3  Attention-taster ..................................  13 
              3.4  Redigeringstaster .................................  14 
           
          4.  BETJENING ..............................................  15 
              4.1  Start og genstart .................................  15 
              4.2  Programindlæsning .................................  16 
              4.3  Programmelbetjening ...............................  18 
           
           
          B_I_L_A_G_: 
           
          A.  REFERENCER .............................................  19 
           \f

                                                 ii 
           \f

         1_._ _ _ _ _ _ _ _ _I_N_T_R_O_D_U_K_T_I_O_N_                                                     1.
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
          Figur 1: RC855 skærmterminal og tastatur. 
           
          RC855 fås enten som en work station (programmerbar, intelligent
          terminal) med en eller to diskettestationer, hvorfra forskellige
          programmelsystemer kan indlæses, eller som en display station
          (dedikeret terminal), der arbejder med et forudvalgt programmel. 
           
          RC855 work station'en med diskettestation kan arbejde med
          programmelsystemer såsom: 
           
          - CP/M-baserede applikationer 
          - IBM 3270 BSC emulator til interaktive opgaver 
          - IBM 3780 BSC emulator til overførsel af filer (batch) 
           
                   RC855 display station'en leveres med IBM 3270 BSC emulatoren
          indbygget i form af et internt lagerkort, der er fast monteret i
          terminalen. 
           \f

          Et system kan påbegyndes med blot en enkelt, selvstændig enhed og
          kan siden i takt med behovet udbygges til en klynge-struktur. 
           
          Mulighederne i konfigureringen er beskrevet i RC855 Konfigura-
          tionsvejledningen 1. 
           
           
1_._1_ _ _ _ _ _ _ _E_r_g_o_n_o_m_i_                                                            1.1
           
          Ergonomi har været en central faktor i udformningen af RC855
          skærmterminalen. 
           
          Understellet er udformet, så det tillader vipning og højdeind-
          stilling af skærmterminalen, som også nemt kan flyttes og drejes
          efter behov. Tastaturet er tilkoblet med et kabel og kan lige-
          ledes nemt flyttes, så det netop passer til brugerens situation. 
           
          Skærmbilledet på RC855 er ikke-reflekterende og forhindrer så-
          ledes effektivt alle irriterende reflektioner, der ellers kunne
          nedsætte læseligheden af den viste tekst. Lysstyrke og kontrast
          kan indstilles efter lysforholdene omkring terminalen, hvorved
          øjentræthed og hovedpine kan undgås. 
           
           
1_._2_ _ _ _ _ _ _ _B_e_t_j_e_n_i_n_g_ 1.2
           
          Pånær forskelle i programmel-indlæsning, så betjenes RC855 work
          station'er og RC855 display station'er på samme måde. 
           
          Indlæsningen af programmel fra diskettestationen på work sta-
          tion'en er beskrevet i installations- eller brugervejledninger
          til de konkrete programmelpakker. 
           
                   Indlæsningen af programmel fra det interne lagerkort i display
          station'en foregår automatisk som led i start-procedurerne. 
           
          RC855 har indbyggede selvtest funktioner, som udføres ved hver
          start eller genstart (reset). Resultatet af selvtesten vises som
          status-meddelelser på den nederste linie i skærmbilledet. Indlæs-
          ningen af programmel giver ligeledes anledning til meddelelser,
          der angiver status for indlæsningen. 
           \f

          Afhængig af programmelsystemet kan det være påkrævet at inddatere
          et antal konfigurationsparametre, ligesom yderligere diagnostice-
          rende testprogrammer kan være til rådighed. Disse forhold og
          fremgangsmåden i betjeningen er beskrevet i den dokumentation,
          der følger programmellet. 
           
           \f

F_       2_._ _ _ _ _ _ _ _ _B_E_S_K_R_I_V_E_L_S_E_ _A_F_ _S_K_Æ_R_M_T_E_R_M_I_N_A_L_E_N_                                   2.
           
2_._1_ _ _ _ _ _ _ _S_a_m_m_e_n_k_o_b_l_i_n_g_e_r_ 2.1
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
          Figur 2: Bagpanel. 
           
          1) KEYBOARD                 - forbindelse til tastatur. 
                                         
          2) RESET                    - jvf. 2.2 og 4.1. 
             trykknap 
                                         
          3) CIRCUIT                  - forbindelse til RC-CIRCUIT i klynge-
                                        konfigurationer. 
                                         
          4) LINE II                  - forbindelse til printer. Se også
                                        2.1.1. 
                                         
          5) LINE I                   - forbindelse til værtsdatamat (evt.
                                        via modem); i klynge-konfiguratio-
                                        ner normalt kun benyttet på den
                                        primære terminal. 
                                         
          6) Diskettestation          - forbindelse til diskettestation. Se
                                        også 2.1.2. 
                                         \f

                   7) Netledning og            - sikringen kan skiftes ved først at
             sikring                    trække netledningen ud og derefter
                                        sikringsholderen øverst i stikket.
                                        En ekstra sikring findes i holde-
                                        ren. 
                                         
          8) POWER ON/OFF             - jvf. 2.2 og 4.1. 
             vippekontakt                
                                         
          Yderligere information vedrørende installering af udstyret findes
          i RC855 Installationsvejledningen 2. 
           
           
2_._1_._1_ _ _ _ _ _P_r_i_n_t_e_r_ 2.1.1
           
          Som ekstraudstyr kan der tilkobles en printer til skærmtermina-
          len. 
           
          Betjeningen af printerne er beskrevet i vejledninger, der følger
          særskilt med de forskellige typer af printere. 
           
          Hvis der tilkobles en printer, skal et antal konfigurationspara-
          metre i skærmterminalen tildeles værdier i overensstemmelse
          hermed. Fremgangsmåden er beskrevet i de konkrete vejledninger,
          der følger programmellet. 
           
          Ved brug af visse programmelsystemer og klynge-konfigurationer er
          printeren til rådighed som en fælles ressource i klyngen, dvs.
          den kan benyttes af flere terminaler i klyngen. Sådanne forhold
          bør undersøges førend betjeningen af terminal og printer påbegyn-
          des. 
           
           
2_._1_._2_ _ _ _ _ _D_i_s_k_e_t_t_e_s_t_a_t_i_o_n_ 2.1.2
           
          Mindst en diskettestation skal være tilkoblet, for at udstyret
          skal kunne benyttes som work station; to diskettestationer kan
          tilkobles. 
           \f

                   Betjeningen af diskettestationen er enkel og ligetil: trykkes på
          den aflange knap lige under lågen, springer lågen op og disketten
          kan forsigtigt skubbes ind i diskettestationen indtil fast an-
          slag. Ved ilægning af disketten skal etiketterne på diskettens
          omslag vende opad og væk fra diskettestationen. Efter ilægning
          holdes disketten automatisk på plads og lågen kan lukkes ved at
          trykke nedad på dens forkant. Skal en diskette tages ud, trykkes
          på den aflange knap igen og disketten springer frem i åbningen. 
           
          Disketter, der ikke bruges, skal altid opbevares i beskyttelses-
          omslaget og godt beskyttet mod skadelige påvirkninger fra omgi-
          velserne, f.eks. magnetiske felter, støv og sollys. Disketterne
          bør lagres opretstående og helst i en lukket plastkasse. Disket-
          tens overflade (synlig gennem det aflange hul i omslaget) må ikke
          berøres! Skriv aldrig på etiketterne, når disse er klæbet på om-
          slaget! 
           
                                        En diskette kan skrivebeskyttes,
                                        dvs. data kan kun læses fra disket-
                                        ten, ved at lave et hak i omslaget
                                        som vist på tegningen (mål i mil-
                                        limeter). En skrive-beskyttelse kan
                                        ophæves ved at klæbe et stykke
                                        uigennemsigtigt tape over hakket. 
           
          Før diskettestationen kan benyttes, skal den tilsluttes en stik-
          kontakt og tændes med kontakten foran. Foran på diskettestationen
          findes desuden en indikator, der lyser, når der læses/skrives på
          disketten. Ilægning/udtagning af disketter må ikke foretages,
          mens indikatoren lyser. 
           
           \f

         2_._2_ _ _ _ _ _ _ _B_e_t_j_e_n_i_n_g_s_k_o_n_t_a_k_t_e_r_                                              2.2
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
           
          Figur 3: Betjeningskontakter. 
           
          1) POWER ON/OFF             - tænder/slukker for terminalen. Se
             vippekontakt               også 4.1. 
             (bagpanel)                  
                                         
          2) RESET                    - genstarter terminalen. Se også 4.1.
             trykknap                    
             (bagpanel)                  
                                         
          3) Kontrast                 - kontrastregulering af skærmbillede.
             fingerhjul                 Se nedenfor. 
             (under monitor)             
                                         
          4) Lysstyrke                - lysstyrkeregulering af skærmbille- 
             fingerhjul                 de. Se nedenfor. 
             (under monitor)             
                                         
                   Reguleringskontakterne til lysstyrke og kontrast er placeret un-
          der monitoren, foran i højre side. De benyttes for at opnå den\f

          mest behagelige visning af tegn i skærmbilledet. Gå frem som føl-
          ger: indstil lysstyrken så rasterpunkterne netop ikke mere ses og
          indstil så kontrasten, således at tegnene fremtræder mest behage-
          ligt. 
           
          B_e_m_æ_r_k_: Høj lysstyrke reducerer monitorens levetid og kan desuden
          være kilde til hovedpine og øjenirritationer. Skærmbilledets lys-
          forhold bør efterindstilles i takt med ændringer i de omgivende
          lysforhold. 
           
          ADVARSEL: Længere tids påvirkning fra høj lysstyrke (generelt høj
          intensitet eller highlight-felter) kan resultere i gennembrænding
          af skærmens fosforlag. 
              
          5) Højdeindstilling         - indstillinger i højden foretages
             trykknap                   ved hjælp af en lille motor. Den
                                        kan kun arbejde, hvis terminalen er
                                        tændt. Tryk på kontakten for at
                                        ændre indstilling; slip kontakten,
                                        når ændringen skal stoppe. 
                                         
                                      : Hæver monitoren. 
                                      : Sænker monitoren. 
                                         
             Vipning                  - monitoren kan vippes ved at skubbe
                                        let opad/nedad på bageste del af
                                        monitoren. 
                                         
          6) VOLUME                   - den indbyggede højttaler (der be-
             drejekontakt               nyttes til de hørbare signaler) kan
             (tastatur, bagpanel)       indstilles til den ønskede lydstyr-
                                        ke ved brug af denne kontakt. 
                                         
          7) KEY-CLICK ON/OFF         - tastaturet udsender en klik-lyd ved
             vippekontakt               korrekt tasteanslag. Klik-lyden kan
             (tastatur, bagpanel)       tændes/slukkes med denne kontakt. 
                                         
                                         \f

         2_._3_ _ _ _ _ _ _ _V_e_d_l_i_g_e_h_o_l_d_e_l_s_e_ 2.3
           
          Brugeren har ingen vedligeholdelsesopgaver i forbindelse med
          terminalen udover den regulære rengøring. Brug en fugtig, hårdt
          opvredet klud. 
           
          NB: Benyt kun mild sæbevand til rengøringen. 
           
           \f

F_       3_._ _ _ _ _ _ _ _ _B_E_S_K_R_I_V_E_L_S_E_ _A_F_ _T_A_S_T_A_T_U_R_ 3.
           
          Tastaturet leveres i forskellige versioner afhængig af ønsket
          (nationalt) tegnsæt. Danske tastaturer fås endvidere i en
          modificeret udgave. 
           
           
           
           
           
           
           
           
           
           
          Figur 4: RC855 tastatur, dansk/norsk. 
           
           
           
           
           
           
           
           
           
           
          Figur 5: RC855 tastatur, dansk offs. 
           
           
3_._1_ _ _ _ _ _ _ _G_e_n_e_r_e_l_l_e_ _f_u_n_k_t_i_o_n_e_r_ 3.1
           
          Taste-klik                  - ved korrekt tasteanslag høres en
                                        klik-lyd. 
                                         
                                        Lydstyrken kan reguleres ligesom
                                        funktionen helt kan slukkes. (jvf.
                                        2.2). 
                                         \f

                   Alarmsignal                 - et alarmsignal høres, hvis der fo-
                                        retages betjeninger, der er ugyl-
                                        dige. Signalet kan også udsendes på
                                        initiativ fra værtsdatamaten. 
                                         
                                        Lydstyrken kan reguleres, men funk-
                                        tionen kan ikke slukkes. (jvf.
                                        2.2). 
                                         
          Automatisk repetition       - når en taste holdes nedtrykket læn-
                                        gere end trekvart sekund, bliver
                                        den pågældende tegnkode repeteret
                                        (med en hastighed af 10 tegn/sek.).
                                        Gælder dog ikke de hjælpetaster som
                                        nævnes lige herefter. 
                                         
          De taster, som beskrives i det følgende, er hjælpetaster, der
          altid benyttes sammen med en anden "regulær" taste. De benyttes
          for at kunne generere alternative koder sammen med de regulære
          taster (f.eks. store bogstaver). Hjælpetaster skal holdes nede,
          mens den regulære taste slås an. 
           
          SHIFT                       - bemærk de forskellige måder, tasten
                                        benyttes: 
                                         
                                     I: Benyttes SHIFT sammen med en tegn-
                                        taste, genereres store bogstaver
                                        eller tegn fra det "øvre" tegnsæt
                                        (svarende til øverste tegn på tas-
                                        ter med to symboler). 
                                         
                                    II: Benyttes SHIFT sammen med andre
                                        specifikke taster, modificeres den
                                        normale funktion, disse taster har.
                                        De alternative funktioner, der der-
                                        ved opnås, er beskrevet i forlæn-
                                        gelse af beskrivelsen af tastens
                                        normale funktion, dvs. i de for-
                                        skellige vejledninger til program-
                                        mellet. 
                                         \f

                   LOCK                        - som SHIFT i tilfælde I, dog kun med
                                        virkning på de alfabetiske taster.
                                        Når tasten trykkes ned, træder
                                        funktionen i kraft (indikatoren ly-
                                        ser) og forbliver i kraft, indtil
                                        man igen trykker på tasten. I for-
                                        bindelse med nogle programmelsy-
                                        stemer findes en konfigurations-
                                        parameter som indvirker på benyt-
                                        telsen af tasten.  
                                         
                                        Bemærk: LOCK funktionen påvirker
                                        kun taster med t symbol. Taster
                                        med to symboler kan, uanset brugen
                                        af LOCK tasten, altid generere øvre
                                        tegn ved brug af SHIFT tasten. 
                                         
          CTRL                        - benyttes overvejende sammen med
                                        andre funktionstaster for at opnå
                                        særlige system-funktioner. Brugen
                                        af to taster er i disse tilfælde
                                        anvendt som et værn mod utilsigtet
                                        aktivering af disse system funktio-
                                        ner. 
                                         
           
3_._2_ _ _ _ _ _ _ _A_l_f_a_n_u_m_e_r_i_s_k_e_ _t_a_s_t_e_r_ 3.2
           
          De alfabetiske og numeriske tegntaster betjenes på tilsvarende
          måde som kendt fra almindelige skrivemaskiner. Hvis der er re-
          striktioner i benyttelsen, er dette omtalt i de respektive
          vejledninger til programmellet. 
           
           
3_._2_._1_ _ _ _ _ _N_u_m_e_r_i_s_k_ _t_a_s_t_a_t_u_r_b_l_o_k_ 3.2.1
           
          Tastaturet omfatter en særskilt blok med numeriske taster for at
          lette inddatering af numeriske data. Tasten med decimalkomma-teg-\f

          net kan i forbindelse med nogle applikationssystemer virke på
          forskellig måde, bestemt af den værdi, der tildeles en konfigura-
          tionsparameter. 
           
                   Bemærk også følgende: 
           
          N_o_r_m_a_l_ _f_u_n_k_t_i_o_n_:              Som numeriske taster. 
           
          S_æ_r_l_i_g_ _f_u_n_k_t_i_o_n_:              Hvis en af de numeriske taster (1,
                                        2, ..., 9) benyttes sammen med
                                        SHIFT tasten, genereres de tilsva-
                                        rende program-funktioner (PF1, PF2,
                                        ..., PF9); se også 3.3. 
                                         
                                         
3_._3_ _ _ _ _ _ _ _A_t_t_e_n_t_i_o_n_-_t_a_s_t_e_r_ 3.3
           
          Anvendelsen af attention-tasterne afhænger helt af det givne
          applikationssystem. Her følger en liste med tasterne: 
           
          SELCT (taste/indikator)       Select (= vælge/udpege) 
          CLEAR                         (= slette) 
          PA                            Program Access (= program valg/til-
                                        gang) 
                    P_A_1_,_ _P_A_2_,_ _._._._,_ _P_A_5_: Disse taster er indeholdt i tasta-
                                        turets layout. 
                   P_A_6_,_ _P_A_7_,_ _._._._,_ _P_A_1_0_: Brug SHIFT tasten sammen med PA1,
                                        PA2, ..., PA5 for at opnå henholds-
                                        vis PA6, PA7, ..., PA10. 
          USM (taste/indikator)         Unsolicited Message (= uopfordret
                                        meddelelse fra værtsdatamat) 
          PF                            Program Function (= program funk-
                                        tion) 
                    P_F_1_,_ _P_F_2_,_ _._._._,_ _P_F_9_: Brug SHIFT tasten sammen med de
                                        numeriske taster 1, 2, ..., 9 i d_e_n_
                                        n_u_m_e_r_i_s_k_e_ _t_a_s_t_a_t_u_r_b_l_o_k_ for at opnå
                                        henholdsvis PF1, PF2, ..., PF9. 
                 P_F_1_0_,_ _P_F_1_1_,_ _._._._,_ _P_F_1_4_: Disse taster er indeholdt i tasta-
                                        turets layout. \f

          CURSR SELCT                   Cursor Select (= cursor lyspen
                                        valgbar) 
          PRINT (taste/indikator)       (= udskrift) 
          ESC                           Escape (= undslippe) 
          RESET                         (= nulstille/genstarte) 
          SEND                          (= afsende) 
 
                                         
         3_._4_ _ _ _ _ _ _ _R_e_d_i_g_e_r_i_n_g_s_t_a_s_t_e_r_ 3.4
           
          Disse taster benyttes til flytning af cursor og til redigering af
          data. Den konkrete måde disse taster anvendes på, afhænger af
          programmelsystemet og er beskrevet i applikationsvejledningerne.
          Her følger en liste med tasterne: 
           
          -> 
          <- 
          -> 
          <- 
           
           
           
          <- 
          TEGN IND (taste/indikator) 
          LINIE IND 
          FM                            feltmærkning 
          DUP                           duplikering 
          SLET TEGN 
          SLET LINIE 
          SLET FELT 
          SLET DATA 
          MARKER 
          FLYT 
           
           \f

F_       4_._ _ _ _ _ _ _ _ _B_E_T_J_E_N_I_N_G_                                                        4.
           
          Meddelelser fra RC855 systemet, der kan forekomme under betje-
          ningen, vises i statuslinien. Begyndelsespositionen for en
          meddelelse indikerer, hvilken slags meddelelse, der er tale om: 
           
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _x_x_x_._._._ _ _ _ _ _ _x_x_x_._._._ _ _ _ _ _ _ _ _ _ _ _ _ _ _x_x_x_._._._ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _x_x_ _ 
           1)          2)                  3)                      4) 
           
          1) meddelelser med relation til systemidentifikation og -status;
             se også applikationsvejledninger. 
          2) meddelelser med relation til udskrivningsaktiviteter; se  
             applikationsvejldninger. 
          3) meddelelser med relation til kommunikation med værtsdatamat og
             internt i klynge; se applikationsvejledninger. 
          4) statusmeddelelser under programindlæsningsfasen. 
           
           
4_._1_ _ _ _ _ _ _ _S_t_a_r_t_ _o_g_ _g_e_n_s_t_a_r_t_ 4.1
           
          Strømmen tændes/slukkes med POWER ON/OFF kontakten på bagpanelet.
           
          En genstart (reset) følger hver gang strømmen tændes samt hver
          gang RESET kontakten på bagpanelet aktiveres. Samme virkning kan
          i forbindelse med nogle programmelsystemer opnås ved at benytte
          tasterne CTRL CLEAR, når programmelsystemet arbejder. 
           
          Efter en (gen)start aktivering udføres den indbyggede selvtest.
          Når selvtesten er afsluttet, vises følgende meddelelse: 
           
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _R_C_8_5_5_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           
          Dermed indikeres, at der ikke er sporet nogen fejlfunktioner. 
           \f

                   Hvis der opspores en fejlfunktion, vil en af de følgende meddel-
          elser blive vist i ca. 10 sek., hvorefter en ny programindlæsning
          forsøges: 
           
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _R_C_8_5_5_ _c_h_e_c_k_s_u_m_ _e_r_r_o_r_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _R_C_8_5_5_ _m_e_m_o_r_y_ _e_r_r_o_r_ _<_a_d_r_e_s_s_e_>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           
          Såfremt der opspores en fejl, tilkaldes en servicetekniker (notr
          en eventuel <adresse> information, idet en sådan vil være nyttig
          i fejlfindingsarbejdet). 
           
           
4_._2_ _ _ _ _ _ _ _P_r_o_g_r_a_m_i_n_d_l_æ_s_n_i_n_g_ 4.2
           
          Efter afslutning af selvtesten vil RC855 fortsætte med indlæsning
          af programmel til arbejdslageret, hvor det skal være indlæst for
          at kunne udføres. 
           
          Programmelsystemerne fås enten til indlæsning fra en tilkoblet
          diskettestation eller fra et internt lagerkort. 
           
          Skal programmellet indlæses fra en diskettestation, skal denne
          tilkobles og tændes. Systemdisketten (normalt CP/M operativsyste-
          met) sættes i og diskettestationens låge lukkes. Kort efter vises
          systemets response (system prompt = særligt tegn der angiver, at
          systemet er rede til fortsættelse af betjeningsforløbet), hvilket
          indikerer, at andre programmer nu kan indlæses. De konkrete be-
          tjeningsforløb i indlæsning og start af applikationsprogrammer
          fra diskette findes beskrevet i installations- og brugervejled-
          ninger til programmellet. 
           
          Skal programmellet indlæses fra det interne lagerkort, sker dette
          automatisk efter afslutningen af selvtesten. 
           \f

                   De enkelte faser af progamindlæsningen kan overvåges ved hjælp af
          statusmeddelelser. De to tegn yderst til højre i statuslinien
          angiver forløbet og skal forstås som følger: 
           
          LI: indlæsning fra internt lagerkort 
          LD: indlæsning fra diskette (vises i tre faser) 
          SA: valg af applikation; på dette trin kan indlæsningsproceduren
              afbrydes ved at trykke på mellemrumstangenten og et alterna-
              tivt program kan indlæses fra disketten 
          LA: indlæsning af applikation; det aktuelle applikationsprogram
              indlæses 
               
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _R_C_8_5_5_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<_x_x_>_ _ 
           
          Opstår der en fejl under indlæsningen af programmellet, vises en
          af følgende meddelelser: 
           
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _R_C_8_5_5_ _L_O_A_D_ _S_T_A_T_U_S_:_ _<_f_e_j_l_å_r_s_a_g_>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<_x_x_>_ _ 
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _R_C_8_5_5_ _L_O_A_D_ _S_T_A_T_U_S_:_ _d_i_s_k_e_t_t_e_ _e_r_r_o_r_ _-_ _<_f_e_j_l_å_r_s_a_g_>_ _ _ _ _ _ _ _<_x_x_>_ _ 
           
          <_f_e_j_l_å_r_s_a_g_>_                              <_x_x_>_ 
          hard error                               LI 
          time out                                 LD 
          checksum error                           SA 
          deleted data encountered                 LA 
          recalibrate time out 
          recalibrate status 
          read-id error 
          seek error 
          seek time out 
          read status 
          fdc error 
           \f

                   Når gentagne forsøg på indlæsning af programmel fra diskette mis-
          lykkes, så prøv med en anden diskette (hvis muligt). Mislykkes
          indlæsningen fortsat, tilkaldes en servicetekniker (notr eventu-
          elle informationer fra <fejlårsag> og <xx> felterne, idet sådanne
          vil være nyttige i fejlretningsarbejdet). 
           
          Når der indlæses fra diskette, vises meddelelsen: 
           
           _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           _R_C_8_5_5_ _-_ _I_n_s_e_r_t_ _d_i_s_k_e_t_t_e_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
           
          - hvis diskettestationen ikke er tilkoblet eller tændt; - hvis
          der ikke er sat en diskette i, eller lågen ikke er lukket. Kon-
          trollr diskettestation og ret fejlen. 
           
           
4_._3_ _ _ _ _ _ _ _P_r_o_g_r_a_m_m_e_l_b_e_t_j_e_n_i_n_g_ 4.3
           
          Efter indlæsning af et programmelsystem, vises en identifikati-
          onsmeddelelse for det givne programmelsystem. 
           
          Den videre betjening af programmellet er beskrevet i betjenings-
          vejledninger og øvrig dokumentation gældende for de konkrete sy-
          stemer. 
           
           \f

F_       A_._ _ _ _ _ _ _ _ _R_E_F_E_R_E_N_C_E_R_ A.
           
          1  RCSL Nr. 42-i2048: 
               RC855 Konfigurationsvejledning 
                
          2  RCSL Nr. 42-i2047: 
               RC855 Installationsvejledning 
                
          -  Forskellig programmel-relateret dokumentation: 
                
               RCSL Nr. 42-i1826: 
               RC855 IBM 3270 BSC Emulator, Installation Guide 
                
               RCSL Nr. 42-i2041: 
               RC855 IBM 3270 BSC Emulator, Betjeningsvejledning 
                
               RCSL Nr. 42-i1692: 
               RC855 IBM 3780 BSC Emulator, Users Guide 
                
               RCSL Nr. 42-i1700: 
               RC855 CP/M Work Station, Users Guide 
                \f

F_           
           \f

«eof»