|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - download
Length: 100992 (0x18a80)
Types: TextFile
Names: »D103«
└─⟦2520239fd⟧ Bits:30005867/disk13.imd Dokumenter (RCSL m.m.)
└─⟦this⟧ »D103«
i
C_O_N_T_E_N_T_S_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _P_A_G_E_
1. INTRODUCTION ........................................ 1
2. CORRECTIONS ......................................... 2
A_P_P_E_N_D_I_X_:
A. REFERENCES .......................................... 46 \f
ii \f
1_._ _ _ _ _ _ _ _ _I_N_T_R_O_D_U_C_T_I_O_N_ 1.
This manual describes corrections to the first edition of the RC
BASIC PROGRAMMING GUIDE (RCSL No 42-i 0671).
Some corrections are due to printing errors, most of the changes
are, however, a consequence of new features that have been
implemented in the RC BASIC system.
The most important new features are:
- STRING ARRAYS: It is now possible to work with two-dimensional
strings.
- LOWBOUND: The lower bound of arrays can be set to zero or one.
- RESET: The effect of an ON ERR/ESC-statement can be cancelled.
- IMPROVED FILE SYSTEM: On systems with moving head disc,
subcatalogs are used instead of logical discs. Several users
can have write-access to the same logical disc/subcatalog, and
one logical disc/subcatalog can be used as a program-library
accessable from all terminals.
- LOGON/LOGOFF: On configurations with some kind of disc, the
system will make an attempt to load a program from the disc
when a terminal is logged on/off. This makes it possible for
the user to implement an account-system.
- PROTECT: It is possible (by means of the above mentioned
facility) to prevent a user from changing subcatalogs, saving
programs into existing files etc.
- CALL ROUTINES: It is now possible to call assembler-coded
subroutines from RC BASIC programs.
- EXTENDED PRECISION: The system can be delivered with extended
precision-arithmetic corresponding to 10 decimals digits in\f
output. The number of digits to be output can be defined by the
user by means of the DIGITS-statement.
Many of the corrections in this manual have been described in the
previous manuals: "Corrections (no 1 (2)) to the RC BASIC
Programming Guide", RCSL No 43-GL6940 (7914) which are replaced
by the present manual.
Changes or new information are marked with a vertical bar in the
margin.
Most of the corrections are mentioned by a page number and a line
number. A positive line number means that lines should be counted
from the top of the page, a negative line number means that lines
should be counted from the buttom.
With these corrections included, the Programming Guide
corresponds to rev. 02.00 of the RC BASIC System.
\f
F_2_._ _ _ _ _ _ _ _ _C_O_R_R_E_C_T_I_O_N_S_ 2.
In the list of reserved words on the second page:
word use section
CALL S App. H
DIGITS C,S 3.6.A
LOWBOUND C,S 9.10.A
PROTECT C,S 3.26.A
RESET C,S 3.30.A
CONTENTS, Last page, replace line -3 by:
G LOGON/LOGOF FUNCTIONS.
CONTENTS, Last page, insert after line -2:
I EXTENDED PRECISION IN RC BASIC.
Page 13, insert after line -6:
<subcatname': The name of a subcatalog.
Page 17, line 4:
The lower bound of a dimension is usually 1, it may,
however, be set to 0 by means of the LOWBOUND statement
(see Ch. 9).
Page 17, line 10:
32 767 -' 16 380.
Page 21, line -5 through -1:
1. A string variable, e.g. ANSWER
2. An element of a string array, e.g. TEXT(5) \f
3. A part of a string variable or a part of an element of a
string array.
4. A string literal, e.g. "PETER"
5. The CHR(X) function, e.g. CHR(65)
6. A concatenation of the above items, e.g. "JOHN SMITH",
ADDRESS
Page 22, line -7:
block -' blocks.
Page 25, line -10, -8, -6:
0250 LET MONTH="OCTOBER"; DAYS=31
0270 LET MONTH="NOVEMBER"; DAYS=30
0290 LET MONTH="DECEMBER"; DAYS 31
Page 29, line 6 through 9:
2. If the SAVEd program is on disc, the system searches the
logical disc/subcatalog to which the terminal is con-
nected for <filename' (see Ch.8). If <filename' is not
found then the system searches for a logical disc called
LIB and if this is found then a search is made in this
logical disc for <filename'. If <filename' is not found,
the system outputs the error message 0100: FILE UNKNOWN.
Page 29, line 12 and 13:
The statement: "If <filename' is not found ..." should be
deleted.
Page 29, insert after line -12:
7. When the CHAINed program is executed, it is done without
clearing the state of the program. This means that all
variables have the values they had, when the program was\f
SAVEd. If a CHAINed program should be executed as if the
user had started it by means of the command RUN, then
the user must bring the program into "neutral" state be-
fore it is SAVEd:
1 stop ; insert STOP as the first
statement
RUN ; execute the program
1 ; delete STOP-statement
SAVE "<filename'" ; SAVE the program
Page 30, insert after line -4:
4. The number of items in each DATA-statement is limited.
Each list may contain 22 (in extended precision systems
15) numeric items. If the list contains string elements
the maximal number of items depends on the length of the
strings.
If the list has too many elements, error message no.
0009: LINE TOO LONG will be output when the DATA-state-
ment is entered.
Page 31, line -3:
more that -' more than.
\f
F_ Page 33, insert after line 14:
3.6A DIGITS
F_o_r_m_a_t_
DIGITS = <expr'
<expr': a numeric expression which evaluates to an
integer, 1 <= <expr' <= 10.
U_s_e_
As a statement or command to define the maximal number of
digits output in PRINT-statements in systems with extended
precision arithmetic.
R_e_m_a_r_k_s_
1. The default value of DIGITS is 6.
2. The statement/command has no effect in systems with
normal precision arithmetic.
3. If <expr' evaluates to a number smaller than 1 or
greater than 10, DIGITS is set equal to 1 respectively
10.
4. For further remarks, see appendix I.
\f
F_ Page 33, line -12 through -1:
<svar'(<l') <svar'(<l')
DIM <sarray'(<n',<l') , <sarray'(<n',<l')...
<array'(<m') <array'(<m')
<array'(<row',<col') <array'(<row',<col')
<svar': a string variable
<l': a numeric expression, which evaluates to the
length of a string variable or the length of each
element in a string array.
<sarray': a string array name.
<n': a numeric expression, which evaluates to the num-
ber of elements in a string array.
<array': an array name
<m': a numeric expression, which evaluates to the num-
ber of the last element in a one-dimensional ar-
ray.
<row': a numeric expression, which evaluates to the num-
ber of the last row in a two-dimensional array.
<col': a numeric expression, which evaluates to the num-
ber of the last column in a two-dimensional ar-
ray.
Page 34, line 1 through 4:
U_s_e_
As a statement or command to define explicitly the size of
one or more numeric variable arrays, string variables or
string arrays. (For the dimensioning of string variables,
see Chapter 5).
\f
F_ Page 34, line 15:
1 <= value -' 0 <= value
Page 34, line -8:
Less than 1 -' less than the lower bound
(as defined by means of the LOWBOUND-statement, see Chapter
9.)
Page 35, line -9:
32767 -' 16380
Page 54, insert after line -13:
3.18A: LOWBOUND
For description, see Chapter 9.
Page 55, insert after line 8:
3. Execution of a RESET ERR statement (see sect. 3.30A)
will restore normal error action.
Page 56, insert after last line:
6. Execution of a RESET ESC statement (see sect. 3.30A)
will restore the normal ESCape key function.
\f
F_ Page 73, insert after line -3:
3.26A PROTECT
F_o_r_m_a_t_
PROTECT = <expr'
<expr': a numeric expression specifying a
protection mask.
U_s_e_
As a statement or command to protect certain statements or
commands from being executed on the terminal. An attempt to
execute a protected facility will cause an error message to
be output.
R_e_m_a_r_k_s_
1. Protection codes:
1. PROTECT
2. CONNECT
4. RELEASE
8. COPY
16. COPY to existing file
32. LIST in existing file
64. SAVE in existing file
2. If PROTECT=1 has been executed, the protection-mask
cannot be changed. The mask will be cleared when the
terminal is logged off.
3. The PROTECT statement is especially useful in LOGON-pro-
grams. For further details see APP. G.
\f
E_x_a_m_p_l_e_
PROTECT = 1+2+4
The CONNECT and RELEASE statements and commands cannot
be executed on the terminal.
\f
F_ Page 79, insert after line 19:
3.30A RESET
F_o_r_m_a_t_
ESC
M_ RESET
ERR
P_
U_s_e_
As a statement to cancel the effect of an ON-ESC or
ON-ERR statement.
R_e_m_a_r_k_s_
1. After execution of a RESET statement the normal
action is restored.
See ON-ERR, sect. 3.20 and ON-ESC, sect. 3.21.
\f
m_ Page 92, line -10:
2 16 -' 2 15
Page 103, insert after line -13:
5.1.8 S_t_r_i_n_g_ _a_r_r_a_y_s_
The array-concept can be used in connection with
strings. Dimensioning of a string array is accomp-
lished by means of the DIM statement, (see Chapter
3), for example:
DIM TEXT(20,40)
The string array TEXT consists of 20 string-elements
each 40 characters long. The i>th element can be re-
ferenced as TEXT(i). TEXT(i,j) is a reference to
the j>th character in the i>th element, and
TEXT(i,j,k) points our character number j through k
in the i>th element of the string array.
The lower bound of a string array (i.e. the number of
the first element) is usually 1. By means of the LOW-
BOUND-statement (see Chapter 9) the lower bound may,
however, be set to zero. The first character in a
string element will always be number 1.
E_x_a_m_p_l_e_ C_o_m_m_e_n_t_
0010 TAB=4 The 5 names are
0020 DIM NAME(5,8) stored in the string
0030 LEFT I=1 array NAME
0040 REPEAT
0050 READ NAMES (I)
0060 LEFT I=I+1
0070 UNTIL I'5
0080 FOR I=1 TO 5
0090 PRINT NAME(I)
0100 NEXT I
0110 DATA "PETER,"JOHN","ROBERT","ROBERTA","DIANA"
p_ PETER JOHN ROBERT ROBERTA DIANA \f
E_x_a_m_p_l_e_ C_o_m_m_e_n_t_
0010 DIM TEXT(6,5)
0020 FOR I=1 TO 6
0030 LET TEXT(I)="TEXT",CHR(48+I)
0040 NEXT I
0050 FOR I=6 TO 2 STEP -1
0060 PRINT TEXT(I) print string element 6 to 2
0070 NEXT I
0080 FOR I=1 TO 5
0090 PRINT TEXT(1,I); print string element 1, cha-
0100 NEXT I racter by character
0110 PRINT
0120 PRINT TEXT(2,3,LEN(TEXT(2))) print string element 2,
from character no. 3.
TEXT6
TEXT5
TEXT4
TEXT3
TEXT2
TEXT1
XT2
\f
F_ Page 108, insert after line 1:
If the lower bound of arrays has been set to zero (by
means of the LOWBOUND-statement, see Chapter 9), then
MATRIXA will have 11 rows (no. 0 through 10) and 21 columns
(0 through 20).
Page 124, line 1 and 2:
7. Logical Discs/Subcatalogs and Related Commands.
7.1. Introduction.
7.1.1. Logical Discs.
Page 126, line 5:
protection key -' protection key ('0)
\f
F_ Page 126, insert before line 14:
7.1.2. Subcatalogs.
The logical discs described in Sect. 7.1.1. are always used
on systems with flexible discs. On systems with moving-head
disc (systems running under the DOMUS operating system) RC
BASIC will usually use s_u_b_c_a_t_a_l_o_g_s_ in stead of logical
discs. The subcatalogs can be considered as being a part of
the DOMUS system, and therefore they will not be described
in this manual. The reader is referred to ref. 1 and 2.
Once a subcatalog has been created (by means of the DOMUS
utility program SUBCA, see ref. 1) it may from the BASIC-
users point of view be looked at as a logical disc, except
for a few minor differences that will be mentioned in the
following:
- The name of a subcatalog consists of max. 5 characters.
- The name of a file contained in a subcatalog consists of
max. 5 characters.
- A subcatalog does not have a fixed size. Files may be
created within the subcatalog as long as there is space
on the disc holding the subcatalog.
- The INIT-, LOCK- and USERS-command (Sect. 7.4, 7.5 and
7.8) are blind, i.e. they have no effect when used in
subcatalog-systems.
- The concept "exclusive user" does not exist in connection
with subcatalogs. When a user connects his terminal to a
subcatalog and he specifies a correct protection key, he
will be allowed to perform all kinds of operations on the
files contained in the subcatalog. This does not mean,
that other users are excluded from the actual subcata-
logs. In other words: all users may perform all kinds of\f
operations at the same time. It is, however, not possible
for two or more users to write into or delete the same
file at the same time.
- If a subcatalog does not have a protection key, a user is
allowed to perform a_l_l_ operations (including "DELETE")
if he knows the name of the subcatalog.
- The main catalog of the system can be looked at as a sub-
catalog named CAT with protection key equal to zero. If a
user has not connected his terminal to a subcatalog, he
will be connected to CAT. The user is then allowed to
r_e_a_d_ all files described in CAT, but he may only c_h_a_n_g_e_
files, that have been created from BASIC. This means,
that all system-files are protected against destruction.
\f
F_ Page 126, line -10:
R_e_m_a_r_k_s_ _(_l_o_g_i_c_a_l_ _d_i_s_c_-_s_y_s_t_e_m_s_)_
1. If the user CONNECT>s to a logical disc which has a pro-
tection key (<'0) without specifying this, he may only
read from the logical disc.
2. If the user specifies a protection key (<'0) and the va-
lue is correct, he becomes the exclusive user of
<ldname' and may now write to as well as read from
<ldname', whereas no other user may connect his terminal
to <ldname'.
3. If a CONNECT-command is given from a termimal which is
already connected to a logical disc, a RELEASE-command
(see Sect. 7.7) will automatically be executed.
4. If the protection key of a logical disc is equal to
zero, this logical disc can be used by s_e_v_e_r_a_l_ _u_s_e_r_s_ _a_t_
t_h_e_ _s_a_m_e_ _t_i_m_e_. The users will be able to CREATE, RENAME,
read from and write to files on the logical disc, if
they do not specify a protection key when CONNECTing. If
a file is to be DELETE>d, this can only be done by a
user, who is exclusive user of the logical disc. One be-
comes exclusive user of a logical disc with protection
key e_q_u_a_l_ to zero by specifying any protection key n_o_t_
e_q_u_a_l_ to zero when CONNECTing.
The following table shows which kind of access the user
will have depending on the protection key of the logical
disc and the key specified in the CONNECT-command.
\f
F_ T_ Key specified in
CONNECT-
command =0 '0
Protec- i.e. no key
tion key of
_t_h_e_ _l_o_g_i_c_a_l_ _d_i_s_c_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
W_r_i_t_e_-_a_c_c_e_s_s_: E_x_c_l_u_s_i_v_e_ _u_s_e_:
=0 all kind of access all kind of ac-
is allowed except cess is allow-
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _D_E_L_E_T_E_ _ _ _ _ _ _ _ _ _ _ _ _ _ _e_d_ _ ____________
'0 R_e_a_d_-_a_c_c_e_s_s_ onlyE_x_c_l_u_s_i_v_e_ _u_s_e_:_
all kind of ac-
cess is allowed.
&_
R_e_m_a_r_k_s_ _(_s_u_b_c_a_t_a_l_o_g_-_s_y_s_t_e_m_s_)_
1. If the user CONNECT>s to a subcatalog which has a pro-
tection key (<'0) without specifying this, he may only
read from files contained in the subcatalog.
2. If the user specifies a protection key and the value is
correct, he is allowed to perform all kinds of opera-
tions on files contained in the subcatalog.
3. If a CONNECT-command is given from a terminal which is
already conncted to a subcatalog, a RELEASE-command (see
Sect. 7.7) will automatically be executed.
4. If a subcatalog does not have a protection key, a user
is allowed to perform all kinds of operations on files
contained in the subcatalog, if he CONNECT>s to the sub-
catalog. \f
T_ The following table shows which kind of access the user
will have depending on the protection key of the subcatalog
and the key specified in the CONNECT-command.
Key specified
in CONNECT- =0 '0
Protec- command i.e. no key
tion key of
t_h_e_ _s_u_b_c_a_t_a_l_o_g_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
=0 all kinds of all kinds of
access is access is
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _a_l_l_o_w_e_d_ _ _ _ _ _ _ _ _ _ _a_l_l_o_w_e_d_ _ _ _ _ _ _
'0 read-access all kinds of
only access is
allowed (if
the key is
correct)
&_ \f
F_ Page 127-132:
<ldname' -' <ldname'/<subcatname'
logical disc -' logical disc/subcatalog
Page 127, line 14:
user"s -' user>s
Page 127, line -11:
1. A file can be copied to a logical disc/subcatalog only
if the user has write-access to the files of that
logical disc/subcatalog (see Sect. 7.2).
Page 128, insert after line -12:
4. The INIT-command has no effect in subcatalog-systems.
Page 129, insert after line 13:
5. The LOCK-command has no effect in subcatalog-systems.
\f
m_ Page 130, Remarks to LOOKUP.
Remarks 1-6 only applies to logical-disc systems.
In subcatalog-systems the listing of files will look as
follows: (The headings will only be printed, if the LOOKUP
"LPT" form of the command is used).
NAME ATTRIBUTE LENGTH INDEX RLENGTH LBYTE LBLOCK SEQ
RECSIZE NO.REC RAN
PROG1 ........V 3 576 6 133 3 S
DATA1 ........F 7 666 12 80 42 R
LENGTH, INDEX and RLENGTH are usually of no interest for the user
of BASIC. For further information, see ref. 2.
NAME: The name of file.
ATTRIBUTES:
V: The file is extendable.
F: The file has a fixed length i.e. it
is not extendable.
LENGTH: The length of the file.
INDEX: The number of the sector, where the
indexblock of the file is placed.
RLENGTH: The reserved length of the file.
LBYTE: (sequential files). The number of
bytes used in the last block written.
LBLOCK: (sequential files). The number of
the last block written.
RECSIZE: (random access files). The length (in
bytes) of the record.
NO.REC: (random access files). The number of
records in the file.
SEQ/RAN:
S: a sequential file.
R: a random access file.
Only the files that have been created from BASIC will be
listed although other files will be accessable for read-
p_ ing.
\f
F_ Page 132, insert after line 6:
3. The USERS-command has no effect in subcatalog-systems.
Page 133, line 6:
L_o_g_i_c_a_l_ _d_i_s_c_s_ -' l_o_g_i_c_a_l_ _d_i_s_c_s_/_s_u_b_c_a_t_a_l_o_g_s_.
Page 133-150:
Logical disc -' logical disc/subcatalog.
Page 133, insert after line -10:
Serial printer (SP)
Page 134, line 2-4:
In logical disc-systems a RC BASIC file comprises a number
of consecutive blocks in a logical disc. Each file is de-
scribed separately by an entry in the subcatalog of the lo-
gical disc (see Sect. 7.1). In subcatalog-systems an RC
BASIC file consists of a number of s_l_i_c_e_s_ that can be pla-
ced anywhere on the disc. A slice is a number of consecu-
tive blocks; the number depends on how the DOMUS-disc has
been generated, but it is usually 6 (see also ref. 2.)
Page 134, line 6:
Logical disc -' logical disc/subcatalogs.
Page 134, line 13-14:
In logical disc-systems the name consists of 1 to 8 charac-
ters, and in subcatalog-systems 1 to 5 character. Only cha-
racters with decimal values between 32 and 127 (see appen-
dix D) are legal. \f
Page 135, line 13 and
Page 137, line -16 and
Page 149, line 2:
Replace "correctly specified the protection key of the lo-
gical disc/subcatalog in the CONNECT-command" by
"has write-access to the files of the logical disc/subcata-
log to which the terminal is connected"
Page 135:
Replace lines -5 through -3 by
A discfile can only be CREATEd, RENAMEd or written into if
the user has write-access to the logical disc/subcatalog
(see Chapter 7, CONNECT).
A discfile can only be DELETEd if the user is exclusive
user of the logical disc/subcatalog.
\f
F_ Page 137, line 4:
<filename': the name of the disc file to be created, ex-
pressed as a string literal or by means of a
variable. In logical disc-systems the name con-
sists of 1 to 8 characters, and in subcatalog-
systems 1 to 5 character. Only characters with
decimal value between 32 and 127 (see appendix
D) are legal.
Page 137, line -9 - -1:
3. In subcatalog-systems a file that is created with size
equal to 0 will be extendable. This means that the file
will be extended if the user writes more data into the
file, than can be held in the blocks actually allocated
to the file. If <size' is '0 the length of the file will
be fixed, i.e. the file can not be extended.
4. In logical disc-system a file that is created with
<size' equal to 0 will be given a length corresponding
to the number of free blocks in the logical disc. The
file can then be used for output, and when it is CLOSEd
(see Sect. 8.2), the system will truncate it. No more
than one file (in logical disc-systems) created with
<size' equal to 0 can be used, unless the files in
question have already been CLOSEd once.
5. <size' must be positive, if the file is a random access
file.
\f
F_ Page 138, line 1:
5 -' 6
Page 138, line 7:
6 -' 7
Page 138, line -5 through -3:
1. A file can be deleted only if the user is exclusive user
of the logical disc containing the file to be deleted
(see Chapter 7, CONNECT).
Page 138, DELETE:
Remarks 1-3 only applies to logical disc-system. In sub-
catalog-systems a file can be deleted, if the user has
write-access to the subcatalog.
Page 143, line 5:
mode 0 or 3 -' mode 0, 2 or 3.
Page 149, line -13:
mode 0 or 3 -' mode 0, 2 or 3.
Page 160, line -8 and
Page 170, line -3:
disc file -' disc file (only possible if the user has
write-access to a logical disc/subcatalog).
\f
Page 161, insert after last line, and
Page 170, insert after line 5:
3. If the SAVEd program is on disc, the system searches the
logical disc/subcatalog to which the terminal is connected
for <filename' (see Chapter 8). If <filename' is not found
then the system searches for a logical disc/ subcatalog
called LIB and if this is found then a search is made in
this logical disc/subcatalog for <filename'. If <filename'
is not found, the system outputs the error message 0100:
FILE UNKNOWN.
\f
F_ Page 162, insert before line 5:
9.10A LOWBOUND
F_o_r_m_a_t_
LOWBOUND=<expr'
<expr': a numeric expression which evaluates
to 0 or 1
U_s_e_
As a command or statement to change the lower bound
of numeric and string arrays.
R_e_m_a_r_k_
1. The default lower bound is 1 (i.e. the number of
the first element in an array is one). By means of
the LOWBOUND-statement the lower bound may, how-
ever, be set to zero.
2. If lowerbound is zero, the row and column no. zero
is included in all matrix-operations.
3. The LOWBOUND-statement can be placed anywhere in
an RC BASIC program. Each time an array element is
referenced the current lower bound will be taken
as the first element of the array.
\f
F_ E_x_a_m_p_l_e_ C_o_m_m_e_n_t_
0010 LOWBOUND =1
0020 DIM A(5)
0030 FOR I=1 TO 5
0040 LET A(I)=I
0050 NEXT I
0060 FOR I=1 TO 5 lower bound of A-array is 1
0070 PRINT A(I);
0080 NEXT I
0090 LOWBOUND =0
0100 DIM B(5)
0110 PRINT
0120 FOR I=0 TO 4 now lower bound of A-array is 0
0130 PRINT A(I)
0140 NEXT I
0150 PRINT
0160 FOR I=0 to 5 B-array has 6 elements (0 to 5)
0170 PRINT B(I);
0180 NEXT I
1 2 3 4 5
1 2 3 4 5
0 0 0 0 0 0
Page 165, line 3, 8 and 9:
NUL -' STX
\f
F_ N_e_w_ _E_r_r_o_r_ _M_e_s_s_a_g_e_s_ _(_p_a_g_e_ _1_7_6_-_1_8_7_)_
0047: PARAMETER ERROR
The actual parameters used in a call of an assembler-coded
subroutine do not correspond to the formal parameters as
specified in the subroutine.
0049: FACILITY PROTECTED
The statement or command is protected and cannot be
executed at the terminal.
0090: USER CALL ERROR 1
0091: USER CALL ERROR 2
These messages can be used by the programmer of assembler-
coded subroutines if an error is detected during the exe-
cution of the subroutine.
0098: PAGING ERROR.
This error will only occur on a system running under the
DOMUS-operating system. The reason is, that (part of) the
virtual storage cannot be read from the disc. The user>s
current program is destroyed. If the error occurs regularly
the reason is probably malfunctioning hardware.
0099: STACK OVERFLOW.
A stack overflow may occur, if the user has recursive
functions or procedures in his program, for instance 10 DEF
FNA(X) = FNA(X). If this is not the reason, then please
contact RC.
No 0105, 0110, 0115:
LD -' LD/SUBCATALOG
0160: CATALOG I/O ERROR
Some kind of inconsistence was discovered in the catalog.
Contact RC.
\f
0161: SUBCATALOG UNKNOWN
The user attempted to connect his terminal to a subcatalog
which does not exist or to which no link has been made (see
ref. 1).
0165: DISC WRITEPROTECTED
An attempt has been made to write data on a (flexible) disc
which is writeprotected.
0166: ILLEGAL OPERATION
1) A wrong protection key was specified or
2) The disc-unit containing a subcatalog has not been
initialized or
3) An attempt has been made to connect to a file which
is not a subcatalog.
0167:
This error message means that NO FREE AREAPROCESSes are a-
vailable for the time being (see ref. 3 and 2). As er-
ror messages are fetched from a discfile, and as this ope-
ration requires an areaprocess, the text cannot be fetched.
Therefore the text that is written in connection with error
no. 0167 is random.
0172: INDEXBLOCK FULL
In connection with each file an indexblock is used. This
indexblock can be filled up, if a file is very large.
Usually the disc must be reorganized.
0180: Same as 0160
0181: DISC OFF-LINE
An attempt has been made to access a disc, which was not
ON-LINE.
0185: Same as 0165.
\f
0186: ILLEGAL OPERATION ON FILE
The file is reserved by another user i.e. by a program
running simultaneously with the BASIC-system.
0187: DISC FULL
The disc on which a file is created or extended is full.
0192: Same as 0172.
As it can be seen, many of the messages 0160-0172 and 0180-0192
are alike each other. In general it can be said, that errors
0160-0172 occur in connection with operations on (sub)catalogs,
while 0180-0172 occur in connection with operations on files.
Page 189, line 5:
Disc write-protected -' Skip block
\f
F_ Page 211:
Insert DIGITS, LOWBOUND, PROTECT and RESET as reserved
words.
Page 212, insert after line 4:
<var'
<svar' <svar'
CALL , <mvar' ... H
<slit' <sarray'
<slit'
<expr'
Invokes the execution of anSTATEMENT
assembler-coded subroutine.
Page 213, insert before line 4:
DIGITS = <expr' 3.6A
Specifies the maximal number digits STATEMENT
output in PRINT-statements in systems or COMMAND
with extended precision.
Page 213, line 4 through 8:
<svar' (<l') <svar' (<l') 3.7
DIM <sarray' (<n',<l') , <sarray' (<n',<l')
<array' (<m') <array' (<m')
<array' (<row',<col') <array' (<row',<col')
Defines the size of string variables, STATEMENT
string arrays or numeric arrays. or COMMAND
\f
Page 215, insert after line -10:
PROTECT = <expr' 3.26A
Protects certain statements and commands so STATEMENT
that they cannot be executed at the terminal.
M_ Page 216, insert after line 12:
P_ ERR
RESET 3.30A
ESC
Restores normal function of the ESCape key and STATEMENT
normal error action. or COMMAND
Page 225, insert efter line -5:
LOWBOUND = <expr' 9.10.A
Sets the lower bound of arrays COMMAND or
to 0 or 1 STATEMENT
\f
F_ Page 228:
G LOGON/LOGOF Functions.
The LOGON/LOGOF functions are implemented to enable the
user to write his own programs to be invoked in the log on
and log off situations, thus facilitating e.g. pass-word
control, accounting and "hot-news".
When the terminal is logged on, the system searches for a
program-file named "LOGON". In logical disc-systems the
search is made on the logical disc "LIB". In subcatalog-
systems the search is made on the maincatalog, and if the
file is not found, a new search is made in the subcatalog
"LIB".
If the file is found, the program is loaded and executed
automatically before the text "REV. XX.XX READY" is output.
When the terminal is logged off (i.e. the BYE-statement is
executed) the system will in the same way search for a
program named "LOGOF". The program will, if it is found, be
loaded and executed before the terminal is logged off.
The LOGON/LOGOF programs are ordinary BASIC programs
written by the user himself. When writing the programs,
some statements are particularly useful:
- In order to make it impossible for the user at the ter-
minal to interrupt the programs by pressing the ESC-key,
the first statement (which will always be executed)
should be an ON ESC-statement, as shown in the example.
- The PROTECT-statement (see sect. 3.26A) makes it possible
to protect certain statements from being executed from
the terminal. If for instance the user is allowed to
access one specific logical disc/subcatalog only, the\f
user can be connected to that logical disc/subcatalog by
means of a CONNECT-statement in the LOGON-program, and
the CONNECT- and RELEASE-statements can then be protec-
ted.
- The last statement executed in the LOGON-program should
be NEW. This will make it impossible for the user at the
terminal to study the program (it may contain passwords
and/or filenames which the user should not know).
- By using some of the SYS-functions it is possible to make
the LOGOF-program write information about how long time
the user has spend at the terminal into a discfile. An
account system is very easy to implement, if the LOGON
program outputs information such as username, terminal
number (SYS(4)), date and time (SYS(1-3), (11-13)) into a
discfile. The LOGOF program may then output terminal
number, date and time and/or time used (SYS(5)).
W_A_R_N_I_N_G_:
The LOGOF-program should not contain a BYE-statement, as
execution of this statement during log off will course an
error (STACK OVERFLOW), no 99). If this error occurs, the
terminal will not be logged of, and the protection mask
will be equal to zero which means that the user can ac-
cess any logical disc/subcatalog.
Once the LOGOF-program has been started, the terminal
will unconditionally be logged off when the program
terminates, even if the ESC-key is pressed or an error
occurs.
E_x_a_m_p_l_e_
0010 ON ESC THEN EXEC ESCPROC
0020 ON ERR THEN EXEC ERRPROC \f
0030 PROC ESCPROC
0040 ON ESC THEN BYE
0050 PRINT "DON>T PRESS ESCAPE!"
0060 PRINT "IF YOU DO IT AGAIN THE TERMINAL WILL BE LOGGED OFF"
0070 ENDPROC
0080 PROC ERRPROC
0090 PRINT "ERROR IN LOGON PROCEDURE"
0100 BYE
0110 ENDPROC
0120 DIM NAME(5),USER(5)
0130 PRINT
0140 PRINT "WELCOME TO RC BASIC/COMAL"
0150 PRINT
0160 INPUT "TYPE USER NAME: ",NAME
0170 IF LEN(NAME)=0 THEN GOTO 0160
0180 LET TRUE=1; FALSE=0
0190 LET FOUND=FALSE
0200 OPEN FILE(1,1)"USERS"
0210 REPEAT
0220 READ FILE(1)USER
0230 IF NAME=USER THEN LET FOUND=TRUE
0240 UNTIL FOUND OR EOF(1)
0250 CLOSE
0260 IF NOT FOUND THEN
0270 PRINT "THAT NAME IS NOT IN THE USER CATALOG"
0280 BYE
0290 ENDIF
0300 IF SYS(4)<'32 THEN
0310 PRINT "CONNECTED TO SUBCATALOG: ";
0320 CASE SYS(4) OF
0330 CONNECT "DISC3"
0340 PRINT "DISC3"
0350 PROTECT =1+2+4
0360 WHEN 1,2,3
0370 CONNECT "DISC1"
0380 PRINT "DISC1"
0390 PROTECT =1+2+4 \f
0400 WHEN 4,5,6
0410 CONNECT "DISC2"
0420 PRINT "DISC2"
0430 PROTECT =1+2+4+8
0440 ENDCASE
0450 ENDIF
0460 NEW \f
F_ C_o_m_m_e_n_t_s_
LINE
10 The first statement should be ON-ESC.
30-70 ON-ESC procedure. The user is warned the first
time. The next time ESCape is pressed, the termi-
nal is logged off.
20-110 In case an error occurs a message is printed and
the terminal logged off.
130-150 >HOT NEWS> may be printed here.
200 User catalog file is opened (this file is assumed
to be created in advance).
160 User types his name.
170 In case ESCape has been pressed, repeat the input
statement.
210-240 The user name is searched for in the catalog.
260-290 If not found then log off the terminal.
300 At the console (terminal 32) everything is
allowed.
360 Terminals 1, 2, and 3 are not allowed to CONNECT
and RELEASE, and PROTECT cannot be changed.
400-430 Terminals 4, 5, and 6 are in addition not allowed
to COPY from other subcatalogs.
460 The program is removed. \f
F_ Page 229:
H Calling an Assembly Language Subroutine
from RC BASIC.
F_o_r_m_a_t_
<var'
<svar'
CALL <subr.name' , <mvar' ....
<sarray'
<slit'
<expr'
<subr.name': the name of an assembler-coded sub-
routine expressed as a string literal or
by means of a variable.
<var': a numeric variable
<svar':a string variable
<mvar': a matrix variable
<sarray': a string array
<slit': a string literal
<expr': a numeric or relational expression
U_s_e_
As a statement to invoke the execution of an assembler-
coded subroutine included in the system.
R_e_m_a_r_k_s_
1. When the CALL-statement is executed the following
happens:
a. If a module containing user-coded subroutines is
present in core, then the subroutine table in this
module is searched for the name of the subroutine. If
the name is found operation continues at point c.
b. As a. except that the searching is carried out in the\f
F_ module containing subroutines coded by RC. If the
subroutine is not found then the BASIC program is in-
terrupted with error no. 0046: PROCEDURE DOES NOT EX-
IST.
c. Now the number and the type of the actual parameters
are checked against the parameter specifications in
the subroutine. If a conflict is found then the BASIC
program is interrupted with error no. 0047: PARAMETER
ERROR.
d. The actual parameters are organized in a way which
makes it possible to access them from the subroutine
and then a jump is made to the subroutine.
2. When the subroutine is terminated, return to BASIC can
occur in two different ways. In case of normal return
execution of the BASIC program continues from the state-
ment following the CALL-statement. If an error has oc-
cured during execution of the subroutine, the BASIC pro-
gram will be interrupted (unless an ON ERR-statement has
been executed), and an error message is printed.
Ref. 4 describes how to program subroutines to be
called from RC BASIC.
E_x_a_m_p_l_e_
0010 DIM A(20), B(3)
0020 CALL "PUSH", A, 3
0030 B = "POP"
0040 CALL B, A, X
The two routines "PUSH" and "POP" are shown as examples
in ref. 4. \f
F_ I Extended Precision in RC BASIC
I.1 Numbers
In the extended precision version of RC BASIC/COMAL arithmetic
operations are carried out to a significans of 10 decimals
digits. The syntax is exactly the same as in the normal precision
version except a greater number range.
An extended precision number may be in the range:
1.6 * 10UU-616DD < n < 1.6 * 10UU616DD
Numbers may as in the normal precision version be expressed as
integers, fixed-point, or floating point (E-type notation).
Internally all numbers are represented as 48 bit floating-point
numbers. A 12 bit 2>s complement exponent and a 36 bit 2>s
complement fraction. The fraction is normalized (the exponent is
adjusted so that the most significant bit in the fraction is 1).
The error introduced in the conversion is less than 3 * 2UU-11DD
The numbers are stored in 3 consecutive 16-bit words (in normal
precision 2). This means that the formats are different, so that
programs and numeric data in binary form produced by the normal
precision version cannot be used in the extended precision
version, but have to be converted.
I.2 Output Format
The number of digits output by a PRINT statement may be specified
by the DIGITS statement/command. This number and the number of
digits in the number to be output determines how the number is
formatted by the PRINT statement. If the number can be
represented using the number of digits specified in the DIGITS
command or less, the number is output as integer (if the digits\f
after the decimal point are all zero) or fixed-point number,
otherwise E-type notation is used.
N_u_m_b_e_r_
DIGITS = 3 DIGITS = 6
2 000 000 2E+06 2E+06
108.999 109 108.999
.00123 1.23E+03 .00123
24E4 24E4 240000
I.3 Functions
The same functions which exist in the normal precision version
are also available in the extended precision version. The notes
in Section 4 on arguments and results applies as well except for
EXP(x). Because of the greater number range the EXP function
accepts a greater argument range. The argument x of EXP(x) should
satisfy the relation:
-1420.25 <= x <= 1418.86
I.4 Changing from normal to extended precision
When changing from a system with normal precision to a system
with extended precision, the user should notice the following:
S_A_V_E_d_ _p_r_o_g_r_a_m_s_:
Programs which have been SAVEd in a normal precision system can
not be LOADed in an extended precision system. This means, that
before changing systems the user must store his programs in
ASCII-format (by means of the LIST-command). This "conversion"
can be done in the following way:
\f
- Load a normal precision system
- For each SAVEd program execute the following commands:
LOAD <filename 1'
LIST <filename 2'
- Load an extended precision system
- For each LISTed program execute the following commands:
NEW
ENTER <filename 2'
SAVE <filename 1'
<filename 1' and <filename 2' may be the same file.
C_A_L_L_-_r_o_u_t_i_n_e_s_:
Assembler coded subroutines must be changed and re-assembled, if
they have numeric parameters. Ref. 4 describes how the subrou-
tines can be programmed.
D_a_t_a_-_f_i_l_e_s_:
In extended precision system numeric items takes up 6 bytes (4
bytes in normal precision system). This means, that the user when
changing system will have to reconsider the size of sequential
files and the length of records in random access files.
Binary files which have been written from programs running in a
normal precision system c_a_n_n_o_t_ be read from programs running in
extended precision systems.
Binary sequential files can be converted into ASCII-files (i.e.
they must be written by means of PRINT in stead of WRITE and read
by means of INPUT in stead of READ).
Binary random access files can not be converted, they must be
re-created.
\f
D_A_T_A_ _-_ _s_t_a_t_e_m_e_n_t_s_:
The maximal number of elements in DATA - statements is smaller
in extended precision systems than in normal precision systems.
This may result in error message no. 0009: LONE TOO LONG, when
programs containing DATA - statements are ENTERed. If this
happens, you will have to split "long" DATA - statements into
two or more statements with fewer elements (see also page 5 in
this manual).\f
F_ C_o_r_r_e_c_t_i_o_n_s_ _t_o_ _t_h_e_ _I_n_d_e_x_ _(_p_a_g_e_ _2_3_0_-_2_3_9_)_
Page 231:
CALL, H
Page 232:
DIGITS, 3.6A, I
Page 234:
LIB, 3.3, 9.10, 9.16
Logical discs
- write access, 7.2
LOGON/LOGOF functions, G
LOWBOUND, 2.4, 3.7, 5.1, 6.2, 9.10A
Page 237
PROTECT, 3.26A, G
RESET, 3.20, 3.21, 3.30A
Page 238:
Strings
- arrays 3.7, 5.1, 9.10A
Page 238:
line -14 is replaced by:
subcatalog, see Logical disc.
subcatalog (in a logical disc), see Catalog.
\f
F_A_._ _ _ _ _ _ _ _ _R_E_F_E_R_E_N_C_E_S_: A.
1 :DOMUS-utility SUBCA
User>s Guide
Keywords: RC3600, DOMUS, utility, catalog system,
subcatalog
Abstract: This manual is a user>s guide for the DOMUS
utility program SUBCA used for maintenance of
subcatalogs.
2 :RC3600 Catalog System
System Programmer>s Guide
edition 78.09.05 or later
Keywords: Catalog system, file system, area process.
Abstract: This manual describes how to use the RC3600 Catalog
System from assembled programs. Also the organiza-
tion of discs is described. The user must be fami-
liar with the MUS system.
3 :RC BASIC
Operating Guide
edition October 1978 or later
Keywords: RC BASIC, DOMUS, MUS, Logical Disc,
Subcatalog, Flexible Disc.
Abstract: This manual describes how to use the RC BASIC sy-
stem under the DOMUS/MUS operating system. The cre-
ation and use of logical discs and subcatalogs is
shortly described. \f
4 :Assembler Coded Subroutines (CALL-routines) in RC BASIC
(RC3600/RC7000)
Programmer>s Guide
Edition : December 1979 or later
Keywords : RC3600, RC7000, RC BASIC, DOMAC, DOMUS, COPS,
Assembler Routines
Abstract : This guide describes how to program assembler
routines that can be called from BASIC programs \f
\f
RC855
Betjeningsvejledning
A/S REGNECENTRALEN af 1979 Maj 1982
Informationsafdelingen RCSL Nr. 42-i2046 \f
Forfatter: Henning Christensen
Nøgleord: RC855, system, betjening
Resum: Betjeningsvejledning til RC855 work station/
display station. Beskrivelse af: sammenkob-
linger og betjeningskontakter; tastatur;
start-procedurer. Dækker de generelle aspek-
ter og skal anvendes i sammenhæng med den
øvrige dokumentation til applikationen.
(28 trykte sider)
CP/M er et varemærke indregistreret af Digital Research.
\f
i
I_N_D_H_O_L_D_S_F_O_R_T_E_G_N_E_L_S_E_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _S_I_D_E_
1. INTRODUKTION ........................................... 1
1.1 Ergonomi .......................................... 2
1.2 Betjening ......................................... 2
2. BESKRIVELSE AF SKÆRMTERMINALEN ......................... 4
2.1 Sammenkoblinger ................................... 4
2.1.1 Printer .................................... 5
2.1.2 Diskettestation ............................ 5
2.2 Betjeningskontakter ............................... 7
2.3 Vedligeholdelse ................................... 9
3. BESKRIVELSE AF TASTATUR ................................ 10
3.1 Generelle funktioner .............................. 10
3.2 Alfanumeriske taster .............................. 12
3.2.1 Numerisk tastaturblok ...................... 12
3.3 Attention-taster .................................. 13
3.4 Redigeringstaster ................................. 14
4. BETJENING .............................................. 15
4.1 Start og genstart ................................. 15
4.2 Programindlæsning ................................. 16
4.3 Programmelbetjening ............................... 18
B_I_L_A_G_:
A. REFERENCER ............................................. 19
\f
ii
\f
1_._ _ _ _ _ _ _ _ _I_N_T_R_O_D_U_K_T_I_O_N_ 1.
Figur 1: RC855 skærmterminal og tastatur.
RC855 fås enten som en work station (programmerbar, intelligent
terminal) med en eller to diskettestationer, hvorfra forskellige
programmelsystemer kan indlæses, eller som en display station
(dedikeret terminal), der arbejder med et forudvalgt programmel.
RC855 work station'en med diskettestation kan arbejde med
programmelsystemer såsom:
- CP/M-baserede applikationer
- IBM 3270 BSC emulator til interaktive opgaver
- IBM 3780 BSC emulator til overførsel af filer (batch)
RC855 display station'en leveres med IBM 3270 BSC emulatoren
indbygget i form af et internt lagerkort, der er fast monteret i
terminalen.
\f
Et system kan påbegyndes med blot en enkelt, selvstændig enhed og
kan siden i takt med behovet udbygges til en klynge-struktur.
Mulighederne i konfigureringen er beskrevet i RC855 Konfigura-
tionsvejledningen 1.
1_._1_ _ _ _ _ _ _ _E_r_g_o_n_o_m_i_ 1.1
Ergonomi har været en central faktor i udformningen af RC855
skærmterminalen.
Understellet er udformet, så det tillader vipning og højdeind-
stilling af skærmterminalen, som også nemt kan flyttes og drejes
efter behov. Tastaturet er tilkoblet med et kabel og kan lige-
ledes nemt flyttes, så det netop passer til brugerens situation.
Skærmbilledet på RC855 er ikke-reflekterende og forhindrer så-
ledes effektivt alle irriterende reflektioner, der ellers kunne
nedsætte læseligheden af den viste tekst. Lysstyrke og kontrast
kan indstilles efter lysforholdene omkring terminalen, hvorved
øjentræthed og hovedpine kan undgås.
1_._2_ _ _ _ _ _ _ _B_e_t_j_e_n_i_n_g_ 1.2
Pånær forskelle i programmel-indlæsning, så betjenes RC855 work
station'er og RC855 display station'er på samme måde.
Indlæsningen af programmel fra diskettestationen på work sta-
tion'en er beskrevet i installations- eller brugervejledninger
til de konkrete programmelpakker.
Indlæsningen af programmel fra det interne lagerkort i display
station'en foregår automatisk som led i start-procedurerne.
RC855 har indbyggede selvtest funktioner, som udføres ved hver
start eller genstart (reset). Resultatet af selvtesten vises som
status-meddelelser på den nederste linie i skærmbilledet. Indlæs-
ningen af programmel giver ligeledes anledning til meddelelser,
der angiver status for indlæsningen.
\f
Afhængig af programmelsystemet kan det være påkrævet at inddatere
et antal konfigurationsparametre, ligesom yderligere diagnostice-
rende testprogrammer kan være til rådighed. Disse forhold og
fremgangsmåden i betjeningen er beskrevet i den dokumentation,
der følger programmellet.
\f
F_ 2_._ _ _ _ _ _ _ _ _B_E_S_K_R_I_V_E_L_S_E_ _A_F_ _S_K_Æ_R_M_T_E_R_M_I_N_A_L_E_N_ 2.
2_._1_ _ _ _ _ _ _ _S_a_m_m_e_n_k_o_b_l_i_n_g_e_r_ 2.1
Figur 2: Bagpanel.
1) KEYBOARD - forbindelse til tastatur.
2) RESET - jvf. 2.2 og 4.1.
trykknap
3) CIRCUIT - forbindelse til RC-CIRCUIT i klynge-
konfigurationer.
4) LINE II - forbindelse til printer. Se også
2.1.1.
5) LINE I - forbindelse til værtsdatamat (evt.
via modem); i klynge-konfiguratio-
ner normalt kun benyttet på den
primære terminal.
6) Diskettestation - forbindelse til diskettestation. Se
også 2.1.2.
\f
7) Netledning og - sikringen kan skiftes ved først at
sikring trække netledningen ud og derefter
sikringsholderen øverst i stikket.
En ekstra sikring findes i holde-
ren.
8) POWER ON/OFF - jvf. 2.2 og 4.1.
vippekontakt
Yderligere information vedrørende installering af udstyret findes
i RC855 Installationsvejledningen 2.
2_._1_._1_ _ _ _ _ _P_r_i_n_t_e_r_ 2.1.1
Som ekstraudstyr kan der tilkobles en printer til skærmtermina-
len.
Betjeningen af printerne er beskrevet i vejledninger, der følger
særskilt med de forskellige typer af printere.
Hvis der tilkobles en printer, skal et antal konfigurationspara-
metre i skærmterminalen tildeles værdier i overensstemmelse
hermed. Fremgangsmåden er beskrevet i de konkrete vejledninger,
der følger programmellet.
Ved brug af visse programmelsystemer og klynge-konfigurationer er
printeren til rådighed som en fælles ressource i klyngen, dvs.
den kan benyttes af flere terminaler i klyngen. Sådanne forhold
bør undersøges førend betjeningen af terminal og printer påbegyn-
des.
2_._1_._2_ _ _ _ _ _D_i_s_k_e_t_t_e_s_t_a_t_i_o_n_ 2.1.2
Mindst en diskettestation skal være tilkoblet, for at udstyret
skal kunne benyttes som work station; to diskettestationer kan
tilkobles.
\f
Betjeningen af diskettestationen er enkel og ligetil: trykkes på
den aflange knap lige under lågen, springer lågen op og disketten
kan forsigtigt skubbes ind i diskettestationen indtil fast an-
slag. Ved ilægning af disketten skal etiketterne på diskettens
omslag vende opad og væk fra diskettestationen. Efter ilægning
holdes disketten automatisk på plads og lågen kan lukkes ved at
trykke nedad på dens forkant. Skal en diskette tages ud, trykkes
på den aflange knap igen og disketten springer frem i åbningen.
Disketter, der ikke bruges, skal altid opbevares i beskyttelses-
omslaget og godt beskyttet mod skadelige påvirkninger fra omgi-
velserne, f.eks. magnetiske felter, støv og sollys. Disketterne
bør lagres opretstående og helst i en lukket plastkasse. Disket-
tens overflade (synlig gennem det aflange hul i omslaget) må ikke
berøres! Skriv aldrig på etiketterne, når disse er klæbet på om-
slaget!
En diskette kan skrivebeskyttes,
dvs. data kan kun læses fra disket-
ten, ved at lave et hak i omslaget
som vist på tegningen (mål i mil-
limeter). En skrive-beskyttelse kan
ophæves ved at klæbe et stykke
uigennemsigtigt tape over hakket.
Før diskettestationen kan benyttes, skal den tilsluttes en stik-
kontakt og tændes med kontakten foran. Foran på diskettestationen
findes desuden en indikator, der lyser, når der læses/skrives på
disketten. Ilægning/udtagning af disketter må ikke foretages,
mens indikatoren lyser.
\f
2_._2_ _ _ _ _ _ _ _B_e_t_j_e_n_i_n_g_s_k_o_n_t_a_k_t_e_r_ 2.2
Figur 3: Betjeningskontakter.
1) POWER ON/OFF - tænder/slukker for terminalen. Se
vippekontakt også 4.1.
(bagpanel)
2) RESET - genstarter terminalen. Se også 4.1.
trykknap
(bagpanel)
3) Kontrast - kontrastregulering af skærmbillede.
fingerhjul Se nedenfor.
(under monitor)
4) Lysstyrke - lysstyrkeregulering af skærmbille-
fingerhjul de. Se nedenfor.
(under monitor)
Reguleringskontakterne til lysstyrke og kontrast er placeret un-
der monitoren, foran i højre side. De benyttes for at opnå den\f
mest behagelige visning af tegn i skærmbilledet. Gå frem som føl-
ger: indstil lysstyrken så rasterpunkterne netop ikke mere ses og
indstil så kontrasten, således at tegnene fremtræder mest behage-
ligt.
B_e_m_æ_r_k_: Høj lysstyrke reducerer monitorens levetid og kan desuden
være kilde til hovedpine og øjenirritationer. Skærmbilledets lys-
forhold bør efterindstilles i takt med ændringer i de omgivende
lysforhold.
ADVARSEL: Længere tids påvirkning fra høj lysstyrke (generelt høj
intensitet eller highlight-felter) kan resultere i gennembrænding
af skærmens fosforlag.
5) Højdeindstilling - indstillinger i højden foretages
trykknap ved hjælp af en lille motor. Den
kan kun arbejde, hvis terminalen er
tændt. Tryk på kontakten for at
ændre indstilling; slip kontakten,
når ændringen skal stoppe.
: Hæver monitoren.
: Sænker monitoren.
Vipning - monitoren kan vippes ved at skubbe
let opad/nedad på bageste del af
monitoren.
6) VOLUME - den indbyggede højttaler (der be-
drejekontakt nyttes til de hørbare signaler) kan
(tastatur, bagpanel) indstilles til den ønskede lydstyr-
ke ved brug af denne kontakt.
7) KEY-CLICK ON/OFF - tastaturet udsender en klik-lyd ved
vippekontakt korrekt tasteanslag. Klik-lyden kan
(tastatur, bagpanel) tændes/slukkes med denne kontakt.
\f
2_._3_ _ _ _ _ _ _ _V_e_d_l_i_g_e_h_o_l_d_e_l_s_e_ 2.3
Brugeren har ingen vedligeholdelsesopgaver i forbindelse med
terminalen udover den regulære rengøring. Brug en fugtig, hårdt
opvredet klud.
NB: Benyt kun mild sæbevand til rengøringen.
\f
F_ 3_._ _ _ _ _ _ _ _ _B_E_S_K_R_I_V_E_L_S_E_ _A_F_ _T_A_S_T_A_T_U_R_ 3.
Tastaturet leveres i forskellige versioner afhængig af ønsket
(nationalt) tegnsæt. Danske tastaturer fås endvidere i en
modificeret udgave.
Figur 4: RC855 tastatur, dansk/norsk.
Figur 5: RC855 tastatur, dansk offs.
3_._1_ _ _ _ _ _ _ _G_e_n_e_r_e_l_l_e_ _f_u_n_k_t_i_o_n_e_r_ 3.1
Taste-klik - ved korrekt tasteanslag høres en
klik-lyd.
Lydstyrken kan reguleres ligesom
funktionen helt kan slukkes. (jvf.
2.2).
\f
Alarmsignal - et alarmsignal høres, hvis der fo-
retages betjeninger, der er ugyl-
dige. Signalet kan også udsendes på
initiativ fra værtsdatamaten.
Lydstyrken kan reguleres, men funk-
tionen kan ikke slukkes. (jvf.
2.2).
Automatisk repetition - når en taste holdes nedtrykket læn-
gere end trekvart sekund, bliver
den pågældende tegnkode repeteret
(med en hastighed af 10 tegn/sek.).
Gælder dog ikke de hjælpetaster som
nævnes lige herefter.
De taster, som beskrives i det følgende, er hjælpetaster, der
altid benyttes sammen med en anden "regulær" taste. De benyttes
for at kunne generere alternative koder sammen med de regulære
taster (f.eks. store bogstaver). Hjælpetaster skal holdes nede,
mens den regulære taste slås an.
SHIFT - bemærk de forskellige måder, tasten
benyttes:
I: Benyttes SHIFT sammen med en tegn-
taste, genereres store bogstaver
eller tegn fra det "øvre" tegnsæt
(svarende til øverste tegn på tas-
ter med to symboler).
II: Benyttes SHIFT sammen med andre
specifikke taster, modificeres den
normale funktion, disse taster har.
De alternative funktioner, der der-
ved opnås, er beskrevet i forlæn-
gelse af beskrivelsen af tastens
normale funktion, dvs. i de for-
skellige vejledninger til program-
mellet.
\f
LOCK - som SHIFT i tilfælde I, dog kun med
virkning på de alfabetiske taster.
Når tasten trykkes ned, træder
funktionen i kraft (indikatoren ly-
ser) og forbliver i kraft, indtil
man igen trykker på tasten. I for-
bindelse med nogle programmelsy-
stemer findes en konfigurations-
parameter som indvirker på benyt-
telsen af tasten.
Bemærk: LOCK funktionen påvirker
kun taster med t symbol. Taster
med to symboler kan, uanset brugen
af LOCK tasten, altid generere øvre
tegn ved brug af SHIFT tasten.
CTRL - benyttes overvejende sammen med
andre funktionstaster for at opnå
særlige system-funktioner. Brugen
af to taster er i disse tilfælde
anvendt som et værn mod utilsigtet
aktivering af disse system funktio-
ner.
3_._2_ _ _ _ _ _ _ _A_l_f_a_n_u_m_e_r_i_s_k_e_ _t_a_s_t_e_r_ 3.2
De alfabetiske og numeriske tegntaster betjenes på tilsvarende
måde som kendt fra almindelige skrivemaskiner. Hvis der er re-
striktioner i benyttelsen, er dette omtalt i de respektive
vejledninger til programmellet.
3_._2_._1_ _ _ _ _ _N_u_m_e_r_i_s_k_ _t_a_s_t_a_t_u_r_b_l_o_k_ 3.2.1
Tastaturet omfatter en særskilt blok med numeriske taster for at
lette inddatering af numeriske data. Tasten med decimalkomma-teg-\f
net kan i forbindelse med nogle applikationssystemer virke på
forskellig måde, bestemt af den værdi, der tildeles en konfigura-
tionsparameter.
Bemærk også følgende:
N_o_r_m_a_l_ _f_u_n_k_t_i_o_n_: Som numeriske taster.
S_æ_r_l_i_g_ _f_u_n_k_t_i_o_n_: Hvis en af de numeriske taster (1,
2, ..., 9) benyttes sammen med
SHIFT tasten, genereres de tilsva-
rende program-funktioner (PF1, PF2,
..., PF9); se også 3.3.
3_._3_ _ _ _ _ _ _ _A_t_t_e_n_t_i_o_n_-_t_a_s_t_e_r_ 3.3
Anvendelsen af attention-tasterne afhænger helt af det givne
applikationssystem. Her følger en liste med tasterne:
SELCT (taste/indikator) Select (= vælge/udpege)
CLEAR (= slette)
PA Program Access (= program valg/til-
gang)
P_A_1_,_ _P_A_2_,_ _._._._,_ _P_A_5_: Disse taster er indeholdt i tasta-
turets layout.
P_A_6_,_ _P_A_7_,_ _._._._,_ _P_A_1_0_: Brug SHIFT tasten sammen med PA1,
PA2, ..., PA5 for at opnå henholds-
vis PA6, PA7, ..., PA10.
USM (taste/indikator) Unsolicited Message (= uopfordret
meddelelse fra værtsdatamat)
PF Program Function (= program funk-
tion)
P_F_1_,_ _P_F_2_,_ _._._._,_ _P_F_9_: Brug SHIFT tasten sammen med de
numeriske taster 1, 2, ..., 9 i d_e_n_
n_u_m_e_r_i_s_k_e_ _t_a_s_t_a_t_u_r_b_l_o_k_ for at opnå
henholdsvis PF1, PF2, ..., PF9.
P_F_1_0_,_ _P_F_1_1_,_ _._._._,_ _P_F_1_4_: Disse taster er indeholdt i tasta-
turets layout. \f
CURSR SELCT Cursor Select (= cursor lyspen
valgbar)
PRINT (taste/indikator) (= udskrift)
ESC Escape (= undslippe)
RESET (= nulstille/genstarte)
SEND (= afsende)
3_._4_ _ _ _ _ _ _ _R_e_d_i_g_e_r_i_n_g_s_t_a_s_t_e_r_ 3.4
Disse taster benyttes til flytning af cursor og til redigering af
data. Den konkrete måde disse taster anvendes på, afhænger af
programmelsystemet og er beskrevet i applikationsvejledningerne.
Her følger en liste med tasterne:
->
<-
->
<-
<-
TEGN IND (taste/indikator)
LINIE IND
FM feltmærkning
DUP duplikering
SLET TEGN
SLET LINIE
SLET FELT
SLET DATA
MARKER
FLYT
\f
F_ 4_._ _ _ _ _ _ _ _ _B_E_T_J_E_N_I_N_G_ 4.
Meddelelser fra RC855 systemet, der kan forekomme under betje-
ningen, vises i statuslinien. Begyndelsespositionen for en
meddelelse indikerer, hvilken slags meddelelse, der er tale om:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_x_x_x_._._._ _ _ _ _ _ _x_x_x_._._._ _ _ _ _ _ _ _ _ _ _ _ _ _ _x_x_x_._._._ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _x_x_ _
1) 2) 3) 4)
1) meddelelser med relation til systemidentifikation og -status;
se også applikationsvejledninger.
2) meddelelser med relation til udskrivningsaktiviteter; se
applikationsvejldninger.
3) meddelelser med relation til kommunikation med værtsdatamat og
internt i klynge; se applikationsvejledninger.
4) statusmeddelelser under programindlæsningsfasen.
4_._1_ _ _ _ _ _ _ _S_t_a_r_t_ _o_g_ _g_e_n_s_t_a_r_t_ 4.1
Strømmen tændes/slukkes med POWER ON/OFF kontakten på bagpanelet.
En genstart (reset) følger hver gang strømmen tændes samt hver
gang RESET kontakten på bagpanelet aktiveres. Samme virkning kan
i forbindelse med nogle programmelsystemer opnås ved at benytte
tasterne CTRL CLEAR, når programmelsystemet arbejder.
Efter en (gen)start aktivering udføres den indbyggede selvtest.
Når selvtesten er afsluttet, vises følgende meddelelse:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_R_C_8_5_5_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Dermed indikeres, at der ikke er sporet nogen fejlfunktioner.
\f
Hvis der opspores en fejlfunktion, vil en af de følgende meddel-
elser blive vist i ca. 10 sek., hvorefter en ny programindlæsning
forsøges:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_R_C_8_5_5_ _c_h_e_c_k_s_u_m_ _e_r_r_o_r_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_R_C_8_5_5_ _m_e_m_o_r_y_ _e_r_r_o_r_ _<_a_d_r_e_s_s_e_>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Såfremt der opspores en fejl, tilkaldes en servicetekniker (notr
en eventuel <adresse> information, idet en sådan vil være nyttig
i fejlfindingsarbejdet).
4_._2_ _ _ _ _ _ _ _P_r_o_g_r_a_m_i_n_d_l_æ_s_n_i_n_g_ 4.2
Efter afslutning af selvtesten vil RC855 fortsætte med indlæsning
af programmel til arbejdslageret, hvor det skal være indlæst for
at kunne udføres.
Programmelsystemerne fås enten til indlæsning fra en tilkoblet
diskettestation eller fra et internt lagerkort.
Skal programmellet indlæses fra en diskettestation, skal denne
tilkobles og tændes. Systemdisketten (normalt CP/M operativsyste-
met) sættes i og diskettestationens låge lukkes. Kort efter vises
systemets response (system prompt = særligt tegn der angiver, at
systemet er rede til fortsættelse af betjeningsforløbet), hvilket
indikerer, at andre programmer nu kan indlæses. De konkrete be-
tjeningsforløb i indlæsning og start af applikationsprogrammer
fra diskette findes beskrevet i installations- og brugervejled-
ninger til programmellet.
Skal programmellet indlæses fra det interne lagerkort, sker dette
automatisk efter afslutningen af selvtesten.
\f
De enkelte faser af progamindlæsningen kan overvåges ved hjælp af
statusmeddelelser. De to tegn yderst til højre i statuslinien
angiver forløbet og skal forstås som følger:
LI: indlæsning fra internt lagerkort
LD: indlæsning fra diskette (vises i tre faser)
SA: valg af applikation; på dette trin kan indlæsningsproceduren
afbrydes ved at trykke på mellemrumstangenten og et alterna-
tivt program kan indlæses fra disketten
LA: indlæsning af applikation; det aktuelle applikationsprogram
indlæses
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_R_C_8_5_5_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<_x_x_>_ _
Opstår der en fejl under indlæsningen af programmellet, vises en
af følgende meddelelser:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_R_C_8_5_5_ _L_O_A_D_ _S_T_A_T_U_S_:_ _<_f_e_j_l_å_r_s_a_g_>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _<_x_x_>_ _
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_R_C_8_5_5_ _L_O_A_D_ _S_T_A_T_U_S_:_ _d_i_s_k_e_t_t_e_ _e_r_r_o_r_ _-_ _<_f_e_j_l_å_r_s_a_g_>_ _ _ _ _ _ _ _<_x_x_>_ _
<_f_e_j_l_å_r_s_a_g_>_ <_x_x_>_
hard error LI
time out LD
checksum error SA
deleted data encountered LA
recalibrate time out
recalibrate status
read-id error
seek error
seek time out
read status
fdc error
\f
Når gentagne forsøg på indlæsning af programmel fra diskette mis-
lykkes, så prøv med en anden diskette (hvis muligt). Mislykkes
indlæsningen fortsat, tilkaldes en servicetekniker (notr eventu-
elle informationer fra <fejlårsag> og <xx> felterne, idet sådanne
vil være nyttige i fejlretningsarbejdet).
Når der indlæses fra diskette, vises meddelelsen:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_R_C_8_5_5_ _-_ _I_n_s_e_r_t_ _d_i_s_k_e_t_t_e_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
- hvis diskettestationen ikke er tilkoblet eller tændt; - hvis
der ikke er sat en diskette i, eller lågen ikke er lukket. Kon-
trollr diskettestation og ret fejlen.
4_._3_ _ _ _ _ _ _ _P_r_o_g_r_a_m_m_e_l_b_e_t_j_e_n_i_n_g_ 4.3
Efter indlæsning af et programmelsystem, vises en identifikati-
onsmeddelelse for det givne programmelsystem.
Den videre betjening af programmellet er beskrevet i betjenings-
vejledninger og øvrig dokumentation gældende for de konkrete sy-
stemer.
\f
F_ A_._ _ _ _ _ _ _ _ _R_E_F_E_R_E_N_C_E_R_ A.
1 RCSL Nr. 42-i2048:
RC855 Konfigurationsvejledning
2 RCSL Nr. 42-i2047:
RC855 Installationsvejledning
- Forskellig programmel-relateret dokumentation:
RCSL Nr. 42-i1826:
RC855 IBM 3270 BSC Emulator, Installation Guide
RCSL Nr. 42-i2041:
RC855 IBM 3270 BSC Emulator, Betjeningsvejledning
RCSL Nr. 42-i1692:
RC855 IBM 3780 BSC Emulator, Users Guide
RCSL Nr. 42-i1700:
RC855 CP/M Work Station, Users Guide
\f
F_
\f
«eof»