A Survival Guide to the 1541 Disk Drive
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
7843 Directory Management
7843 Directory Management Tired of using existing badly written operating systems, Hieu decided to write his new one. Of course, his new operating system will be awesome, bug-free, fast and easy to use. He has finished most of the work, and now he is asking you to do one lasttask: Implement a directory manager. Initially, Hieu’s computer directory is empty. The current directory is the root directory. The directory manager keeps the directory in a rooted-tree structure. In each directory, the children are sorted in lexicographical order. He can do one of the following actions: • MKDIR s: create a child directory named s inside the current directory where s is a string. – If the current directory already contains a child directory named s, print “ERR” and do nothing. – Otherwise, print “OK” • RM s: remove a child directory named s inside the current directory where s is a string. Figure 1 – If there is no child directory named s, print “ERR”. Otherwise, print “OK”. • CD s: change the current directory to a child directory named s where s is a string. – If s is equal to the string “..” and the current directory is the root directory, print “ERR” and do nothing. – If s is equal to the string “..” and the current directory is not the root direc- tory, then you need to change the current directory to the parent directory Figure 2 and print “OK”. – If there is no child directory named s, print “ERR” and do nothing. – If there is a child directory named s then you need to change the current directory to s and print “OK”. -
Print Wizard 3 Manual
Print Wizard User Guide and Technical Manual Version 3.0 and later Rasmussen Software, Inc. 10240 SW Nimbus Ave., Suite L9, Portland, Oregon 97223 (503) 624-0360 www.anzio.com [email protected] Copyright © 2004-2005 by Rasmussen Software, Inc., All Rights Reserved Rasmussen Software, Inc. Page 1 Print Wizard Manual Table of Contents Table of Contents PRINT WIZARD USER GUIDE.......................................................................................................................................... 7 1 PRINT WIZARD INTRODUCTION ......................................................................................................................................... 7 1.1 What is Print Wizard?............................................................................................................................................... 7 1.2 Concept..................................................................................................................................................................... 7 1.3 Profiles and Services .............................................................................................................................................. 10 1.3.1 Introduction to print profiles................................................................................................................................................11 1.3.2 Introduction to services .......................................................................................................................................................12 -
Disk Clone Industrial
Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14 -
Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command. -
Commodore 128 Book 2 Adva
COMMODORE C12S BOOK 2 ADVANCED PROGRAMMING COMMODORE el28 ADVANCED PROGRAMMING by Ian Sinclair Glentop Publishers Ltd MARCH 1986 All programs in this book have been written expressly to illustrate specific teaching points. They are not warranted as being suitable for any particular application. Every care has been taken in the writing and presentation of this book but no responsibility is assumed by the author or publishers for any errors or omissions contained herein. COPYRIGHT © Glentop Publishers Ltd 1986 World rights reserved No part of this pUblication may be copied, transmitted or stored in a retrieval system or reproduced in any way including but not limited to photography, photocopy, magnetic or other recording means, without prior permission from the publishers, with the exception of material entered and executed on a computer system for the reader's own use ISBN 1 85181 034 X Published by: Glentop Publishers Ltd Standfast House Bath Place High Street Barnet Herts ENS SXE Tel: 01-441-4130 Printed in Great Britain by The Eastern Press Ltd., London and Reading Contents PREFACE CHAPTER 1 Reminders roundup • Storage space • Machine code • Principles of programming. Other languages CHAPTER 2 Why use disks? • What is a disk system? • Tracks, sectors and density. Formatting disks. Storage space. The disk filing system • Loading and saving • More disk commands • Clearing, retitling and erasing. Backing up • Copying a named flle • Deleting flles • Wildcards and wiping. Protecting disks and programs. Renaming flles CHAPTER 3 Text display. Screen clear and print location. Print fielding. Formatting numbers • Standard form • Money amounts • Titles and centering. Windows. Hard copy CHAPTER 4 Working with numbers. -
Powerview Command Reference
PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre .............................................................................................................................. -
Command-Line IP Utilities This Document Lists Windows Command-Line Utilities That You Can Use to Obtain TCP/IP Configuration Information and Test IP Connectivity
Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 Command-Line IP Utilities This document lists Windows command-line utilities that you can use to obtain TCP/IP configuration information and test IP connectivity. Command parameters and uses are listed for the following utilities in Tables 1 through 9: ■ Arp ■ Ipconfig ■ Netsh ■ Netstat ■ Pathping ■ Ping ■ Route ■ Tracert ARP The Arp utility reads and manipulates local ARP tables (data link address-to-IP address tables). Syntax arp -s inet_addr eth_addr [if_addr] arp -d inet_addr [if_addr] arp -a [inet_address] [-N if_addr] [-v] Table 1 ARP command parameters and uses Parameter Description -a or -g Displays current entries in the ARP cache. If inet_addr is specified, the IP and data link address of the specified computer appear. If more than one network interface uses ARP, entries for each ARP table appear. inet_addr Specifies an Internet address. -N if_addr Displays the ARP entries for the network interface specified by if_addr. -v Displays the ARP entries in verbose mode. -d Deletes the host specified by inet_addr. -s Adds the host and associates the Internet address inet_addr with the data link address eth_addr. The physical address is given as six hexadecimal bytes separated by hyphens. The entry is permanent. eth_addr Specifies physical address. if_addr If present, this specifies the Internet address of the interface whose address translation table should be modified. If not present, the first applicable interface will be used. Pyles, Carrell, and Tittel 1 Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 IPCONFIG The Ipconfig utility displays and modifies IP address configuration information. -
The Ultimate C64 Overview Michael Steil, 25Th Chaos Communication Congress 2008
The Ultimate C64 Overview Michael Steil, http://www.pagetable.com/ 25th Chaos Communication Congress 2008 Retrocomputing is cool as never before. People play Look and Feel C64 games in emulators and listen to SID music, but few people know much about the C64 architecture A C64 only needs to be connected to power and a TV and its limitations, and what programming was like set (or monitor) to be fully functional. When turned back then. This paper attempts to give a comprehen- on, it shows a blue-on-blue theme with a startup mes- sive overview of the Commodore 64, including its in- sage and drops into a BASIC interpreter derived from ternals and quirks, making the point that classic Microsoft BASIC. In order to load and save BASIC computer systems aren't all that hard to understand - programs or use third party software, the C64 re- and that programmers today should be more aware of quires mass storage - either a “datasette” cassette the art that programming once used to be. tape drive or a disk drive like the 5.25" Commodore 1541. Commodore History Unless the user really wanted to interact with the BA- SIC interpreter, he would typically only use the BA- Commodore Business Machines was founded in 1962 SIC instructions LOAD, LIST and RUN in order to by Jack Tramiel. The company specialized on elec- access mass storage. LOAD"$",8 followed by LIST tronic calculators, and in 1976, Commodore bought shows the directory of the disk in the drive, and the chip manufacturer MOS Technology and decided LOAD"filename",8 followed by RUN would load and to have Chuck Peddle from MOS evolve their KIM-1 start a program. -
Introduction to Computer Networking
www.PDHcenter.com PDH Course E175 www.PDHonline.org Introduction to Computer Networking Dale Callahan, Ph.D., P.E. MODULE 7: Fun Experiments 7.1 Introduction This chapter will introduce you to some networking experiments that will help you improve your understanding and concepts of networks. (The experiments assume you are using Windows, but Apple, Unix, and Linux systems will have similar commands.) These experiments can be performed on any computer that has Internet connectivity. The commands can be used from the command line using the command prompt window. The commands that can be used are ping, tracert, netstat, nslookup, ipconfig, route, ARP etc. 7.2 PING PING is a network tool that is used on TCP/IP based networks. It stands for Packet INternet Groper. The idea is to verify if a network host is reachable from the site where the PING command issued. The ping command uses the ICMP to verify if the network connections are intact. When a PING command is issued, a packet of 64 bytes is sent to the destination computer. The packet is composed of 8 bytes of ICMP header and 56 bytes of data. The computer then waits for a reply from the destination computer. The source computer receives a reply if the connection between the two computers is good. Apart from testing the connection, it also gives the round trip time for a packet to return to the source computer and the amount of packet loss [19]. In order to run the PING command, go to Start ! Run and in the box type “cmd”. -
The Commodore 64 Survival Manual
THE COMMODORE 64 SURVIVAL MANUAL Bantam Books of Related Interest Ask your bookseller for the books you have missed THE COMPLETE BUYER’S GUIDE TO PERSONAL COMPUTERS by Tim Hartnell and Stan Veit THE FRIENDLY COMPUTER BOOK: A SIMPLE GUIDE FOR ADULTS by Gene Brown HOW TO GET THE MOST OUT OF COMPUSERVE by Charles Bowen and Dave Peyton THE ILLUSTRATED COMPUTER DICTIONARY by The Editors of Consumer Guide® MASTERING YOUR TIMEX SINCLAIR 1000/1500™ PERSONAL COMPUTER by Tim Hartnell and Dilwyn Jones THE COMMODORE 64 SURVIVAL MANUAL Winn L. Rosch Illustrations by Steve Henry A Hard/Soft Press Book BANTAM BOOKS TORONTO • NEW YORK • LONDON • SYDNEY • AUCKLAND THE COMMODORE 64 SURVIVAL MANUAL A Bantam Book I August 1984 Sprite and sound assistance: Michael Callery All rights reserved. Copyright © 1984 Hard!Soft Inc. Cover art copyright © 1984 by Bantam Books, Inc. This book may not be reproduced in whole or in part, by mimeograph or any other means, without permission. For information address: Bantam Books, Inc. ISBN 0-553-34127-8 Published simultaneously in the United States and Canada Bantam Books are published by Bantam Books, Inc. Its trademark, consisting of the words "Bantam Books” and the portrayal of a rooster, is Registered in U.S. Patent and Trademark Office and in other countries. Marca Registrada. Bantam Books, Inc., 666 Fifth Avenue, New York, New York 10103. PRINTED IN THE UNITED STATES OF AMERICA HL 0987654321 To Granny TABLEOFCONTENTS 1 INTRODUCING THE COMMODORE 64 1 Computer basics made easy. Peripherals, applications, shopping notes, and general hints and tips. 2 BEATING THE SYSTEM______________________ 16 What’s inside your C-64 and how does it work? A fasci nating look at monitors, printers, plotters, storage media, modems, paddles, joysticks, and other devices. -
CONTENTS Blue Reader Sogwap Softwares Excellent Program for Transferring Files Between C Page Item 64/C 128 and MS-Dos Based Machines
geoNEWSthe Journal of geoCLUB Issue 68 April 1997 EDITOR’S COMMENTS This Issue brings Part 2 of the Big CONTENTS Blue Reader Sogwap Softwares excellent program for transferring files between C Page Item 64/C 128 and MS-Dos based machines. The concluding part will be published in the May issue. 2 Library Review Another continuing saga is Terry & Sharon reproduced on pages 9 to 12 named as CMD :2. It may seem to the casual reader that the author 4 What To Do... and geoClub are praising CMD very highly. As Sharon Chambers perhaps the only supplier left to the serious C64 user it is perhaps just praise. Far too many CBM Message From... supplier have found user support very lacking GeoNut culminating it their demise. Even the original manufacturer has failed to support the very 5 Big Blue Reader people who put them where they were. CMD in Michael Miller continuing to support the C64 user deserves all the good publicity they can get. 9 C.M.D. :2 Dale Sidebottom Page 4 has a tip from Sharon on gluing back together that most important part of any plastic item that is always the one that breaks. Accompanying this is a message from geoNut with regard to a copyright free disk based LoadStar that should be available from the Library by the time you read this. Published by:- Frank Cassidy See you all in May — Happy Geosing 55, High Bank Road Droylsden (^frank Manchester M43 6FS PAGE 1 The April Disk Review Terry Watts Sharon Chambers 3, Rutland Avenue, 41, Albert Street, Borrowash, Cl HQ Crewe, Derby. -
Commodore VIC 1541 Floppy Drive Users Manual
. II U n. : VIC-154'1 I [ill [)] g 11II II II 11II III III III 11II II a II .. II !I'" n " II i" i., I II n :d:j ~ commodore COMPUTER VIC-1541 SINGLE DRIVE FLOPPY DISK USER'S MANUAL P/N 1540031-02 ~ commodore COMPUTER WARNING: This equipment has been certified to comply with the limits for I!, Class B computing device, pursuant to Subpart J of Part 15 of FCC Rules. Only computers certified to comply with the Class B limits may be attached to this printer. Operation with noncertified computers is likely to result in interference to radio and TV reception," This warning is valid for the equipment which has the following FCC label on its rear. CERTIFIED TO COMPLY WITH CLASS B LIMITS. PART 15 OF FCC RULES SEE INSTRUCTIONS IF INTERFERENCE TO RADIO RECEPTION IS SUS- PECTED. The information in this manual has been reviewed and is believed to be entirely reliable. No responsibility, however, is assumed for inaccuracies. The material in this manual is for information purposes only, and is subject to change without lIotice. @Commodore BusinessMachines, Inc., September 1981 "All rights reserved." Table of Contents Page 1. General Description .............. 3 2. Unpacking and Connecting . 6 Contents of Box . 6 Connection of Cables 7 PoweringOn ........ 7 Insertion of I)jskette . 8 Usingwith VlC 20 or Commodore 64 . 8 3. UsingPrograms.............. 9 Loading Pre-packaged Software 9 LOAD . 9 Directoryof Disk . 9 Pattern Matching & Wild Cards 11 SAVE . 12 SAVE and replace. 13 VERIFY.. .. .. .. 13 DOS Support Program 14 4. Disk Commands . 14 OPEN ANDPRINT # 14 NEW ..