S90£6 V) 'A311VA I.IS Second Class Postage Paid at Menlo Park, CA ijij31 VNn~V1 %£ Address Correction Requested leAW NOSNHo r NO~Aa ISZZ 10 60aS NHO rS90£6

I VOLa NO 3 ISSUE 43 NOV·DEC 1979 ALSO PUBLISHED BY PEOPLE'S COMPUTER COMPANY: DR. DOBB's JOURNAL of COMPUTER Calisthenics &

Dr. Dobb's Journal is a highly respected reference journal which fills a unique and Orthodontia solid niche within the microcomputing world. We publish discussions and examples Send in this form or a facsimile to .tart your of general purpose system tools, articles on lubKription to Dr. Oobb's Joumal. legislation or trends affecting computerists, ------OADEAFOAM------' a consumer watchdog column, as well as a St.rt my IoUbscription to Dr. Oobb'. JourMl, variety of monthly columns designed to 10 i.u", $15/yr. ($5 off the newMt.nd pricel. guide and help readers wend their way o o,.:k 'nctosed o Bill me through the confusion of a new and bur­ N ______

geoning industry. Add~n ______

Recent issues have included: • Growing, pruning City,Stefl ______Zip_ and climbing binary trees with tiny-c' Selecting business software for • An inter­ Signature active timeshared operating system for the 8080 Pl._ inquire Ibout foreign nltel. Send order to' • A critical look at the MC68000 • A Z80· ZAP P.opI,', ComPUter Co., Box E, 1263 EI CImino. disassembler • Converting 8-bit memories t. Mlnlo P'tk, CA 94025. 16-bits OSI BASIC for the KIM-l • Let \ "f C7 computer speak ASCII I~

SHOGI: GAMES FOR YOU TO PROGRAM ATARI SOUNDS • CRYPTARITHMS GRAPHICS formerly VolumB 8 Number 3 SUBMITTING ITEMS FOR PUBLICATION STAFF Noy· Dec 1979 ~S LABEL tV1!ryming with your name, addras and the date; tspes should lifO include the EDITORS progl1lm nSTlt, langu. and system. TYPE text if at all possible, double-waced, on 8%x Bob Albrecht 11 inch white paper. DRAWINGS should be as clear and neat as possible in black Ink on Tracy Deliman white paper. Special Features Don Inman by Herb Moore LlSTI NGS are hard to reprodu~ clearlv, so please note: Ramon Zamora 8 SEE WHAT YOU HEAR & HEAR WHAT YOU SEE • Use a new ribbon on plain white paper when making a liuing; we prefer roll paper or PUBLISHER Making music with the new Atari lan·lold p~r. Willard J, Holden 14 GAMES TO PROGRAM by' Herbert Kohl • Send copies 01 one or more RUN~ of your program, to verilv that it runs and to A Shogi variation provide a sense of how things work-and to motivate more 01 us to read the eode, RUNs ASSISTANT PUBLISHER CRYPTARITHMS by John Davenport Crehore should illustrate the main purpose and operation of your program as clearly as possible. Sara Werry 22 Bells, wh'$lles and special features should iust be de~cribed jn the documentation unless The venerable Nine Hex imparts wisdom they're particularlV relevant. PRODUCTION MANAGER 24 INTERRUPT by Warwick Slough • Make sure your code is well documented-I;se a separate shee t 0 1 paper. Refer to Carole Cullenbine Security systems and Swiss·style swindles portions of eode bv line number or label Or address, please, not bV page number. When ARTISTS writing documentation. keep in mind that readers will include beginners and people who 32 FORTRAN MAN by Todd Voros and Lee Schneider may be relativelv ine~perienced with the language you're using. Helpful documentation! Aleeca Harrison Our hero's memory is RESTOREd annotation can make your code useful to more people. Documentation should discuss Ann Miya 4. TEXAS INSTRUMENTS GRAPHICS & ANIMATION bY ,Don Inman Just which eases are covered and wh,ch aren't. ' Judith WaSserman pg.l1 Creating new characters on the TI 99/4 • If you send us a program to publish, we reserve the righ t to annotate it (don't worry, we won't publish it if we don't like it L TYPESETTERS • Last but not least, please lry to limit the width of your listings 50-60 characters is Phyllis Adams ideal. Narrow widths mean less reduction, better readabilitV and better use of space. Articles Gavin Cullen 11 MATCH ME by Don Inman ~ROOFREADER LETIERS are alwavs welcome; we assume it's OK to publish them unless you ask us nOI Komputing for kindergarten kids to. Upon request we will withhold your name from a published leuer, but we will not Nancy Heubach 16 THE JOY OF SOUND by Doc Plumber publish correspondence sent to uS anonymously. We reseNe the right to edit letters for CIRCULATION MANAGER purp01a of clarity and bnw'ty Chipmunks, lasers, bombs and music Micheel Madaj 25 CALENDAR by H. Frank Anderson, M.D. ADVERTISING WHOLESALE DISTRIBUTION A technological Stonehenge Ronald Simpkin! 28 APPLE it'S THREE M'S by Chuck Carpenter ADVEATIS1NG .pial Is (IV1Iilable in this publication. Plea. direct inquiries to the Advertising Maneger, People's Computer Company, Box E, Menlo Park, CA 94025. SPOT EDITOR Memory, monitor and machine language: the conclusion (4151 323-.3 111 Herry Saal 36 A NEW ALGORITHM FOR CHESS by David Chelburg & David Wa lters PROMOTION MANAGER pg.27 (Part 4) The dynamic evaluation SUBSCRIPTION INFORMATION Betsy Roeth 44 WORKSHOPS BEAT MATH ANXIETY by Stanley Kogelman Mind over math U. S, RATES FOREIGN RATES And a $peCial thanlu to all the other 49 MAKING MUSIC ON THE PET by Alfred J. Bruey o StO!1 yr. 16 Issues) Payments must be in SUS draWll on a folks at Paople's Computer Company: e Hardware, software and simple tunes o Retaining subscription@S25 US bank. Delie Daniels, Grant Groberg, Erl~ 56 AN INTRODUCTION TO RECREATIONAL DISPUTING by John Hirsch (SIS tax deductible) o $17 Canada!Maxico First Class Sanders, Ann Marchbergar, Nette The RDS has only one by-law o Sune;ning subscription @$loo+ o 523 Rest of World Airmail Chekanskv Wang, Sahntll Pennuttl, (590+ ta~ deductible) o S14 World Surface Mail Ellen Markoff. Games & Stuff PleBS!! allow 6·9 w&ekli for your first Delivery of foreigll mail is slow and unre­ TRS-80: ELEMENTARY MATH by Karen Chepko issue to e(five. liable. We strongly advise airmail. RETAINING SUBSCRIBERS 27 Her first program is a winner Algorithmic!, Inc. BACK ISSUES 34 TRS-SO: TOWER OF HANOI by Herbert L Dershem David R, Dick pg,40 Animation for an ancient game $2.50 each: $3.00eech: Mark Elgin 46 TRS-SO- BINGO by Karen Chepko Vol. 6, Nos. 1,2,3,4,6 Vol. 7, Nos. 3, 4, 5,6 l Outside tha U. S. John B. Fried A micro-lesson in advanced BASIC Vol. 7,No.. 1,2 Vol. 8, Nos. 1,2 ~ add S .50 per iAUa. Scott B. Guthery 47 TRS-80; LOAN PAYMENT by Milan Chepko W. A, Kelley A unique commercial application FOREIGN DISTRIBUTORS OF RECREATIONAL COMPUTING Brett Wilson 52 CHOOSE·A·TITLE by Jack A Taylor LP Enterpri_, 313 Kin9lton Road, liford, lG1 lPJ, Essex, UK; EIKtronic Concepts 673,920 different titles are possible! PTY Ltd., 52·58 Claranee St .. Svdnay. NSW 2000. AUSTRALIA; RS-232.186 Queen SUSTAINING SUBSCRIBERS 54 NEWETT AWL'S GOAT ONCE AGAIN by Brian Yanny St., W. Toronto, Ontario M5V 1Z1, CANADA; ASCII Publilihi"" 305 HI TOR,O, Results of a summer school project • 5-6-7 Minami AOYSTla, Mineto·Ku, Tokyo 107, JAPAN; In" W. HolKklr. 0815 Bill Godbout Electronics 55 COMPUTE-A-TICKET by David J. Beard Holzkirchen, Lindenm. 8, WEST GERMANY; Hobby Oat., 5200 12 Malmo, SWEDEN; Byte Publications Generate tickets for any good event Compugr Stor•• P. O. Box 31·261, 22B Milford Ad .. Milford, Auckland, NEW Paul, Lori and Tom Calhoun 63 AMINAL: A COMPUTER GAME by Kathy Burk and Rachel Wasserman ZEALAND; Syrtlmt Formula. Corp., Shin·Makicho Bldg. 1 ·8·17, Yeesu, Chuo-Ku. A Challenge by kids for kids Tokvo 103, JAPAN. Printed bv Nowels, Menlo Park, CA pg.28 RacrNriofUlf Computing (lSSN #0164-5846) is published bimonthly by Paople'. Computer CompanV, 1263 EI Camino Aeal, Box E, Menlo Departments Park, CA 94026, People', Computer CompanV Is a tax-exempt, independent, non-profit corporation, and donationilira tex.deductible, Sel:ond clan pottage paid lit Menlo Perk, California, and additional entry polnU, Copyright ©1979 bV People's Computer Companv, Menlo Park, 4 EDITORS' NOTES & LETTERS Celifomla. CoV1!r by Ann Miya 59 REVIEWS 61 ANNOUNCEMENTS 2 RECREATIONAL COMPUTING -

pUling and we have enjoyed your maga­ Or selllow·cost memory upgrade kits? remember not one word about com· zines and hope for more. If we can help puters. Has my memory been attacked by in any way please feel free to contact us. Yes, from tile regular hobby suppliers. a DELETE monster without my knowing it, or did I forge t about the auack and Tony Severa Do you (Re) have plans to have a number then forget that I forgot? Ubrarian, Midway Computer Club of articles on the Atari 800 when many HELLO, COMPUTERTOWN! 13) Highland Ave. are in use? Sincerely, Vacaville, CA 95683 John W. Davison Who else but a Dragon could roast a hot dog with his breath? Well, here's Ok, ComputerTown, I've seen your Yesi Lots of the"t We are also running P. O. Box 1165 the evidence. announcement in several issues of Recre­ Keep it up, Tony! You are right on articles on the new TI 99/4. You saw Ft. Walton Beach, FL 32548 ational Computing and have finally de­ target. We are out to 17Illke Q small town it here first! We are doing articles now If you have any lIeat little programs for cided to write you and see what you are of 27,000 people completely computer before there are many machines in use. Our cover shows the winning entry for the first Intenuztiorwl Computer­ the PET, send them to the SPOT editor, up to. Fint: some impreSSions after literote. Yes, we want input, ideas, Drawn Dragon Contest, a jire-bretIthing but congenial scaly bellSt who Harry Saal. fIe needs theml Mealltime, evidently prefers roasting hot dogs rather than hutnilnsl It was drawn by reading your announcement. and whatever. We see this as something Any other conunents on the Atari 800, we'll publish more PET programs as Tom Weller of Berkeley, California using the Commodore PET graphic that needs to be done - so we are doing etc.? readers selld them ill. - Eds. dUlJ'(1cter set. Tom said that he typed all the graphics in "print" statements I assumed that something is going on or it! Anyone needing info call send Q and tllat lie "got pretty good at wrestling with the peculiar properties of may go on to detennine the future of SASE 10 ComputerTown. U.S.A.!, P,D. Send us an article when you get your USER CLUBS IN SO. CAL? the PET quote mode. " Good work, Tom, you must have been detenninedl P.C.C. Since P.C.C. is a non-profit Box 310, Menlo Park, C4 94025 - Eds. machine. Tom's Dragon wins him a three-yetIr subscription to RC corporation I would also assume you are I perused your magazjne at a local wanting input (ideas. etc.) from those A READER QUIZZES RC Donald J. Stonek computer store and I liked what I saw. The Second and Third place winning Dragons, drawn by two brothers, Steve of us who help support P.C.C. with our 6026 S. New York Ave. and Tom Wuttke, aged 12 and 9, were also drawn on PETs. These Dragons subscriptions and donations. I am considering the purchase of a Cudahy, Wisconsin 53110 Also, I am interested in joining a were created as a port of the Second Kids Computer ainic at the University perso'nal computer like the Apple II . computer club. The Southern California of WiSCOtlsin- Waukesha Campus. For their fine drawings, Steve wins either a All the labels probably tie in personal Of those available this fall, the Atari Computer Society seems to have dis­ fWo-year subscription or 12 back issues of RC and Tom wins a one-year computers to your organization in BOO looks interesting. I plan 10 use appeared and I can find very [iule infor· subscription or a copy of "What To Do After You Hit Remm," P. C C 's present or future planning. Music in the my computer for personal use-education mation on computer clubs. Does anyone first book ofcomputer grunes. park can be a nice thing-several people for my family, games and some personal ha\'e any information? get together with some musicians and flllance. I plan on purchasing cassette Fourth and Fifth place winners are John Livingston of Waukesha, Wisconsin, combine computer synthesized music programs for the most part in the S8· Donald C. Pickering who also drew his Dragon on a PET, and Michael Slavin of Port Jefferson, with live music and you invite the public $20 range. I wouJd also like to learn SOMETHING'S BOTHERING HIM 13425 Kornblum #E New York, who drew his Dragon on a DEC PDP I 1. They each get a consola­ to participate and enjoy. to do some of my own programming. Hawthorne, CA 90250 tion prize of a copy of P. C. C. 's Reference Guide to Personal and Home There are two things that have been Computing. Thank you everyone who sent us Computer-Drawn Dragons. We You take your computers to the local If I get the Apple II Plus with Applesoft bothering me about the magazine the last CRYPTIC FRIENDS really enjoyed all the contest entries! See page 7 for photos of the winnen. library, which is what I do, and share II BASIC, do you anticipate that many issue or two. First and most important­ them with others less fortunate than of the programs for Apple that were what happened to SPOT? Where are all Dear Nine Hex . This issue is fOCUSing on computer sound and music, since the sound feature yourself and do your part to help eradi­ integer BASIC would be available in those neat little useful programs that seems to be the lalest popular development in micros. The lead article, "See cate Computer Illiteracy. Applesoft II? were the cause of my subscribing in the I read and solved most of your crypta· What You Hear and Hear What You See" by Herb Moore is the second in a first place? rithms in the latest Recreatiorwl Com· sen'es on the new Atari . "The Joy of Sound" by Doc Plumber Obviously you support or are being sup­ Yes, as the users (you included) of puting. features a sound'device that works on the TRS-80 and the PET. Alfred ported by several schools. I am interested Applesoftll make the conversions. The other thing on my mind is the Broey's article, "Making Music on the PET" describes a sound generation in providing computer literacy courses Fantasy Games. It seems to me an What intrigues me is your former associa· method for the machine. Also in the mode of expanding the capabilities of to local schools who cannot afford to Is Applesoft II a more advanced BAS IC exercise in futility to print long scenarios tion with the Nationa[ Puzzlers' League. the micro ;s the article "Texas Instrument Graphics and Animation. " The transport their students to the Lawrence than Integer BASIC? of non·existent games, fantasy. chess, J do believe I recognize your nom, from ideas and devices in these articles should bring hours of enjoyment for micro­ Hall of Science. tic-Iac·toe, or any 0111er kind. Where the old issues of The Enigma that I have computer users. Yes! are the programs to go with them? How read, and am surprised and pleased to I know nothing about Canada College. about a 4-0 tic-tac-toe game with a hear of you again. There are additional exciting items in these pages. Herb Kohl, a well-known But, I do react to the fact that in our If you have seen or used the Atari 800, 3-0 board where pieces will at random educator, presents a challenge to programmers in a Shogi variation.. FORTRAN local junior college (Solano County) please write any observations below. I pop off into a 4th dimension and pop The NPL, as you may know, fell on hard Man has remmed. Cryptarithms is still keeping our puzzlers busy. Also, we there is no course in micros. understand it is modular, holds up to back at some unpredictable time times during the 1960s and early 1970s. have included a number of listings or small programs throughout this issue, 48K RAM, has color and sound capability capturing whatever square they land on. The group was close to dissolution on more than we have ron in previous issues, since our retJden have been re­ I would also assume that the bookstore with good graphics and is expandable. How about a checker or chess game doing several occasions. I joined the League in questing them. is important for I find myself and many The ROM software and the 16K Atari the same thing? If I were into games I 1973, and about that time there was a other computer people to be book freaks. RAM expansion prices are much higher probably could come up with something resurgence in interest and membership. We had mentioned last time that Don Inman might be added to the "Ulsthead than cassette software and 16K expan­ better. The point is that ideas for games Today we're a thriving organization again of RC. Well, we're happy to announce that it's confinned Don, a grizzled As far as the Round Table pizza is con­ sion kits for the Apple. are not very hard to come by (even for of 300 memben, with more puzzles than computer freak, prolific computer book writer, and fonner editor of Calcu­ cerned, in Fairfield, CA we meet every me); implementing the ideas turns out ever, and resumed annual conventions. laton/Computers will add bits of wisdom and insanity to the editorial staff Wed. A.M. at Vickies restaurant to In your estimation, do you feel Atari to be dragon feathers of a different kind. ofRC. We/come, Doni have coffee, breakfast and see what will encourage outside software suppliers Anyway. the note about you compelled synergy we can get going. to sell low cost ($8-25) cassette soft­ Also, I see no point in reviews, com­ me to write and say hello. Tracy Deliman Don Inman ware? mentary, or letters about movies, books Ramon Zamora Bob Albrecht Well, those are my thoughts, By the way, and T.V. programs not directly related Will Shortz (Willz) I and others in this area are very con­ Yes, once the tnilchines get into the to computers in a computer magazine. Associate Editor cerned over the future of personal com- "peop/e's" hands. J read The Lord of the Ring series but Games Magazjne

4 AECA EA TIONA L COMPUTING NOV·OEC 1979 5 -

SIMULA nON IN BUSINESS TINYZORK CAN PETS SPEAK? It is not given to everyone to enter into Tolkien himself gave the last word on the him, not placed there by Tolkien, and Middle Earth. Even my wife and sons subject. "Some who have read the book. reflects his feelings and beliefs, not those The review of the simuialion, "Starting a The recent article you published on I am a recent subscriber to your magazine cannot follow and share completely its or at any rate have reviewed it, have of the author. Small Business" by Leroy Finkel in your ZORK did little more than tempt us with and I have been generally pleased with it. delights. I wish they could. I feel they are found it bOring, absurd, or contemptible; July-August issue inspired me to dig out the unobtainable. How many personal I would like to ask some things, mostly the poorer for not being able to do so. and I have no cause to complain since I I subscribed to Recreational Computing my copies of the manuals for this simula­ computer enthusiasts do you know that about PETs. I would very much like to However, if I read his character correctly, have similar opinions of their works, or of to learn more about computers and tion to see jfit might be converted to run can read 9·track tape at all, let alone in be able to have my PET speak and/or I advise Lon Ponschock not to read the kinds of writing that they evidently programming. Let's st ick to that subject on our Alpha microcomputer system. I DEC format? recognize spoken words. Is there any way Tolkien. The Lord of the Rings would prefer ." and bring in other topics, no matter am pleased to report that after about 15 this can be done? I have been trying to surely, in his own words, offend him at how worthy or delectable, only so far hours of effort, I was able to convert it Let's hope that you can come up with get the PET to recognize words using every level at which he can be offended. For Lon Ponschock's edification, in as they impinge upon it. That goes for to ALPHABASIC and to get it to run and something that we can use, and publish both hardware and software together, but It is not for him-a sad fact but true. Tolkien's own words, "As for any inner puzzles, too. print out successfully. it soon. And, please, remember that not without much success. Also, do you think There is enough unhappiness in the world meaning or 'message,' it has in the in­ all of us have TRS·80's either, even you could include more pertinent without his adding to it by reading a tentions of the author none. It is neither C. A. Cozart We plan to try the simulation in several though it may sometimes seem so. information and programs for the PET? work whose premises he will reject allegorical nor topical." 440 S. 44th Street of OUT business courses tltis fall. It will Lately there hasn't been anything useful and whose development would fill him Boulder, CO 80303 be a good way to introduce a touch of Thank you for your continuing good for the PET. with revulsions. I suspect such an en· As Sam said to Faramir, "It strikes me realism into our classes. We would be work. deavor would so enrage him that another, that folk takes their peril with them into Remember, it is called Recreational interested in learning about other busi­ Did you know that the winning projects and even worse, letter to Recreational Lorien , and finds it there because they've COIllPUtfl!.l.i not Recreational Comput~ ness simulations- especially those already lewis Moseley, Jr. in the Southern California State Science Computing would inevitably result. Lon brought it." Any topicaJ symbolisms Computing calf happell ill the mind as in BASIC! 2576 Glendale Court, N .E. Fair in ninth grade physical science and Ponschock is welcome to his literature. which Lon Ponschock may find in 11le well as ill the computer. We blend the Conyers, GA 30208 in nin th grade life science both had to do I hope he will have the courtesy to allow Lord of (he Rings was brought there by mind and the computer. - 11le Dragon Kurt Kreiselmaier. Assistant Professor with having semi-artificial intelligence me to prefer mine. Dept. of Business Administration Much the same comments have been programs on PETs? This took place in Midwestern State University expressed about Adventure .. . yet, we Los Angeles during May. I think people 3400 Taft Boulevard now have Adventure for the PET and who do projects like that deserve recog· 3ResuIts of tbe jfirst Wichita Fails, TX 76308 TRS-80. As stated in the lead to the nition. ZORK article. we want to promote a REGARDING UNIVERSE 'Tiny Zork" for home computen.. We Brian Sawyer are only tempting you with the 1310 Dover Hill Rd. lfnternational QComputfr 11Bratun I am working on a program that is very obtainable! - RZ Santa Barbara, CA 93103 similar to Universe (by Les La Zac in the March-April issue of Re). The difference We are including more programs and 11B3R~~Q&£ QCQ&£~QE~~ is that I am writing it in Apple BASIC, infonnation for PETs (chock this issue) using the Apple's high resolution graph· TRACING GENEALOGIES and would gladly include more if people ics. Anyone who would like to help is would only send things! - TD First Place: Tom WeUer (See ihe cover.) welcome to contact me. I feel that if I bought a microcomputer last year, an the program is to be any good, I should Apple IJ (6502), in the hope that it ask for help with it. After all J'm not a would bring order out of chaos in the TOLKIEN DEBATE AGAIN! whiz at programming; you might say I'm collected documentation I have of several just past novice. thousand ancestors. I would like to be It is a pity that the merits of various able to store, file, sort, retrieve, and cross· computers cannot be discussed without My des.ire is to invite other people to join reference genealogical data, and be able descending into disparagement of the in writing a super fantastic program. Any­ to trace genetic disorders and make other good sense of those who chose otherwise one contributing will hold the right to analo~. I would like to have pedigree, than yourself -vide Mark T. Tsetsi in the have their name listed as one of the individual and family group printouts July-August issue. authors. Also if you're interested in as well as indexes. money, write me. Even worse is the vitriolic condemnations The Mormons have done excellent work , by Lon Ponschock, in the same issue, of Tolkien's Lord of the Rings-without David Robertson but they use IBM 370'5. Some work out Second Place: Steve Wuttke Third Place: Tom Wuttke 6338 Wisteria Lane of the University of Utah has focused on bothering to read it himself. Certainly it Apollo Beach, FL 33570 minis using an excellent sowtdex code is escapist literature. It is a measure of with pointer systems for parents and Tolkien's artistry with words that some CHEERS FROM OOWN UNDER progeny, but the adaptation to micros is of us willingly suspend disbelief and not clear. escape into another, a magical world, Congratulations on a fine magazine. with its own logic and development, one fmd the games and chess discussions I would like to hear from others of a which answers some need deep within us. exactly to my taste. similar interest so that possibly a network In this world love is not merely a matter of information could be pooled and of glands and hormones. The virtues and Thanks for many happy hours of enjoy­ shared. their opposites are not mere meaningless ment. words or conditioned reflexes. Truth and Clifton M. Howard beauty and deceit and ugliness exist and Keith B. Lewis 58 Van Orden Road good and evil strive for mastery of the world. Fourih Place: John Living<;ton Malvern, Victoria, Australia Harrington Park, NJ 07640 Fifih Place: Michael Slavin 6 RECREATIONAL COMPUTING NOV-DEC '979 7 -

You need to include four variables: V 30 FOR W "- I TO 50: NEXT W 10FORA - I TO IS (for Voice). N (fo r Note), T (for Tone), 40NEXTN 20 READ N and L (for Loudness). These would be 30 SOUND 0,N,10,8 entered into the machine in this form : This will result in a set of notes that 40 FOR W • I TO 200: NEXT W gradually decrease in pitch as the 50 SOUND 0,0, 10,8 60 FOR W - I TO 10: NEXTW 20 SOUND V,N.T,L computer selects each new variable in 70 NEXT A the FOR-NEXT loop. That's right , 80 DATA 121,108,%,91,8 1 If you enter the following program, it it's "backwards" - Iower numbers mean 90 DATA 72,64,60,53,47 should give you your fIrst chance to hear higher notes and higher numbers mean 100 DATA 45,40,35,31,29 what you can hear and also allow you to lower notes. set the volume on your TV set. ATARf VOICES The chart gives numerical values for three 10 SOUND 0,121,10,8 octaves of notes corresponding to conven­ So far so good. Now let's see if we can 20GOTO 20 tional tonality. get the machine to "sing" to us in four . part harmony, To do so, we'll need to SEE~BATYou This will give you a steady tone that is explore the variable V (for VO ice). The approximately Middle C. The loudness following program will make the machine Natufal Scale Note N (Note) Value should be at a medium range , so you can play the three notes of a C Major chord, set the volume level on your TV set to a C, E, G, all three voices at once. reasonable level while the tone is playing. C 243 c# 230 Une 20 tells the computer to hold the 10 SOUND 0,12 1,10.8 HEARS D 217 tone wail you press the BREAK key to 20 SOUND 1,96,10,8 D# stop the program. 204 30 SOUND 2,81,10,8 E 193 40 FOR W .. I TO 100: NEXT W The AT ARI machine allows you to gen­ F 182 SO END erate 16 different levels of loudness. If F# 172 G 162 HEAR ~BAT you you wish to have a tone play at each level Now suppose you want to have voice 0 G# 153 of loudness, you can use a FOR-NEXT A 144 start and sustain a note, voice I coming loop as demonstrated in the following A# 136 on after a short delay and also sustaining, program: 8 128 and Hnally voice 2 coming on to C (Middle C) 121 complete the chord, Try this: SEE 10FORL=OTOIS c# 114 20 SOUND O,IIS,IO,L D 108 10 SOUND 0,121,10,8 30 FOR W '" I TO 200: NEXT W 0# 102 20 FOR W - I TO 100: NEXTW 40 NEXT L E 96 30 SOUND 1,96,10,8 F 91 40 FOR W - I TO 100: NEXTW You now have a sense of the increments F# 85 50 SOUND 2,81,10,8 60 FOR W - I TO 100: NEXTW BY HERB MOORE of loudness available, so let's set the loud­ G 81 ness at an average level of 8 and look at G# 76 70 END the tone variable T. There are 16 tone A 72 Our ''music editor" ;s still busy exploring MAKING SOUNDS As you typed in the same FOR-NEXT setti ngs on the ATA RJ . We can revise the A# 68 all the exciting dimensions of the new 8 64 loop in lines 20, 40, and 60 in the above program using the variable T in ATARJ computers. Herb, who is a Last issue you got to "see what you could C 60 program above, yo u may have said to the FOR·NEXT loop. The program will I7UJsician and beginning computer person, sec," This time let's "hear what you can c# 57 yourself (if you're lazy like me), "There look like this: says that these articles. If read ;n se­ hear ." D 53 must be an easier way to do this." Or, if quence, can be understood by people D# 50 you've had a bit more programming who have had little previous experience As you might have guessed, but I'll tell IOFOR T "OTOI5 E 47 20 SOUND 0,1l5,T,8 F 45 experience, you may have said, " Why not in BA SIC programming. you anyway, if you want the ATARl use a SUBROlfflNE here," A GOSUB computer to make a sound, you need to 30 FOR W = 1 TO 200: NEXT W F# 42 40NEXT T statement tells the computer to leave enter a SOUND statement. If, however, G 40 Herb's last article in the Sept-Oct issue of G# 37 temporarily the main program and go to Re, covered the color graphics ovaiwbfe your SOUND statement is "unsound" so When this program is nul, the computer A 35 a subroutine. In the subroutine, a to speak, the computer won't make any on the ftulchines while this one descdbes will play each of the 16 available tones. A# 33 RETURN statement tells the computer to the sound capabilities. Laler articles will noises. That seems fair enough. So let's 8 31 continue with the main program at the combine color graphics and sound so that look more closely at what is necessary in Next let's look at the variable N (for C 29 li ne following the GOSUB statement, So you really can "see whilt you hear and the SOUND statement. Note). The ATARI computer is able to we can rew ri te and shorten our program hear wluzt you see. " - TD select from 256 note values ranging from If you wish to write a musical sca1e , you using a subroutine: o through 255. Since we have 256 notes can store notes from this chart in a table Sections of this article were excerpted rrom the to produce, let's rewrite the program to 10 SOUND 0,121,10,8: GOSUB 100 book ATARI BASIC by Bob Albrecht, leRoy and read them into the program when Finkel, and Jerald R. Brown, ©1979, by John vary the notes. We will also shorten the you need them. Here's a program that 20 SOUND 1,96,10,8: GOSUB 100 Wiley & Sons. Inc. time delay in line 30. 30 SOUND 2,81,10,8: GOSUB 100 plays two octaves of a C Major scale , 40 EN D ascending from Middle C. The C Major IOFOR N"'OT02SS 100 FOR W · I TO 100: NEXT W scale consists of all natural notes' that is 20 SOUND 0,N,10,8 110 END it has no sharps or fl ats. ' ,

B RE CREATIONA L COMPUTING NO V·DEC 1979 9 OLE MAC WHAT? 3200 FOR W = I TO 10: NEXT W for voice three. Lines 8000 through 3500 RETURN 8500 create the time delay that alloWS Here's a slightly more complex program 4000 FOR W = I TO 200; NEXT W you to turn off the sound when you wish which uses subroutines to establish dif· 4100 SOUND 3,0.0,0 to separate one note from the next. ferent possibilities for the duration of 4200 FOR W = I TO 10: NEXT W Here is a duet of "Ole MacDonald" 4300 RETURN notes. Line 3000 will be equivalent to a and subroutines: 5000 FOR W = 1 TO 300: NEXT W A-reN quarter note, or a count of one beat in 5100 SOUND 3,0,0,0 conventional music notation. Line 4000 10 NO ~ 243: Nt '" 193; N2 ~ 162: GQSUB 6000 5200 FOR W = I TO 10: NEXT W 20 N3 ~ 60: y,. 100: GOSUB 6400 will be equivalent to a half nolC, or two 5300 RETURN 30 N3 '" 60: Y " 100, GOSUB 6400 beats, line 5000 the equivalent of a 6000 FOR W = I TO 400: NEXT W 40 N3 '" 60: Y 100: GOSUB 6400 dotted half note, three beats, and line 6500 RETURN 50 N3" 8\ Y - 100: GOSUB 6400 6000 will be the equivalent of a whole 60 GOSUB 8000 E note or four beats. TIle statements in lines 3 100- 3200, 4100- 70 NO '" 182 Nt:; 144: N2" 121 : GOSUB 6000 4200, 5100-5200 tell the machine to 80 N3 '" 12. y = 100: GOSUB 6400 90 N3" 72: y " \00: GOSUS 6400 10 SOUND 0,243,10,8 turn off Voice 3 for a cOUllt of 10. This 100 GOSUB 8000 20 SOUND 1,193, I 0,8 delay will be short since the computer 110 NO:; 243. NI = 193: N2 '" ]62; GOSUB 6000 30 SOUND 2,162,10,8 counts quite fast. There is no short time 120 N3" 81 Y :; 200: GOSUB 6400 40 SOUND 3,60,10.11: GOSUn 5000 delay in subroutine 6000. All the voices 1)0 N3" 47; y ,. 100- GOsus 6400 140 N3" 47. Y " 100, GOSUB 6400 50 SOUND 3,81,10.11: GOSUn 3000 are turned off by the END statement III 150COSUB 8000 60 SOUND 0,182,10,8 line 230. 70 SOUND 1,144,10,8 160 NO = 162- Nl " ]28: N2 ~ 108: GOSUS 6000 80 SOUND 2,121,10,8 1701'13 = 54. Y = 100: GOSUB 6400 '. MORE IMPROVEMENTS 180 N3" 53: Y " 100, COSUB 6400 90 SOUND 3,12,10,11: Gosun 4000 190 cosus 8000 100 SOUND 0.243,10,8 In the main text of the program, we 200 NO = 243, NI = 193: N2" 162: GOSUB 6000 UOSOUND 1,193,10,8 210 N3" 60: Y '" 400: GOSUB 6400 120 SOUND 2,162,10,8 change line 40 to these three lines: 220 COSUB 8000 130 SOUND 3,81,10,11: Gosun 4000 6000 SOUND 0.NO.IO.8 140 SOUND 3,47,10,1 1: Gosun 4000 40 SOUND 3,60,10,11: GOSUB 3000 6100 SOUND I.Nl.l0,8 150 SOUND 0,162,10,8 41 SOUND 3.60,10,11: GOSUB 3000 6200 SOUND 2.N2.10,8 160 SOUND I, 128,10,8 42 SOUND 3.60,10,11; GOsua 3000 6300 RETURN 170 SOUND 2,108,10,8 6400 SOliN\) 3.1013 .10 . 11 180 SOUND 3,53,10,11: GOSUn 4000 instead of holding the same note for 7000 FOR \>, - 1 TO Y casus 8300 7100 RETURN 190 SOUND 0.243,10,8 3 bealS, we're telling the machine to stop 8000 SOUND 0,0.0,0 200 SOUND ],193,10,8 briefly after playing the note for one 8100 SOUND 1.0,0,0 210 SOUND 2,]62,10,8 beat, then repeat this process two more 8200 SOUND 2,0,0,0 220 SOUND 3,60, 10.1 1: GOSUn 6000 times so that we get tJuee distinct notes. 8300 SOUND 3,0,0,0 230 END Don Inman's son, Kurt, is already quite proficient on the TRS­ Seven shapes are drawn on the left edge of the video screen. These lines are equivalent to striking the 8400 FOR Z" 1 TO 10, NF:XT Z 8500 RETURN BO. He and Don are co-authors on several books that deaf 3000 FOR W '" 1 TO 100; NEXT W key on a piano three separate times with this fast-selling machine (Introduction to T·BUG and 3500 RETUR N versus striking the key once and holding Now you have an idea of some of the Real Time BASIC for the TRS·80, difithium Press). Kurt is 4000 FOR W = ] TO 200: NEXT W it down for tJnee beats. We make similar things that you can do with the sound fifteen years old! 4500 RETURN changes as follows: parameters of the ATARI computer. 1. I 5000 FOR W = 1 TO 300: NEXT W In this article I have dealt with the voice But how about Dan's daughter, Kit? She is too young to 5500 RETURN 2. 90 SOUND 3,72,10,1 1: GOSUB 3000 and note parameters of the SOUND rou· co-author books, right now. However, she can run the com­ 6000 FOR W = 1 to 400: NEXT W .I: 91 SOUND 3,72,10,11: GOSUB 3000 tine. You might want to now play with puter. Don has produced a shape-matching program for her 6500 RETURN 140 SOUND 3,47,10,11: GOSUB 3000 the T (for Tone) and L (fat Loudness) to 3. 141 SOUND 3,47,10,11: GOSUB 3000 which he now shares with you and your kids. -RZ I further enrich your music programs. I'll You may notice that Voice 3 in tlris 180 SOUND 3,53,10,11: GOSUB 3000 be interested 10 hear what you hear. program is set at a slightly higher level 181 SOUND 3,53,10,11: Gosun 3000 •• For your reading pleasure, I'm including I. of loudness. Voice 3 is the melody voice. a description of "Ole MacDonald" in BY DON INMAN Voices 0, I, and 2 playa background We'll leave line 130 alone since it is meant 5. conventional music nOlation. Be "hear­ ~ chord so are set lower. If you run this to be a half note that is sustained 2 beats. ing" you! The use of graphics on the computer is the key to capturing program, you might find the melody 6. the interest of youngsters. This program was designed for my vaguely familiar. That's because the NOW HEAR THIS! ... daughter, Kit, who is in kindergarten. It requires that the user melody is almost "Ole MacDonald be able to punch in a single-digit number (1· 7) and the ENTER 7. Had a Farm." But ... not quite! You could say that part of the "Zen in .z- key on the TRS-80 computer. It could also be used by pre· the Art of Programming" is flllding dif­ school children. The machine will execute commands so ferent ways to make the machine do what NOla 4 CCCG AAG EEOO C fast that there will be no space between you want it to. So for the zen of it, here's '. ~ :. . the notes, causing them to slur together. another way to have the machine play the . ':.'. ::'- .._ .:, . :-.,:. Ouarter Nota " . :: .:.:.: -:;•• ;:' .:'. : .:: • " , or If we rewrite the program and put a time same tune. We have made the SOUND (gets one beat! delay in the subroutines, we can distin· statements into subroutines and will i Half Note guim each separate note in the melody: enter different values for the note (gets twO beats) variables in the program. The variable Y r Whole Nota 3000 FOR W = I TO 100: NEXT W in line 7000 of the FOR-NEXT loop (gets four beau) 3]00SOUND 3,0,0,0 allows you to vary the note duration

10 RECREATIONAL COMPUTING ~Ir~itl NOV-DEC 1979 11 fCR H'<~I~" rLO'l"(7"li ''::IF- M f'G~f. ,J7: FC~~ 'l.l~ 1000 OATA lSS4".IS48J,IS412 EXPLANATION OF THE PROGRAM BY SECTIONS P"~!: f";~;; c,,~' ~tXT One of these seven shapes is then randomly chosen and it ap· 11. POKf, -_M,'. '-Eo'.M , I '.',( I~ID OATA 15675.15681).181 11:10 OATA 15940,IB7, lS941 ,I 51,16068,1 'lI, 16D69.181 shapes. lila DATA 1619~,18~,1~19".IS1

M,N are graphic character codes. f"OM ·-?larl?,," «~LOTIZ,) ,Tep_4, PCKE ~,J2 POKE C'I,3~ 1. 1200 DATA ~S,I ,1 91,2,l21,1.4 ~ ~,4 , ~77.S,"O~.6.HJ1,7 I 2 is the chosen input number (to match the shape). 'I' P"~E ' - 4.~ POIU: -' , ~ , PC·R;; I rr 25 11, PCI<>; ~ .N, N''''':' A with this program is like. WHAT IS THE NUMBER OF THE MATCHING FIGURE7_ 70 FO~ ,,"I TO 7, R£AlI L,ll, PIIIN'I" _L,II:, NLX':' A '" 80 B~ RKDP) 'to P " 162H The next section contains the message for an incorrect guess. line 600 increases the count for number of misses, Line 610 In the next section, a graphic character code is selected for N and 620 print the message. Line 630 is a time delay to allow ... the message to be read, Lines 640 through 660 erase the Th e user then keys in the number of the shape which he/she and M depending on the value of the random number. This message and the shape, and line 670 returns to line 90 to thinks the random shape matches. The ENTER key · is then selects the correct shape to match the corresponding shape .. put the random shape in the lower right corner ready for ., pressed. The random shape then moves vertically and hori· numbered by the value of B. After the correct values for N a new guess. zontally to a position adjacent to the chosen shape. and M have been chosen, the program proceeds to line 200.

10 If Bel TIlEN 1<~1S7, Mol8l bOO ~=K.I. 110 If 0=2 THW N=IS6: M=ISl 610 PRINT H~,"'.",,'- - THAT'S ~ >I" !", : . I~( "" B'J THEN "~171: ,,,,,, 183 ,~o PRINT :,!4:'4,"r!IlN~ !lAM. TIl~~ 'I"~Y ~,"~I~."; .. ~IJ H,R "·1 -ro HI., NEXT W ll0 IF 8_4 THE~ N',lBl, 11 181 .' 14'~ If n- '. TH~N ~=lB7, 1I=1~1 ~4'! Pc-Kr. ", 31, PjK~ ·1,12 :: .. 1. l~ If U06 TIl&N N~171, M. 1Sl 6S0 PRllIT ~2"fj. 1&0 Ir 007 TH~~ N-186 , >1.151 6fjO PRI~T P4:'4." "; ". 670 G01'O 90 . ., ".. :: ::: 2. .. :,,: Next we put the random figure on the screen and get the The following section is used for correct guesses (see line 530). :.: 3. guess. 2. For a correct guess 2 will be the same value as B ;: ------(the number selected randomly by the computer). Line 200 Line 700 increases the record of the number of correct guesses. lines 710 and 720 put the score on display. line 730 , displays the random shape made up of the charact~r codes .' .. 4. .. +I Nand M. Line 210 asks for the user to make his guess. Line restores the data pointer to the beginning of the data table , for a new random shape. line 740 then sends the program ., ,. I 220 makes sure that the number selected is either 1,2,3,4, .:' ., ~~ 5. 5,6,C:H 7. If the number chosen is not one of these, the selec· back to the beginning. .:;: I .: .. ::.. .~.,: .. I tion is erased and the program goes back for a new input. , 6. line 230 causes the program to omit any vertical movement, 700 S. S' l ,. .: . I as the guess is already positioned on the correct line. , 10 PRINT ~JOO ,"i'IIITCHES ~ .:. ~;. 720 P~INT ~ 4 28 ,"MI SS~S .. :: ., ; 7. 730 RESTnRF. .. 74'" GO'J'O 50 200 PO"" P ,H, POKE ~H , Ii 210 PRINT P91l-6 .">lHAT IS THE HU!lBER or n!~ ""'TCH I~ G FIGURE"" INPUT Z$ n :: ~~ WHAT IS THE NUMBER OF THE MATCHING FIGURE? 3 21S Z ~ VAl (I S) ;: ~: ..' .:. .~ :. ::. ~20 If" 2 (1 1 AIIO Z <~ 2 1\110 Z(H AND Z ~)4 I

12 RECREATIONAL COMPUTING NOV·DEC t979 13 Later in the game, here is a possible sequence of moves using GAMES TO PROGRAM the Shogi rules. NORTH Thll boerd looks like this. It is SOUth's turn 10 move. ~ Q Q o

A SOUTH The Vaul! ot tne Dead IS NORTH Dut one ot the many A South warrior captures a dalk and leal some North warrior. ~ mystelles Within the lumed remple 01 0 Q Apshar Th e Temple 01 Shogi ra ~ e yOl.ll lavonte cha' acter Or A.pshJi IS yOlH IIISI • ,( lettl1" compute, create one for adven lule In the you' DU NJO NOUESr-· serres • Let the Boo. 01 Lore gu,de you 01 tantilsy lole IHaYlng Ihrough a DUNJONOu!:sr games Variation wtthl n Ill" Temple • Dec,de to f'ght lh<"1 monllN. or DUNJONOUESr' IS a BY HERBERT KOHL ~ grab the fleasu'e and ,un bUI complete game system don t In,n ~ tOO long- they II come and The Tempt e 01 Ap shai SOUTH alter ~Ol.l' IS a complete lanli1Sy Because of this characteristic, the game strategy gets complex. advenlure game tor you You must analyze not only the situation on the board, but the NORTH The Temple of Apshai-for the anu youl rnlCIOCOrnpuler Herb, a well known educator. author, and editor, i1U1ugurates Q A North warrior advance$. off·the·board power your opponent has. TRS-80 Ilevel II. 16K J and PET Ove:R. ZOO 1C{)(;J,Irl ! new RC challenge series: games [or you to program. YOIl can ~ 132KI microcompulers. tell from (his first offering tllat the games you will see herf.' flf€il ZO xOK~ r£RS / will be interesting. (They will also be educational- but we'll The rules of Shogi are also complex and will be described in a 0 Ask YOUI local dealel C'Y!"R 10 71W$.fU S/ 1 01 send a check 101 S2~ 95 to try to keep tllat quiet!) future article. Here I would like to demonstrate the rule of interchangeability of pieces on a simplified board. To get a 0 Automated Simulations-Department 0 Herb and his wife Judith are co-directors of Coastal Ridge feel for the consequences of the rule, a 5 X 5 board is used for PO Box 4232. Moun13rn View CA 94040 Research and Education Center in Pt. Arena, CA. The center experimentation. In the games I've begun to explore, each is Q non-profit educational organization designed to provide player starts with 5 pieces, a ruler and four warriors. The & bolh theoretical and practical support to people involved in rulers move as kings do in chess, and as in chess they cannot SOUTH move into check. The rulers have no capturing moves. The progressive educational activities. NORTH warriors have modified pawn moves. They move and capture South pUb a captured Let us know how you like this series. - RZ like pawns with these exceptions: warrior into play. Trouble ~ THE COMPUTING TEACHER* for North I Shogi is the Japanese version of chess. Though in many ways it I) They cannot move 2 squares on their first move. 0 Is a professional journal, designed for educators is similar to chess it has one feature that makes it unique 2) They can move one square at a time backwards as well as Q 0 interested in the instructional use of computers among chess type games. All of the pieces in the game , no forwards. - and calculators. It is now in its sixth year of matter what rank, are shaped like arrows: 3) There is no pawn promotion when a piece reaches the last publication. rank. & D • classroom materials for use with students; SOUTH The object of the game is to either: • teacher education materials; TIle pieces are also all the same color. The only way you can Is it possible to program this game and explore the possibilities • software / courseware; tell which player controls a piece is by the direction the arrow I) Capture the ruler. for interesting pl~y? The board can be expanded. New pieces is pointing. Your pieces point towards your opponent. 2) Trap your opponent so that none of his or her pieces can can be added diat move like bishops or rooks to further make a legitimate move. complicate the game. What would a game exploration program Subscription rates: look like? Could there be a way to develop a program so that $8 tYro (six issues) Q Q There is one additonal rule - the Shogi ruJe. You can put a the size of the board and the move characteristics of the piece $10tYr. (foreign rate) warrier you capture back into play on your side anywhere on can be varied each time one plays? $16/ (13 issues) 0 the board instead of moving one of your pieces. THE COMPUTING TEACHER 0 At the beginning of the game the board looks like this: Computing Center Eastern Oregon State College Q Q ~ Q Q La Grande, Oregon 97850

During the game of Shogi, any captured piece can be put back ... Published by the Oregon Council for into play. TIle person who captures the piece can replace it on Computer Education. A non-profit the board in lieu of one of his or her moves. The piece then Organization. becomes part of the player's forces. o 0 ~ 0 0 ©1979 by Herbert Kohl NOV-DEC 1979 15 14 fI~CREATIONAL COMPUTING You now type in your five parameters (separated by commas). SOUNDW ARE DEMONSTRA TlON PACKAGE Example:

A - SAUCER FR,DU,#S,SSI.SS2 a? 5,5,100,2, 20 B - LITTLE LASER then press: ENTER C-BIG LASER WOW!!! FAST FIRING LASERS!!! D - BOMB E - LITTLE BIRDS SOUNDWARE Notice the tone example uses the two parameters 100 and 500 F - BIG BIRDS fol1owed by three zeros. This plays a single tone with a pitch The Joy of 00und from G - CHIPMUNKS BY value of 100 and a duration value of 500. Let's experiment by H - PONG CAP ELECTRONICS lengthening the duration. it can go up to 9999.) 1- THEIR POLICE I-OUR POLICE K - MACHINE TALK Type: E L-BACK TALK then the parameten: 100, 1000, 0,0, ° Q -QUIT CHOOSE YOUR SOUND rrr>_ ,------this is doubled 00UNDWAI2E then press: ENTER THE NOTE LASTED TWICE AS LONG AS THE OR IGINAL By pressing anyone of the keys (A·L), you will hear the sound of your choice. If you goof and press the wrong key Now type: E then: 200,500,0,0, (one not on the menu), the screen will display the title "page" ° original duration and you must once again press ENTER to see the menu. (Press ENTEQ to Continue) \ ' pilch is doubled then press: ENTER Afler listening to this wide variety of demonstration sounds, i ~ ______-' you will be ready to experiment with some sounds of your I THE NOTE IS LOWER IN PITCH THAN THE ORIGINAL own. If you press Q, control is return to 8ASIC with the usual prompt: Now type: E then: 50,500,0,0,0 ''-:::------pitch is half original READY then press: ENTER >- HARDWAR E THE NOTE IS HIGHER IN PITCH THAN THE ORJGINAL You are now ready to load the next program on the SOUND· The hardware installation is easy. The package is about the WARE tape. Type: size of a small transistor radio. When you open the case to insert two AA batteries, you'll find what looks suspiciously CLOAD "8" like the audio section of a transistOl radio. C1e'ler idea! (Why didn't I think oHt?)

Next, you merely unplug the AUXiliary connector of the SOUNDWARESOUNDCOMPQSER BY DDC PLUMBER casselte recorder (the gray 3.5 mm plug to your Radio Shack cassette) and plug it into the SOUNDWARE connector. An ENTER: PITCH, DURATION, #STEPS STEPSTZEI STEP- SIZE2 " On/Off/Volwne control is provided to adjust the volume of He's back again, this time with a system that allows you and (1-999), (1·9999), (0-255), (0· 255), (0·255) your TRS-80 to make music together! This is the second in a the sound. series by Doc Plumber on hardware/software inter/aces thot EXAMPLES; I·TONE 100,500,0,0,0 That's all there is to the hardware. No tools, wiring or solder· Thus, we see that low values produce high pitches, and high even amateurs con put together. 2·LASER S. S, 100, 2, ° values produce low pitches. High values produce long dura­ ing are necessary. 3·SAUCER 250,25,249,5,248 tions, and low values produce short durations. You may have The next step is to bring several computers together and create also notice that the high pitched note was shorter than either a symphony! Or would it be a cacophony? - TD SOFTWARE PRESS: I OR 2 OR 3 TO HEAR AN EXAMPLE E TO ENTER A NEW SOUND of the other two even though the durations were the same R TO REPEAT THE PREVIOUS SOUND (500). To have a true constant duralion, the product of the If you own a TRS-SO, PET or COMPUCOLOR II . then Three programs are provided on the SOUNDWARE cassette tape. The first is a demonstration program that is loaded by QTOQUlT pitch and the duration values should be kept constant. Ex· SOUNDWARETM. from CAP Electronics is for you. This ample: simple-la-connect, easy-Io-use system will give you hours the TRS·80 command: of entertainment when used with the included demonstrotion The display is self-explanatory. Pressing 1,2 or 3 will give you original note:: 100 X 500 = 50,000 program alone. If you add its capabilities to your current game CLOAD "A" one of the three sounds listed as examples. If you want to high pitch: 50 X 1000" 30,000 programs, you 11 get realistic sounds that will make your low pitch: 200 X 250 '" 50,000 After this portion has been loaded, you on the screen the enter a new sound, type: programs come alive. see message: E Therefore, if we enter: SOUNDWARE is a combination hardware/software package (the software package can be purchased separately) designed WORKING Below the instructions in the previous display will appear: 100,500,0,0,0, for the PET and TRS·80. or 50,1000,0,0,0 After a few seconds the screen displays the title shown at the IQTO QUIT or 200,250,0,0,0 *TM a tndemark of CAP Electronics, 1884 Shulman Ave., San Jo,e, heading of this article. When the ENTER key is pressed, CA 95124 - $29.95 for the PET and S39.95 fo r the TRS·80. the menu for the demonstration is printed. FR,DU,#S,SSI ,SS2 =? notes of equal duration should be produced.

16 RECREATIONAL COMPUTING NOV-DEC 1979 17 Next, we'll examine how the steps work. These experiments could go on for hours as there are so many USING SOUNDWARE IN PROGRAMS possible combinations of the parameters. I. Original note plus five steps of size 6. The third program on the SOUNDWARE tape is helpful in Each step value is added (or subtracted) to the previous creating sounds in your own programs. You first load SOUND. value, but some puzzling results can occur when you use Type: E WARE Program ''C'' into the computer from the cassette. more than one step. If you take only one step: It is a BASIC program which will load the machine language 100,500, S, 6,-':'~==~'" each step size 6 program used to make the sOWlds. When it has finished load­ '\ . S additional ueps 100, SOO, I, 3~,-____ small numbers give ing, you will receive the usual READY signal from the TRS. is a small step down 80. Here how the screen looks from power up. We hear: J .. d #1 J 100,500, I, 170,0 o~pdown J "'~ ____ larger numbers give MEMORY SIZE? 32642 JIves room (or the machine step down #2 larger steps down language program step down #1 J J RADIO SHACK LEVEL II BASIC step down #2 READY step down #1 J 100,500, 1,252:.'-0____ very large numbers give >CLQAD "C" SOUNDWARE loaded here a small step JUl READY Down we go, alternating steps I and 2 from the original >- note.

2. Original note plus five steps of size 250. Now type; Type: E RUN: 100,500, S, 2S0 2S0 Run the SOUNDWARE "C" program ~ each step size 250 which loads the machine language program for you. Weheu: Jstep up #1 The screen goes blank, and then displays: Jstep up #2 ';stepup #1 Jstepup #2 MEMORY SIZE MUST BE SET TO AT LEAST 125 J.tep up #1 BYTES LESS THAN MAX E.G. 32542 FOR t6K OR J original note 20324 FOR 4K MAOiJNES IF IT'S NOT, POWER OFF AND START AGAIN!! 3. Alternating up and down PRESS ENTER TO CONTINUE_ Type: E 100,500,20, 250, 6~ _____ '- step down i Now press: \L--=====;~ stepup . 20 additional steps ENTER We hear: To clear up the picture a little bit, study the following table ... etc. of results. MEMORY SIZE MUST BE SET TO AT LEAST 125 The computer is now ready for you to enter your BASIC BYTES LESS THAN MAX E.G. 32642 FOR 16K OR program. Your program can be entered from the keyboard or 4. One last experiment varying the dUration with .alternating from a pre ·recorded cassette tape. Since Don Inman was kind Step Ch ..., 20324 FOR 4K MACHINES steps IF IT'S NOT, POWER OFF AND START AGAIN!! enough to send me a cassette copy of MATCH ME (see page No change ), I decided to add some sound to his program. Type: E Small step up PRESS ENTER TO CONTINUE 20,20,250,250,6 sounds an alarm '" t WORKING Delay here a (ew 3Cconds to My next step was to load MATCH ME from the casseUe. '" STARTING ADDRESS '" 32642 load machine language E •• program 20,200,250,250,6 gives a twinkle 1 I typed: 157 big Itep• up NOW YOU COULD MAKE SOUNDS WITH x'"' USR(O) I" nay away CLOAD "MATCH ME" E THE SOUND PARAMETERS CAN BE LOADED INTO I" big step down 20,2000,50,250,6 HELP! the police TM TO TM+6 WJTIJ POKES f READY After the program had been entered, J made these changes and •• additions to MATCH ME. 1 ~ >- I small step down 0 no change

When more than one step is involved and large steps are used, you may get a "wrap around" from high to low or from low to high pitches.

18 RECREATIONAL COMPUTING NOV·OEC .97\1 19 =

SUBROlITlNE ADDED TO PLAY SOUND YOUR INVITATION TO 2000 TM" PEEK (16561) + PEEK (16562) • 256 + 2 2010 POKE TM ,0: POKE TM + 2,E: POKE TM + 4,F: POKE nl + S,G: POKE TM + 6,H COMPUTIN ADVENTURE 2020 X" USR (0): RETURN MAIN PROGRAM CHANGES AND ADDITIONS

5S O"'200:E"'S:F"IOO:G=255:H=O: Produces a sound similar to a siren on its way up. UKd to inuo­ GOSUa 2000 duce the program and afler each correct mal<:h. 70 rORW=lT07:READL,M:PRINT@L,M 75 D=IS:E= I O:F=)Q:G=I:H=O: Provides a IaKr shot a5 each of the figuns an numbered. GOSUB 2000: NEXT W 205 0=20: E= 100: F =0: G =0: H "0: Adds a shorl tone (or blip) when the fIgUre to be matched GOsun 2000 appears. 310 POKEC-64,N:POKEC-63,M 320 O"'ZO:E"'IOO:F=O:G=O:H=O: Produces a short tone as the figure moves vertically. GOSUB 2000 410 POK£C_4,N:POKEC_3.M Produces a different lone as the figure moves horizontally. 420 D=4Q:E=50:F=O:G=O:H=O: GOSUB 2000 INTERFACE AGE SIS D=IO:E=lOO:F=20:G=255:H=6: Produces falling notes after A MATCH is printed. GOSUB 2000 EVERYTHING YOU WANT TO 525 D= 10: ["'100; F=20:G=6:H=250: Produce.s a series of monotones after the smiling face. GOSUa 2000 615 0=250: £""0: F=SO:G=5: H=149: Produces a rising series of warbling notes after NO, NO ... on KNOW ABOUT COMPUTING GOsua 2000 a missed guess. 630 O " ISQ:E=10:F=90:G=249: H=9: Produces a falling Kries of warbling notes after!R Y AGAIN ... Every issue is written and ediled by experts. Every issue brings you how·lo's and know·how on: GOSUB 2000 715 O " SO:E " 40:F=20:G"250:H;6: Produces a seMel of low monotones after the number of matches - Software and Hardware -Educational and Developmental Applications GOsua 2000 are printed. 72S O"3Q:E"67;F;20:G=24S:H=l l : ProduCC5 a series of higher monotones afler the number of GOsua 2000 misses are printed. • T uforials on all phases of computing - Business, Accounting, Investment Analysis, Law 740 I'OR W = I TO 30: D = RND (255): E = 50: technology and Medical Applications I =0: GoO: H .. 0: GOSUB 2000 Produces 30 random tones before proceeding to a new U}'. 145 NEXT W - New Product Design and Reviews -Hardware and Software Reviews

- Carnes, Robotics and Energy • Personal and Home Projects MY RECOMMENDATION ON SOUNDWARE II'S a 12·month program to help you enjoy all computing activities no matter what your special interest Whenever sound is needed in the main program, the paramo Get it as soon as possible! You don't know what you've been is. All the spectacular computing fun, adventure and know·how every compulerisl dreams about and eters (0, E", F, G and H) arc assigned and the subroutine at line missing. TIle sounds that you can create are endless. let your iI's all yours. We guarantee'" it. 2000 is called. A varicty of sounds were added to the program, imagination run wild! Be careful if you have a room full of but I'm sure that you could do so much beller. Here is a brief computers equip ped with SQUN DWA RE . You may wish you DON'T WAIT! SUBSCRIBE TODAY! description of the sounds I used. You'd have to play them on had a set of earphones for each machine. SOUNDWARE is addictive. Once you start using it, you'll have trouble stopping. • Unless you are completely satisfied with INTERFACE AGE. you may cancel your subscription al any lIme and receive it SOUNDWARE to appreciate the effect. full refund for all unmailed copies.

Please en'er my subscrlp'lon for: o I Year (12 Issues) \18 0 I Year Cilndda,~l exlco \20 EXCLUSIVE 1980 BONUS o I Year Foreign Surlac", $28 0 1 Year Foreign Air Mail $50 o Enclosed is my check or money ord",r In U.S. Funds drawn on U.S. bank. INTERFACE AGE brings you a com· Mak", che<:k or money order payabl'! '0' plete course on '"How to Build and Use INTERFACE AGE Magazine. PO Box 1234. C",rriros. CA 90701 a Micro Computer Based System." This series will cover all aspects from o Blil ~le PleaS(' charge my 0 I [j ~ n _ system development principles fO how to use a database management system. I I I I I I I I I I I I I I I I In addition, several interesting in· stallments will be devoted to providing the reader with a good grounding in the Exe 'n FORTRAN language. RUSH my copies to:

DON'T MISS A SINGLE ISSUE!

20 RECR EA TlONAl COMPUTI NG NOV·DEC 1979 21 - ~-

COMMENTS FROM NINE HEX (JACK CAEHORE)

Here are a few elementary hints for solving puzzles. Test these You know AT is at least 10, and therefore M is 5, 6, 8 or 9. hints on each letter, first singly, then ~ its relationship to other (Aemember: K is 7.) This fact means that M cannot be 0,1,2, (,ypt letters. Check to see if the letter: a) represents a 0, 1, 5 or 6; 3 and 4. Cross out these last five squares on the M line. Based hml b) is a large or small digit; c) is an even or odd digit; d) gener· on what M can be, RT cannot be more than 18. Thus, A is 1. ates a carry, when added to or multiplied by another digit. Write A in the 1$ column of the Elimination Table, in the BY JOHN DAVENPORT CREHORE (Nine Hex) row labeled A, and cross out all other squares along the A line The editors and I agree that we must not delay showing and 1s column. another solution device: the Elimination Table or " Is-Not" As many of you discovered, Puzzle 12 in the last issue had an We BPologize for the frustrations this may have caused. See how it works? Goodl error in it. -The puzzle should have read: Puzzle 12 (Com- chart. Observe the 10 by 10 grid of squares: pu~~) L SUl TAL Look elsewhere in this issue for some example programs that In the last issue, we printed the first five puzzler postcards E SSL TTY readers are sending to us to solve these puzzles. - RZ "1.-NQt" Chart we received. Here I acknowledge a few more, joyful at the BM MHH HHH happy chord you all strike-mostly, in refreshing me in o , 234 56 789 , , arithmetic. NEW PUZZLES A 8 , Dr. Dave: I appreciate your scholarly critique on the whole Puzzle 13 (Novices) Puzzle 14 (Adepts) C , syndrome with which we are all having so much fun. Your F , second paragraph is so apt: "I was tempted to write a program V EC ATY CWU H , for the solution of Puzzle 7, but I believe that the human T X TER J , ability to discover clues and adapt to new discoveries renders R WYL MYE RTE K K~ a human solution more efficacious and less troublesome than ±-.]; TUA YWE EC M , , , , , writing a program ... . I enjoyed the challenge provided by VS WURLT UYC T N , Nine Hex. My compliments to him .. x VS WRWEE WEW EWE R , R, , , , , , VSS Scott: Scholarly analyses! Your programming was so swift Hints: E and W in the top tine when multiplied by R. E. and The digits 0·9 are put along the top of the chart; the letters I heard you calling, "Look Ma-no hands." J sense an old Hints: T +T :, E. Look at the samples and examples. T of the second line, yield plenty of interlocking clues. How­ of the puzzle down the left edge. When you think you have a timer. ever, if you get stuck, look on page 57 for some specific hinu. value for a letter-say, 7 for K-write K in the 7$ column, in But, try it first. the square that is on the row labeled K. Then cross out every Willz: Oh! You are an old timerl My earliest listing in the National Puulers' League directory was 1939. I've been too Puzzle 15 (Geniuses) vacant square that is in the 7$ column, and every vacant square on the K-line. That is, indicate K is not 1-6 or 8·9, and 7 preoccupied since to rejoin. Now, I'm ready to get back in. Puzzle 16 (Computers) is not any of the remaining letters. I am sure we started the fun with puzzling, with our national conventions. Y OE H EL S C U LE NMT EYL Suppose you now find, as part of the overall problem: U EE EL OE + B B B Y U x A Prof. Jim Householder: From Humboldt State Univ., sends M C A E H Y C C U Y NUR REY us a simple-uh ... well, two·word example. He says there's ±l! a math fad on at HSU. Hints: No hints to geniuses. They compete on equal terms Hints: Your computer won't need hints. RT TWO with computers. +TWO FOUR - NINE HEX

SAMPLES AND EXAMPLES ...... ~ .... ~~g~ J:I--J ,:IE.'!: " • W ._.g, .. ::J ~ ""C - £ . 10 t:: .~ 8·- t ~~ ~ . ~~ ~a. >- N ; i!t I 15 ~ .. "z • •• £ c; ofiVjfi 0 • .. (I) ...... ::: ] "''''i.~ 0 ;:: , ~- ! .8""" !.<::: ::1 • • .fi.0~" • ~ ..~ ...- 0:: c:l. "is." 0 C -::J o a:: E E E .::J '::J • • •• .... 0 '- .,'" ;; ~ ••U~ < .. U ~ u ~~ " e a: • ~·B.~£~ w rD' u.: ~ .. o .. rD c; U N ~u N ,,~ c; S ... E 'S' N • " E E 0 ::J_ ::1 • ::J -"15 .. • <' r," .. X u .. z "15...., i c; -fj""C ~• • 1 ~~~.si

22 RECREATIONAL COMPUTING NOV·DEC 1979 23 Strange things seem to happen. says Datarel was fully described, and he spent data which were already as familiar to British writer Warwick Slough, when the next 20 minutes preparing a Xerox him as his breakfast eggs. people and computers get together. copy of the relevant pages. 12 Heavy Engineering and Maintenance Co. Confronted by the temptations of a powerfUl machine, a man inevitably Martin caught up with Jeanette at the Current Assets S2 ,000,000 shows his true character. To that insight. "Jug and Bottle." She had reached the Energy Transmission and Conversion Corp. add the fantasy of a Swiss vacation with second gin and tOllic condition (speaking Current Assets $1 ,250,000 a beautiful woman, and you have a without inhibition but not yet loquacious). classic Warwickian story. (Mr. Slough The remainder of the lunch was unremark­ Semiconductor Technology Ltd. last appeared in these pages in the able. No word was mentioned concerning Current Assets S2,650,000 March-April issue. J - LB security of data systems.

In tile afternoon Joyce Brabingham he read from the screen. No such firms existed, of course, but these were some of Jeanette McPherson was an archetypal approached Jeanette. Normally she was several apparently new customers whose secretary of the 19805. As the sun slanted slightly condescending to the other staff business Manin's insurance company had tluough the venetian blinds of her office (since she was a personal assistant to taken on in the last few weeks. Further­ window, she peered at the green lettering the managing director), but today her more, funds had been transferred to cover flickering on a small VDU screen, while face was marked with a worried frown. payments on a number of hypothetical her fingers caressed the keys on the claims, creating sizeable deposits of money CALENDAR adjacent keyboard. She was using the in various Swiss accounts. With a satisfied small word processing system recently nod he switched off the terminal. As he introduced by the insurance brokerage INTERRUPT leaned back in his chair a glazed look where she worked. callie into hls eyes and his mind conjured BY H. FRANK ANDERSEN, M. D. BY WARWICK SLOUGH up visions. II Dolce Vita (Swiss style) and With a puzzJed frown she scanned the Jeanette - yes, especiaUy with Jeanette. screen's contents. The text was not what FOT anyone who has a busy calendar and is constantly having elapsed number of days of the year on the given date: YV. she expected. "Must have set up the to juggle dates, determine differences between dates or add DDD, or if the century is important, VYYY.DDD. I call this wrong floppy disc," she mused. Still, A tap at hls office door ended hls reverie and subtract with dates, herel the program to let your com­ the "YR.DAY" format. The decimal portion is a modulo the record appearcd to have all interest· and preceded the entrance of Wilkins, puter do it for you. The author is an obstetrics and gynecology 365 (or modulo 366 in a leap year) number divided by 1000. ing content. She flicked three keys, and the company secretary. "Have you a few resident at the University of Michigan, and developed the prrr Thus, Jan I, 1978 is 78.001 and Dec 31, 1978 is 78.365. the text moved forward on the screen. spare minutes, Martin?" he queried. "Got gram out of a study of the projection of delivery diztes in Dec 31 . 1976 would be 76.366 since 1976 is a leap year. something that might you." ''Therefore in the present circumstances amuse pregnant patients. - TD It would be necessary to represent this as 1976.366 if dates Dataret would seem to be a reliable will occur in different centuries within the program. investment for investors seeking steady Martin nodded wearily and indicated a Microcomputer applications in the home, business, or labora­ returns. Security of computer·stored nearby chair for hls visitor. Wilkins was tory frequently involve entering dates. Occasionally, part of The subroutine beginning at line 1000 converts a date (M,D, information will be an expanding field a hell of a bore but he'd better appear to the program may involve manipulating the dates, for example, Y) into YR.DAY format (DI) by adding the days in each pre­ give him some attention. Wilkins gushed of activity, and Dataret has the essential determining the number of days between two dates or adding codiftg month. plus the date of the cunent month, then expertise and staff to implement its on, impervious to the malicious desires or subtracting a number of days from a given date. If the ap­ dividing by 1000, and adding the year. Using a reverse process, systems." Although she did not recognise permeating Martin's mind. "Well, about plication involves only short time periods, this can be done the subroutine at line 1300 converts VR.DAY (01) back to a the record, she instructed the printer to two months ago we were trying out a by a relatively simple loop whlch essentially counts one day date (M,D,Y). The routines use loops with "GOTO" rather make a hard copy, almost from habit computer security system - Dataret I think at a time. 11tis kind of process is used by some programs than "FOR-NEXT" statements because I discovered that before replacing the floppy disc with the they called themselves. Anyway, I was just available commercially; however, such a program can be problems result when I branch from within a "FOR-NEXT' one she required. chewing the fat with our computer slow for long time periods. loop with "I" as index to a subroutine also using a "fOR­ people, and it seems there's some snag NEXT" loop with "I" as index. Later that morning she collected a heap with the implementation of tile Datarel I recently came across this problem in a situation where I of concertina-like folded paper and system. Meanwhile, of course, all existing wanted to project a fmal or termination date from information ADDITION-SUBTRACTION divided it into appropriate records. The information about our customers has on several earlier dates. What I needed was a system which gave: strange record bore the title "Commercial "Jeanette, have you by any chance seen been coded up using their methods. The addition subroutine, line 1600, adds a specific number of Security Systems." She laid it at one end a floppy disc with a report concerning I. A single number with a constant format whlch uniquely re­ days to a date in YR . DAY format by adding one year, or of her desk, to be dealt with when time commercial security systems in the "Now they've got to change the lot to some presented a single date. 365 or 366 days, at a time. The subtraction-two subroutine allowed. At the lunch break time had still office?" she piped. "Sure," responded new firm's system we're adopting. Old 2. Routines to determine the difference between two dates at line 2200 performs a similar subtraction process. not allowed, and the record lay in a Jeanette, "I think it's over on th~ side Briggs is mad as hell - says how can he or to add a number of days to a date and determine the solitary state, to be discovered by the table." With a grateful sigh, Joyce pounced be expected to keep staff when they have new date. The subtraction-one subroutine at line 1900 detennines the chlef accountant, Martin Merton, when on the intrusive disc. to do everything twice? Anyway thought 3. An approximate date that could be recognized from this difference between two dates. Note that Dl must be a later he arrived to take her to lunch. (A major it might amuse you," he chortled. number, and could be used for preliminary calculations on date, meaning a larger number in YRDAY format than D2. part of Martin's extracurricular activities Some eight weeks later Martin was a hand calculator. The routine subtracts the .DA Y portion with an appropriate concerned Jeanette: wining, dining and making final arrangements to Oy to "By the way you're not looking too "carry" of 365 or 366 days if necessary, and the YR. portion, even fmding heL) As he digested the Switzerland for the business trip of a life­ good - probably been overworking. Why VR.DAY then multiplies the YR. difference by 365, and adds an appro­ information from the printed out-put, time. He was working with a VDU don't you take a few days off. I believe priate number of days fot leap years. Une 2090 increments the suspicion of a smile nitted over his currently linked into a private Swiss Switzerland's pretty good at this time of The format I decided upon uses a real number in whlch the one day each time a leap year is crossed and adds that to the face. The encryption algorithm used by computer network. He checked again the year." integer portion is the year and the decimal portion is the result. lines 2100 and 2110 mOdify that for centuries.

NOV.DEC 1979 25 24 RECREATIONAL COMPUTING -

• ~n ~t.. C.'."'D'~ ..... ,o.n _0:.0 .,n ~El' ,nn 00:.0 "."' "?n ~>JO w. ,~ ..u A><"'~"". V.l), 'Oon .. "" U.-U"Lr" M, "",", 01, .... "3" RQ< ", Lh', ~~ ~ 1.• ~' 'o.n PO< •• n REI' .~N ,_>«'W, .ur"",., •• , 1>1 ,"." P,M .,... .,. . ~ . OJ • 0, ..... REl' I ••U" •• rv .roe" n>.T"wl.< ,'~n " .. ,wfn. n' Lf?' '-1 ..... I1n" "" • Q., •,1' ."," '''PICoU'' ~ ITN ~'.'"M U I.'"'' , ...."" ""'.C''''".n . 171" "01 .... ·f" '12n " ,.1,03'" ",f( '''Tl03''., fM'''' "" l~~ n3 n~ _ , £L<> I~M I nan "£~ " 'n..-' ""'1>11-1>'1 ,n." "Eo ''''''!IT . 0, ." •. p"y) 17~" ~err ,,,." I" ~" R~" "Qn AEM 1M" RfM " ,OM ()~ • OJ ' .... "nM • ,~,,, "1M "[. , 'f OJ _ l~T"'~J • """nM , •• ~", • ",. , _ ""I!""" ,,, ...... ". V.·'."l.~' 11«0, ~. "', .. ,. n. 01 ..... " I nO" •• ~ "M p.u a .. ? . 3,. 30, JI , In. JI , ~I , 3". '11. In, ], ,".o" ~~I' ,,," "E'TB~[ ,.,,, ~f.~ II?" ~ ,OM ~r .. <"""~.CTl ~~ _ ~~, ",~"~",,", . ~f 11 3n ,,2 ' I ,a,,, .. ,~"n . \', ,,," . ,,~", "." ,,£.. ,QPn ~~~ UP ,"".".... , II... , ..., ... T".,. I?'n IQJn ~., .. ~'''~,. _ 0' :~C. ~. , •• "~ .... u. ,,' • ., _ Ill> I ,~ o _e.D ,,' ,O.n ~f" BY KAREN D. CHEPKO I ,7n 00 • I>'> '" lo~n WE .. "' 0 ". 11 " ~ ...., • I ,Ob" ~ .... U~., .. "' .• _<\ 'JI. "•. n~ .Ian HU "<" ,Q7" ..... I?M . ... <1£ .. The Chepko software wn'ting team is ,a"" it Ret 'ElD£KT1I!Y "1TH !IV ICII1EH O£f'!(O' I?,n II ,,' < l Tw", "'" ,un I ~"n If 110M • l~"Y/.M, ".'" , or.. •• pMn ~E " expanding! Here is Karen 's first program. 2e RDI ' THIEf I!IYER Ffl.LS. I1IN'ESOTA 56791' 1'3" ,. ""M" 1~'(Y/'nI'I, I?~'" , .,,. •• pn ,,, " 1), •• up rM'~ ..... '" Milan Chepko, Karen's husband, writes a 38 CLS OEFllfl R-l ,.." I. ~/ • • , .. t'''I.' '.... , ".. , P"." ""1"' "'In .~""" _ n'<"~·· 40 1hf'UT ·!£UO' WHAT IS YCU! IR£' , Nf PRINT l>'" " •. ,,,", ..",nM." ~"Jn ,.~Te ~,"n lot of software for RC. He mily have to .,"" ·t .. , ...... , GEM 58 IIf'UT '~T CiRf1()£ ARE YOU IN (]( IIIl6!GfRT(N IfI) 9ELCII " e)', G .,,~., ,,~n, _, get a second COmputer soon, as Karen Ql lEJI ·INSTRI.(;lJ(J6 FOR OIYIS ICtI· ,non ,. o~ _ I~T' I ~p" 001 ~"TI"T _ .. , .. hIM, ,,~ ".",_f, , ..•• '''-'''', ,_ .... ",.ow •. lee PRINT 'WITH A ROfIllIlER IJ' ., m£ FtISIO IS I ) ' 1J30 AEM " ,ooy. ,~"',", " ... . . "~., " .. ,", •. CO', ,.,~ .. 80th Karen and Milm are not "trained" y ,nA., ,,,,, " lit FOR TaJTD1:;ea /EXT 1 I J4n ~." , .. co~p~ter people. What they are doing, I 1~n ".~ ',"" 'I'··~ 129 PRllfl PRINT PRINT'1tWE A PEl«:ll fN) PfIPER tft«>V, . , Nt:;. LET 'S GET STfaTEO'" IJ~" ~r .. "~"'A""" "',,,,,,, I), n,. " ... , . v ",M' -.~ bW/dmg programs and experimenting 1:18 rOR laJTIJ2geEI ~X1 T 13.n p~" ."" ·" •• rTl_" _ r _ "., 14e REI1 · ~TERftlrE S INITIAl. I'ftRlFELES' 'J~n .... P'M .­ with a home computer, preSilges what the PP I " ~._ 158 If G<2 , X-18 non "~.u·[ '." _I ,'_. ,Vj ,."n ., • IIH,,,,, ?""" .>0 (., .• I ..... micro-revolution is going to be about. 16a IF G-2 • X- Ule ,.,n HJ" " .... ,.?n "'0" WI" You 17Iily not know it, Karen and Milan 178 IF Gn, X-I00911 ,,,,, Pr'n ..,. '" 188 CIS "· RI()(2) ....RI( )(2) .~~ .• -, •• ,,<\ but you are pioneers. Keep at it .... _ , w . ". Ri 198 ~ L><8 ..... RI(l(X) ZORl(l(X) "",,0,nn "'-:EO' . ,",n "'.' ., 280 IF Vw1 • CoRf()(X) ELSE c-e ,.~n .. ,~ '''~n "00 a9 REI1 'DETERIIIIES Fl.fCTICHS' ,.-" " .~. 0.' • 111 ,)nn "., • II~ After two years of listening to my " v, .. ' ." ,,,,,v"~''')"" ' .. " I"~' .. ~ .. 228 If va IfI) 11-1 , ~ A-l B-V J-II_Bot ". I "~II"~J N,fj I"eo p~, n "f;M husband talk about his computer, I felt I 2 38 IF I'(l IfI) 11-2 , [)O< 2 .. ,.-,~,., • ,." , .. ,., 'Jpn I I '''T<''~-'''' • ,on-, ,H,O.'-I ".o) 7"'" "" • ~~~ 'L<~ "" •• ~~ 248 IF t>-2 IfI) G<-2 ,fIOOV B-2 ,.on ~[_ 'nn I. '''''''3_11'1'''' ,~" 1"""'_1>"""1 T"~~ "" 1~, .. ~ .. had absorbed enough to write some pro­ " ~ IF M fN) G.)2 , FPRf()( 2e8) I~.n " D • ~I , ...... ~ • ~ _ ~, '. L<'. ",... '30n r, ,Nnn1·, "~n" '~T1 '"T-l fIo-V 93~" " II'> • "" T~f~ III • ", _ I ...... '."" '3'" ...... _ on all that equipment sit idle during the day 2 70 IF V-)2 fK) 11-2 , 1Jo~ '~M .,­ 'J~" "are "~n 28e IF Jla.4 fN) G ,~ .... 01 • ol _ , _ ,.M .. ,... """l1e~ <11""~".'t;. nnll""" son is interested in both mathematics lea IF 0-4 fN) G.)2 , fIooRI() ():299) JIoo Rl(l( 1811 ) J-1118 "£" ,,,''',' • 01 ' .. ·.VA"> 9.'~ ,.,n oJ • '" _ """""" l 18 IF Do ~ fN) fKB. 0010199 ,'?" "t.. 09 '''~ . I> n.. ~') and the computer, I decided to write an I.~" "l" .", .. " _ 03 , ..... "~,, "",·or OJ • '" • "" , 32e REI1 'SUS IP Pf!(B.0IS· elementary math program for him. The 138 IF /)0:1 • Qt: ••stI\ , ~·-"ftl. result was several hundred seemingly l 49 IF 1>2, Qt •• PRttrt.CT. ~.xt ..... 159 If Dol, Qt-·ROfIllIlERo. P$•• - ...... Each subroutine contains a list of input and output variables, result in the year 4000 A.D. The program is accurate across unorganized lines that produced addition 168 IF t>-4 ,Ot··QJ(]T1(HT · P$...... and a list of the variables used within the routine. As printed, leap years and centuries except for the problems mentioned. and subtraction. Milan patiently gave me V0 us · · ...... • the program requires about 4000 bytes; however, if the REM If accuracy across centuries is not needed, the lines indicated many helpful hints over the next few 199 IF MIfI) 011. PRINT USltli lIf. C ~ IF 1>2 IfI) fKB, PRINT USltli lit, B ELSE PRINT USltli lit, II statements are removed the memory requirement drops to by \ REM < < can be deleted. weeks and I was able to shorten the ~ee IF /)004 , PRINT , _____ ?' 2100 bytes. If accuracy across centuries is unnecessary, and program while including multiplication 419 IF Do2 IfI) fK8 , PRINT usitli P$,II ELSE PRINT USltli ,",,8 429 IF D04 , PRINT '---' PRINT statements are compacted, the whole package can probably This program was written in Northstar BASIC, Version 6. and diviSion. [t has also been nUl in BASIC E; however, [found that 418 PRIHf . 11£ ' ; Qt; . IS' be put in under 1500 bytes. Of course, only those routines CP/M 440 11flI[' " S occasionally it would produce a YR.DA Y with more than 4511 1)004, A ROfIllIlER 1J";l necessary for a specific application need be used. The program presents a different set of IF IIf'UT' WITH three decimaJ places (e.g., 78.364997). This can be easily 46e ROt 'TESTS 1WSiERS' problems for kids in grades K through I, 478 IF Jla.4 .](+J IMH:: corrected by adding a line to round to the nearest 0.001 POTENTIAL "GOTCHA'S" 2, and 3 and above. In setting up the 480 IF Do4 fN) LOR , GOTo:i2Il at the end of each routine. 498 IF JOS ooTo:i2Il problems, I used "print using" state­ :l89 PRINT PRINT'~ 1Dl), · 1Nt:; · . YOU GOT IT RIOO ON THE FII1ST TR'V' • The main problem with any dating routine is leap years. A In writing this article 1 found the following references to be ments. This kept the right-hand margins 518 FOR T- n02S08 /EXT T 0010198 century year is not a leap year unless it is divisable by 400, 52"8 FOR 1M1 0l of value: even, aJlowing the problems to be shown 518 1hf'UT 'OOPS' TItV fD'IlH. TI£ It6IO IS';S thOUgh. 1hls system, known as the Gregorian calendar, was in the conventionaJ manner. 548 IF Jla.4, IIf'UT' WI1'll A ROfIllIlER lJ"il ELSE PRINT S5EI IF t>-4 fN) LOR , GOTO ~ instituted in 1582 A.D. when 10 days were simply dropped 1. A. eemer, "Time," Infflrl«tI Age, Vol. 4, P. 74, Feb. 1979. w. 5QI IF JOS , ooT0598 from the year to coordinate the previous system, the Julian The testing section compared the input '78 PRllfT PRINT'I'U:H BETTER. ',/tf,'''' calendar, with astronomical measurements. Britain and the 2. J. D. Roberuon, "Aemerk on Algorithm 398," Commun. ACM, answer (S) with the correct answer (1). 580 FOR T- 1T02S08 t£X1 T ooT0199 VoI.1S, p.918. Oet.1972. 2L9 NEXT 11 American Colonies, however, did not begin to use the Gre­ Up to four attempts to answer are 688 PltlHf '11£ " Qt, . 116", J gorian caJendar until 1752. Thus, if for any reason calculations 3. R. A. Stone, "Tablaless Date Conve ... ion," Algorithm 398, Com­ allowed before the correct answer is 618 IF {)004, PRINT' Wlflj A ROfIllIlER IJ";R '28 FOR l*1T02S08 t£X1 1 are done involving dates near these years, inaccuracies may mlln. ACM, Vol. 13, p. 621, Oct. 1970. disp~ayed. I did not use score keeping 08 PRINT 'LET 'S TR'V fH)TI£l! (Jo£. ',HS:i '" result. Also, the year 4000 will not be a leap year. This is not routines because this program was to be 64e 1'(11 T*1T01!iIl0 fEXT T ooT0188 currently included in the program, and an error of one day will for fun and not for pressure. 26 RECREATIONAL COMPUTING

NOV-DEC 19,. 27 Address Modes We said that mnemonic instruction codes could be represented by HEX opcodes. Here is a list of the codes used $0 far: The operands with each instruction code can identity which opcode to use for the instruction. Operands also tell the Op-code Instruction Mdre •• Kode computer which address mode to use. Address modes instruct eo, I~diate the computer to do something specific with the contents of '" 'M "'b.olute Apple II's Three M's '"'SO "'bsolute the operand. There are several possible address modes that can '"m Absolute be used with many of the instructions. Depending on the '" r,.,p lled \ / results and type of program, different address modes can be "" '" used wi th the instruction code. Later we will describe just There are many other instruction codes, addressing modes and (Memory, Monitor, & Machine Language) three address modes. More information is available from the opcodes in the 6502 instruction set. A summary of these is references at the end of the article. shown on pages 100 to 105 of the Apple II Reference Manual.

Some Words on the 6502 Part II Assembled Code Conventions The 6502 microprocessors have internal read/write (RAM) To construct an assembled program, you need to know some­ memory called registers. These registers allow the programmer thing about the conventions for an assembled single byte, to move instructions and data into and out of the two byte and three byte instruction. Also, you must know the microprocessor. arrangement of the bytes in the three byte instruction. De. pending on the instruction used and the data in the operand One register is called the aa:umulator (or A register), and two field, the opcode is assembled followed by the required others are the X and Y registers. The accumulator is the most number of data bytes. Immediate mode addressing uses the important register in the 6502. Many program steps will put opcode then one byte of data. Absolute mode uses the opcode data in the accumulator then put it into some memory loca­ and two bytes of data. When assembled, the least significant tion. Sometimes an operation is performed directly on the operand byte is first, then the most significant byte. value in the accumulator. Load and store are two such

operations. Load causes a value to be placed in a 6502 register. SCOT • HEX Address Store takes data from a 6502 register and puts it into an exter­ Cleast Significant Byte nal memory location. HOst Significant Byte

Mnemonics, Addressing and Opcodes This convention was designed into the 6502 to provide for special page 0 address modes. Instruction codes used for the load and store accumulator operations are LDA and STA. The three letter mnemonic is Implied mode (the RTS instruction for example) uses only a taken from characters in the instruction. single byte opcode. The instruction itself includes all the in­ formation needed for the desired result. Instruction ATS BY CHUCK CARPENTER LD... (LoaD ... cc .... ulator) is used when you call one program from another. The return 51... (STore "'ccumulHOr) from subroutine returns you back to a point where you want In Part I, Chuck covered the fundamentals of the Apple 11'5 to continue another program (or subroutine). memory and monitor. He now introduces you to the Apple's The instruction LDA does one of two things: 1) loads the machine language. He concludes the article by showing you value in the operand into the accumulator or, 2) loads the Putting It AU Together how to write a small program and use the mini-assembler. value found at the address in the operand into the accumu­ lator. The 6502 knows what to do by the way you write the Now, let's build an example program and assemble it by hand. You will begin to The program must 1) load the accumulator (LDA) with a If you are a beginning Apple user, read on. 1585 operand. Depending on the form used, the addressing mode is discover how to really use your machine. -RZ '" $fDEO defined accordingly. Here are two examples for the LDA value, 2) jump to a subroutine (JSR) that prints the contents '" instruction. of the accumulator on the screen, 3) jump to another sub­ There are two ways to put a machine language program in '" routine (JSR) to 'beep' the bell, and 4) end the program memory. One way is directly in HEX codes, using monitor Operation Codes I. LO ... 1585 (I".,.,diate addreSSing mode) IRTSI. commands. The other way uses the built-in mini-assembler 2. LOA $0)00 ("'bsolute addressing mode) utility. However, before we try to write an Each mnemonic instruction code also has a corresponding First, write the assembly language program that will do these program, some knowledge is needed of the machine parts and HEX value called an operation code. These opcodes are things. I'll provide you with the value for the accumulator and In example 1, the sign indicates that the accumulator is to the assembly language. recognized by the system monitor and coverted to binary # the subroutine addresses for the operands to get things going. values for the 6502. Actually, the computer only recognizes be loaded with $B5_ ($ in front of a number means HEX.) Example 2 tells the computer to get the value found at Instruction Set binary numbers, but using HEX numbers to respresent binary ~ Dperand location $0300, and load it into the accumulator. ~ numbers is a step toward making programming easier. Binary 'M 1585 load the acc.... ulator ... 1th 565 MicroproceSy)fS use a set of codes for commands and instruc­ to HEX conversion is a task handled by the Apple II monitor. m SFDEO ; J'-""!> to characler-out routine tions_ The 6502 microprocessor has an instruction set that has Instruction ST A tells the 6502 to take the current value in the $fBE4 ; jump to bell routine 55 three letter codes. The codes are called mnemonics Writing programs in hexadecimal opcodes and data can still be accumulator and store it in the address specified by the '"m ; make " ""finite return (ni-mon-icks-meaning easy to remember). By themselves, the awkward. The assembly language, with mnemonic instruction operand. For example, STA $0300 means take the value in the mnemonic instruction codes can't always tell the 6502 what to codes and operands, is another step toward simplification. accumulator and store it in location $0300. Two other Taking the above program, begin the hand assembly, have the do. Additional information called an operand is used with However, HEX opcodes remain a significant and necessary part instructions we will use are JSR (Jump to SubRoutine) & RTS program start at address $0300 and use consecutive addresses. (ReTurn from Subroutine). most instruction codes. Here are some examples: of 6502 machine language programming. Begin with the opcode for LOA immediate. The next memory 28 RECREATIONAL COMPUTING NOV-DEC 1979 29 You halle now assembled a program starting at location and the accumulator value is put on the screen. Our first in­ location will contain the data in the operand. An opcode struction loaded the HEX value for a 5 into the accumulator. $0300. Now run the program using the following sequence : always has to be the first byte of data in your program. The routine at address $FBE4 is called BELL2. The program Hayden proudly announces: Most of the time it will be some form of the LOA instruction. then calls on this routine to generate the 'beep' heard in the rim prO

Now let's try the mini-assembler to write a program. First, Still to be explored are symbolic operands, loop indexing, turn on your Apple and press the RESET key. You should page zero features, and other monitor routines. That leaves a 1980 HAYDEN see the asterisk (.) prompt and flashing cursor block in the .. lot more to be covered, but we'll end it here for now. COMPUTER CALENDAR lower left corner. In the following sequence, you will be typ­ ing in the underlined characters. The computer response is References • full-color original computer art not underlined. Also, it is not necessary to use the $ character • complete program for a perpetual or leading zeros. The mini-assembler takes care of these things. 1. Apple II Reference Msncnl. 1978, Apple Computer Co. calendar The character Jf (slash b) means type a blank with the space 2. The NeWffettsr for ApP/8 II awntm, Vol. 1 iswe 2, pages 19-21, Rainbow, Sox 43, Audubon, PA 19407 • computer anecdotes bar. 3. S·C A$$I!mbl8r II, SC Software, P.O. Box 5537, Rich8rdlon, TX 75080 • # 5179-4. only $5.95 l!.!f. ~ ~ 4. ArtlICO-Asssmb/8r!r8xt Editor, Aresco, Box 43, Audubon, PA : .,M.,r ,.I nl - n."",bl.,r . t $f666 I. r666G ( ~tTURII) 19407 ,. : prClfllPt .nd c ursor 5. 6502 Progrvnming M8nuBl, Several sources-Rockwell Interna­ : fl .. t lin., to be .,._I.,d Ara/labl' at YOUI ) . }OO,LDA 185 ( ~{TURN ) tiol'l8l, SynertllC, Commodore Ifrom the make" of the 6502 microprocessor! ~. 0 ]00- A9 85 l DA H BS ; ....,...,le6 out put /ocal computer stora! 6. Programming rha6502, Rodnay Zacks, Sybex, 1979 5. _ JStl F(l[O (RETURN) : ne xt l ine fo r a ~ ...lIIbly 7. How to Program Microcomputsf$, William Barden Jr., Howard Or, write to: 6. 0302- 20 ED FD JSR SFOEO; nseJrob l.,d ()OJtp ut W. Saml &: Co., 1978 7. II J Stl FUE~ ( UTUIl.II ) : continue., .. bov Divide 10 reach III .. 51ronBhold of Ih .. oIde$1 and In in-Circwl Emulllor! ., greatest of the alm- Castle '1clntd! ADDRESS ______, In gr:lleful th~nkl for the return of their In· Core P1tti;".;;:;':';~ i;;;;;;;; Linea. their commamkr, kn",,",s lluol withou. oestnll mascot. the I..o<.:kout Monster. t~ Clan CITY/STATE ______ZIP _____ Ctp,tt! CIty, To make. Igrees to admIt them to the stronghold and extraordinary help Ihey "'ill nevcr be abk \0 m_ dIU ¥QUnd aJlo""s them 10 utilize the ran and po....erful trans" conneCI tlleir dcades wUh the CCnfl1ll'$ In COUNTRY ______the pi';'" in 10 few cycles device. Angus Mclntel. leader of the a.n. -" lime 10 turn Ihe flow of the bank. She abo jr rasil1' II impolSlbl.1 knows Ihal such IIclp can be obtained from none leads them into the lQ""et le,e!s of the hatd ..... ~. C1 witll and there amongst layers of fine dIgital dust o Check enclosed other ,han FOrlran Ma n! ~k im- the emul.t'n stands waiting. o Bill me (U.S. only) Our Hero. ho.... e'·er. IS unable 10 UJe motl of his po .... el'1l. When parts of hIS memory .... ere Swiftly the connections are made, Billy BaSl~ Signature -:~:----:--:,_...,.-_:------­ inad"erlently erased. much of his po .... er .... ~nt is hooked up to one line of the emulator; o Renewal (please attach mailing label). F'Man to the other. Controls an: &Ct, pil1out~ a$ ....ell! Internationa! Rales: Canada First CltJu 0$17 One Year adjusted. and ,-oltage levels blllnced, The finll The $Olution? A memory·to·memory transfer switch is thrown Rest of World Ainm!lil Oi23 One Year .... ith Billy Basic se .... ing as the $011= file for World Surface Mail - I will ri5k the lengthy and unreliable delivery of BY lEE SCHNEIDER & TODD VOROS informatIon! 5uriacemail (signedl,______-;o;-:::-:-::--:-:- ______o $14 One Year Payment must be in SUS drllWn on a US Bank.

.ugh th. OS~'!llliolls. Ihe v.nerable old Linea anxiously br~ncheJ forward to the dued ~ral Wire .... ound. who has a lolerance Ib<)1le aU, dlre~b fillure of her lnnll·time friend. lie slarl(h be· them&CIH~ in Ihe allae" on Capital City. the h~11 01 deadlY \ona~ spllr~s. meYfCP"Bt~dly mem the hlule He makes adjust· neath the great mlchine. stdl connected to the 'ery ~tronghold of Ih~ Ghtchm.stn and charge and dls.:hi'lle Ihe c~pao;iti"e guards that menlS to th. lines as ne<:

11,. , •• n •..

Order tht _ ..... charII' car' rian to tht fronl lunetion linll , • ,.nd pl1llpllre our RAM batteries for I wlbined·,.tI _It on the Main Gil'"

Couldn'l we terminate OUt And whal do they $Cnse tominll in through Ihe ., , Iftistanf;ll lnac:k II tIIil node Great ('ore PI.ins~ Could it be the lines of sup­ and re·form OttrnelWori< tore· portinll fon:t that they are so direly 111 neM engage at I different branch? of or II it jU!t another st~ak of bad nux~

"" ""' No, '" arl 101llly committed. If ... . 1tImpt to ditcOtlOtc:t Funny •.. you're lootcing son now the Glitd"lmllter'l indu<> of ItT*'IlII' too, F·MiIU>! Whet'l iOlnlil oo? followtive ,,0I1IliJI our retr_tinlilforon would currenl IL ____ ~~~~~------~-~r-~~---~;::=;::-7;...J lines, and ttM l/'1nlittnts would datroy ull W, frHIJt contin... tIII11tlIck1

\10 III Linea and her resiSlIncc arm·e in time~ Will the e~il Glilcrunasler e'.r be banished forever from MlcroproccWJrbnd~ Will Billy Basic e'oTr apin RUN free in hi~ nah>c home­ t.nd?

AU rl-.I. III 0'''' b8ck urwler !'or the answers to the$C and olher uncompilable th. Emul,tor,"" I'll be hl'lln' questions, tune in for Ihe next cpl$ooe same 'Ie back to normal quick .. tlmeoul. same status n ... ye can q,y "Holy Macrol" A nip of Ih~ ~mulalor sw,lcll 300 3 ••••• , .. Linea updates the ~ccntJy·rcslored vcr>ion of laler F.Man, filling ,n Ihe ..cant locations in his d81a lrny,

Yes, and unleu we (II!Il into ax.,ulion soon, our . ffons will be ~inamd. Wi1h OU r detut, we will lose OUr AV- ... bul how'~' -;::;;~~ beloved lend 10 thet .'lI am ....' ..'1 'rOQ9t , till hold ttl. the Glitdlmaste. end h is noisy CoN Pleinl ~ herllfld a_I C.Plmi City. To make I mass dm I ....f .. lNound PLEASE MAIL THIS CARD WITH PAYMENT TO: the pll onl in 10 f_ cyd es Then we mull IjIIt our resin· 11 impostibl,1 ance fon:es to connect .... ith the Genenl 'l networt< i .... RECREATIONAL COMPUTING P.O. BOX E

Volume 111 1263 EL CAMINO REAL EpilOde 9 MENLO PARK. CA 94025

BY LEE SC HNEIOER & TODD"

Meanwhile. in a fa ron-pro~ince, units of the W,lh unending propagallon, they surge fo,,"ard Through the oscillallons. t he nnel1lble old Linea anxiously branc~s fON/utl to I Underground ReSl'llanCC M01Iemenl cnpwe benuth the Underground banner. Through GCIII'I1II Will'",ound, who hll$ a tolerance abO>'e fiJ!,u~ of lIer long-time friend. He siands be­ !rom the souret snc C!C:J!eClN_ them~I"e, in the auack on Capilal City. Ihe the hili of deadly voltalJlC ~pike5. they Il'peatcdl~ them all, dill'cn the baule. lie makes adjust­ ncath the ~31 mlcll1M, still tonnccted to the 'ery sLrongltoJd of the Ghtchma\ler and his charge and dlsclta",e Ihe capacitive guards that ments to the Hnes as needed; shunllng off his emuil lor OUlpul.5 hlgh-Jc~el foKeS. hold up the potentIal on the cit), walls. po'.ier in new dill'clions at uch tum. 1 .• . 1 1M1 fine, LInN ••• but wh~ _ you doing over ~ when I'm over hMe1 aI. Hlllf of our 5Uppl ies h_ been shorted by the Glitch· m.m', Oeregull1ion Pro­ ;.cIOrl. The rnt Ire _Iy O¥eI' loadedl We t-' men .. si.tance ••• or we m i~t well give up .oo 110 oI1m l :1 1/~~lk~

.... :';::"_J"'--':':'_"':'::"' )I •••

Order IN _ chIrljll CIr· rian to IN front Juncllon lines ••• end prepetl our RAM batteries for • 5U ltllined ·detIL ..... It on the Mein G_I

Couldn't we terminllt1L our And what do they sense CQllling in through the "

.. ,- No, we.e totally committed. If we I lt1tmpt to dillCOflll«t Funny ... you',... looking 10ft now the Glitdlmaltar"llnduo­ 01 ""'111 too, f·Man! WhIot's live voltlLglt lorCli would follow our retrwting CUrtWIt "-,,------,,~~:;~~~'r_------lines, and the tranlients .... ould deltroy ull We musr !;Onlin'" the Ittackl

Will Lmu ""d her n:slsllnee alTf\e In lime? 'If ill the cvil Glitchmastcr I"cr be banished fOIl"'er (rom \-l icroprocclSO r lllnd~ Will Billy Basie ("cr _pin RUN frtt In hIS nllive home­ land'

All righi, all 0' ~ bed< under For the Inswers 10 thcse and other Ulloolllpilable the Emulator,.n' I'll be h..,in' qUI'!!loll$, tunc in for the next episode same ya tJ.c;k to nOffTlaI quick as timeout, same ~tatus nag ye can gy "Holy MIlICIO!" ,. h' • r • I ( • , , " r. 111.,'_ .1

The program given here is written in Level II BASIC for the TRS-80: Radio Shack TRS·80. The user has the options of solving the puzzle himself or watching the computer solve it. In either case , the user has the choice of the number of discs to be used, up to a maximum of IS. The program also provides TOWER OF HANOI a time estimate for how long the solution will take. This is helpful in the case of 15 discs where at least 32,767 moves BY HERBERT L. DERSHEM are required. When the computer solves the puzzle, the user has the option of controlling the length of lime between moves. TItis feature is helpful for demonstration purposes.

The method used by the computer is recursive , which means TOWER LISTING Several issues ago we published a couple of program examples that the routine to detemline the moves calls upon itself. The using recursion. At that time, we asked if anyone had other basic principle here is thai if you have a routine to successfully home computer applications that were based on recursive pro­ move n-I discs from Tower i to Tower j, for any j and j, then cedures. Tower of HanOI~ as presented here, makes excellent you can move n discs from Tower i to Tower j by the fol­ use of a recursive technique for implementing the "move" lowing procedure; section of the progranL I) Move n-l discs from Toweri to Tower k. BUI, bewarell /f your micro does not hOlle Q recursive BASIC. 2) Move I disc from Tower i to Tower j. this program will not work for YOII as it is written. You will 3) Move n-l discs from Tower k to Tower j. hope to alter lilies 1000·/100. _ RZ where k is the number of the Tower which is not Tower i or This program is :I version of the Tower of Hanoi puzzle, also Tower j. In other words, k::: 6 - i - j. 1ltis recursive procedure common ly known as Donuts (see "Donuts for Kids" by Ron is shown in statements 1000·1100. Sonlore in Calculators/Computers, November, 1977). The puzzle consists of N doughnut shaped discs. of different 1ltis program has been used with students at both the elemen­ diameters, and three vertical towers on which the discs can tary and the secondary level. The puzzle is explained by be placed. The problem begins with all the discs on the left ­ showing the students the computer solution with three discs. most of the three towers, called Tower 1. The larger discs Usually, about a three second delay is requested between are at the bOllom of the stack. moves so that an explanation of each move can be given. Fol­ lowing this , the students are asked to solve the puzzle with TIle object is to move all of the discs from Tower 1 to Tower four discs and compare their number of moves to what the 2, the middle of the thtee towers. There are three rules to computer reports as optimum, After several tries or after they follow in mOving the discs: do obtain the optimum number of moves, they watch the computer solve the puzzle for four discs, and then go on to I) Only one disc can be moved at a time, try it for five. After the optimum effort for five discs is found, 2) A disc is moved by remOving it from the top of the stack the students are encouraged to conjecture on the eITort needed of discs of one tower and placing it on the top of a stack for six or more. For a larger number of discs, running the of discs of another tower. program al least to the point where the time estimate is 3) No disc may ever be placed on top of a smaller disc. produced is also interesting. RECREATIONAL COMPUTING NOV-DEC '9'" 35 David lVatten indicated in 'he letter thaI came with this part The case where it is not advantageous for the opponent to of their chess article thaI David ekelberg is away in Russia. make the capture is known as overprotection. In this case, So, for the next few mom},s, you can contact rhe D&D some none or all of the protectors may be vilallo the welfare chess team at: 903 We-Go Trail, Mr. Prospect, IL 60056, of attacked piece. (See Figures I. 2 and 3.) Thus, it be­ th~ p P B Perhaps David C. will return from Russia with severol new comes necessary to determine which pieces are vital protec­ topics for this continuing series of artie/es. I don't mind as tors and which are not. To do this, we implemenl the "cap­ long as the manuscripts are not covered with beet jllice Qnd ture'sequence" (described below) to determine whether the -p -p vodka slains. How about a parapsychological pawn 10 the QJ? opponent would make the capture in the absence of one pro­ Now that would be interesh'ng! - RZ a tector. Those protectors, which in their absence create a -Q -R -B -Q -R -B New capture advantage for the opponenl, are the vital protectors. TIlOse pieces are the subjects of this section of the program. Figure 1 Figure 2 None Vital Bishop Vital TIle possible moves of the vital protectors a~e clo.scl?, s~rutin­ ized. If a move jeopardizes the attacked piece, II IS given a negative va lue equal 10 the net loss of ~alerial i.n. the e~su i ng trade. In Figure 4, the queen has limited mobility - If she R R moves 10 squares 3,5,7 or 9. she can no lon.ger protect ~e 17 1/, Igorithm for Chess pawn. Moves to those squares would be given a ~;gatlve A\ P B va lue on that basis. Moves such as these are also black· '5 t 61 / listed" for future reference. The black-list is a column matrix -p L'-Q -p containing the coordinates of the attacked piece, the vital . --" protector, the square to be moved to, as ~ell as the net lo~ PART IV : MIDDLE GAME STRATEGY ­ that would be incurred as a result of this move. If, as 10 In our last article, we began the discussion of our middle -Q -R -B 1" , THE DYNAMIC EVALUATION Figure 5, a piece is vital to the protection of two pi~ces, it ~ game strategy. We discussed the move generation routine is considered vital only 10 the larger valued one (blsho.p), ·2 that prepared the data for the computer to make its analysis. Figure 3 Figure 4 BY DAVID CHELBERG & DAVID WATTERS leaving the lesser piece (pawn) underprotected. Moves which All Vital Mobi lity of a In this analysis, each possible move is tested for a variety of were black ·Iisted because of the lesser piece are restored to For each feature, the move is given a value. cumu­ Vital Protector fe'!.lures. A prior standing. Upon finding a vital protector, all of the lative sum is obtained and the move with the highest value is remaining computer's moves are examined. If a move blocks chosen. TIle aspects of each move thai we feel are impor. the path of this vital protector, and is incapable of protect­ R R Q tanl be can classified into two categories: dynamic evaluation ing the attacked piece, it is given a negative value and black­ and stalic evaluation. The static evaluation concerns itself listed. wit~ long range prob l ~ms such as piece development, cen. -B -p tralized attacks and king defense. The dynamic evaluation In general, vital protectors are pieces which should not be is for the short-term problems such as pieces in danger, pins moved. If a vital protector is used to attack a more valuable -p -p and counterattacks. This article deals with the dynamic piece, the computer's own defensive position is ofte~ com­ evaluation of the middle game. Again, we stress tha t it is promised. It is better to relieve the pressure on the piece by helpful to have read our previous articles before reading - R this one. adding another protector before the attack is made. Figure 5 Figure 6 VITAL PROTECTORS Another case in which a piece should not be moved occurs Double Vital Protection. Pin/hurdle predicament when a piece is either pinned or hurdled. In this section of the The pawn only protects dynamic evaluation, the whole board is examined. Figure 6 The major concern of the dynamic analysis is-pieces in the bishop. shows the pin/hurdle predicament. When a piece such as the danger. Since our program is designed to follow human I.hOught pawn is moved forward, the rook becomes subject to .an processes, let's exanline what a human player might consider in attack by the queen. This is a poor move, and a negative B making his move. Probably the first consideration that comes value is assigned. to mind in response to an opponent's move is " How does that p move threaten me?"; followed by " How can I ave rt this R On the other hand (Figure 7), the pawn move co~d provid.e threat?" Later, the player might consider how he can best an opportunity for attack by the computer. This move IS - p -p paral yze his opponent, bu t the fi rst test he must make is to potentially good. However, it is left to the "attack" routine -R -N determine which m oves cannot be made because of danger to determine how good. No value is assigned because the to other pieces. This section of our program is called "Vital Protection." capture is not imminent, and the situation will probably - R change to prevent the attack. Basically, though, these tWO sections catalog those moves which are undesirable because Figu re 7 Figu re 8 In this routine, a search is made fo r computer pieces under the pieces are needed elsewhere. By having t~s sectio~ as Indirect Attack Indirect Protection al{ack. When a piece is found, the A-matrix is employed to the first major consideration of our dynarmc evaluatIOn, Ilia P X P Move Knight find the attacker. For a piece under attack, two cases exist: many disasters have been averted. underprotection and overprotection. Underprotection occurs when. the advantage is fo r the opponent to make the capture. CAPTURE SEQUE NCES are made hypothetically. From the square that is occupied In thIS case, the "protectors" are free to move as they please by the new move, the A-matrix is used to make two colu~ since the Opponen t will make the capture regardless of their Now that the catalog of explosive moves has been established, matrices. One contains all the computer's pieces protecung pres:ence. Underprotection is examined more closely in a later section. each move can be examined on its own merit. For this we the square, and the other contains the attackers. The opponent employ our "capture sequence." Here , all possible moves moves first, capturing the piece whose move is under con· AECREA TlONA l COMPUTI NG 1979 37 sideration. The computer recaptures until the position is equal to thc net loss saved by making that move. There are LOOKING AHEAD dead-dead means that for one side or the other, to con­ of course many ways to rescue the piece in danger. The most tinue the exchange would be unprofitable. The initial move common method is through direct protection. All possible The last portion of the dynamic evaluation is the "plan ahead" What To Do is then given a value equal to the net loss or gain of the ex­ moves are candidates, although those black-listed as vital stage II is this section that is used to avert one-move mates. change. This section evaluates the relative safety of each protectors are avoided. They are only permitted to save a The 'opponent's attacks that were previously compiled are After You Hit square on the board. It shows the direct implication of a par­ piece of greater magnitude than the one which they already evaluated. Evasive action is taken. Many of the method~ u~d ticular move. The previous section mows the indirect implica­ protect. The value assigned is the net loss saved, less the net in the protection routine, such as interpositio~ and pum~g tions. loss of the old piece that would now be jeopardized. Through­ the attacker are used here in an attempt to aVOId the ensumg Return out the protection routine, vital protectors are treated in attack. Sinc~ these attacks are only hypothetical, the moves PCe's First Boo" of Computer G:unes The next part of the dynamic evaluation is preparatory. All this manner. that defy them are given small values - but an ounce of Firth Printing attacks both direct and indirect must be found. They will be prevention is worth a pound of cure. If a potential ~roblem used in the next two sections - protecting the computer's A variation to direct protection is indirect or discovered pro­ can be solved when the time is available , the offenSIve edge T his 1'''101.; is full 01 ;dl $(lrtS 01 g a ll1c~ 1'01 k iJ~ Of aoulEs endangered pieces and thwarting the opponent's most likely tection. It is realized by moving a piece out of the path of can be maintained. tilat Jbo hdr ,kwl,lp Jecision·llla l.; mg ,md probk'l1\ future attacks. a potential protector. (See Figure 8.) Other ways to circum­ snlvlIl!! s l.; ills for ne \\ J lld UIl('\IK'C ICd ~i!llalio n ~ vent attack are: moving the endangered piece, capturing the SUMMARY ll'II Uiri n!! nCJ111i t\ ,mo imJ!!in;l1lOl1. , .' . . In fmding the attacks, the basic question asked is "by moving attacker, pinning the attacker to the king, interposing a \\oSI of I lll' galll,'s ,';111 be p!J~ cd \-I I11H1UI ;1 cDmpll1cl IIlI). to this square, can any opponent's piece be attacked?" The lesser piece, and counterattacking. Again these moves are given These are the of our dynamic strategy. To sununarize: variation to this (which has already been explored) is "by a raw value equal to the net loss saved. In no case is a move The first step is to fmd the vital protectors and pinn~d pieces. * ,dCll":,' fklioll !!;lIlW~ moving this piece. can another piece be freed to attack the given a double value. That is pinning the attacker and pro­ Next evaluate each possible move from a matenal stand­ * bl)JI d J!; 1I 1W~ opponent?" These latter moves have already been generated tecting the endangered piece at the same time is given only point, using a capture sequence. A cutoff exists for uni~ue * b li si nl'5S ,!In] ~()ci. ll \..:IC IKl' \ll1l llLi1l0llS and it remains to be determined whether the attack is formid­ one value. outstanding captures. Next, all attacking moves are compiled I' x plJilll'J in PCC \ l e Ll w,1 s l ~k. \-lill l c \J lllp1c~ of pia ) able or not. To find the attacks, a' mini-move generation and a search for one-move mates is implemented. Then, en­ ;llId ..:nl11p1c IC ":\llllpU Il'l' Ii~t lll gs III BASI( routine is implemented. A list is compiled of aU the potential RELIABILITY OF STRATEGIES dangered pieces are protected, and finally, future attacks IH4 pages. 5th pr i!ll!llg. ]{ O: \;lil pril'l' $ I O.()5 attacks (direct and indirect). This list is pruned by determining are prevented. AJd 51.25 bool.; rJtc or 52.00 ll'S 1m ~llIppJl\)!. CA the usefulness of each attack. An attack is considered useful All of these methods can successfully save the endangered rl'siJcl11S Jdd 6' 1,1\. St'ut! y\IUr p.l~ 1111'11 1 .mll (Hdl'l [\) if either the attacked piece is unprotected or the attacker piece. However, we feel that some methods are more reliable After finishing the dynamiC evaluation, the comput~r be~s is of a lesser value than the attacked piece. than others. Therefore, the raw value given to a move is ad­ its static evaluation. In general , the dynamic evaluauon gives ~ People's Compurer Company justed slightly so as to give priority to those moves which are the static evaluation approximately five good moves (although After the list has been prWled, it is scrutinized for king at­ more dependable. Direct protection is probably the best all moves are evaluated in case any surprises exist). The static I~ 1263 El Camino Real, Box E, Menlo Park, Ca94D25 tacks .. If the computer. can put the opponent in check, the method, because it usua11y strengthens the overall defensive evaluation then chooses the best of these five or six moves >1- move IS made hypothetically, and a test for checkmate is im­ structure. Indirect protection is a close second, but not as on the basis of long-range goals. When no advantageous move plemented. If checkmate is possible, the move is made im­ consistent as direct protection because the protector is usually is found in the dynamic evaluation, the static evaluation makes mediately. If the opponent can checkmate the computer on too far removed, too powerful a piece, and easily open to the total decision. TIlls case might arise in the late opening. the next move, the prevention of this move is given priority. attack. The next best method is to capture the attacker. This The reason the anacks are compiled here, rather than in the method is not as good as the fomler ones in general because In evaluating the efficiency of the dynamic evalu~tion, it was move generation routine is because of an earlier cut off. In the it tends to weaken the general defensive structure as well as found that the portion which took the longest tlffie was the preceding routine, if an excellent capture is found, it is as­ decentralize the offense. last section - avoiding attacks. This section has the largest sumed to be the best move (usually this is a response move TRS·SO amount of data to process. On a time/move basis, protec­ • Ecor.omy - $111.'5 in a trade) and it is immediately made. Attacks are not needed Moving the piece in danger is the next most viable alternative. tion takes the longest because of its multi-faceted evaluation (Plugs '"to tape taCO'de, laS and 5amplo p'01l " m InCluded f for Ihat consideration, and a great deal of time is saved by TItis alternative usually causes a loss in the offensive edge, In process. the overall picture, the dynamiC evaluatio~ takes • P,0Ie5510n.1 _ $34 .05 postponing their generation. because most safe moves lie in a retreating direction. In a little more than one quarter of the time per move, With the (Plugs ml0 e.panslon PO" AllowS addition, this alternative has in some cases led to a draw by other expansIon pert use NO bat move generation taking close to half and the static evaluatio~ te''',. needed In chllles Demo' repeated position. Thus it is discouraged to some degree. taking the remainder of the time. Generating the atla~ks ~s Game c..sseue.f The next best method is to interpose a lesser piece. This is considered to be a part of move generation as its functIOn IS PET the last method that decisively ends the attack. It is not • PfoleSSlonal - $211.05 No ....mbly 11K ...... , _ ,lady to indeed generative rather than evaluative. Our next article will (Plugs Inlo Ill er DO" No Dallelle5 plullln, Demon. u&uon pr01lrlm and necessarily desirable, since it creates a pin situation. Pinning deal with the static evaluation and perhaps a skeletal des­ n"eded S.mple progr.m In complete docume ntation ... you c. n cluded·f the attacker to the king only postpones the threat since the cription of end-game strategy. Again, if yo.u have any ques­ write you, own P'01l ,aml In BASIC opponent can usually remove the pin on the next move by tions concerning our program, feel free to wnte us. ______MAJlcouPONrODAv ______castling or interposing a piece. This move often strengthens tr:. 3G Company, Inc. DepI.RC (S03) 662·4492 the opponent's defensive position. ~ RI. 3, Box 28A. Gaslon, OR 97119 [j TRs.60 Economy lRS·eo P'ol... I ..... 1 PEl Pro'I.. 1oAa1 The method of last resort is the coWlterattack. This delay $19.95 $34.95 $29.95 tactic is only helpful if the piece the computer uses in the 3G LIG HT PEN S PROTECTION 1~<1O $ 1 so 10' ma,hng al'<1 nanOhnll s.6 00 10'.'<;In I counterattack prepares a way of escape for the endangered f ncJOSHJ 'S Ct>e<; ~ 0< "'''''''Y O'

The computer prints standard characters on its TV monitor Texas Instruments in 24 lines composed of 32 characters per line .

BY DON INMAN ..: 32 chllracters 1234567890123456789012 .. . 12 per line Here is II second installment in our ongoing introductory 2 series on the new TJ 99/4 Home Computer. In this IJrtide 3 Don covers the basics of creating II graphics symbol within 241;nlll TI BASIC.

He promises to make Mr, Bojangles dance in the next piece. 23 24 Now if we could only have Mr_ Bojangles sing white he dances ''--____-' - wouldn'r that be clever . .. ? - RZ

One of the advantages ofthe home computer over the number­ Now try to visualize one of the individual printing positions. crunching monstrosities of the past is the ability to produce It is made up of 64 tiny dots or areas arranged in 8 rows with graphics on the video screen. With the addition of color and 8 dots in each row. sound, you may someday be producing your own movies created on your friendly home computer. Why not animated cartoons in full cotor and sound? S dotl in each row ~ , In the Sept-Oct issue of Re, we presented some of the sound ~ capabilities of the TI 99/4 Home Computer. In this and future issues, we'll look at some of the graphic capabilities.

The material presented here is based on Introduction to TI BASIC, a book to be published soon by Hayden Book Company, Inc.·

Many different methods are being used by various manu­ facturers to display non-standard symbols on the video screen. These non·standard symbols are then combined to Each standard character that can be displayed on the video produce a "picture" (a graphic representation) of some real screen has its own unique pattern of "turned on" dots. This or imagin&d object. pattern is predetermined and fixed on the TI computer. However, there is a way for you to create your own patterns. '- Standard typing characters can be used in combinations to produce pictures. but the results are not very satisfactory. NON-STANDARD CHARACTERS Look at the following example. A standard character is made by turning on specific dots to form the desired character. Suppose, for example, that you A character on the screen, either a standard character or one type the letter C. The following pattern of dots might be that you create, is formed by the dots within the 8 by 8 grid x X X turned on to form the letter C. discussed above. A character is created by turning some dots X X on and leaving others off. To create a new character, you must Dark points turned on. tell the computer which dots to turn on and which dots to o 0 leave off. L X X Think of each row of the grid as being divided into two I I blocks. X X X X X

Attempts to "animate" such pictures with the computer A""~~\~::::;::::±l ~~ are almost impoSSible. However, TI has provided a way to Each block j5 4 don wide laft right modify the method of printing standard typing symbols so and 1 dot high. bl ock block that you can create symbols of your own. First, let's take a look at how a standard symbol is created. A Dot Code is used for each block to tell the computer which L..I.--.L--'---'--J.-.JL-L-:, ...c dots to turn on. If a dot is to be turned on, a 1 is used in the • Introduction to TI BASIC; Inman, ZamOI"3, Albr&cht, and Dymax; corresponding cell within a block. If a dot is to be left off, a Hllyden Book Company, Inc., 50 Elsex St., Rochelle Park, N.J. 07682. ' Sottom row and right column all off to provide A o is used in mat cell. Part 1 'Pacing between print positionl. 40 RECREATIONAL COMPUTING NOV·DEC 1979 4' Example: Example: To fill up one row of the 8 by 8 character grid, you must use two Shorthand Codes, one for the left block of 4 cells and one for the right block. To produce this pattern: use Shorthand Codes For one block of one row of the 8 by 8 grid:

Examples: row 1 99 o '10 I' I~Turn these two "cells" in Ihe L.::...l"';~ /'eft block of this row ON, ,~2 SA this ~Iication left-----'" Leave all olhe~ off. "~k To produce this row. UM 001 Codes ,~3 3C is available in ,~4 3C Here is a table of all the possible Dot Codes and the patterns 0110 0101 •• ,~5 3C microfotm that can be produced. left right "~k "~k 6 5 ... Shorthand Code row6 3C A ~ Please send me additional information. lefl right Dot Block row 7 24 University Microfilms International block "~k Co'" Pattern ,~8 24 300 North Zeeb Road 18 Bedford Row Dept. P.R. Dept. P.R. 0000 , , I To produce Ihis row. UM 001 Copel Ann Arbor, MI48106 London,WC1A4EJ U.S.A. England 0001 I left right 0010 - 11 8 1010 0001 blocks blockl Name ____c- ______0011 - •• Institution 0100 ri~t A 1 .. Shorthand Code Street' ______block To combine all the B rows together to make the complete 0101 - City,______0 11 0 -- left i. l.right picture, you combine the Shorthand Codes into one long Slale ______Zip _____ 0111 block "~k string, row by row. 1000 , , 1001 -, LET A$ = "995A3C3C3C3C2424" 1010 • - To produce a complete 8 by 8 grid, we need to design B of - Now let's write a short program using T I BASIC to put our 1011 - these pairs of Shorthand Codes, one for each row of the print • "picture" on the screen. 11 00 position. 1101 1110 10 REM·· U TTLE PERSON·· Reader Service 1111 - 20 CA LL CLEAR Thil clea~ the screen. MOVINGt 30 LET A$="995A3C3C3C3C2424" The Shorthand Code. Those of you who are familiar with the conversion of binary define the pictu .... numbers to hexadecimal numbers will recognize that the Dot IMPORTANT Code (of binary numbers) can be written in a Shorthand Code 40 CALL CHAR (96. A$) This repl&C8$ the char· PleBS!! advise us of addreu changes 60 days in ad· of hexadecimal numbers. The Dot Codes are converted to a 1961 acUlr with our vance and 8t1ach your mllgllline m8iting label he ... Shorthand Code which can be used by the computer. This created character IA$). PlellSe dip this notice and mlil. or Mnd UI a "8100· conversion is shown in the following table. able fac.imlle. 50 CA LL COLOR (9,2, 16) Sets the colors: black 12) and white (161. It Dot Code Shorthand Code also giVIII tha character set of the redefined 0000 0 character 19). 0001 1 Nllme Iplease pflnl new informal;oo) 0010 2 60 CALL VCHAR (12, 16.96) Defines Ihe row 1121 snd column (16) Votiere 001 1 3 Ihe picture (96) will Address 0100 4 appear on the screen. 0101 5 Cily 011 0 6 70 GOTO 70 Holds the piclure on 0111 7 screen for viewing. Siale Z,p Code 1000 8 1001 9 This program will put the little guy on the screen. But how do Counlry 1010 A you make him move? Tune in to the next issue of Recreational 1011 8 Computing, and we will teach Mr. Bojangles. our little guy, to 1100 C Notice that latters are dance for you. t 101 0 used fOf" theM. 11 10 E 11 11 F P.O . Box E. 1263 EI Camino, Menlo Park, CA 94025

42 RECR EATIONAL COMPU TING NOV·OEC 1979 43 While the human expression in mathe· "I could never do that." It doesn't occur The first meeting is devoted to discussion matics comes through the personal ways to him that he is observing the result of of experiences and of math myths. At the WOrkshOps math is conceptualized and problems are hours of effort or years of practice. next meeting, a description of daily ac· solved, these qualities are rarely con­ tivities like shopping, buying gas, and Students are always surprised to learn veyed in primary and secondary schools. eating in a restaurant is handed out. This that there were times when I had diffi­ The emphasis there is on communication description includes a great many num· culty with mathematics, that 1 didn't of a specific body of knowledge through bers in order to stimulate reactions to solve all problems instantly in my head lectures and driUs. Individuality and in· math which the group then discusses. Bfat Math AnXift~ and that taking breaks helps. tuition are not encouraged. While no specific problem is stated, par· ticipants are asked to make up a problem The reactions of the most anxious stu­ The focus on detail and symbolism reo they can solve from any part of the story. dents. while different in degree, became quired by math can be very unpleasant, Most striking is the attraction people have more comprehensible to me when 1 reo frustrating, and annoying to those who to what they can't do. If a problem is BY STANLEY KOGELMAN called the feelings I had when learning hate details of any kind. The alternative easy, they feel it is not worth doing. to concentrating on detail is to get an However, when they saw the sentence, "I Dr. KogelmQJI is director of Mind Over causes of math anxiety, which prevents overall sense of a subject and rely had to get 4.8 gallons of gas," they began Math, 40-/8 209tll St" Bayside, Queens, people from coping with anything that to freeze and go blank because they New York J /361. Whew! J'm glad thal's primarily on feelings. In math books, has numbers. For the last three years, I however, there is no way to get a sense of "knew" they couldn't do decimals. out of the way. I was beginning to get have been offering Mind Over Math work­ the concepts without careful reading. Understanding this reaction enables par· anxious over the size or that address. shops which enable people to overcome ticipants to begin to control it. debilitating anxiety so that they are free Our modern world is filled with many There are two contrasting styles of think­ to learn mathematics. ing: convergent and divergent. The con­ Through the next two sessions, partici­ stress-producing and anxiety-generating pants receive more materials and fmd it objects, ideas, and processes. We are bul vergent focuses stepwise to a pomt, while Two -thirds of the people who attend the the divergent is more "creative," free­ getting easier and easier to read and work feted by the media, the pressures of workshops are women. While research in· with combinations of words and num· VrIOrk, and often our own imaginations. flowing, imaginative. While math requires dicates that women avoid math more both styles of thinking, few realize thls, bers. They also begin to more realistically So what are we to do? Well, there aTe de­ than men, my belief is that there are assess what they do and don't know. Al­ stressing workshops. de-conditioning pro­ and a primarily divergent thinker may probably equal numbers of men and resent having to obtain a defmite answer though math as such is not discussed , cesses, hypnosis, Qnd the stuff o[ this women who could be called "math by foUowing a formal sequence of steps. many suggestions on how to study math articie -- Math Anxiety Workshops. anxious." The difference is that women are offered. There is particular emphasis too easily say, "I can't do it," while men, mathematics. For example, I recalled the on how to approach word problems as This articie, the (lJ'St in whot we hope to THE MYTHS with much bravado, say, ") could do it if initial difficulty mastering € . 6 proofs, a translation and on how to develop in­ be a series on the issues of anxiety and I tried." Nevertheless, both may experi· the confusion of the first course in math sight into difficult problems by con· technology, is a good starting point for Many of the feelings people have about ence the same sense of blocking and the cold, logical, rigid qualities of mathe· analysis and topology. When faced with structing simpler Illodels. Q lot of us. Dr. Kogelmlln specializes in inadequacy. new and difficult concepts, the initial helping people overcome their anxieties matics are related to firmly entrenched reaction is a kind of fogginess in the head The last session is devoted to discussing related to mathematics. In the/utIlTe, we and generally believed myths about the Math anxiety does not have a single subject. The twelve math myths are: that is hard to see through, wondering if changes in outlook, underscoring growth plan to extend the scope of these articles cause , but results from any of several Men are better than women; math re­ you are going to be able to understand, and making recommendations for further to include the anxieties that computers factors reinforced by bad experiences. study of mathematics based on individual quires logic, not intuition; YOli must feeling like your mind is just not working, are bringing into people's lives. So, relax, The three most dominant factors are: needs. get comfortable, and go ahead and read .. always know how you got the answer; wondering if it is beyond you. The dif· ference is that the math-anxious give up What? Youre getting nervous? 011, math is not creative; there is a best way Women, especiaUy in junior high school, after a single try, thinking, " I knew 1 Most people do not aspire to be Olathe· come now! There is a number at the bOf­ to do a math problem; it's always im· are affected by role expectations. Math portant to get the answer exactly right; didn't have a mathematical mind," while maticians. They generally set realistic tom of the page . .. but you re not being is something boys are supposed to do. Most people who have difficulty with it's bad to count on your fingers; mathe· the mathematician knows that this is just goals for themselves and just want to be asked to add any tiling to il. It is really Many girls are led to believe that it is math believe they "just can't do it." maticians do problems quickly in their part of the process of learning math. comfortable with the math of everyday o.k. ... just relax and read. . . - RZ unfeminine to excel in mathematics and Their immediate reaction to math is so heads; math requires a good memory; life and want to feel that they can learn intense that their memory, attention and therefore reject it. And they may meet Being a mathematician does not win math is done by working intensely until THE DEMYSTIFICATION PROCESS whatever mathematics .hey need for their concentration become severely impaired. little opposition to dropping math at the the problem is solved; some people have work. Usually this does not go beyond friends at a cocktail party. Typically, the Otherwise intelligent and successful earliest opportunity. reaction to learning I am a mathematician a "math mind" and some don't; there is Mind Over Math workshops aim at enab­ needing to develop skill with arithmetic, people flIld they are just unable to learn algebra, statistics and, perhaps, finite is "Math?!! I always hated it. It was my a magic key to doing math. ling the most anxious to overcome their or do math. You often see them nodding Both men and women often perceive fear of math. During five, two-hour .math and calculus. worst subject. Excuse me, I'm going to "yes" when in fact you know they want math as being a rigid, authoritarian sub· get a drink." Now, however, when J say Demystification of mathematics is an sessions, 10-15 participants fust talk to say "no!" Even the most suppo'rtive ject consisting primarily of a set of rwes 1 have yet to encounter anyone who 1 specialize in overcoming math anxiety, essential part of overcoming math about their experiences with math and and patient tutoring proves ineffective. to be obeyed. Math books contribute to anxiety. Few non-mathematicians are then examine their approaches to solving could not attain his or her goals in math the response is far friendlier. They say, the rigid image by the formal style in aware that intuition is the cornerstone simple problems. Gradually, they work once the anxiety was overcome. "Math anxiety?!! I've got it. All you have After yean; of teaching and doing mathe­ which they are written. To many, this of doing math. TraditionaUy, mathe­ through their negative attitudes until, to do to see me panic is say, 'If two men matical research, I returned to school to appears inflexible and forbidding. It is as maticians throwaway their scrap paper rmally. they can approach math as they can dig a ditch ... ' I remember in seventh earn a master's degree in clinical social if math were something that has always gra de ..." and exhibit only the rermed solution. would anything else. To avoid a class· work. While at Smith College, I did a been there. not something men and room atmosphere, workshops meet in Reprinted by penninlon. © 1979 by The student, observing his instructor research project aimed at discovering women discovered and developed. a lounge. StAM NEWS, Vol. 12. No.2, April 1979. effortlessly solving a problem, thinks, 44 RECREATIONAL COMPUTING NOV-OEC 1979 45 I ca~ 898 TRS-80 no 33471 B I N G o

101";1 "8H/rJ(I 18V I'H~·!]" US";L2 was selected, a location to the left of it low as possible by paying off a lump sum 4ee FOP C=AT08 250 CLS:PRINT''PA YMENT SCHEDULE FOR LOAN OF S":LI:"OVER THE" is set on the screen. As the computer part way through the loan period. As an 260 PRlNT"NEXT ";N; "MOrrrHS AT ";R;"% INTEREST PER YEAR" 4113 1J1="lf1IltIf" picks another number, it points at that example, suppose you want to take out 270 R=RJI200:L3=LI-L2:IF L2=OGOTO 320 '\~0 PF'lNT USING Ut; L 280 PRINT:PRINf''BALLooN PAYMENT OF S":L2j"DUE AFTER LAST MONTH screen location. If the location is SET a loan on a car, which you will use for 290' •• - CALCULATE INI'EREST ON THE BALLOON PORTION .-- another number is then selected. At th~ 4sl) NEXTC 36 months and then sell. Since the car 300 12c:L2 -R:12=(l2-1 00)+1 :I2=(INT(12)/100 4413 PPINT will have some resale value at that time, 310' ·"CALCULATEMONTHLYPAYM.ENT"- end of the game, a quick review of the 320 X=(I +RJ [N:P=L3-({R -X)/(X-I» display teUs me which numbers were 450 RETUf.'N you could use it to pay ofT the loan 330 P=(p- IOO)+ I :P=(lNT(P))/IOO called! 468 'SUBPOUTINE FOR DISPU1YlNG PANDOM NUMBERS prematurely. In effect, you have taken 340 PRINT:PRINT"EACH MONTHLY PA YMENT:S ;P+12 out a loan for longer than the 36 months 350 PRINT:PRINT''TOTAL PAYMENI' BY END OF LOAN=$";N-(P+12)+L2 4713 IF N

"The oldest personal computing periodical" launchpad for Dr. Dobb's Journal Original publication of the walk-in Computer Center! The PET Outrageous predecessor to the magazine you now hold in your hands1 on The Newspaper was a wild idea come true, a seed still prospering. Computers can be demystified; they can be for people. SPECIAL-, OFFER All 12 available back issues of PEOPLE'S COMPUTER COMPANY NEWSPAPER for only $15. Over 1/3 off regular price. PET CRT (Rear View)

'. BY ALFRED J. BRUEY HIGHLIGHTS OF pce NEWSPAPERS Now its the PET'S tum to sound off/The software presented ACCORD Single l .. ue price U.S. $2.00. Foreign $2.50 Vol. 1 # 3 ZINGO/"Going to Bid"/How to Buy an Edulystem/ here is a simple way to get the idea of maldng music on the Vol. 1 1'73) # 3 BASIC MUSIC /CHOMP IEEE-488 Port Vol. 31'74-5) # 1,4 Vol. 3 # 1 A Fantasy of Future FOnTls/ Low·COS't Home School PET. Find out how to hook your PET up to your stereo or build your own amplifier circuit. If you're all t~umbs, an ON/OFF Vol. 4 ('76-6) # 3,4,5,6 Microprocessor systems' INCHWORM/MAZE! Analysis of Teawr/ Parallel User Po rt f Vol. 5 ('76·7) # 1,2,3,4,5 Computer lUiterecy Problem by Pater Lykes easy way out is the commercially (IlIaiiable amplifier, called DOD 0 Vol. 3 # 4 Build your O'Nfl BA$IC/Mvneriou. RNO/Mor1l INCH­ Sou"dware, from CAP Electronics, Dept. Re, 1884 Shulman Quantities ere limited. This offer good until 12130/79 only. WOAM/ Computtn & Art/BIOSIN Son of HardWin! Second Cassene portr'l Vol. 4 # 3 NUMBERffinv BASIC/Anllog to Digitll Convtr1ion/ Ave., San Jore, CA 95024. - TD o Check here for s.peciel offer. or circle VO\lr choiC61. Minuet in G Major Vol. 4 #4 Space Gamesrrlny BASIC/Soloworjtt;/OIOOLEI STTR/ Being able to make music on your PET may not justify its Please print plltinly : MOn! MUlic purchase, but it's a lot of fun to do! Mote PET games are The edge connector that you need plugs onto the parallel NAME ______Vol. 4 # 5 Glma. for tha Pocka1 Calculal0r{SOUARES/Mlka including sound output now and most of them are using Bltlieva Compuhln/STRTR K/Huntington Computer Project user port of the PET. Do not attach it .to the IE~E.488 AOORESS ______Vol. 4 # 6 Blofaedback/pOUNCE/"WIt're Building Our Own the sound generation method described here. port In fact it's not a bad idea to put a stnp of masking tape Computer"/Progr.nmer', Toolbox/ cccrrv II Terminll and CITY/STATE ______acr~ the IEEE port so you don't accidentally plug into it. Glme Center First, we'll take a look at the hardware that you11 n~ed. to ZIP COUNTRY ______Vol. 5 # 1 Low Cost Software/, Tinv Trek/ Your Here's what the completed cable should look like. The ampli­ Brlin i'l HologrltlTl generate sound. Then we'll cover the software, begm~U1g fier end might look different if your system doesn't use the My pltym.nt of $ is Inclo.d Vol. 5 # 2 Dungeon. & OrlgOn,/HATS/One on One/PLANETS/ with a single note and progressing through scale generatIOn, NOTE: All back i"ue orden must be prepeid. Plymenll must be The Positive of Power Thinking and flllally, examine the program necessary to playa com· RCA jack. in U.S.$ drewn on I U.S. blnk. Vol. 5 # 3 STORY/SNAKE/More Build Your Own Compute,., Introducing PILOT/FROGS plete song. Vol. 5 4 REVERSE/RobotirrinV PILOT/Space & Computer1/ OTHER MAGAZINES AVAILABLE # ConV8l"11tlonll Progr.nming THE HARDWARE Amplifier connector Negative- ATTHE BACK ISSUE PRICES BELOW (Circlevourcho;ce• .l Vol. 5 #5 Z·80 PI LOT/6502 Assemblv ProgrammingfTiny BASIC Positive (connects to pin M) use pin 11, 12,orN PtopIe'. Comput.... (formtrly PCC N~) for Beglnn&n PET music is generated through the CB2 line of the parallel U.s. & Foreign by P1eBSe tend in this form or fea;milt to: Peoplt'. Computflr Co., user port of the PET's 6522 VIA (Versatile Interface Adapter). TerTitori.. SurfKemlii 1263 EI Camino Rill, Box E, Manlo Plrk CA 94025. POKEing values into PET locations 59464, 59466 and 59467 PET connector Vol. 5 ('771 #6 $2.50 BB. $3.00 ea. Oniv ttlt inult. Jilted herl an! e'/Iilebllt. PrlCIt includes ;uue, sets the frequency and tone of the square wayes that are Vol. 6 ('77·8) # 1.2,3.4,5 hlndling, and .hlpment by second cllss Of foreign suriICe mlil. generated by the shift register in the 6522. o Vol. 7 ('781 #1,2 Within the U.S., pleaM I!low 6·9 week$ to procen voor orditr Vol.7 ('78) #3 $3.00 ea. $3.50 la. lIICond clan. Ouulde thlt U.S., surilCemail can tlklt 2·4 month •. The drawing below shows the connections to the PET. Use RlICreatiONlI Computing For filter service (U.S. only) add $.50 IMr iuult rlque.ted Ind we'll a connector and don't solder anything to the connectors on Pin M Vol.7 ('79) #4,5,6 $3.00 ea. $3.5011. ship UPS. Outlidit the U.S., IIdd $1.50 per issue rIKIuested for (positive) Vol. 8 ('791 #1 airmltll shipment. the PET. If you are using your hi·fi amplifier for sound output, the connector on the amplifier end (usually an RCA plug type) shouJd match the cable connector. NOV-DEC 1979 49 48 RECAEATIONAL COMPUTING - You should use shielded cable for the line between the PET The formula for calculating the frequency based on values in and the amplifier. Don'r put the PET connector on upside addresses 59464 and 59466 may also be found there. You Lines 50 to 90 generate the ascending scale and line 100 A CIRCUIT FOR A PET AMPLIFIER down! now know how to playa note, in fact, you can play any note to 140 the descending one. The length of the notes are set that is in the range indicated by the equation in the table. to 1/lOth second each by the 6 in lines 80 and 130. The POKEs The following diagram is a circuit for an inexpensive Oess than First, tum off the PET and the amplifier and then plug the in lines 60 and 110 set the frequency. The POKE in line $6.00) PET amplifier for adding music or sound effects to jack into tile amplifier. Carefully slide the connector onto 160 stops the shift register. CO is the COWHer to play the your games. the output port of the PET. Be certain that you have the con· Table of Frequency Constants scale five times. nector on the PET right side up. Now turn on the PET and SI Values to POKE into 59464 the amplifier, but set the amplifier volume all the way down You can now get the PET to play any tune you want. You can to slart. The PET puts out a big signal on the CB2 line and N,,, frnq. POKE N,,, set up the proper frequencies in one array and the proper time you don't want to damage your amplifier. ' POKE .... values for the notes in another, and then play them with M 8 246.942 one BASIC program. A "Happy Birthday" exanlple is given SPKR A word of warning! Avoid discharges of static electricity 251 C 523.25 118 19V C 261.625 in lines 10-19 below. Type in, SAVE, and RUN the following into your PET. Ground yourself before plugging the connector 237 C# 554.37 111 C# 277.185 223 program: ~ 0 587.33 104 INPUT onto the back of the PET. Be especially careful if you are 0 293.665 211 Eb 622.25 98 3 DIM L(251,PI(25) working in an area that is carpeted with nylon carpeting. V- Eb 311.125 199 E 659.26 93 10 DATA 237,237,21 1,237,177,188,237,237,211,237 R 1 : 01 -,.- E 329.63 188 F 698.46 87 15 DATA 157.177,237,237,117,140,177,188,211 SOFTWARE ~ F 349.23 177 F# 739.99 B2 17 DATA 132,132,140,177,157,177 I'- F# 369.995 167 G 783.99 78 18 OAT A 15,5,20,20,20,40,15,5,20,20,20,40 Before we proceed with making music, you should know that G 391.995 157 Ab 830.61 73 19 DATA 15.5,20,20,20,20,20,15,5.20,20,20,40 Ab 415.305 148 A 880.00 69 during some part of your experimentation with music, you 20 FOR 1-1T025 N A 440.00 140 Bb 932.33 may get a musical tone thai you didn't expect. No matler 65 30 READ PIO) Bb 466.165 132 8 987.77 61 31 NEXT I At - lOOK potentiometer with switch what key you rut, it won't stop. To stop the tone without 8 493.885 124 32 FOR 1-1 TO 25 Sl - PAAT OF A1 having to tum the PET off and re·enter your program, 33 READ un just enter the command: POKEing 59466 with a 51 instead of a 15 will shih aU notes one Q1 - RS2031 (Radio Shack 276-2031) 40 NEXT I oct8Ve higher. POKEing with an 85 will shift all notes two octovas higher. 42 POKE 59467,16 SPK A - Bohm Speaker POKE 59467,0 44 POKE 59466,15 Small plastic box, 9 volt battery, battery holder The \lalue C to be POKEd into location 59464 is given by 50 FOR 1"1 T025 Rather than just giving you a usting of a program and letting 63 POKE 59464,PIO) you figure it out yourself, let's start with a program to gener. 70T .. TI Use an RCA phono jack as the input and you'll be able to ate one note. Enler and SAVE the following program: 84 IF TI . T< Ut) THEN 84 use the same connector cable as described previously. 2 if 59466 is 85 85 POKE 59464,0 wnere f is the desired frequency, in hz, and d - 4 if 59466 is 61 10 POKE 59467,16 90 NEXT 1 Substitutions may be made for QI but for sufficient volume 8if 59466 is 15 20 POKE 59466,15 1 l00POKE 59467,0 a high-gain transistor should be used. The transistor can be 30 POKE 59464,237 120 END mounted directly on the leads of the potentiometer. 40T " Tt Here is a listing to play the C-scale. It will play up and down I'm sure you have the idea by now! You should know that 50 IF TI· T<20 THEN 50 the scale five times. If you interrupt it in the middle of its the first three DATA statements contain the frequency values 60 POKE 59467,0 70 END song, you might have to POKE a 0 into 59467 as mentioned and the next two the corresponding note lengths. line 84 earlier. Enter and SAVE the following program: is the timing loop and the note frequency is set in line 63. Now ~UN the program and you should hear your first PET The POKE in line 85 is to turn off the sound so that if two 10 DATA 0,237,211,188,177,157,140.124,118 music. If you didn't hear a note, check your solder joints 20 FOR I- OTQ8 consecutive notes are the same, they will sound like two and connections. Also make sure that you POKEd the right 30 READ PHI) separate notes instead of one long note. numbers into the right locations. Then try again. We'U assume 40 NEXT I everything went right this time and go on with an explanation 42 POKE 59467.16 EXTENSIONS of the program. 44 POKE 59466.15 46FORCO · 1T05 One extension to this music system would be to write a pro­ The note that you played was Middle C and it played for If3rd 5OFORI - 1T08 gram to convert music symbols, such as C or D#, into their of a second. The value 237 in line 30 sets the frequency. 60 POKE 59464,PI(I) corresponding POKE values. It would be a lot easier to write 70T .. n It call be any number from 0 to 255. The lower the number, a C any time you want it than to write a 237. 80 IF TI . T<6 THEN. 80 the higher the note. When you try a very low number, like 90 NEXT I Another extension would be a program to make your PET I or 2, only your dog can hear it. The value 20 in line 50 l00FORI - 1T08 Now you can real ly expand your horizons With the IIny-c tells how long to hold the npte in I f60th of a second units. 110 POKE 59464,PI(8 _ I) keyboard into a musical keyboard. This can be done by slruclured programming language The Ilny-c awne(s manual The 20 holds the note 20/60ths or 1/3rd of a second, a 60 120T - TI taking advantage of the fact that a PEEK on location 515 (including 8080 and PDP-II source code and Ilny-c In C) IS will give you a note I second long, a 30 a note 1/2 second 130 IF TI _T<6 THEN 130 will tell you what key is depressed. You could also write a stiU Just $40. And we-ve added these new formals to reol)y long, and so on. 140 NEXT I program to let the PET compose the music and play it to you. egg you on TRS·80 Levell) SYSTEM Format Cossette; CP M 150 NEXT CO There are two ways to do this: you can either use the RND Diskelles With 8080 Source. PDP- 11 Diskette; North Star 5" 160 POKE 59467,0 Unc 10 starts the sruft register in the 6522 to free.running. function to let the PET compose entirely on its own or you Oiskette; KIM and SYM cassettes And there's more. plus lots to 170 END Line 20 sets the octave. The value of IS gives a useable range can combine the RND' function with a set of music-writing come Order your liny-c owne(s manual today and getlhe of notes, but you might want to try a 51 or an 85 to see what The DATA statement in line 10 gives the numbers to be rules. whole story Coli or wote: tinY c associates. PO. Box 269. happens with these values. POKEd into location 59464 to obtain the various frequencies. Ho)mdel.NJ 07733 (201)671·2296 _ Middle C is 237, Dis 211, up to 118 for the C above Middle Someday when this music isn't good enough for you any­ You 'lI qUIckly discover IIny-c IS all t The Table of Frequency Constants gives a listing of the num­ C. Lines 20 to 40 read in the frequency data, line 42 starts more, you can start considering different hardware so you can It'S cracked up to be. . C71 bers to POKE into 59464 to get notes besides Middle C. the shift register shifting, and line 44 sets up the octave. play more than one note at a time. You might also want to New Jersey reSidents Include 5'l. sates tox Voso consider writing your programs in 6502 macrune language ond MosterChorge occepted. tnclude charge 50 RECREATIONAL COMPUTING plota number WIth ordel instead of BASIC. NOV-DEC 1979 51 --

00020 REM 00030 RE}! WRITTEN BY JACK A. TAYLOR 1, 00040 RE}! TALLAHASSEE, FLA. 00050 REM JANUARY 12, 1978 00060 REM 00070 pRINT "THIS IS THE MUSIC EDUCATION COCOSE -A-TlTLE" 00080 PRINT "SYSTEJoI. IT IS DESIGNED TO RANDOMLY SELECT" 00090 PRINT "A TITLE FOR POTENTIAL MUSIC EDUCATION RESEARCH" 00100 PRI NT "PAPERS, THESES, AND DISSERTATIONS." 00110 PRINT 00120 PRINT 00130 PRINT "HOW MANY TITLES 00 YOU WAIn- PRI NT ED"; 001110 INPUT X 00150 PRINT cnoOJ(-o-l"lLL 00160 DIH A$(20) ,8$(20) ,'C$(20) ,0$(20), E$(20) 00170 J:O 00180 REM STATEMENTS 00220- 00510 RANOOKLY SELECT 00190 REM 5 WORDS (VARIABLES A$, 8$, C$, 0$, £$) BY JACK A. TAYLOR 00;'00 REM fOR A TITLE FROM DATA STATEMENTS 00210 REM BEG I NNING ON LIIl E 00610 School of Music 00220 Rl:INT(13- RND( -I ) +1) Florida State University 00230 1:0 002110 READ A$ 00250 1:1+1 00260 IF I:Rl TfIEN 00280 00270 GOTO 002uO 00280 R2:INT(15- RND(_1l+1) 00290 1.0 For people like myself, who always have TIle user can request any number of 00300 READ S$ difficulty pUlting ritles Oll stories. titles to be printed, and the chances of a 00310 1:1+1 00320 IF I.13- Rl +R2 THEIl 003uO articles, poems . . here is an answer from repeat are slim . With this program, which 00330 GOTO 00300 sunny Florida, If I could 1I0W get the was designed for music education oo3~0 R3dt-IT(16· RND( - I)+I) program to write the paper, I would go students, 673,920 different titles are 00350 1:0 00360 READ C$ /0 Flon'da and fish while my microcom­ possible! or course, one can increase 00370 1:1+1 LISTING puter talks to my editors . .. -RZ or decrease that potential by adding or 00380 IF I:15- R2+R3 THEN 001100 00390 GOTO 003bO deleting research words (and by changing oo~oo RII:INT( 12·RND( _1)+ 1) For those college students who struggle the RND statements), OO~ 10 1:0 \0 create titles for their research papers, 001120 READ D$ OO~30 1:1+1 the CHOOSE·A-TITLE system is the Dr. Ellis Melton, Coordinator of Music OOU~O IF I:16-R3+RU THEN OO~bO solutioll. This BASIC program uses the Ed ucalion at the University of Arkansas, 00ij50 GOTO 001120 RND function· to randomly select five Fayetteville, is the creator of both the 00~60 R5=111T(IS· RND( - I)+I) 00~70 1=0 "research rypc" words fr0111 DATA CHOOSE -A -T ITLE idea and the research 00~80 READ E$ statements 610-820. Line 530 prints the words used in this program. 00~90 1:1+1 words, appropriately arranging them int o 00500 IF I:12 - R~+R5 THEN 00530 00510 GOTO 00~80 a title. 00520 REM I>RINT THE TITLE 00530 PRINT "THE ";A$;" MID ";8$;" OF ";C$;" ";0$;" IN MUSIC ";E$ 005~0 PRINT RUN OF THE PROGRAM 00550 RD! STATEMENTS 00570- 00590 ALLOW ANOTHER TITLE 00560 REM TO BE GENERATED AS INDICATED BY INPUT X nns I S T!iE HUSIC EDUCATIO N COOOSE-A-TITLE ' 00570 J:J+l SYSTD! . IT IS DESIGNED TO RANOOKLY SELECT 00580 RESTORE A TITLE FOR POTENTIAL HUSIC EDUCATION RESEARCH 00590 IF JRACTICAL,CLASSICAL,ADDITIONAL THE HISTORY AND APPLICATION OF ADDITIONAL PATTERNS IN MUSIC 00730 DATA GENERALIZED AD-1INISTRATION 007110 REM VARIABLE D$ DATA 00750 DATA FAC!QRS , TRAITS,HABITS,VARIABLES,CHARACTERISTICS 00760 DATA PROBLEHS,ALTERNATIVES,EFFECTS,PATTERNS,CONCEPTS -Format lor the RND lunction will vary. 00770 DATA THEORIES,!-ODEts 'r depending upon the BASIC version. The 00780 REM VARIABLE E$ DA A program listed here is Ve~ion 2.1. Control DATA APTITUDE,ACHIEVEMENT,STUDY,LEARNING,STUDENTS DATA TESTS,SUCCESS,FAlLURE,ATTITUDES,TEACHIHG Data Corporation (Cyber 70 series computer). DATA EDUCATION,CURRICULA,B[HAVIOR,SCHOOts,HISTORY DATA ADMINISTRATION,CREATIVITY,ABILITY END

RECREATIONAL COMPUTING " NOV-DEC 1979 53 r

<>()()()()()()()<)()()()()<>()()()()() ()()()()()()()()()()()()()()()()()()() <> 1861 1881 <> <> 1882 11182 <> <> <><> <> <> <><> <> () RonlT ONE () () ROnlT ONE () Newett Awl's Goat <> <><> <> ~~.- .,. ft "'~"" ••• ,'" ... "'...... Once Again compute-a-ticket '-/ ,nl.;' I.~ n UCItVI...c , ,U .. I\C' '-/ \./ 'n,~ ,,~ " UCI'fUI...c 'U.. AC' \..1' <> <><> <> () ROULTS $~ ~8 () () ROULTS $~ 58 () <> <><> <> BY BRIAN YANNY <> <><> <> <> 1861 1881 <> <> 1882 11182 () Brian took on the Newell A wi goat problem as a summer <>()<><>()()<)()()()()()()<><)()()()() ()()(><><)(><)()(><)()()<)(><><><)()() school project. The result: a unique way of soilling the prob­ Z' AUT H O~ ; B~ ! A N YANN V lem and an A+ in his course (I'm assuming that was his grade), WASHI NGTON HI GH SC HOOL Mr. Kmoch, the instructor, appears to be combining the teach­ ~IL WAU~E E . ~I SCO N S IN CO ~ PUTER; DIG ITAL SYSTE HS POP-I! ing of good programming style (Brian's listing is well doclI­ BASIC-PLUS LANGUAGE WI TN • WORD FL OATINO PO IN T A~IT H~ E T IC mented) with creotive and challenging problems. Summer ,. IDOUBIE P ~EC I SID N I school will neller be dull again! - RZ OESC~IP T IO N TH I S P ~ OG~A H CD ~ Pur~:; tH E n ~ E n OF A F1G lI ~E BOUNDED BY TWO CI~CUL A ~ ~RCS OF DIFFERE NT RAnll . IT OI VI OFS HIE lNTE ~S E CTJO N OF HIE AR CS The small circle represents the yard. The equation for this [ NTO S ~ ALL TRA PE7.010S. CO ~P U T ES THE AREA OF e ACH. AND SUHS THF TO TA L. circle is Xl + (y - 10)2 '" 100. ~, I TERATIONS OETeR ~ !NE THE NU HBER OF TR APE ZOI DS THE RE GION TO BE CALCULATED 15 10 Be DI'n OEO INTO . The la rge circle represents the boundary of the range the 10 INPUT ITERATIONS ' ;W 20 IF N <~ O THEN 10 ELSE N_ I !N goat can reach. Its equation is given by Xl + yl '" rl where 30 I NPIH 'RADIUS OF VMW " 2 z",.. ,... ,"' o' .... ""' r is the length of the rope. 3~ R' IC: H3 _ ' A"'.. """""',... ,,.... , .. , .. ,. ..."'o, .... ;"· · WO'>KI\· r. .. . . gO PR!N"10PF L ENr.I~ AREA nOAT CONSUHES ·. 'OFS l tlED AREA ' PIIOCEI)lNll" points - Al and Al which will be used as slartingand ending 90' S t ART LOOP n",'-ocll"'9'>Sot. 0"""' __"""'_' values when finding the area of the shaded intersection. 10 0 1 -0 '~Etl!l Hwo •. _ ...., A' " ...... _0<1>"_,vol ... """•• "","0'" . .. ,. .,... "" The trapezoid ABeD represents a (not [0 scale) sample of one 120 FOI> Y'- I ' AI TO ,,~ _ N STEO N n .."or "..,,_ ...... -...... , 1301- 1 . " . ( n.lr. ( ~, -FN~' X) '~ N G' u ' N) _F NV I " .." ) n ...... 0) . ... of the 50 or so sections the shaded region will be broken into ,.,-, NE>: T ~ """'. ,,,.. ,, , .. I ' ~ IF T } A IfIFN :'00 nse S.T by the program. ISO R.Il'''3 Th " "". ""..... ,_ ""11'" .... __ ." .... ,_ 16!! GOT090 <'00 P'>IOH "11 ~ ; . I N -: oRrNT "'." ...... ".,.0 .... ~~g :~l ~ ~ ' .. A ~[ ~ ... e ROPE 'NUHI.'R' · UNITS LO NG' . "",,',",• • n>_ David's program, written in Programma 2.0 BASIC for a S99ENO Sphere System Three with a Okidata printer, prints serially numbered tickets, as you like them. David is associated with Sortiarii, a minicomputer hardware and software support finn.

GGATS lZ:3! p~ 31 - Jul-7S His address is RD#l. Box 648, Newmanstown, PA 17073. '"'ITERATIONS? 5 0 RADIUS OF VARD? 10 WORKING . • . . If you use this program to generate tickets for any good RGPE LENOn! AREA GOAT CONSUMES DESIRED AREA 144.20'.072S0 114 !~7.a79S326794S events, make sure you send David a set of "comps. " - RZ "II .~ !~5.15318 Z 39B6'3 1!l7.07SS3267SCS I I .~6 !~6.9IB.BI69S6~. 157.07S63Z67S49 11. 5 87 ! ~7 . a 729a!6 0 1'2~ 1~7. a 79S32679C9 II . ~ B13 1 ~ 7. 0 79~170BB71 1!l7.07S63267949 II .~B73 1 ~ 7. 07 9!117 0 8B71 1!l7.079S3267949 \1 . 5 6730~ 157. a 796273.~ O B9 157.07SS3Z67949 I I • 5 67 3 0~2 1 5 7. 0 7983! 7 !1~3.3 157.079'63267948 II . 5 67 3 0~2 . ! !1 7. 0 798J26J73SC 1!l7.07963Z67949 I I . 5 873052. 1 !~7. 0 79B326!19"5 1!l7.07983Z67949 II . 5 8730~ 2 C 19 1~7. 0 7963Z679ZS1 1~7.07963Z87849 I! . ~ B73 a ~2CI 9 1~7. 0 7S63Z879ZS1 1~7. 0 79632879C9

54 RECREA nONA L COMPUTING NOV·OEC 1979 55 program for only a fraction of a second. are programmable. Most processors of more terms by way of clarification. Then the processor goes on to the next any size have circuits to directly execute Jargon is increasing at some geometric user in either a round-robin sequence or their primitive machine language. A few rate while our brains have arithmetic some order specified by the system large computers and some minis have limits. designer. hardware that is left in a more primitive state. They require a program in ROM To help solve this dilemma, the Recrea­ On-line systems make use of time-sharing (read--only memory) in order to execute tional Disputing Society (RDS) has been AD IDtroductiDD to to service business customers, as in the their machine language. This is a micro­ formed. There are no dues or organized terminals of an airline reservation system, program and is written in a more primi­ activities. Members are easily recogniz. for instance. Real-time systems also use a tive instruction set than machine Ian. ed by their ability to draw hair-line dis. time-sharing concept. However, the term guage. Microprogrammable processors are tinctions among computer temu Ihat are "real-time" is usually applied to process slow, but flexible. There are micropro­ seemingly equivalent. 1bis computer ac. control where a centraJ processor supplies grammable microprocessors around, al­ tivity is absorbing and endlessly inventive Aec~eatiQnal the intelligence for any number of subsid· though no one has yet incorporated one and it doesn't require a computer. iary machines and must send and receive into a home computer. 'messages at high speed. A strict definition The RDS does not issue membership of a real-time system requires that incom­ By now, you will have noted that the def· cards. Members are born, not made. The ing data be processed and used in a pro­ inition of all but the simplest of comput­ only rule in the by·laws covers disputes Dis~uting gram while the program is actually er terms requires the use of other equally between two members that are not set· running. obscure terms. In addition, authors with tled by an ultimate meeting of minds. In the courage (or naivete) to compile glos­ these cases, an appeaJ can be made to a The difference between a programmable saries of computer terms may fmd that all third RDS member. The by-law states microprocessor and a microprogrammable their efforts to clarify only add to the that the third member is required to give processor is an easy one. All micropro­ confusion. It is possible that every pub· several cogent reasons why both the other BY JOHN HIRSCH cessors with access to read·write memory Lished definition gives birth to two or two people are wrong!

At times. the pressures of our fast-paced one comes along breeding either mares 'cram it into its own neat cage. But con­ technological sociery begin to affect that give milk with a high butterfat cepts rarely remain domesticated when each of us. To relieve the tensions, some content or galloping bovines intended you apply them to familiar computer of us jog, some play tennis, and some for the Belmont Stakes, then the great systems and languages. beat out their exasperations on the type­ gray area arrives. wn·ter. John chose the last outlet. Here A subroutine in FORTRAN, for instance, is the result of his exercise in typewriter There used to be large computers that is equivalent to a subprogram in COBOL, were enthroned with all their satellites CondnUN from pg. 47 therapy. .. . - RZ but not to a subroutine in BASIC, which QUANTITY MAGAZINE QRDERS behind glass walls, friendly minicom· does the same thing as a "perform state­ PEOPLE'S COMPUTER COMPANY PUBLICATIONS What's the difference between a subpro­ puters for desktop use, and microcom· ment" in COBOL. LIST OF VARIABLES USED Rec/f!atio"a/ Computing gram, a subroutine, and a library function? puters with a central processor sand­ LI. . initial loan Dr. DObb'$ Joumfll What is the distinction between a real· wiched onto a single chip. Now mini­ Now that we have dealt with subprograms L2 ... balloon payment Compurer Music Journal time system, an on -line system and a computers are growing larger and possess and subroutines, we can go on to library L3 ... rest of loan, on which principal Will be paid monthly II .. total interest to date Clubs, users groups. $.Choals and any others interllStlld may time-sharing system? What distinguishes their own train of peripherals super­ functions, which are like subroutines ex· 12 ••. monthly interest on balloon principal a programmable microprocessor from a vised by an elaborate operating system. cept that they must be invoked with at 13. montltly interest on rest of loan take advantage 01 di$.Counts for quantlty orders 01 !lach of our p magazines. See terms below. microprogrammable processor? Large scale integrated circuits have been .. . monthly payment on rest of loan (interest + principal) least one argument to which they apply 1'-+12 . total monthly payment All orders will be shipped via UPS - faster than the p os t officel applied to the processors of all computers, their function and return an answer. The R ... interest rate (initiaUy %tyear, bter converted to %tmonth) N . If you can't answer each of the questions and bit-slicing tedUliques can be used to library of library functions may be a .. number of months until balloon payment due DISCOUNT SCHEDULE {one vear! above in 25 words or less, don't let it alter computer word sizes. Biological collection of usefuJ subroutines written Nott: the [ in line 320 is ... this program would probably work worry you. The invention of new jargon beings seem to be governed by some by a software supplier, with a directory in Level I by writing subroutine to handle the exponent. QUANTITY DISCOUNT RC DDJ CMJ is more often a Humpty-Dumpty pro­ natural laws that have remained immut­ that the computer knows how to access. Regular Subscrip· cedure where words mean what I say able up to the present. But electronic However, in some assembly languages lib· tion Rate I COPv none 510 S>5 $20 they mean and you are free to knock me husbandry allows any sort of mating in rary functions are user·defmed but have a 5·24 copies '0% 9 13.50 ,. off the wall if you can. Each computer endless permutation. It is inevitable that linkage method that differs from ordinary ContinuN from pg. 22 25-49 copies • 12 16 manufacturer has their own in·house the distinction between species is rapidly subroutines. No need for any further dis­ 50·74 copies ""''0% 7 10.50 75-+ copies glossary and usually feeb free to pluck blurred. cussion of linkage methods because every­ Cryptarithms 35% 6.50 9.75 "13 any word out of the common stock and one knows about them. Puu.le 14 (Extra CJuts) TERMS reshape it to fit their purposes. Now it is even difficult to fmd an ad· E • E = T; so T is 9,4, or perhaps 5 (with a carry). Thus equate defmition for "computer." The If all this seems perfectly clear, let's go on Good in the U.S. onlv. Ecan be either 2 or 3.ln the fIrst product,R ·U= E,so Aside from this problem of ad hoc defi· word is being applied to any dinky micro· to answer the other questions posed at Quantity orders must be made UP of one title only - no mIxing nition, there is also the great gray area processor used to control an eggbeater the beginning of this article. A time-shar­ E cannot be 3. Why? So E is 2. At this point, begin using among titles. that keeps creeping up on us. We start or an electric toothbrush. There are a ing system is one in which a fast sequen· an "Is-Not" Chart. Now by looking at the ninth column All copie-s must be shipped to Jarne name and stU'!!H address with a cow and a horse, which are easy plethora of dictionaries which attempt tial processor fools all its customers into where R + T + W = W you can begin to unravel the rest. (no P.O. boxl. enough to tell apart even if you lack a to organize the chaos of computer termi· thinking that they are all being served at The Elimination Table or "Is-Not" Chart will help you Pavment must accompanv order- ch eck or money order onlv. degree in animal husbandry. Then some· nology. They trap each feral concept and once. It does this by working on each with this task. Good luck! Minimum one·year sub$.Cription.

56 RECREATIONAL COMPUTING NOV·DEC '979 57 , •

... it doeslI '/ take a 17th level saving roll on 10 to understand . .. the 5th Edition of Reviews MICROCOMPUTERS AND THE 3Rs, The chaplers on computer science, II is on the whole a good effort. Chris A GUIDE FOR TEACHERS problem solving, instructional simulation Doerr has put her years of exposure to By Christine Doerr and games offer informalion that's fairly education and compuling to good use Hayden Book Company, Inc. well known to old hands, but provide a with this comprehensive introduction to Rochelle Park, N.J. concise, comprehensive inlroduction to inslruclional computing. She shows, in $7.95 newcomers. The material selected is good, addition, awareness of the financial and as is the case throughout Ihe book, realities of school systems. Because of I'm quite pleased to have had the oppor· a copious list of references is provided. the invaluable and unbiased information tunity to review this book. It fills the it contains, the book deserves wide need for a practical guide for teachers The rmal two chapters offer advice on acceptance. who want to get involved in computing. Computer Assisled Instruction (CAl) a Sword-and-Sorcery The comprehensive introduction to edu· and Administrative Computing, two Reviewed by John Nierengarten Fantasy Role-Playing Came cational computing and the reliable topics which are the source of consider· University of Wisconsin suggestions on selecting a unit shouJd be able confusion to educators. The author La Crosse, Wisconsin 54601 of value to experienced instructional makes thorough observations on the pros computer users and administrators as and cons of using CAl, differentiates - Original game by Ken St. Andre, revised and well. The treatment of important ques· among the basic types, and provides re-organized, and edited by Liz Danforth tions about using the computer in teach· some simple examples. - Completely re-illustrated by Rob Carver, ing also makes it recommended reading Liz Danforth and Victoria Poyser for any teacher or administrator getting A few words of caulion are given about involved for the first time, whether they using micros for administrative com· - FealUring new spells, more powerful are considering microcomputers or time­ puting. I personally wouJd be more weapons and armor, more background sharing systems. conse rvative; at present, most major material on the T&T world, an illustrated administrative applications do not belong cross-referenced Weapons Glossary, and a The highlights of the book are as follows: on a mi"ro. A great deal more than THE INCREDIBLE SECRET comprehensive Index In "The Microcomputer: What it is and writing or procuring programs is required. MONEY MACHINE - 96 pages, typeset, professionally printed What it Ain't," the author explores the The whole man·machine system must By Don Lancasler and perfect-bound history of instructional computing and be carefully designed and tested, other­ Howard W. Sams & Co., Lnc. its status in schools today. She also - all under a full-color Danforth cover! wise the potential for failure and the Lndianapolis, Indiana discusses the components of a micro· resulting frustration is great. $5.95 computer system and gives some advice Complete for only $8.00 on economic choices one may face when Before you read tltis book you may want you can't afford to miss it! My crilicism is minor. The author's selecting equipment. personal choice of a computer and some to quit your job, if you've got just one, of the general recommendations accom· because, according to the author. "(II) "What the Micro Computer Offers to panying it arc a bi! dated. For instance, will certainly be using you 1') its own Yes.' Please send me Tunnels & Trolls (5th edition) rulebooks at $8.00 each.' Education" addresses common fears and a floppy disc was not included on her profit, having you do what II wants ... concerns regarding the computer in edu­ system and not recommended on a starler and may even insist on such dumb Enclosed is 0 check or money order for (please add 50¢ for shipping & handling). cation, and the question of "why get system because of cost. Floppy discs things as your being 31 a certain place at Make checks payable to Flymg Buffalo Inc. involved?" The author suggests that the are now available for some systems for a certain time, wearing specified costumes NAME ______answer is the opportunity for great teach· as little as S6OO, and their availability or paying tribule 10 others in its ltier· ing. The development of that theme of· can make an enormous improvement in archy." Mler you've quit, or in order ADDRESS ______fen sensible priorities. its usefulness to an educational program. ·to, settle down to read this engaging In fainless, this recommendation was book of "contrary opinions." CITY ______STATE ______ZIP _____ For the teacher deciding whether 10 probably made with the best information build or buy a micro-system, "How available at the time, but things are Mr. Lancaster is known for his earlier Send to to Get Started" provides plenty of changing very rapidly in this field. The books CMOS Cookbook, and OIeap information. (Building a unit is nOI author compensates adequately by com. Flying Buffalo Inc., P.O. Box 1467, Scottsdale, Arizona 85252 Video Cookbook. In The Incredible recommended for most applications.) paring the most popular microcomputer Secret Money Machine, Lancaster draws (Chris Harvey is our sale European distributor for Tunnels & Trolls. All European orders should be Additionally, the author examines impor· systems and avoiding specific recommen· upon his own experience and that of sent to him at 11 Woodside Way, Aldridge, Walsall, West Midlands, U.K.) tant logistical problems such as access to dations on choice of a particular piece other people to create this practical PLEASE NOTE: THE 4TH EDITION OFT&T IS OUT OF PRINT AND IS NO LONGER AVAILABLE pc the machine and necessary security. of equipmenl. guide for those with the urge for rmancial

58 RECREATIONAL COMPUTING NOV·DEC 1979 69 -- , - , independence. The author talks taxes Sound intriguing? It's only the beginning. Learning to communicate in both words and copyrights, and proposes some Lancaster advises nitty gritty measures and images is a big part of becoming a novel investment ideas. Actually, this is that will help you avoid pitfalls and success on your own, Lancaster believes. a book you'll learn from even if you achieve success. "If a person seeks you He covers resources to use for writing, won't be starting your own business. out, he has made an ego decision that he the basics of graphic production for Numerous examples and references to will defend. Should he huy from you, publication. For example, "if you do too computer· related business should be of he will defend this decision ... opposite· good a job ... it may even hurt you ... special interest to RC readers. Iy, if a person feels he was 'sold' some· the editor can use it directly, rather than thing, he will easily find minor and even hav~ an artist redo it." You'll really be excited by this book if unreasonable faults with it . you're itching for a job change and have a Finally, you'll learn about "unmatters." HardlNOre SoftltKlre business idea. Contrarily and with much " ... Uke to travel? Do stories or photos There must be one honcho, and not SuperT~lk'r. This new peripheral pletely assembled and immedi· Basic . An efficient com. Ch9Ckbook II. This program does two, in your secret money machine. humor, Lancaster urges yOll to eliminate on where you go and let books, magazines system allows Ihe Apple II com· atelv available. Contact Micro piler for 80SO and Z80 CP/M everything necessary to keep such words as salesman , agent, and and papers pay a't least part of your way." If there are two involved in your project, puter to OUtpUI exceptionally Squered Inc., Suite 5B, 5131 systems that supports extensive, checkbook balanced and then secretary from your vocabulary, and to You'll learn why 'grWlgy' places are the one must be a honchee! high quality humanSpe8ch through OWllnsmouth Ave., Canoga Park, commerciel features of some. It can handle amounts up forget about much-touted techniques best places to rent, and why word of e loudspeaker under program CA 91303, or call (213) 883· 8ASIC·80. Produces optimized, to $1.000.000 using codes of up like creative management and aggressive mouth will be your best kind of advertis· In two days my review copy of this book control. Output may also be di· 1993. relocatable machine code in Micro, to four alpha or numeric char· rected through any P .A. or stereo marketing. Instead, he advises you to ing. You'll learn by diagram a method of was marked up by three friends. Nuff soft·s standard binary format; acters, and it does a complete Iystem. It consists of the peri· Compu1eaehertm. A unique self· employ exactly 0.834 employees (that's modifying your television to help you said! compiled BASIC programs can be balence, reconcile. and editing. pheral card, a microphone, e study training system designed to loaded and linked with subroutines For the TAS·80 with 16K or 83.4% of your time) and to do everything with your secret money machine. It's loudspeaker, software and docu· teach personal home computing Reviewed by Sara Werry generatt!d by Microsoft·s FOR· more. Price is S18.50. For more yourself. His most binding prerequisite nOI fair of me to tease you like thaI. mentation and two SuperTalker et alow cost in a minimal amount People's Computer Company TRAN·80 and COBOL·BO com· information contact The 80ttom is that you want to and will spend most This is one of the many illustrations programs. $279 assembled and of time is now available from pilers, and MACRO·SO auembler. Menlo Park, CA 94025 Shelf. Inc .• Box 49104, Atlanta. of your time working on your project. throughout the book, and couJd be titled tested. Contact: Mountein Hard· Sybex. The package includes a Single copy S395. For more Georgia 30359. (404) 939·6031. 'Four Steps to Disconnect.' ware, Inc. 300 Hervey West microcomPUter board, program informetion contact Microsoft. , Blvd.. Santa Cru~. CA 95060 cassette. two educational books lOBOO NE 8th. Suite 819. Belle· Telephone Dialar Program. The (40B) 429·8600. (Progrsmming the 6502 and ADVERTISING SPACE AVAILABLE vue, WA 98004 (206) 455·80SO. ZBO program ellows the TRS·80 $T AT£MENT OF OWNEAS><". M_NAGEMENT _NO CIACUlA TIOOI 6502 Applications Book), re· ,"_ ... ,,"'~~~JI&>' Level II to dial the telephone. v., Y.z, Full Page, Inside Front & Back Covers , ""...... """ .. ,." Malibu 165 Print,r. Thil new Quired manuals and instructional Fantasy Adventure Geme. Paci· ~I"E"'O"" .. ," .... v,,,.!; The program can aid the handi· model can be operated in three audio casette. Retails for $299. flca tm is en action·packed game Advilrtising Manager. People's Computer Company (415) 323·3111 cepped or assist the baby sitter. • .0<' ;";:;;'" ...__ ...... ~., ... .. _, <".'_" ;_ ... .,'c-" "'.. _ modes: as a high·speed dot me· For more information contact for the Apple compvter. Set sail 1263 EI Cemino Real, Box E, Menlo Perk, CA 94025 126) tl '.~Ino ... 1. "".,,, , ..... co 9102S (S., "',eo (o",'y) TW1Inty phone numbers may be " Sybex. 2020 Milvie St .• Berkeley. : ..." .... ,.. -.. _.. ,,, ...... " ...... ,...... _.. ,...... ,-- trix printer at 165 chaf8Cte" from the encient port of No dialed, accessed using the letters ... per s&<:ond; a reduced speed • CA 94704. (415) 84B·B233. Return. cross the uncharted See PLEASE SEND FOA AATE CARD ...... ,"." •., .""...... 0' '.'."'" ''''0' ...... '0 '0"0' A through T. Both dial and push. letter·quality dot matrix printer of Blood. brave the dangers. ·Wi,'i;~' ~':"".::,~~·,;:-,26J II •• _'"" .,,1. "<",,, "" . tA ~"alS button phones may be used. ,~ at 90 cps; or a fun-graphics Disk Drive Head Cleaner. This and you will find yourself on the ....,. ....A'b.«MIT"" -- ... - P«"""o"' •..,., I,,,,, •• ' ...... 1 $7.95 includes progrnm, instruc· ..-...... ' ...... - matrix printer. Many new hla· is for the TRS·SO. It is a mini mystt!rious islend of Pacifica. tions. interface circuit diegram educating educators... " ...... 0;''''"'__ · ""'••• ',._ ...... '_ ",_ ...... ___ ...__ .~ , __ ~., 'w~ ...~,~ ~_. ____,.,_. ture•. Pri~ is $2395.00. Deliver diskette, reusable on both sides. For a copy send $9.95 to Rain· .... ~ ____ "..... _.__ ~.,~ .•• _.... ,.-. "_, __ ,,, __,_,w w_ ...... _., ..... __ , and parts list. Write: Software .. _____ ,...... "._._~Hft~'. __ ."_ ... __ " ... ,, ..... ,_ ..... _... _.. 30 days ARO. For more informa· Includes a program that cleans bow Computing, 17023 White Exchange. 2681 Peterboro. W. tion contact Melibu Desigrl Group. thoroughly and automatically, Oak Ave., Grenada Hills. CA Bloomfield. Mi. 48033. MICROCOMPUTERS Inc .• 8900 Eton Ave., Suite G. and cleaning solution. Head clean· 91344. Canoga Park. CA 91304. (213) er will allow more reliable disk Three Mile Island. Could il have 998· 7694. drive operation. 512.95 from Music Program. Software Music ANDTHE /~======~; " • • ""..... -o, .... _.,~.~ ..... 00... ' ...... " .0'...... "'••• _.,.. _, ...., .... yo • • o. been prevented? Decide for your· ,,, •• , .""" .... ", ...... ,..... ,.,., "."w___ N ..... dealer or The Bottom Shelf, Synthesis System is a softwarel self. Muse Co. has an Apple II 3 R'S " Inc., P.O. Box 49104, Atlanta. Apple Computer 110 Card for herdware package thet turns any disk simulation that lets you run by Georgie 30359. (404) 939·6031. 8080/Z·80 or 8085 microcom· - Malibu 165 Printer. This inter· the reactor. The cost is 539.95, Christine Doerr ~ ~ puter into e high quelity. multi· ~ .... ,,; .. ,...... "" •.... .-,.;,.... =:;t." y." ....«'" ,;;.,;, -...:. '"'" .,.~ -----1 face card allows the Apple com­ and the program requires 48K ,~-- ,- ~ , -.~" ~ " .--"--"~ Computer and Terminal Unit...... - .. .. ." .. -".--- .. .. ,-. puter to interface directly to the voiced music synthesizer. Soft· of memory. Muse Co. Also has This functions as a full duplex. basic Malibu Model 165 dot ware includes line oriented text several other interesting programs dumb tt!rminal which can be used editor, high level music language metrix printer. taking advantage on tape and disk. Write to: 7112 .'" ...... ,,"< ...... in conjunction with remott! time. compiler. file menagement and of the unique graphics capabil· Darlington Dr .• Baltimore. MD I. , ..., •• <...... ,.".,",_ •• ~ sharing services. end also as an music synthesiler. The price wilh ~,;.,=.....------ities of both the Apple and the 21234. &dvanceQ personal computt!r. It Malibu printer. $260.00 with documentetion. hardware end tt!n ., I ~ ~~~~~~~~~:":.~·.":.c~!m ... '...... + ::~:: ___-+-_'::":"::'--- __-I combines PET computer and cable and instruction manual. songs is $79.95. Those intefflsted NCE's own de$ign. using BASIC contact California Software, P.O. Programming Tools. Infinite Basic This book educates educators on the many ways com­ I· ...... ,Q<,.,.~, ... ~ •• """-,.,,, =c-I_~S . 456 7 . S,~ For more information contact (level Ill. It is availeble with 8K. Box 275. EI Cerrito. CA 94530 is a revolutionary new product puters. especially microcomputers, am be used In the ~ ;:!:..~:.;~~~::~:::.~ .. ~;';,~'::.~:.~:-,";,:.,~: .". I. " s JOCI Malibu Design Group Inc., 8900· 16K Of AAM memory. and 14K (415) 527·7730. adding over 70 BASIC non· classroom. It describes microcomputers, how to org.!lnlze G Eton Ave .. Canoga Park, CA 1 -·c·~·;"·;'·~·~'·.',;·~· ·~"~··;·~· C·'C·-"'·''------1---'' '~~ S.ll!' ___J ROM memory. Peripherals avail. trivial commands to TRS BASIC. a computer-based program, the five Instructlon.!ll .!IppUC.!l· t; <...... _., •• ., . . ... 91304, (213) 998·7694. , :;:~<: :.~~,~:;'Q"" ""·«·":··:··C-::-'~··"-----t_~'".""'O ___ I.a}s able. Introductory price is $795. Small Business Programs. CALC Combinetions of these added tion types (with examples from a wide r.!lnge of subjects), -I--_ -_. NCE/CompuMart, PO Box 8610. is e program that can SilVe e lot BASIC commands can be pack· and a complete syllabus with teaching notes for a 6·week · :.:::';.:::. : ::: '=~~.:, ___ t JI' J6 Ml.250 Dual Disk Driv •. This ~" 1l.lO" 9.l00 Dept. Pl, Ann Arbor. Mi. 48107. of time and money. It selects aged and loaded into selected introductory course on computers .!Ind BASIC progr.!lm· Micro Squared unit is capable (313) 994·3200. memory locations to minimize mingo #5113·1, paper, $7.95 I ... ,,,,... ,,,, ,.. ""__ "_b, - ~- TW.··o , ·.-;,;.;r. ~' -··A·'rt ....;;?;7 ';':;' bank accounts-enters checks, ,- -,""","" ... _,,,.. ...- I v /"/. f 'Y. of single or double density end calculates deposits and displays memory requirements, and to ",., ,.. ".. "'" ,. """.,., ~.,' ... "' '.. ", .... ,'" '' ~n_ '" ~J' ,,_. ON"", consists of two double·sided '"." .... __ ._,_,_. _____•• _ __.... _..t'"___ •__ , •• •_ .. ~.,_ grand total. Other programs in provide programmers with the _' ... _._M_. __.... __ ~._. __ .. ·__ .. ,...... _._ . ~ .... _ ... _ Published by ._. __ .....- drives. a povwr supplv. cable. package print labels and provide sophisticated tools necessary to end chassis and selll for $1195. sophisticatad check balancing. develop prohlssional packages. HAYDEN BOOK COMPANY,INC. It has 140 track capacity. with For TRS·SO level II and 16K Available for $49.95 from RA· 50 Essex Street, Rochelle Park, NJ 07662 double density feature allowing memory. For more information. CET, 702 Palmdale. Orange. CA .. ·_-,,....u B75K bytes of storage. is com· Micro Architect. 96 Dothan St .• 92565, (714) 637·5016 end from Arlington. MA 02174. dealer"1. 60 AECAEA TlONAL COMPUTING NOV·DEC 1979 61 to begin bj·monthly Issues with addrened envelOP8i to Micro Consumer Complltef Information • Educational the January/February issul In Architect, 96 Dothan St., s...... i<: •• Shoppers for computers 1980. The new addreSii for Arlington, MA 02174. in the Southern Callfornie aree WHAT 00 YOU WANT YOUR ANIMAL TO BE, GERTRUDE • AdYertising, Sub.criptlons, Dealer will now flnd their talk greatly ?HIPPO Software Information and Article Sub· R'NlIsAnc. M.n: Th, K.-y simplillad, thanks to a new service 4MJN4L 4 Computer Game mission Is COMPUTE, The Jour· Component. Over 360 pages of implemented by the Southern Califomle Computer Dealan WHAT SIZE 00 YOU WANT YOUR ANIMAL TO BE, GERTRUDE Skills and .Q builder. This II II nal for Progressive Computing, presentations from the 1979 BY KATHY BURK, AGE 10 & ?HUMVNGUS "'ri8$ for PET, Apple Hand TRS- P.O. Box 5119, Greensboro, AEDS Convention held May 15· Moclatian. Everyone from San RACHEL WASSERMAN , AGE 9 80 revel 1 or level 2. MOrl than NC 27403. Tallphone (919) lB. 1979, Detroit, Michigan . Diego to Santa Barbera may dial Part I: The Challenge two dozen ni!W programs offered 272·4867. Editorial questions Topics include: computer·assisted the totl free number: (SOCI) NOW YOU HAVE A HUMUNGUS HIPPO, GERTRUDE for preschool, elementary, junior $hould be addressed to Mr. Len instruction, instruction learning 432·7257. The callar will be high, hif/l school and adult level., Lindsav, 1929 Northport Dr. applications. computer·related given names, addresses end phone 00 YOU WANT IT TO BE, GERTRUDQb IncludM gamlll, tutorials, prac­ #6, Madison WI 53704. curriculum, education adminis · numbers of the three computer Here is a SlJmple run of a program designed by these ::~~LOR tica, memory, spelling and trative applications, computer stOrM nllrest him. two young ladies. The challenge to the readers: What vocabulary buildIJrs, crosswords Mar' BIlK: Comput,t Games. nlSoureas. data·center admini, · does the pr~ram look like? We will publish their pro. WHATCOWR EYES 00 YOU WANT IT TO HAVE • and other innovative programs. a .equel to BMic ComputrJr tretlon. Send $12.00 to AEDS Indepandent N_ Lin •. U$lrs of gram next Issue plus the responses lNe get. Oh, yes!! ?PURPLE :-- __ PriCIll range from $13.50 10 GMTltn by David Ahl. This Proc&ldings, 1201 16th St., personal computars made by the ! almost forgot. You can't send us a solution to this $18.50, FOI" further information book Contlini 84 new gamlS. N. W., Washington, D.C. 20036. Heath Company may now obtain 10 eontact Program Design, In<:. 11 It includes 9fIITIM luch as Camll, news bulletin. of interest to them puzzle unless you are less than years old Just include NOW YOU HAVE A HUMVNGUS PINKISH HIPPO WITH PURPLE EYE'S a note from an adult verifying your ROGRA~IS Completion Drill •. For the TRS- It gives a general Ovt!rview of dl1a from a more recently announced in planning high school program· SI:-':GU. ISSL·!·. S5.00 EACH CROSS I!,;OEXEO 80 LeV9I II, 16K, cost Is $39.94 processing with particular polnu date In San Frenclsco, scheduling ming cantesU. The material can FOREIGN AUD 52.00 EA/ AIR ,\IAIL for package. For a brochure and of Intlrest for TRS·80 own,,,, the 5th Felre for the end of Feb· be ulo&d for team conte.u or tapM contact SOFTWAREIm, 40 lind provides a source of supply of ruary and fint of March. This individual competitions. Pecket Stuywsant Menor, Gen_o, New over three hundred useful itllms final change of dates was made includes rules, semple prob/erm, 50.\11:: OF OVR CL:S rO~IERS I~Cl.l ' IJE: York 14454, (716)243-3006. for micrOll. $3.00 from The because the Civic Canter just referenOll. , and solution •. Requast Bottom Shelf, Inc., P.O. BO)l became available for March 14· information from: Dale Bryson, 49104, Atlanta, GaOl"1lia 30359. 16, and the Faint organilefS felt Mathemetic. Department, Ump· it was a pTeferable time-the qua Community College, P.O. 1ll~1 PEPSI COLA Publications (4041939·6031. US ;\I A \,y OOCTORS lIYIathu would be better end Box 967. RO$lburg, Oregon AT & T t;NION CARBIDE t;S ,IIR FORCE .\rrOR:-.:rVS PET GlIHtta. A new neme for the TRS Vellow PIgII. Issue 1.4, Is a $pring would be solidly underway 97470. !';BC-T\' DETROIT STEELE in the San Francisco Bay areal PROCI'ER & GA.\IBU:~ Gazette: Compure. the Journal tw1llve·page publication devoted IT & T TEACIII:,RS Exhibitor & speaku information TEXAS Ii\STRU,\IENTS for progrealva computing. Robert entirely to business lOftwere. It Is NAT BANK OF KUWAIT INDIVIDUALS Lock, PrMidant of Small Sylteml a handy guide for 1-8lectlng may be raquested from the Computer Fai,., 333 Swett Rd., Services, Inc. of Greensboro, NC buslneSii software for the lind Len Lindsay, former pub· TRS·BO. It describes all the Woodtidll, CA 94062. no charge (0 venders 10 list software - dealer discounts available lI,her of the PET Gazette, software produced by Micro (4151 861·7075. announced the acquisition of the Architect. This I"ue features a CHECK OR ~IONEV ORDER PI.EASE PET Gazette by Small Sylteml sophisticated data base menager Services, Inc. They are solldting for lhe TRS·80. For tree copy, CO:\JP(;TERMAT Box J664R l...1.kt·lIa\3Su Cil). AZ 864-03 602.8 .~5 . 33j7 articles for future issues, and plln $Ind two stamped, long, sell· '------J 6' RECREATIONAL COMPUTING NOV·DEC 1979 63