Cp/M 2.2 Pdf Manual

Total Page:16

File Type:pdf, Size:1020Kb

Cp/M 2.2 Pdf Manual CP/M Features and Facilities The CP/M Editor DIGITAL RESEARCH TM CP/M Operating System Manual COPYRIGHT Copyright C 1976, 1977, 1978, 1979, 1982, and 1983 by Digital Research. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Digital Research, Post Office Box 579, Pacific Grove, California 93950. This manual is, however, tutorial in nature. Thus, the reader is granted permission to include the example programs, either in whole or in part, in his own programs. DISCLAIMER Digital Research makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Further, Digital Research reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research to notify any person of such revision or changes. TRADEMARKS CP/M and CP/NET are registered trademarks of Digital Research. ASM, DESPOOL, DDT, LINK-80, MAC, MP/M, PL/1-80 and SID are trademarks of Digital Research. Intel is a registered trademark of Intel Corporation. TI Silent 700 is a trademark of Texas Instruments Incorporated. Zilog and Z80 are registered trademarks of Zilog, Inc. The CP/M Operating System Manual was printed in the United States of America. First Edition: 1976 Second Edition: July 1982 Third Edition: September 1983 Table of Contents 1 CP/M Features and Facilities 1.1 Introduction 1-1 1.2 Functional . Description .......................... 1-3 1.2.1 ....General Command Structure ............. 1-3 1.2.2 ....File References ........................ 1-4 1.3 Switching . Disks ................................ 1-7 1.4 Built-in . Commands ............................ 1-7 1.4.1 ....ERA ................................. 1-8 1.4.2 ....DIR .................................. 1-9 1.4.3 ....REN ................................ 1-10 1.4.4 ....SAVE ............................... 1-11 1.4.5 ....TYPE ............................... 1-11 1.4.6 ....USER ............................... 1-12 1.5 Line Editing and Output Control 1-12 1.6 Transient Commands 1-14 1.6.1 STAT .......................................I -15 1.6.2 ASM ........................................1-22 1.6.3 LOAD .......................................1-24 1.6.4 PIP ..........................................1-25 1.6.5 ED ..........................................1-35 1.6.6 SYSGEN ....................................1-37 1.6.7 SUBMIT .....................................1-39 1.6.8 DUMP ......................................1-41 1.6.9 MOVCPM ...................................1-42 1.7 BDOS Error Messages ............................... 1-44 1.8 Operation of CP/M on the MDS ....................... 1-46 2 ED 2.1 Introduction to ED ................................... 2-1 2.1.1 ED Operation ............................... 2-1 2.1.2 Text Transfer Functions ....................... 2-3 2.1.3 Mei-norv Buffer Organization .................. 2-4 2.1.4 Line numbers and ED Start Up ................. 2-5 2.1.5 Metnorv Buffer Operation ..................... 2-7 2.1.6 Command Strings ............................ 2-8 Table of Contents (continued) 2.1.7 Text Search and Alteration .......... 2-11 2.1.8 Source Libraries ................... 2-15 2.1.9 Repetitive Command Execution ...... 2-17 2.2 ED Error Conditions ....................... 2-18 2.3 Control Characters and Commands 2-19 3 CP/M Assembler 3.1 Introduction ...................................... 3-1 3.2 Program Format ................................... 3-3 3.3 Forming the Operand ............................... 3-4 3.3.1 Labels ................................... 3-5 3.3.2 Numeric Constants ......................... 3-5 3.3.3 Reserved Words ........................... 3-6 3.3.4 String Constants ........................... 3-7 3.3.5 Arithmetic and Logical Operators ............. 3-7 3.3.6 Precedence of Operators ..................... 3-9 3.4 Assembler Directives .............................. 3-10 3.4.1 The ORG Directive ........................ 3-11 3.4.2 The END Directive ........................ 3-11 3.4.3 The EQU Directive ........................ 3-12 3.4.4 The SET Directive ........................ 3-13 3.4.5 The IF and ENDIF Directive ................ 3-13 3.4.6 The DB Directive ......................... 3-15 3.4.7 The DW Directive ......................... 3-15 3.4.8 The DS Directive ......................... 3-16 3.5 Operation Codes ................................. 3-16 3.5.1 Jumps, Calls, and Returns .................. 3-17 3.5.2 Immediate Operand Instructions ............. 3-19 3.5.3 Increment and Decrement Instructions ........ 3-20 3.5.4 Data Movement Instructions ................ 3-21 3.5.5 Arithmetic Logic Unit Operations ............ 3-22 3.5.6 Control Instuctions ........................ 3-24 3.6 Error Messages ................................... 3-24 3.7 A Sample Session ................................ 3-26 Table of Contents (continued) 4 CP/M Dynamic Debugging Tool 4.1 Introduction 4-1 4.2 DDT Commands 4-4 4.2.1 The A (Assembly) Command 4-4 4.2.2 The D (Display) Command ................... 4-5 4.2.3 The F (Fill) Command ....................... 4-5 4.2.4 The G (Go) Command ....................... 4-6 4.2.5 The I (Input) Command ...................... 4-7 4.2.6 The L (List) Command ....................... 4-7 4.2.7 The M (Move) Command ..................... 4-8 4.2.8 The R (Read) Command ...................... 4-8 4.2.9 The S (Set) Command ........................ 4-9 4.2.10 The T (Trace) Command ..................... 4-9 4.2.11 The U (Untrace) Command .................. 4-10 4.2.12 The X (Examine) Command ................. 4-10 4.3 Implementation Notes 4-11 4.4 A Sample Program 4-12 · CP/M 2 System Interface 5.1 Introduction ...................................... 5-1 5.2 Operating Svstem Call Conventions .................. 5-4 5.3 A Sample Flie-to-File Copy Program ................. 5-36 5.4 A Sample File Dump Utility ........................ 5-40 5.5 A Sample Random Access Program .................. 5-46 5.6 System Function Summary ......................... 5-54 6 CP/M Alteration 6.1 Introduction ...................................... 6-1 6.2 First-level System Regeneration ...................... 6-3 6.3 Second-level System Generation ..................... 6-6 6.4 Sample GETSYS and PUTSYS Program ............. 6-11 6.5 Disk Organization ................................ 6-13 6.6 The BIOS Entry Points ............................ 6-15 6.7 A Sample BIOS .................................. 6-25 6.8 A Sample Cold Start Loader ........................ 6-25 Table of Contents (continued) 6.9 Reserved Locations in Page Zero .......................6-26 6.10 Disk Parameter Tables ................................6-28 6.11 The DISKDEF Macro Library ..........................6-34 6.12 Sector Blocking and Deblocking ........................6-39 Appendixes A The MDS Basic 1/0 System (BIOS) ........................ A-1 B A Skeletal CBIOS ...................................... B-1 C A Skeletal GETSYS/PUTSYS Program .................... C-1 D The MDS-800 Cold Start Loader for CP/M 2 ................ D-1 E A Skeletal Cold Start Loader ............................. E-1 F CP/M Disk Definition Library .............................F-I G Blocking and Deblocking Algorithms ...................... G-1 H Glossary .............................................. H-1 I CP/M Messages ........................................ 1-1 Tables 1-1 Line-editing Control Characters ............................1-12 1-2 CP/M Transient Commands ...............................1-14 1-3 Physical Devices ........................................1-17 1-4 PIP Parameters ..........................................1-31 2-1 ED Text Transfer Commands ...............................2-3 2-2 Editing Commands .......................................2-8 2-3 Line-editing Controls ......................................2-9 2-4 Error Message Symbols ...................................2-18 2-5 ED Control Characters ...................................2-19 2-6 ED Commands ..........................................2-20 3-1 Reserved Characters ......................................3-6 3-2 Arithmetic and Logical Operations ..........................3-7 3-3 Assembler Directives .....................................3-10 3-4 Jumps, Calls, and Returns .................................3-17 3-5 Immediate Operand Instructions ............................3-19 3-6 Increment and Decrement Instructions .......................3-20 Table of Contents (continued) 3-7 Data Movement Instructions .............................3-21 1-1 Arithmetic Logic Unit Operations .........................3-22 3-9 Error Codes ...........................................3-24 3-10 Error Messages ........................................3-25 4-1 Line-editing Controls ....................................4-2 4-2 DDT Comniatids ........................................4-2 4-3 CPU Registers .........................................4-11 5-1 CP/M Filetypes .........................................5-7 5-2 File Control Block Fields .................................5-9 5 -3 Edit Control Characters .................................5-16 6-1 Standard Memory Size Values .............................6-3 6-2 Common Values for CP/M
Recommended publications
  • ISIS Propaganda and United States Countermeasures
    BearWorks MSU Graduate Theses Fall 2015 ISIS Propaganda and United States Countermeasures Daniel Lincoln Stevens As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation Stevens, Daniel Lincoln, "ISIS Propaganda and United States Countermeasures" (2015). MSU Graduate Theses. 1503. https://bearworks.missouristate.edu/theses/1503 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES A Masters Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Daniel Stevens December 2015 Copyright 2015 by Daniel Lincoln Stevens ii ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES Defense and Strategic studies Missouri State University, December 2015 Master of Science Daniel Stevens ABSTRACT The purpose of this study is threefold: 1. Examine the use of propaganda by the Islamic State in Iraq and al Sham (ISIS) and how its propaganda enables ISIS to achieve its objectives; 2.
    [Show full text]
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • GBCC-CIS-1 Page 1 Micro-Soft’S Macro-Impact
    CIS111 GBCC Renee Dodge CIS111 Mid-Term – Fall 2010 For your mid-term, I would like you to conduct some research on the history of computers. Select a milestone or event that you feel had a significant impact on the overall development of computers and how we use computers today. Be sure you not only provide your opinion as to why you feel this milestone is significant, but also provide historical proof - actual facts as to how this event shaped the development and use of computers. For this assignment, please complete the following: 1. Choose a topic 2. Research your topic and locate at least 5 different sources of information, overall. o At least 3 sources should be Internet websites. o Remember: Wikipedia is NOT an acceptable research source. 3. In addition to the Internet, you should also utilize the library online resources (EBSCO database, e-Books, etc). o At least 2 different sources of information should be online library resources. o If you have never used the library online resources before, you may ask me for a brief overview of how to use them or see Becky Clerkin in the library for help. 4. Include your research findings in a 5-page paper and be sure to properly cite where you found your information. If you are not sure how to cite references check out the following link: How to Cite Books, Magazines, and Web Sites in a Research Paper: http://www.lib.duke.edu/libguide/works_cited.htm 5. Upload your research paper to the Digital Drop BoX no later than Wednesday, October 27th at 11:59pm.
    [Show full text]
  • A Guide to Discuss Ethical Issues in Digital Research Second Edition
    Ethical challenges in digital research 2nd edition ETHICAL CHALLENGES IN DIGITAL RESEARCH A guide to discuss ethical issues in digital research Second edition Ethical challenges in digital research 2nd edition Ethical challenges in digital research – A guide to discuss ethical issues in digital research Second edition January 2020 Developed by DIGETIK at Aalborg University as part of DIGHUMLAB Authors Line Lisberg Christensen, Research Assistant Malene Charlotte Larsen, Associate Professor Layout Steffen Madsen, DIGHUMLAB i Ethical challenges in digital research 2nd edition I. Introduction to document The ever-changing development of digital technologies and digital infrastructure makes it necessary for us as researchers to change approaches to digital research within the humanities. In terms of research ethics, we can no longer use traditional laws and guidelines that only match the non-digital world. In a time where it is necessary to change and re-think our ways of doing research, we bring to you this second version of Ethical Challenges in Digital Research to initiate discussions about ethical research and to help guide you in your digital research. The compound may serve you as a guideline to ethical research, a helpful tool to those in need of inspiration or merely as a list of literature that is relevant to your field, whether that is: big data, surveillance, privacy, games and gamification, ethics in studies with children and adolescents, health research, journalism, ethnographic studies, visual methods, vulnerable groups, web archives, economy, risky business for researchers or one of the many other categories in this collection of ethical digital research. We initially created this document with the intention of helping scholars reflect and discuss the ethical dimensions of their digital research, whilst providing guidance and insight about how to deal with these issues.
    [Show full text]
  • Doin' the Eagle Rock
    VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 DOIN’ THE EAGLE ROCK this RNG in every virus for which he requires a source of random numbers. Peter Ferrie Microsoft, USA The virus then allocates two blocks of memory: one to hold the intermediate encoding of the virus body, and the other to hold the fully encoded virus body. The virus decompresses If a fi le contains no code, can it be executed? Can arithmetic a fi le header into the second block. The fi le header is operations be malicious? Here we have a fi le that contains compressed using a simple Run-Length Encoder algorithm. no code, and no data in any meaningful sense. All it The header is for a Windows Portable Executable fi le, and it contains is a block of relocation items, and all relocation seems as though the intention was to produce the smallest items do is cause a value to be added to locations in the possible header that can still be executed on Windows. There image. So, nothing but relocation items – and yet it also are overlapping sections, and ‘unnecessary’ fi elds have been contains W32/Lerock. removed. The virus then allocates a third block of memory, Lerock is written by the same virus author as W32/Fooper which will hold a copy of the unencoded virus body. (see VB, January 2010, p.4), and behaves in the same way at a The virus searches for zeroes within the unencoded memory high level, but at a lower level it differs in an interesting way.
    [Show full text]
  • Club-80 Heft 41 (Bw Ocr).Pdf
    Inhaltsverzeichnis * . Autor & Seite Autor & Seite Clubinternes Hardware Zusammenfassung Fragebogenaktion 1-5 Floppy-Tester 65- 66 Jens Neueder Artikel aus Elektor Neues vom Vorstand 6 - 8 Club 80-Neumitglieder aus "CP/M-aktuell"-Usergruppe Auswertung der Fragebogen zur Mitgliederkarteiaktualisierung Nachträge zum Vorwort 9-10 Club 80 Börse 67 Hartmut Obermann Suche... Uwe Schobert Clubinfo H - 12 Termine 13 Jens Neueder Sonstiges Neuigkeiten für CP/M 69 Vorstellung 13 - 14 Alexander Schmid Jörg Lindner Genie News: Neue Preisstrukturen 70- 71 Software Wissenswertes ZCPR oder Z3Plus 72- 73 Literaturrecherche: USA, England, Deutschland 73-85 Austausch von Grafiken DOS -> CP/M 15 - 18 Egbert Schröer Alexander Schmid Wichtige T ip s... Elektrikers 86 Grafik des Gills unter Holte CP/M + 19-26 Alexander Schmid Volker Dose, Egbert Schröer Model 4 intern: Dem Interpreter aufs Bit geschaut 27 - 35 Artikel aus CP Die letzten Seiten Impressum 87 MSDOS-Trick: Command /F 35 Schluß 88 Insider-Info: Windows-Fehler 68 Redaktion Hartmut Obermann Mitgliederadressenliste am INFO-Ende Microsoft Link80 und .SYM-Datei 36 Sonderheft: Wissenswertes rund um den Z280 am INFO-Ende Uwe Schobert Software-Technik und Compilerbau 37-38 Artikel aus PASCAL IMP - ein DFÜ-Programm für CP/M 39-44 Günther W. Braun Internet und UUCP mit CP/M 45- 58 Volker Dose Internet via Genie 59- 62 GE-Mail aud Internet Access 63- 64 Egbert Schröer Fragebogenaktion Auswertung/Zusammenfassung Von 70 versandten Fragebögen erhielten wir bisher 43 mehr oder weniger vorhandene Erfahrungen: ausgefüllt wieder zurück. Die folgenden Seiten geben eine Zusammenfassung 21 Club-Mitglieder würden gern ihre Hard- und/oder Softwareerfahrungen den Eurer Antworten/Angaben wieder.
    [Show full text]
  • Go Forth with TTL !
    Go Forth with TTL ! The Gigatron TTL Color Computer Forth for a Very Unusual Processor Ken Boak SV Fig. Forth Day 2019 . In September of 1975, MOS Technology launched the 6502 at the Wescon75 Computer Conference in San Francisco. Chuck Peddle and his team had created a very lean, stripped down, small die cpu. Costing just $25, the 6502 was a fraction of the cost of its nearest competitor. At that time the Intel 8080 was $360 and the Motorola 6800 was $175 . The 6502 was clearly a disruptive usurper. 25 year old, HP Engineer, Steve Wozniak, realised that this new microprocessor would be a game-changer and went on to incorporate it into the small computer he was developing. That machine went on to become the Apple I. In 1975 7400 TTL was the “Bread and Butter” of logic design: 7400 series TTL integrated circuits were developed in the early 1960’s. Initially quite expensive so mainly used in Military and Aerospace applications. By the early 1970’s TTL had become a versatile family of standardised, low cost,. easy to use logic. Typically about $1 per device. 7400 series logic was widely used in the design of minicomputers, including the PDP-11, the Data General Nova 1200 and later models of PDP-8. TTL was a viable, faster and cheaper processing solution than the emerging 8-bit microprocessors such as MOS 6502, Intel 8080 and the Motorola 6800. Essential Reading 16-bit TTL CPU board from Data General Nova 1200 The Gigatron TTL Computer – What is it? Started as a Hackaday.io project in Spring 2017 by Marcel van Kervinck of The Hague, Netherlands.
    [Show full text]
  • Exploring Software Inefficiency With
    ZeroSpy: Exploring Software Inefficiency with Redundant Zeros Xin You∗, Hailong Yang∗y, Zhongzhi Luan∗, Depei Qian∗ and Xu Liuz Beihang University, China∗, North Carolina State University, USAz State Key Laboratory of Mathematical Engineering and Advanced Computing, Wuxi, Chinay fyouxin2015,hailong.yang,07680,[email protected]∗, [email protected] Abstract—Redundant zeros cause inefficiencies in which the 1 for(int i=0;i<1000;++i) { 2 A[i] = 0; B[i] = i; zero values are loaded and computed repeatedly, resulting in 3 } 4 ... unnecessary memory traffic and identity computation that waste 5 for(int i=0;i<1000;++i) memory bandwidth and CPU resources. Optimizing compilers 6 I C[i] = A[i]-B[i]; is difficult in eliminating these zero-related inefficiencies due to Listing 1. An example code working on redundant zeros, where all variables are 32-bit integers. limitations in static analysis. Hardware approaches, in contrast, optimize inefficiencies without code modification, but are not enough to fulfill the computation, which yields better cache widely adopted in commodity processors. In this paper, we 1 propose ZeroSpy - a fine-grained profiler to identify redundant usage and vectorization potentials . zeros caused by both inappropriate use of data structures and Actually, a larger number of real-world applications (e.g., useless computation. ZeroSpy also provides intuitive optimization deep neural network and high-efficiency video coding) have guidance by revealing the locations where the redundant zeros already been reported to contain a significant amount of happen in source lines and calling contexts. The experimental redundant zeros and achieved significant speedup from the results demonstrate ZeroSpy is capable of identifying redundant zeros in programs that have been highly optimized for years.
    [Show full text]
  • Introduction to MS-DOS
    1.Introduction to MS-DOS : MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers. It was essentially the same operating system that (Bill Gates's) young company developed for IBM as Personal Computer - Disk Operating System in 1981. Most users of either DOS system simply referred to their system as Disk Operating System. Like PC-DOS, MS-DOS was (and still is) a non-graphical line-oriented command- driven operating system, with a relatively simple interface but not overly "friendly" user interface. Its prompt to enter a command looks like this: C:\> MS-DOS does not care about anything called an icon, wallpaper or screen saver. Rather than being considered as a Graphical User Interface (GUI) MS-DOS is what is known as a command-line interface. You type commands on what is called the command line. MS-DOS is a single-user, single-tasking computer operating system. In spite of its very small size and relative simplicity, it is one of the most successful operating systems that has been developed to date. In DOS, a file name consists of eight character followed by a 3 character file extension. The size of a file is restricted to a 4 byte file descriptor, which limits a file’s maximum size to approximately 4 billion characters. The first release of DOS could not read or write to disk drives so users could only read and write to a floppy disc. DOS was not a state of the art operating system, even for its time.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • CDS/ISIS Handbook by the Same Authors Which Was Published by the UK Library Association in 1994
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Middlesex University Research Repository The CDS/ISIS for WindowsHandbook Andrew Buxton Alan Hopkinson THE CDS/ISIS FOR WINDOWS Handbook Andrew Buxton Information Systems Manager Institute of Development Studies at the University of Sussex and Alan Hopkinson Head of Library Systems Middlesex University Paris, UNESCO/CI, September 2001 CONTENTS Foreword Preface Aims of this handbook Conventions used in this book 1 Introduction 1 1.1 Versions of CDS/ISIS for DOS and Windows 1.1.1 CDS/ISIS for DOS 1.1.2 CDS/ISIS for Windows 1.1.3 WWWISIS 1.1.4 JavaISIS 1.1.5 Other versions 1.2 General overview of CDS/ISIS for Windows 1.3 Record structure and record linking 1.4 The Windows version: the main menu 1.5 Availability of CDS/ISIS 1.6 Software contributed by users 1.7 User groups 1.8 Exchange formats 2 Overview of Windows 13 2.1 Introduction 2.2 Disk drives 2.3 The mouse 2.4 Files and file names 2.5 Folders 2.6 Features of Windows 2.6.1 The Window Bar 2.6.2 The Task Bar 2.6.3 Tabs 2.6.4 Other features of the bar 2.6.5 Menu Bar 2.6.6 Toolbar 2.7 Dialog boxes 2.7.1 Text entry box 2.7.2 List box 2.7.3 Combo box 2.7.4 Command buttons 2.7.5 Radio buttons 2.7.6 Spin box 2.7.7 Check box 2.8 You need to know!..
    [Show full text]