Unibasic 9.3 Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

Unibasic 9.3 Reference Guide Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM Unibasic From Dynamic Concepts Wiki Contents 1 UniBasic 2 About this Guide 2.1 Conventions 3 Installation & Configuration 3.1 Configuring Unix for UniBasic 3.1.1 Number of Processes 3.1.2 Number of Open Files 3.1.3 Number of Open i-nodes 3.1.4 Number of Locks 3.1.5 Message Queues 3.2 Unix Accounting & Protection System 3.3 Creating a Unix Account for UniBasic 3.4 UniBasic Security & Licensing 3.4.1 Software Licensing 3.4.2 Hardware Licensing 3.5 Loading the Installation File 3.5.1 Loading the UniBasic Installation File 3.5.2 Loading the UniBasic Development File 3.6 ubinstall - Installing UniBasic Packages 3.6.1 Errors During Installation 3.7 Configuring a UniBasic Environment 3.7.1 Directories and Paths 3.7.2 Filenames and Pathnames 3.7.3 Organizing Logical Units and Packnames 3.7.4 Environment Variables 3.7.5 Setting up .profile for Multiple Users 3.8 Command Line Interpreter 3.9 Launching UniBasic From Unix 3.10 Terminating a UniBasic Process 3.11 Licensing a New Installation 3.12 Changing the SSN Activation Key 3.13 Launching UniBasic Ports at Startup 3.14 Configuring Printer Drivers 3.15 Configuring Serial Printers 3.16 Configuring Terminal Drivers 3.17 Creating a Customized Installation Media 4 Introduction To UniBasic 4.1 Data 4.1.1 Numeric Data 4.1.1.1 Numeric Precision 4.1.1.2 Special Notes on %3 and %6 Numerics https://engineering.dynamic.com/mediawiki/index.php?title=Unibasic&printable=yes Page 1 of 397 Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM 4.1.1.3 Integers Stored in Floating-Point Variables 4.1.2 String Data and Literals - "str.lit" 4.1.3 CRT Mnemonics and Expressions - crt.expr 4.2 Statements, Statement Numbers & Labels 4.2.1 Immediate Mode 4.2.2 Statement Numbering 4.2.3 Multiple-Statement Lines 4.2.4 Inserting, Changing & Deleting Statements 4.3 Variables 4.3.1 Variable Naming Conventions 4.3.2 Subscripted Variables 4.3.3 Arrays and Matrices 4.4 Numeric, Array and Matrix Variables 4.4.1 Automatic Dimensioning Numeric Variables 4.4.2 Re-Dimensioning Numeric Variables 4.5 String Variables 4.5.1 Subscripted Strings 4.5.2 String Arrays 4.5.3 Dimensioning String Variables 4.5.4 Re-Dimensioning String Variables 4.6 Expressions 4.6.1 Operator Precedence 4.6.2 Operator Precedence Table 4.6.3 Predefined BASIC Functions 4.7 Operators Used in Expressions 4.7.1 Unary Operators + - 4.7.2 Arithmetic Operators ^ * / % + - 4.7.3 Concatenation Operators + , 4.7.4 Relational Operators = <> > >= < <= 4.7.5 Boolean Operators AND OR 4.7.6 String Operator USING 4.7.6.1 Field Descriptors 4.7.6.2 Leading Characters 4.7.6.3 Floating Characters 4.7.6.4 Numeric Characters 4.7.6.5 Commas 4.7.6.6 Decimal Points 4.7.6.7 Post Signs 4.7.6.8 Numeric Split 4.7.7 String Operator TO 4.8 Numeric Expressions 4.9 String Expressions 4.10 Rules Governing String Processing 4.11 String Assignment 5 UniBasic Files 5.1 Introduction to Files 5.2 Filenames and Pathnames 5.3 File Attributes, Protection and Permissions 5.3.1 Using IRIS Protections 5.3.2 Using Unix Permissions Directly https://engineering.dynamic.com/mediawiki/index.php?title=Unibasic&printable=yes Page 2 of 397 Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM 5.3.3 BITS Attributes 5.3.4 Supplemental Protection Attributes 5.4 Accessing Data Files Through a Channel 5.4.1 Channel Expression - chn.expr 5.5 Record Locking 5.6 Text Files 5.6.1 Creating Text Files 5.6.2 Accessing Text Files 5.7 Saved BASIC Program Files 5.8 Contiguous Data Files 5.8.1 Creating Contiguous Files 5.8.2 Accessing Contiguous Files 5.9 Tree-Structured Data Files 5.9.1 Creating Tree-Structured Files 5.9.2 Accessing Tree-Structured Files 5.10 Formatted (Item) Data Files 5.10.1 Creating Formatted ITEM Files 5.10.2 Accessing Formatted ITEM Files 5.11 Indexed Data Files 5.12 Indexed File Creation 5.12.1 Accessing an Indexed Data File 5.12.1.1 Mode 0 - Index Definition 5.12.1.2 Mode 1—Miscellaneous Index Information 5.12.1.3 Mode 2—Search for a Specific Key 5.12.1.4 Mode 3—Search for the Next Highest Key 5.12.1.5 Mode 4—Insert a New Key into an Index 5.12.1.6 Mode 5—Delete an Existing Key from an Index 5.12.1.7 Mode 6—Search for a Previous Lower Key 5.12.1.8 Mode 7—Reorganize Index 5.12.1.9 Mode 8—Specify B-Tree Insertion Algorithm 5.12.1.10 Mode 12-Determined encryption status 5.12.2 Indexed File Errors & Recovery 5.13 Accessing non-UniBasic Files and Devices 5.14 IRIS BCD Data and Key Files 5.14.1 Creating IRIS BCD Data Files 5.14.2 Accessing IRIS BCD Data Files 5.15 Universal Data Files 5.15.1 Creating Universal Data Files 5.15.2 Accessing Universal Data Files 5.16 Encrypted Data Files 5.16.1 Creating Encrypted Data Files 5.16.2 Accessing Encrypted Data Files 5.17 Special UniBasic Files 5.17.1 Error Message File: errmessage 5.17.2 $TERM Files: term.xxxx 6 Device Input and Output 6.1 Port Numbering 6.2 Phantom Ports 6.3 Accessing Drivers ($LPT) and Pipes 6.4 Printer Drivers https://engineering.dynamic.com/mediawiki/index.php?title=Unibasic&printable=yes Page 3 of 397 Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM 6.5 Mail Drivers 6.6 Terminal Translation File $TERM Files 6.6.1 $TERM Flags and Switches 6.7 Defining $TERM Mnemonics 6.7.1 Mnemonics Translated for Output 6.7.2 CRT Mnemonics 6.7.2.1 Mnemonics for Keyboard and Auxport 6.7.2.2 Mnemonics to Clear & Reset the Terminal 6.7.2.3 Mnemonics Applied to the Cursor Position 6.7.2.4 Mnemonics to Control Attributes 6.7.2.5 Mnemonics to Control Color 6.7.2.6 Mnemonics to Transmit Data 6.7.2.7 Miscellaneous Mnemonics 6.7.2.8 Special Mnemonics for I/O Control 6.7.2.9 IRIS Mnemonics Not Supported 6.7.3 $TERM Extended Graphic Mnemonics 6.7.3.1 Table of Extended Graphics Octal Codes 6.8 $TERM Input Character Processing 6.9 Cursor Tracking Mode 6.10 Using Dynamic Windows 6.10.1 Using Protected Characters & PC Monitors 6.10.2 Mnemonics Simulated During Window Tracking 7 UniBasic Commands 7.1 Starting & Ending Statement Numbers 7.2 Processing in Command Mode 7.3 ! Command 7.4 / Command (BITS only) 7.5 AUTO 7.6 BASIC (IRIS only) 7.7 BAUD 7.8 BYE 7.9 CD 7.10 CHAIN "SAVE. ." (IRIS only) 7.11 CHANGE (BITS only) 7.12 CHECK (IRIS only) 7.13 CLU (IRIS only) 7.14 CONTINUE 7.15 DEL (BITS only) 7.16 DELETE (IRIS only) 7.17 DUMP 7.18 EDIT 7.19 ERASE (BITS only) 7.20 EXEC (IRIS only) 7.21 EXIT (IRIS only) 7.22 FILE 7.23 (Filename) 7.24 FIND 7.25 GET (BITS only) 7.26 GO (IRIS only) 7.27 HALT https://engineering.dynamic.com/mediawiki/index.php?title=Unibasic&printable=yes Page 4 of 397 Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM 7.28 HELP 7.29 LEVEL 7.30 LIST 7.31 LOAD (IRIS only) 7.32 MERGE (BITS only) 7.33 MSG 7.34 NEW 7.35 OEM 7.36 PACK (BITS only) 7.37 PROTECT 7.38 PSAVE 7.39 RENUMB 7.40 RSAVE (BITS only) 7.41 RUN 7.42 SAVE 7.43 SHOW 7.44 SIZE 7.45 STATUS (IRIS only) 7.46 TIME 7.47 UNASSIGN 7.48 USERS 7.49 VARIABLE 7.50 VERIFY 7.51 VSAVE (BITS only) 8 UniBasic Statements 8.1 Program Debugging Aids 8.1.1 Single-Step Program Execution 8.1.2 Trace Mode 8.1.3 Program Breakpoints 8.2 Statement Documentation Format 8.3 BUILD # 8.4 CALL 8.5 CHAIN 8.6 CHAIN READ 8.7 CHAIN WRITE 8.8 CLEAR # 8.9 CLOSE # 8.10 COM 8.11 CONV 8.12 CREATE # 8.13 DATA 8.14 DEF FN 8.15 DIM 8.16 DUPLICATE 8.17 EDIT 8.18 END 8.19 ENTER 8.20 EOFCLR 8.21 EOFSET 8.22 EOPEN https://engineering.dynamic.com/mediawiki/index.php?title=Unibasic&printable=yes Page 5 of 397 Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM 8.23 ERRCLR 8.24 ERRSET 8.25 ERRSTM 8.26 ESCCLR 8.27 ESCSET 8.28 ESCDIS 8.29 ESCSTM 8.30 EXECUTE 8.31 FOR 8.32 GOSUB 8.33 GOTO 8.34 IF 8.35 IF ERR 8.36 INDEX # 8.36.1 Summary of INDEX Modes 8.36.2 Detailed Table of INDEX Modes 8.36.2.1 Table of INDEX status return values 8.37 INPUT 8.38 INTCLR 8.39 INTSET 8.40 JUMP 8.41 KILL 8.42 LET 8.43 LIB 8.44 MAT = 8.45 MAT + 8.46 MAT * 8.47 MAT CON 8.48 MAT IDN 8.49 MAT INV 8.50 MAT TRN 8.51 MAT ZER 8.52 MAT INPUT 8.53 MAT PRINT 8.54 MAT RDLOCK # 8.55 MAT READ 8.56 MAT READ # 8.57 MAT WRITE # 8.58 MAT WRLOCK # 8.59 MODIFY 8.60 NEXT 8.61 ON 8.62 OPEN # 8.63 PAUSE 8.64 PORT 8.64.1 Mode 0—Attach Selected Port 8.64.2 Mode 1—Place an Attached Port in Command Mode 8.64.3 Mode 2—Transmit Command String to Attached Port 8.64.4 Mode 3—Return Attached Port’s Operational Status 8.65 PRINT https://engineering.dynamic.com/mediawiki/index.php?title=Unibasic&printable=yes Page 6 of 397 Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM 8.66 RANDOM 8.67 RDLOCK # 8.68 RDREL # 8.69 READ 8.70 READ # 8.71 RECV 8.72 REM 8.73 RESTOR 8.74 RETURN 8.75 REWIND # 8.76 ROPEN # 8.77 SEARCH 8.78 SEARCH # 8.78.1 Summary of SEARCH # Modes 8.78.2 Detailed Table of SEARCH # Modes 8.78.2.1 Table of SEARCH # status return values 8.79 SEND 8.80 SETFP # 8.81 SIGNAL 8.81.1 Mode 1 - Transmit a message to another port 8.81.2 Mode 2 - Receive messages sent to your port 8.81.3 Mode 3 - Pause Program Operation 8.81.4 Mode 5 - Receive System Signal 8.81.5 Mode 6 - Clear all outstanding signals 8.82 SPAWN 8.83 STOP 8.84 SUSPEND 8.85 SWAP 8.86 SYSTEM 8.87 TRACE 8.88 UNIT 8.89 UNLOCK # 8.90 WINDOW 8.91 WRITE # 8.92 WRLOCK # 8.93 WRREL # 9 User CALLS 9.1 CALL $ATOE 9.2 CALL $AVPORT 9.3 CALL $CALLSTAT 9.4 CALL $CKSUM 9.5 CALL $CLU 9.6 CALL $DATE 9.7 CALL $ECHO 9.8 CALL $ENV 9.9 CALL $ETOA 9.10 CALL $FINDF 9.11 CALL $INPBUF 9.12 CALL $LOCK 9.13 CALL $LOGIC https://engineering.dynamic.com/mediawiki/index.php?title=Unibasic&printable=yes Page 7 of 397 Unibasic - Dynamic Concepts Wiki 6/19/17, 1244 PM 9.14 CALL $NCRC32 9.15 CALL $RDFHD 9.16 CALL $RENAME 9.17 CALL $STRING 9.18 CALL $SWAPF 9.19 CALL $TIME 9.20 CALL $TRXCO 9.21 CALL $VOLLINK 9.22 CALL 15 9.23 CALL 18/19 9.24
Recommended publications
  • 15-122: Principles of Imperative Computation, Fall 2014 Lab 11: Strings in C
    15-122: Principles of Imperative Computation, Fall 2014 Lab 11: Strings in C Tom Cortina(tcortina@cs) and Rob Simmons(rjsimmon@cs) Monday, November 10, 2014 For this lab, you will show your TA your answers once you complete your activities. Autolab is not used for this lab. SETUP: Make a directory lab11 in your private 15122 directory and copy the required lab files to your lab11 directory: cd private/15122 mkdir lab11 cp /afs/andrew.cmu.edu/usr9/tcortina/public/15122-f14/*.c lab11 1 Storing and using strings using C Load the file lab11ex1.c into a text editor. Read through the file and write down what you think the output will be before you run the program. (The ASCII value of 'a' is 97.) Then compile and run the program. Be sure to use all of the required flags for the C compiler. Answer the following questions on paper: Exercise 1. When word is initially printed out character by character, why does only one character get printed? Exercise 2. Change the program so word[3] = 'd'. Recompile and rerun. Explain the change in the output. Run valgrind on your program. How do the messages from valgrind correspond to the change we made? Exercise 3. Change word[3] back. Uncomment the code that treats the four character array word as a 32-bit integer. Compile and run again. Based on the answer, how are bytes of an integer stored on the computer where you are running your code? 2 Arrays of strings Load the file lab11ex2.c into a text editor.
    [Show full text]
  • IBM Education Assistance for Z/OS V2R1
    IBM Education Assistance for z/OS V2R1 Item: ASCII Unicode Option Element/Component: UNIX Shells and Utilities (S&U) Material is current as of June 2013 © 2013 IBM Corporation Filename: zOS V2R1 USS S&U ASCII Unicode Option Agenda ■ Trademarks ■ Presentation Objectives ■ Overview ■ Usage & Invocation ■ Migration & Coexistence Considerations ■ Presentation Summary ■ Appendix Page 2 of 19 © 2013 IBM Corporation Filename: zOS V2R1 USS S&U ASCII Unicode Option IBM Presentation Template Full Version Trademarks ■ See url http://www.ibm.com/legal/copytrade.shtml for a list of trademarks. Page 3 of 19 © 2013 IBM Corporation Filename: zOS V2R1 USS S&U ASCII Unicode Option IBM Presentation Template Full Presentation Objectives ■ Introduce the features and benefits of the new z/OS UNIX Shells and Utilities (S&U) support for working with ASCII/Unicode files. Page 4 of 19 © 2013 IBM Corporation Filename: zOS V2R1 USS S&U ASCII Unicode Option IBM Presentation Template Full Version Overview ■ Problem Statement –As a z/OS UNIX Shells & Utilities user, I want the ability to control the text conversion of input files used by the S&U commands. –As a z/OS UNIX Shells & Utilities user, I want the ability to run tagged shell scripts (tcsh scripts and SBCS sh scripts) under different SBCS locales. ■ Solution –Add –W filecodeset=codeset,pgmcodeset=codeset option on several S&U commands to enable text conversion – consistent with support added to vi and ex in V1R13. –Add –B option on several S&U commands to disable automatic text conversion – consistent with other commands that already have this override support. –Add new _TEXT_CONV environment variable to enable or disable text conversion.
    [Show full text]
  • Bidirectional Programming Languages
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Winter 2009 Bidirectional Programming Languages John Nathan Foster University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Databases and Information Systems Commons, and the Programming Languages and Compilers Commons Recommended Citation Foster, John Nathan, "Bidirectional Programming Languages" (2009). Publicly Accessible Penn Dissertations. 56. https://repository.upenn.edu/edissertations/56 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/56 For more information, please contact [email protected]. Bidirectional Programming Languages Abstract The need to edit source data through a view arises in a host of applications across many different areas of computing. Unfortunately, few existing systems provide support for updatable views. In practice, when they are needed, updatable views are usually implemented using two separate programs: one that computes the view from the source and another that handles updates. This rudimentary design is tedious for programmers, difficult to reason about, and a nightmare to maintain. This dissertation presents bidirectional programming languages, which provide an elegant and effective mechanism for describing updatable views. Unlike programs written in an ordinary language, which only work in one direction, programs in a bidirectional language can be run both forwards and backwards: from left to right, they describe functions that map sources to views, and from right to left, they describe functions that map updated views back to updated sources. Besides eliminating redundancy, these languages can be designed to ensure correctness, guaranteeing by construction that the two functions work well together. Starting from the foundations, we define a general semantic space of well-behaved bidirectional transformations called lenses.
    [Show full text]
  • Reference Manual for the Icon Programming Language Version 5 (( Implementation for Limx)*
    Reference Manual for the Icon Programming Language Version 5 (( Implementation for liMX)* Can A. Contain. Ralph £ Grixwoltl, and Stephen B. Watnplcr "RSI-4a December 1981, Corrected July 1982 Department of Computer Science The University of Arizona Tucson, Arizona 85721 This work was supported by the National Science Foundation under Grant MCS79-03890. Copyright © 1981 by Ralph E. Griswold All rights reserved. No part of this work may be reproduced, transmitted, or stored in any form or by any means without the prior written consent of the copyright owner. CONTENTS Chapter i Introduction 1.1 Background I 1.2 Scope ol the Manual 2 1.3 An Overview of Icon 2 1.4 Syntax Notation 2 1.5 Organization ol the Manual 3 Chapter 2 Basic Concepts and Operations 2.1 Types 4 2.2 Expressions 4 2.2.1 Variables and Assignment 4 2.2.2 Keywords 5 2.2.3 Functions 5 2.2.4 Operators 6 2.3 Evaluation of Expressions 6 2.3.1 Results 6 2.3.2 Success and Failure 7 2.4 Basic Control Structures 7 2.5 Compound Expressions 9 2.6 Loop Control 9 2.7 Procedures 9 Chapter 3 Generators and Expression Evaluation 3.1 Generators 11 3.2 Goal-Directed Evaluation 12 }.?> Evaluation of Expres.sions 13 3.4 I he Extent ol Backtracking 14 3.5 I he Reversal ol Effects 14 Chapter 4 Numbers and Arithmetic Operations 4.1 Integers 15 4.1.1 literal Integers 15 4.1.2 Integer Arithmetic 15 4.1.3 Integer Comparison 16 4.2 Real Numbers 17 4.2.1 literal Real Numbers 17 4.2.2 Real Arithmetic 17 4.2.3 Comparison of Real Numbers IS 4.3 Mixed-Mode Arithmetic IX 4.4 Arithmetic Type Conversion 19
    [Show full text]
  • Software II: Principles of Programming Languages
    Software II: Principles of Programming Languages Lecture 6 – Data Types Some Basic Definitions • A data type defines a collection of data objects and a set of predefined operations on those objects • A descriptor is the collection of the attributes of a variable • An object represents an instance of a user- defined (abstract data) type • One design issue for all data types: What operations are defined and how are they specified? Primitive Data Types • Almost all programming languages provide a set of primitive data types • Primitive data types: Those not defined in terms of other data types • Some primitive data types are merely reflections of the hardware • Others require only a little non-hardware support for their implementation The Integer Data Type • Almost always an exact reflection of the hardware so the mapping is trivial • There may be as many as eight different integer types in a language • Java’s signed integer sizes: byte , short , int , long The Floating Point Data Type • Model real numbers, but only as approximations • Languages for scientific use support at least two floating-point types (e.g., float and double ; sometimes more • Usually exactly like the hardware, but not always • IEEE Floating-Point Standard 754 Complex Data Type • Some languages support a complex type, e.g., C99, Fortran, and Python • Each value consists of two floats, the real part and the imaginary part • Literal form real component – (in Fortran: (7, 3) imaginary – (in Python): (7 + 3j) component The Decimal Data Type • For business applications (money)
    [Show full text]
  • Standard TECO (Text Editor and Corrector)
    Standard TECO TextEditor and Corrector for the VAX, PDP-11, PDP-10, and PDP-8 May 1990 This manual was updated for the online version only in May 1990. User’s Guide and Language Reference Manual TECO-32 Version 40 TECO-11 Version 40 TECO-10 Version 3 TECO-8 Version 7 This manual describes the TECO Text Editor and COrrector. It includes a description for the novice user and an in-depth discussion of all available commands for more advanced users. General permission to copy or modify, but not for profit, is hereby granted, provided that the copyright notice is included and reference made to the fact that reproduction privileges were granted by the TECO SIG. © Digital Equipment Corporation 1979, 1985, 1990 TECO SIG. All Rights Reserved. This document was prepared using DECdocument, Version 3.3-1b. Contents Preface ............................................................ xvii Introduction ........................................................ xix Preface to the May 1985 edition ...................................... xxiii Preface to the May 1990 edition ...................................... xxv 1 Basics of TECO 1.1 Using TECO ................................................ 1–1 1.2 Data Structure Fundamentals . ................................ 1–2 1.3 File Selection Commands ...................................... 1–3 1.3.1 Simplified File Selection .................................... 1–3 1.3.2 Input File Specification (ER command) . ....................... 1–4 1.3.3 Output File Specification (EW command) ...................... 1–4 1.3.4 Closing Files (EX command) ................................ 1–5 1.4 Input and Output Commands . ................................ 1–5 1.5 Pointer Positioning Commands . ................................ 1–5 1.6 Type-Out Commands . ........................................ 1–6 1.6.1 Immediate Inspection Commands [not in TECO-10] .............. 1–7 1.7 Text Modification Commands . ................................ 1–7 1.8 Search Commands .
    [Show full text]
  • Rc the Plan 9 Shell
    Rc ߞ The Plan 9 Shell Tom Duff [email protected]−labs.com ABSTRACT Rc is a command interpreter for Plan 9 that provides similar facilities to UNIXߣs Bourne shell, with some small additions and less idiosyncratic syntax. This paper uses numerous examples to describe rcߣs features, and contrasts rc with the Bourne shell, a model that many readers will be familiar with. 1. Introduction Rc is similar in spirit but different in detail from UNIXߣs Bourne shell. This paper describes rcߣs principal features with many small examples and a few larger ones. It assumes familiarity with the Bourne shell. 2. Simple commands For the simplest uses rc has syntax familiar to Bourne-shell users. All of the fol­ lowing behave as expected: date cat /lib/news/build who >user.names who >>user.names wc <file echo [a−f]*.c who | wc who; date vc *.c & mk && v.out /*/bin/fb/* rm −r junk || echo rm failed! 3. Quotation An argument that contains a space or one of rcߣs other syntax characters must be enclosed in apostrophes (’): rm ’odd file name’ An apostrophe in a quoted argument must be doubled: echo ’How’’s your father?’ 4. Patterns An unquoted argument that contains any of the characters *?[is a pattern to be matched against file names. A * character matches any sequence of characters, ? matches any single character, and [class] matches any character in the class, unless the first character of class is ~, in which case the class is complemented. The class may ­ 2 ­ also contain pairs of characters separated by −, standing for all characters lexically between the two.
    [Show full text]
  • IBM ILOG CPLEX Optimization Studio OPL Language Reference Manual
    IBM IBM ILOG CPLEX Optimization Studio OPL Language Reference Manual Version 12 Release 7 Copyright notice Describes general use restrictions and trademarks related to this document and the software described in this document. © Copyright IBM Corp. 1987, 2017 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Other company, product, or service names may be trademarks or service marks of others. © Copyright IBM Corporation 1987, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ............... v Limitations on constraints ........ 59 Formal parameters ...........
    [Show full text]
  • Just Go for It: the Story of Dance-Mat.Js
    Just go for it: The story of dance-mat.js Ramón Huidobro @hola_soy_milk ramonh.dev/dance-mat-js.pdf CW: Sick late 90’s beats I’m Ramón. Freelance software developer, Mozilla tech speaker. Kids’ coding instructor and football coach. I’m Ramón. Freelance software developer and kids’ coding instructor. @SenorHuidobro Dance Dance Revolution DDR The music. Good gravy, the music. const MPR121 = require('node-picap'); const mpr121 = new MPR121('0x5C'); mpr121.setTouchThreshold(40); mpr121.setReleaseThreshold(20); // Process touches mpr121.on('data', (data) => { try { // SEND DATA TO PC }); } catch(e) { console.log("ERROR: ", e); } }); != https://www.kernel.org/doc/Documentation/usb/gadget_configfs.txt Linux USB gadget configured through configfs https://randomnerdtutorials.com/rasp berry-pi-zero-usb-keyboard-hid/ 1. Enable Raspberry Pi OTG (USB on the go) 2. Add boot script to enable Keyboard HID device on the configfs pi@raspberrypi:~ $ echo "dtoverlay=dwc2" | sudo tee -a /boot/config.txt pi@raspberrypi:~ $ echo "dwc2" | sudo tee -a /etc/modules pi@raspberrypi:~ $ sudo echo "libcomposite" | sudo tee -a /etc/modules 1. Enable Raspberry Pi OTG (USB on the go) 2. Add boot script to enable Keyboard HID device on the configfs #!/bin/bash cd /sys/kernel/config/usb_gadget/ mkdir -p ddrusb cd ddrusb echo 0x1d6b > idVendor # Linux Foundation echo 0x0104 > idProduct # Multifunction Composite Gadget echo 0x0100 > bcdDevice # v1.0.0 echo 0x0200 > bcdUSB # USB2 mkdir -p strings/0x409 echo "fedcba9876543210" > strings/0x409/serialnumber echo "Ramon Huidobro" >
    [Show full text]
  • Numeric and String Variables
    Chapter II-7 II-7Numeric and String Variables Overview.......................................................................................................................................................... 94 Creating Global Variables.............................................................................................................................. 94 Uses For Global Variables.............................................................................................................................. 94 Variable Names ............................................................................................................................................... 94 System Variables ............................................................................................................................................. 95 User Variables ................................................................................................................................................. 95 Special User Variables ............................................................................................................................ 95 Numeric Variables................................................................................................................................... 96 String Variables........................................................................................................................................ 97 Local and Parameter Variables in Procedures ...................................................................................
    [Show full text]
  • Ed: a Context Editor for the Cp/M Disk System User's
    Post Office Box 579, Pacific Grove, California 93950, (408) 373-3403 ED: A CONTEXT EDITOR FOR THE CP/M DISK SYSTEM USER'S MANUAL COPYRIGHT © 1976, 1978 DIGIT AL RESEARCH r Copyright © 1976, 1978 by Digital Research. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or trans­ lated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Digital Research, Post Office Box 579, Pacific Grove, California 93950. Disclaimer Digital Research makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Further, Digital Research reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research to notify any person of such revision or changes. Table of Contents 1. ED TUTORIAL • · · · • • · • • 1 l~l Introduction to ED • . 1 1.2 ED Operation .•. 1 1.3 Text Transfer Functions 1 1.4 Memory Buffer Organization. 5 1.5 Memory Buffer Operation..•. 5 1.6 Command Strings 7 1.7 Text Search and Alteration. • • 8 1.8 Source Libraries . • • • . • • 11 1.9 Repetitive Command Execution •• • • 12 2. ED"ERROR CONDITIONS •• . • 13 3. CONTROL CHARACTERS AND COMMANDS . 14 ii ED USER'S MANUAL 1. ED TUTORIAL 1.1. Introduction to ED. ED is the context editor for CP/M, and is used to create and alter CP/M source files.
    [Show full text]
  • Lecture 18 Regular Expressions the Grep Command
    Lecture 18 Regular Expressions Many of today’s web applications require matching patterns in a text document to look for specific information. A good example is parsing a html file to extract <img> tags of a web document. If the image locations are available, then we can write a script to automatically download these images to a location we specify. Looking for tags like <img> is a form of searching for a pattern. Pattern searches are widely used in many applications like search engines. A regular expression(regex) is defined as a pattern that defines a class of strings. Given a string, we can then test if the string belongs to this class of patterns. Regular expressions are used by many of the unix utilities like grep, sed, awk, vi, emacs etc. We will learn the syntax of describing regex later. Pattern search is a useful activity and can be used in many applications. We are already doing some level of pattern search when we use wildcards such as *. For example, > ls *.c Lists all the files with c extension or ls ab* lists all file names that starts with ab in the current directory. These type of commands (ls,dir etc) work with windows, unix and most operating systems. That is, the command ls will look for files with a certain name patterns but are limited in ways we can describe patterns. The wild card (*) is typically used with many commands in unix. For example, cp *.c /afs/andrew.cmu.edu/course/15/123/handin/Lab6/guna copies all .c files in the current directory to the given directory Unix commands like ls, cp can use simple wild card (*) type syntax to describe specific patterns and perform the corresponding tasks.
    [Show full text]