Tektronix Smalltalk

Total Page:16

File Type:pdf, Size:1020Kb

Tektronix Smalltalk USERS Part No. 061-3440-00 TEK MANUAL Product Group 07 TEKTRONIX SMALLTALK Please Check at the Rear of this Manual for NOTES and CHANGE INFORMATION First Printing JUNE 1987 COMMtnED TO EXCRlENCE Copyright © 1987, Tektronix, Inc. All rights reserved. Tektronix products are covered by U.S. and foreign patents, issued and pending. This document may not be copied in whole or in part, or otherwise reproduced except as specifically permitted under U.S. copyright law, without the prior written concent of Tektronix, Inc. P.O. Box 500, Beaverton, Oregon 97077. Specifications subject to change. TEKTRONIX ,TEK, and UTek are registered trademarks of Tektronix, Inc. UNIX is a trademark of AT&T Bell Laboratories. PELLUCIDA is a trademark of Bigelow & Holmes. HELVETICA and TIMES are registered trademarks of Linotype Corp. UniFLEX is a registered trademark of Technical Systems Consultants, Inc. Smalltalk-80 and XEROX are trademarks of Xerox Corporation. ,. MANUAL REVISION STATUS PRODUCT: TEKTRONIX SMALLTALK USERS This manual supports the following versions of this product: Image Version: TB2.2.1 REV DATE DESCRIPTION JUNE 1987 Original Issue TEKTRONIX SMALL TALK USERS 1 Table of Contents SECTION 1 Introduction INTRODUCTION ................................................................................................................... 1-1 ABOUT THIS MANUAL ....................................................................................................... 1-1 Prerequisites ................................................................................... .............................. .......... 1-1 Reading Path ........................................ ....... ............. ......... ................. .................................... 1-1 For the New Smalltalk Programmer ............................... ............... ......... ........ ..................... 1-1 For the Experienced Small talk Programmer .................................................. ....... .............. 1-2 SUMMARY OF THE SECTIONS .......................................................................................... 1-2 THE TEKTRONIX SMALLTALK DOCUMENTATION ..................................................... 1-3 The Goldberg Book ....................... ........................................................................................ 1-3 GETTING STARTED ..................... .............................................................................. .......... 1-4 SECTION 2 A Smalltalk Tutorial OVERVIEW ............................................................................................................................ 2-1 TUTORIAL ............................................................................................................................. 2-1 Entering the Smalltalk System .. ............. .... ......... .... ......... ......... ........... ........ ..................... 2-1 Learning Mouse Mechanics ............................................................................................... 2-2 Using the Mouse Buttons .................................................................................................. 2-3 Selecting Objects ... ....... ...... ....... ...... ..... ........ ... ........... ...... ............... ........................ .......... 2-4 Scrolling Text in a Window........... ....... .... .... ......... .................. ............... ........... .... ......... ... 2-4 Opening a Workspace Window ......................................................................................... 2-6 Evaluating Code in a Workspace ....................................................................................... 2-6 Manipulating Text in a Workspace ................................................................................... 2-8 Accessing Small talk Code .. ....... ...... ................ ........ ... .......... ....... ......... ........ ... ........ .......... 2-8 Executing Example Code ... ......... .... ......... ....... .... ......... ........ ..... ................. ............. ........ 2-10 Altering the 'Code ..................................................... ........................................................ 2-12 Communicating with the Operating System ............... .......... ...................... ..................... 2-12 Writing Files Out to the Operating System ..................................................................... 2-15 Manipulating Windows ............... .... ........... ............. ... .......... ........................................... 2-16 Saving Your Image .......................................................................................................... 2-16 Exiting Smalltalk ............................................................................................................. 2-17 Invoking Your Image File ............... ............. ..... ...... ..... ........ .................. .... ........... .......... 2-18 SECTION 3 Smalltalk Concepts OVERVIEW ............................................................................................................................ 3-1 THE SMALLTALK LANGUAGE ......................................................................................... 3-1 Key Concepts ........................................................................................................................ 3-1 Syntax ................................................................................................................................... 3-2 Identifiers .......................................................................................................................... 3-2 Li terals ............................................... ;.............................................................................. 3-2 Messages ........................................................................................................................... 3-3 Blocks ............................................................................................................................... 3-4 Parsing Expressions .............................................................................................................. 3-5 An Example of Smalltalk Code ............................................................................................ 3-6 PROGRAMMING TOOLS .................................................................................................... 3-8 System Browser .................................................................................................................... 3-8 Workspaces ........................................................................................................................... 3-9 System Transcript ................................................................................................................. 3-9 System Workspace ................................................................................................................ 3-9 Tektronix Smalltalk Users III Table of Contents File List .................................................................................................................................. 3-9 Inspectors .. ...... ..... ........ ............. ....... ............... ......... ............... ........... ....... ...... .................. ..... 3-9 Debuggers ..... ............. .................. ...... ..... ........ ................ .......... ......... ............. ....... ...... ........ 3-10 EXTENDING TI-IE LANGUAGE ........................................................................................ 3-10 Adding a New Metllod ......................................................................................................... 3-10 Adding a New Class ............................................................................................................ 3-14 Define tlle New Class ...................................................................................................... 3-16 Add New Instance Protocol ............................................................................................. 3-16 Add New Class Protocol ... ........... .... ....... ...... ..... .... ............. ..... ...... ............. ........... .......... 3-18 Test the New Class ........... ............... ... .......... ....... .... .................... ......... ................. ..... ..... 3-19 SECTION 4 User Interface Features INTRODUCTION ................................................................................................................... 4-1 Objectives ............................................... ................. ........... ............... .................................... 4-1 GLOBAL KEY COMBINATIONS ........................................................................................ 4-1 Interrupts and Exits ................................................................................................................ 4-1 CTRL-C ................................................................................................................................. 4-2 CTRL-SHIFf-C ..................................................................................................................... 4-2 CTRL-SHIFf- BREAK ......................................................................................................... 4-2 Cursor Center Key ................................................................................................................. 4-3 MENUS ..................................................................................................................................
Recommended publications
  • User Guide Laplink® Diskimage™ 7 Professional
    http://www.laplink.com/contact 1 ™ E-mail us at [email protected] Laplink® DiskImage 7 Professional User Guide Tel (USA): +1 (425) 952-6001 Tel (UK): +44 (0) 870-2410-983 Fax (USA): +1 (425) 952-6002 Fax (UK): +44 (0) 870-2410-984 ™ Laplink® DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: [email protected] Tel (USA): +1 (425) 952-6001 Fax (USA): +1 (425) 952-6002 Tel (UK): +44 (0) 870-2410-983 User Guide Fax (UK): +44 (0) 870-2410-984 Laplink Software, Inc. 600 108th Ave. NE, Suite 610 Bellevue, WA 98004 U.S.A. Copyright / Trademark Notice © Copyright 2013 Laplink Software, Inc. All rights reserved. Laplink, the Laplink logo, Connect Your World, and DiskImage are registered trademarks or trademarks of Laplink Software, Inc. in the United States and/or other countries. Other trademarks, product names, company names, and logos are the property of their respective holder(s). UG-DiskImagePro-EN-7 (REV. 5/2013) http://www.laplink.com/contact 2 ™ E-mail us at [email protected] Laplink® DiskImage 7 Professional User Guide Tel (USA): +1 (425) 952-6001 Tel (UK): +44 (0) 870-2410-983 Fax (USA): +1 (425) 952-6002 Fax (UK): +44 (0) 870-2410-984 Contents Installation and Registration System Requirements . 1 Installing Laplink DiskImage . 1 Registration . 2 Introduction to DiskImage Overview of Important Features . 2 Definitions . 3 Start Laplink DiskImage - Two Methods . 4 Windows Start . .4 Bootable CD . .4 DiskImage Tasks One-Click Imaging: Create an Image of the Entire Computer .
    [Show full text]
  • Visualage for Smalltalk Handbook Volume 2: Features
    SG24-2219-00 VisualAge for Smalltalk Handbook Volume 2: Features September 1997 SG24-2219-00 International Technical Support Organization VisualAge for Smalltalk Handbook Volume 2: Features September 1997 IBM Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix A, “Special Notices.” First Edition (September 1997) This edition applies to VisualAge for Smalltalk, Versions 2, 3, and 4, for use with OS/2, AIX, and Microsoft Windows 95/NT. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. QXXE Building 80-E2 650 Harry Road San Jose, California 95120-6099 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1997. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Preface . xiii How This Redbook Is Organized ....................... xiv ITSO on the Internet ................................ xv VisualAge Support on CompuServe ..................... xvii About the Authors ................................ xvii Acknowledgments . xviii Comments Welcome . xix Chapter 1. AS/400 Connection . 1 Multiple Programs with a Single Remote Procedure Call ......... 1 RPC Part Sets Commit Boundary ........................ 1 Connection Problem with V3R1 ......................... 2 AS/400 Communication Error .......................... 2 Strange Characters on Log-on Window .................... 3 Quick Form from AS/400 Record Classes ................... 3 Communication . 4 Read Next/Previous . 4 SQL Statements . 5 Data Queues and Records ............................ 6 ODBC Requirements .
    [Show full text]
  • Programming-8Bit-PIC
    Foreword Embedded microcontrollers are everywhere today. In the average household you will find them far beyond the obvious places like cell phones, calculators, and MP3 players. Hardly any new appliance arrives in the home without at least one controller and, most likely, there will be several—one microcontroller for the user interface (buttons and display), another to control the motor, and perhaps even an overall system manager. This applies whether the appliance in question is a washing machine, garage door opener, curling iron, or toothbrush. If the product uses a rechargeable battery, modern high density battery chemistries require intelligent chargers. A decade ago, there were significant barriers to learning how to use microcontrollers. The cheapest programmer was about a hundred dollars and application development required both erasable windowed parts—which cost about ten times the price of the one time programmable (OTP) version—and a UV Eraser to erase the windowed part. Debugging tools were the realm of professionals alone. Now most microcontrollers use Flash-based program memory that is electrically erasable. This means the device can be reprogrammed in the circuit—no UV eraser required and no special packages needed for development. The total cost to get started today is about twenty-five dollars which buys a PICkit™ 2 Starter Kit, providing programming and debugging for many Microchip Technology Inc. MCUs. Microchip Technology has always offered a free Integrated Development Environment (IDE) including an assembler and a simulator. It has never been less expensive to get started with embedded microcontrollers than it is today. While MPLAB® includes the assembler for free, assembly code is more cumbersome to write, in the first place, and also more difficult to maintain.
    [Show full text]
  • Cobol Pic Clause Example
    Cobol Pic Clause Example Albuminous and sonsie Scarface never apotheosising nae when Nealon mischarges his hogs. Unlawful Ingmar clips contiguously and super, she revering her cookers benefit symmetrically. Trifoliate Chaim sometimes circularize his breaches see and dilly-dallies so dichotomously! Quetelet index file exactly the coefficient is not confuse the input procedure division resets the rerun in another accept message or paragraphs that? Early cobol example of examples are evaluated one having to pic x when clause is considered useless instructions and date formats will be made quickly than one. After a group item is never reserved words cannot be written under different format you can it occupies in an operational sign printed documentation is suppressed. Because they may be a sample program by requesting a short paragraph in each source item can be greater detail report item is impossible in the records. Exit program using pic n it will be only, or more sections into a pic clause is executed as shown in a file to. Duplicate keys or fetch a call to_char with input call to describe data description during execution of examples of this area b it! We delimit by cobol example illustrates this server outputs data division sections having one. Basic cobol example. The individual file is provided for pic x variables being defined by use of messages. The cobol picture indicates a cobol api to cobol pic clause example. This call function is defined width of the usage is to a table can you explicitly searched last sentence and pic clause scales as steps. No cobol example with clause indicates the pic clause specifies that truncation or.
    [Show full text]
  • Vis: Virtualization Enhanced Live Forensics Acquisition for Native System
    Vis: Virtualization Enhanced Live Forensics Acquisition for Native System Miao Yu, Zhengwei Qi, Qian Lin, Xianming Zhong, Bingyu Li, Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University f superymk, qizhwei, linqian, zhongxianming, justasmallfish, hbguan g @ sjtu.edu.cn Abstract Focusing on obtaining in-memory evidence, current live acquisition efforts either fail to provide accurate native system physical memory acquisition at the given time point or require suspending the machine and altering the execution environment drastically. To address this issue, we propose Vis, a light-weight virtualization approach to provide accurate retrieving of physical memory content while preserving the execution of target native system. Our experimental results indicate that Vis is capable of reliably retrieving an accurate system image. Moreover, Vis accomplishes live acquisition within 97.09∼105.86 seconds, which shows that Vis is much more efficient than previous remote live acquisition tools that take hours and static acquisition that takes days. In average, Vis incurs only 9.62% performance overhead to the target system. Keywords: Vis, Live acquisition, Accuracy, Virtualization 1. Introduction After forensic scopes and medias are determined, a typical computer forensics scenario has three steps: acquisition, analyzing and reporting [47, 9]. Focusing on the stages of acquisition and analyzing, computer forensics pro- poses two key challenges: how to obtain the complete system state and how to analyze the retrieved image effectively [39]. Missing image of memory Preprint submitted to Digital Investigation February 16, 2012 content leads to an incomplete or wrong investigation result, even with an incomparable analyzing technology. Transcending static acquisition strategies, live acquisition extends the information gathering range of forensics examiner, i.e., involving with the volatile data.
    [Show full text]
  • A User Guide for the FRED Family of Forensic Systems Thank You for Your Recent Order
    A User Guide for the FRED Family of Forensic Systems Thank you for your recent order. We hope you like your new FRED! Please do not hesitate to contact us if you have any questions or require any additional information. Although we welcome a phone call anytime, our preferred method of contact is via our website www.digitalintelligence.com . The sales and technical support ticketing system is easy to use and allow us to track all requests and responses. To create your user account click on the User Icon on the top right of the web page banner and click on Sign Up. Here you can register your FRED system as well as track your web order history and support tickets. Please note your system serial number is the unique identifier for your system. It is helpful if you use the system serial number in your correspondence. If you have a sales related question or technical support issue, simply navigate to www.digitalintelligence.com/support A searchable knowledge base, links to other help or informational topics as well as a “Open A Ticket” button link can be found near the bottom of the page. We want to remind you, regardless of your warranty status, we will always be willing to assist with any technical questions you have regarding any Digital Intelligence product. *** Read me first *** Forensic Recovery of Evidence Device This document contains important information about the configuration and operation of your FRED system. FAILURE TO FOLLOW THESE GUIDELINES MAY RESULT IN PHYSICAL DAMAGE TO YOUR EQUIPMENT WHICH IS NOT COVERED UNDER WARRANTY.
    [Show full text]
  • PIC Assembly Language for the Complete Beginner
    PIC Assembly Language for the Complete Beginner Michael A. Covington Artificial Intelligence Center The University of Georgia Athens, Georgia 30602-7415 http://www.ai.uga.edu/mc This article appeared in Electronics Now Magazine in 1999 and is reprinted here by permission. Some web addresses have been up- dated but the content has not; you will find that MPLAB, for instance, now looks somewhat different. You may print out this article for personal use but not for further pub- lication. Copyright c 1999 Gernsback Publications, Inc. Copyright c 1999, 2004 Michael A. Covington. These days, the field of electronics is divided into “haves” and “have- nots” – people who can program microcontrollers and people who can’t. If you’re one of the “have-nots,” this article is for you. 1 Microcontrollers are one-chip computers designed to control other equip- ment, and almost all electronic equipment now uses them. The average American home now contains about 100 computers, almost all of which are microcontrollers hidden within appliances, clocks, thermostats, and even automobile engines. Although some microcontrollers can be programmed in C or BASIC, you need assembly language to get the best results with the least expensive micros. The reason is that assembly language lets you specify the exact instructions that the CPU will follow; you can control exactly how much time and memory each step of the program will take. On a tiny computer, this can be important. What’s more, if you’re not already an experienced programmer, you may well find that assembly language is simpler than BASIC or C.
    [Show full text]
  • Artificial Intelligence System Introduction to the Smallt Alk-80 System
    USERS Part No. 070-5606-00 TEK MANUAL Product Group 07 4404 ARTIFICIAL INTELLIGENCE SYSTEM INTRODUCTION TO THE SMALLT ALK-80 SYSTEM Please Check at the Rear of this Manual for NOTES and CHANGE INFORMA TION First Printing DEC 1984 Revised AUG 1985 COIIWITTED 10 EXCEL.l.ENCE Copyright © 1985 by Tektronix, Inc., Beaverton, Oregon. Printed in the United States of America. All rights reserved. Contents of this publication may not be reproduced in any form without permission of Tektronix, Inc. TEKTRONIX is a registered trademark of Tektronix, Inc. Smalltalk-80 is a trademark of Xerox Corp. MANUAL REVISION STATUS PRODUCT: 4404 Artificial Intelligence System Smalltalk-80 System This manual supports the following versions of this product: Version T2.1.2 REV DATE DESCRIPTION DEC 1984 Original Issue AUG 1985 Addition of NOTES Section 4404 Smalltalk-80 System User's CONTENTS INTRODUCTION .......................................................................................................... 1 About This Manual ................................................................................................... 1 The 4404 Artificial Intelligence System Documentation .......... ....... ....... ......... .......... 2 The Smalltalk-80 System Reference Books ............................................................... 3 A SMALLTALK-80 SYSTEM OVERVIEW ................................................................ 4 What is The Smalltalk-80 System? ............................................................................ 4 The User Interface: Mouse,
    [Show full text]
  • Extensible Markup Language (XML) 1.0
    REC-xml-19980210 Extensible Markup Language (XML) 1.0 W3C Recommendation 10-Feb-98 This version http://www.w3.org/TR/1998/REC-xml-19980210 http://www.w3.org/TR/1998/REC-xml-19980210.xml http://www.w3.org/TR/1998/REC-xml-19980210.html http://www.w3.org/TR/1998/REC-xml-19980210.pdf http://www.w3.org/TR/1998/REC-xml-19980210.ps Latest version http://www.w3.org/TR/REC-xml Previous version http://www.w3.org/TR/PR-xml-971208 Editors Tim Bray, Textuality and Netscape ([email protected]) Jean Paoli, Microsoft ([email protected]) C. M. Sperberg-McQueen, University of Illinois at Chicago ([email protected]) Abstract The Extensible Markup Language (XML) is a subset of SGML that is completely described in this document. Its goal is to enable generic SGML to be served, received, and processed on the Web in the way that is now possible with HTML. XML has been designed for ease of implementation and for interoperability with both SGML and HTML. Status of this document This document has been reviewed by W3C Members and other interested parties and has been endorsed by the Director as a W3C Recommendation. It is a stable document and may be used as reference material or cited as a normative reference from another document. W3C's role in making the Recommendation is to draw attention to the specification and to promote its widespread deployment. This enhances the functionality and interoperability of the Web. This document specifies a syntax created by subsetting an existing, widely used international text processing standard (Standard Generalized Markup Language, ISO 8879:1986(E) as amended and corrected) for use on the World Wide Web.
    [Show full text]
  • Bash Guide for Beginners
    Bash Guide for Beginners Machtelt Garrels Garrels BVBA <tille wants no spam _at_ garrels dot be> Version 1.11 Last updated 20081227 Edition Bash Guide for Beginners Table of Contents Introduction.........................................................................................................................................................1 1. Why this guide?...................................................................................................................................1 2. Who should read this book?.................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need?...............................................................................................................................4 9. Conventions used in this
    [Show full text]
  • A Special-Purpose Language for Picture-Drawing
    The following paper was originally published in the Proceedings of the Conference on Domain-Specific Languages Santa Barbara, California, October 1997 A Special-Purpose Language for Picture-Drawing Samuel N. Kamin and David Hyatt University of Illinois, Urbana-Champaign For more information about USENIX Association contact: 1. Phone: 510 528-8649 2. FAX: 510 548-5738 3. Email: [email protected] 4. WWW URL:http://www.usenix.org A Sp ecial-Purp ose Language for Picture-Drawing y Samuel N. Kamin David Hyatt Computer Science Department University of Il linois at Urbana-Champaign Urbana, Il linois 61801 fs-kamin,[email protected] Abstract supp orted in programming languages. This supp ort means allowing the creation of \ rst-class" values of eachtyp e, that is, values not sub ject to arbitrary Special purpose languages are typical ly characterized restrictions based on the typ e. It also means pro- by a type of primitive data and domain-speci c oper- viding op erations appropriate to those typ es in a ations on this data. One approach to special purpose concise, non-bureaucratic form. language design is to embed the data and operations In our view, this approach to language design is p er- of the language within an existing functional lan- guage. The data can be de ned using the typecon- fectly suited to the design of sp ecial-purp ose lan- structions provided by the functional language, and guages. These languages are usually characterized the special purpose language then inherits al l of the byatyp e of primitive data sp eci c to a problem domain, and op erations on those data.
    [Show full text]
  • Domain Specific Languages∗
    Domain Specific Languages∗ Paul Hudak Department of Computer Science Yale University December 15, 1997 1 Introduction When most people think of a programming language they think of a general pur- pose language: one capable of programming any application with relatively the same degree of expressiveness and efficiency. For many applications, however, there are more natural ways to express the solution to a problem than those afforded by general purpose programming languages. As a result, researchers and practitioners in recent years have developed many different domain specific languages, or DSL’s, which are tailored to particular application domains. With an appropriate DSL, one can develop complete application programs for a do- main more quickly and more effectively than with a general purpose language. Ideally, a well-designed DSL captures precisely the semantics of an application domain, no more and no less. Table 1 is a partial list of domains for which DSL’s have been created. As you can see, the list covers quite a lot of ground. For a list of some popular DSL’s that you may have heard of, look at Table 2.1 The first example is a set of tools known as Lex and Yacc which are used to build lexers and parsers, respectively. Thus, ironically, they are good tools for building DSL’s (more on this later). Note that there are several document preparation languages listed; for example, LATEX was used to create the original draft of this article. Also on the list are examples of “scripting languages,” such as PERL, Tcl, and Tk, whose general domain is that of scripting text and file manipulation, GUI widgets, and other software components.
    [Show full text]