• Keine Ergebnisse gefunden

III entire is for is Digital is

N/A
N/A
Protected

Academic year: 2022

Aktie "III entire is for is Digital is"

Copied!
58
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1).. MDBS. MANUAL. INSTALLATIQN. SPECIFIC. SYSTEM. III. for CP/M WITH COMPILED BASIC. Micro Data Base Systems, P.. Lafayette,. O.. (BASCOM). Inc.. Box 248. Indiana. 47902. USA. (Revised. December 1981 November 1982:. MDBS. 3.05). Copyright Notice This entire manual is provided for the use of the customer and The customer's employees. entire contents have been copyrighted Data Base Micro Systems, Inc., and reproduction by any means is except prohibited with Micro Data as permitted in a written agreement Base Systems, Inc. the by. Trademarks:. (C). COPYRIGHT. Research. are trademarks of DigitalBASCOM SuperCalc is a trademark of SORCIM. is a trademark of Microsoft.. CP/EI. and. 1981,1982. MP/M. Micro. Data. Base Systems,. Inc..

(2) .. NEW. Any programming. RELEASES,. VERSIONS,. AND. endeavor. of the magnitude evolve over time. to vows to provide. necessarily continue Systems, Inc., version for a nominal handling fee. Base. its. A WARNING. of the MDBS software will Realizing this, Micro Data users with updates to this. versions of MDBS software will be considered as separate products. bona fide owners of previous versions are generally entitled However, a to preferential rate structure.. New. of our software is personalized to identify the licensee. some of several levels of this personalization, which involve encryption methods guaranteeá to be combinatorially decypher. Our products have been produced with a very difficult to investment of capital and labor, to say nothing of the substantial years of prior involvement in the data base management area by our we Accordingly, concerned about any principals. are seriously unauthorized copying of our proáucts and will take any and all available legal action against illegal copying or áistribution of our products.. Finally,. ). (C). each copy There are. COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc..

(3) .. PREFACE. Although the great majority of MDBS features and facilities are and host programming system independent of the host operating These include the languages, system specific aspects. there are some DML command command forms, lines, installation procedures, execution and data item-host This manual language variable correspondences. the needed system aspects specific in order to use that are presents MDBS. DDL/DMS,. MDBS-QRS,. This manual. I.. File Names for MDBS Software Fully Qualified File Names in CP/M Special Keys when Using Interactive. d.. E.. and TESTING. Installing. MDBS.DDL. Linker Testing Alternative. PROCEDURES. and. MDBS.DMS. MDBS. MDBS.DMS. Installation. SYSTEM. DEPENDENT. DEFAULTS. File name defaults for areas File extension defaults Pages per area default Page size default Page size restrictions. A.. Non-numeric Data Items Data Items Integer Unsigned Data Items Internal Decimal Data Items Real Data Items Repeating Data Items. CONTROL. A. B. C.. COPYRIGHT. Method. MDBS.DDL. ITEM. E. F.. (C). Utility. DATA. El. C. D.. Software under. Environments. The Renaming. OPERATING. B. C. D.. MDBS. Contention Count Time. INVOKING. A.. VI.. CP/M MP/M. INSTALLATION. C.. V.. eight chapters:. A. B. C.. A. B.. IV.. consists of the following. and MDBS-IDML.. NAMES. E. F.. III.. 1¢IDBS-DMU. FILE. D.. II.. MDBS-RCV,. -. HOST. LANGUAGE. VARIABLE. CORRESPONDENCE. PROCEDURES. Program an Application Special Link Files Alternative Control Procedures for Chaining Running. 1981,1982. Micro Data Base Systems,. Inc..

(4) .. .. VII.. VIII.. DML. (C). FORMAT. A.. Command. El. C. D.. Special. Open and Close. E. F.. Get and Put Assignment. G. El.. Utility Chaining. Find. Status. Commands. Command. INTERACTIVE MDBS-CNV. MDBS-IDML. C. D.. COPYRIGHT. Examples. Examples. ADD-ON. B. C. D.. A. B.. Command. Command Examples Command Examples Command Examples. A.. E. Appendix Appendix Appendix Appendix. COMMAND. PACKAGES. MDBS-QRS MDBS-DMU MDBS-RCV. Direct and Indirect Invocation Command DML Retrieval/Write Groups MDBS OMS Method Alternative First Installation Second Alternative Method Installation. 1981,1982. Micro. Data. Base Systems,. Inc..

(5) .. I. A.. File The. for. Names. MDBS. FILE. NAMES. Software. software and the software of furnished in a collection of files. In the these files have the following names: MDBS. DMS.REL DBRUN.REL BASCOM80.REL L1BASCO!'LREL. MDBS.DMS. RTL.REL. ddl.com. mdbs.ddl. Z.REL DMSTAB.MAC. DDLI.OVL DDL2.OVL DDL3.OVL. MDBS.DDL MDBS.DDL MDBS.DDL. SAMPLE.BAS. direct. SAMPLEI.BAS. QRS3.C)VL. QRS4.OVL QRS5.OVL QRS6.OVL QRS7.OVL QRS8.OVL QRS9.'OVL. QRSIO.OVL idml.com IDMLI.OVL IDML2.OVL IDML3.OVL IDML4.OVL IDML5.OVL IDML6.OVL IDML7.OVL IDML8.OVL dmu.con. rcv.com. cNv.ccm RIWO.REL RlWl.REL RIW2.REL RIW3.REL. COPYRIGHT. form. extension. component component form). (RTL library code. object overlay overlay overlay. l 2 3. program call sample sample program indirect call sample. ddl specification. mdbs.qrs object code QRS support overlay. O. support overlay support overlay 2 support overlay support overlay support overlay 5 support overlay 6 support overlay 7 support overlay 8 support overlay 9 support overlay 10 kdbs.idml object code IDML support overlay l IDML support overlay 2 IDML support overlay 3 IDML support overlay IDML support overlay 5 IDML support overlay IDML support overlay 7 IDML support overlay mdbs.dmu object code object code for the MDBS-RTL recovery prograní: RCV object code for the DDL conversion program: CNV table: indirect DML reference level l reads, no writes table: indirect DML reference level l reads, level l writes table: indirect DML reference level l reads, level 2 writes indirect DML reference table: reads, level level writes. QRS QRS QRS QRS QRS QRS QRS QRS QRS QRS. l 3 4. 4. 6. 8. l. (C). indirect. interface. CP/t4 MDBS.DMS MDBS.DMS MDBS.DMS. QRSI.QVL QRS2.OVL. component. language interface BASCOMlanguage interfaceMDBS.DMS component. OSCPM.REL. qrs.com QRSO.OVL. form). library (standard. runtime loader. add-on packages are environment,. CP/M: BASCOM. BASCOM. A.REL. SAbtPLE.DDL. MDBS. 1981,1982. Micro. Data. 3. Base Systems,. Inc.. I-l.

(6) .. table: indirect DML reference level l reads, level 4 writes indirect DML2 reference table: level reads, no writes DML reference table: indirect 2 reads, level level l writes DML reference table: indirect 2 level reads, level 2 writes table: indirect DML2 reference reads, level level 3 writes indirect dml reference table: reads, level level writes DML reference table: indirect reads, no writes level DML reference table: indirect 3 reads, level level I writes DML reference table: indirect 3 reads, level level writes DML reference table: indirect 3 reads, level 3 writes level table: indirect DKL3 reference reads, level level 4 writes MDBS linker utility MLINK overlay for pass MLINK overlay for pass l2 DML renaming. RIW4.REL R2WO.REL. R2WI.REL R2W2.REL R2W3.REL R2W4.REL. 2. R3WO.REL. 4. 3. R3W1.REL R3W2.REL. 2. R3W3.REL R3W4.REL MLINK.COM NILINKI.OVL MLINK2.OVL. utility creates selective DMS runtime module creates entry point table for DMS runtime module link for overriding CP/M disk access. MRENAME.COM MKDMS MKTAB. file. FASTIO.REL. mechanism. link file for disabling CALC link file for disabling real and idec data manipulation real data manipulation link file for disabling idec manipulation link file for disabling date data data manipulation link file for disabling link file for disabling time data manipulation common block definitions for chaining. NOCALC.REL. NOFLOAT.REL NOREAL.REL NOIDEC.REL NODATE.REL. NOTIME.REL COMDEF.REL. SAMPLECI.BAS. sample sample sample sample sample. SAMPLEC2.BAS SAMPLEC3.BAS SPMPLEC4.BAS SAMPLEC5.BAS. program chained chained chained chained. using chaining. module module module module. is not purchased for the RTL form of MDBS and for packages, then some of these files will not be the link files for disabling various MDBS features not always available in all environments, under all releases of are MDBS. license If f!dbs add-on all furnished.All of a. I-2. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc..

(7) .. B.. File Names in CP/M name consists of fully qualified CP/M a drive by file specification.. Fully Qualified A. a. valid CP/M. CP/M. file. optionally prefaced file name consists of from one to eight alphanumeric characters, with an a drive characters. optional extension of up to three alphanumeric If must B, p and be be used, must A, or specification is ..., a by a colon. TRIAL.DDL is a CP/M file name for on followed drive E, then the fully qualified file name is:. name,. If. A. it file. it. :TRIAL.DDL. E. drive specification is omitted from a fully qualified file name, default drive directory is assumed. Note that any file names should be enclosed in double quotes specified in a DDL description a r e (and (" "). extension) name described i n defaults File Chapter IV. a If then. the. C.. Special Keys when Using (ENTER) RETURN CONTROL-X. CONTROL-I ESCAPE CONTROL-P CONTROL-S. CP/M. a. sof tware. output from interactive following a CONTROL-S pause. CONTROL-Q. All be. Software under. line line entry and restarts the input a character causes deletion in the line being input causes a tab character to be placed in the line returns control to the operating system (hard interrupt) causes the proiript of the interactive software to (soft interrupt) appear toggles the interactive software output between and printer the console a in the output from interactive causes pause interrupts line. CONTROL-C. MP/M. MDBS. terminates an input. CONTROL-H. D.. Interactive. causes. software to resume,. Environments. software for use under CP/M (versions 2.2 and later) can also under MP/N. This manual applies equally to FÍP/M and M. MP/M the use of MDBS-IDML cpl or KDBSNote: istoolarge to allow MP/M with QRS with a one user configuration. They can be used under the l-4, aná over multiuser versions of MDBS. MOBS. used. 4. depend on many factors including the extent of an application, the quality of schema design, the host language used, the quality of application program ming, data volume, the hardware used, and the operating system. Due to the directory utilization approaches of CP/K and MP/!4, is generally true that MDBS provides M. DBS. access. speeds. faster access under. it. PI PI PI . than under In certain PI environments, it is possible to override the usual directorymechanism access to achieve substantial increases in MDBS access speeds. here possible, Micro Data Base Systems, Inc. will do the mechanism. work necessary to override this Contact Micro Data Base Systems, Inc. for information about this service and the fees charged for performing this service. C. jyj. M. M. M. M. jq. M. W. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. I-3.

(8) .. Contention Count Time. E.. The command. unit of time used with MP/M for the DMS contention count See the is one clock tick (i.e., 1/50 or 1/60 of a second). command in the MDBS DMS Manual.. MCC. F.. '. The Renaming. Utility. The MRENAME.COM file contains a utility that can be used to change the names of D!4L commands. For instance, you can use this Before invoking this to DBPUTC. utility to changea the name PUTC DM L.R EN) (call containing the changes to be create file utility, Each line of this file begins made. with the name of an existing DML command, followed by a blank space, followed by the new name of the The renaming is DI4L command to be used in your application programs. by accomplished entering the following operating system com mand line:. it. MRENA!4E. DMS. REL. DML.REN. This assumes that DMS.REL and DML.REN are on the default drive. Note T he that MRENAME may take a considerable period of time to execute. Copy D!4S.PHN to a different working output is a file called DMS.PHN. the name DMS.REL. This new DMS.REL is used in place of disk, givng it the DMS.REL supplied on the distribution disk.. I-4. (C). COPYRIGHT. 1981,1982. Micro Data Base Systems,. Inc..

(9) II. A.. INSTALLATION and TESTING. PROCEDURES. Installation. l.. MDBS.. DDL. is installed by simply copying the DDL.COM, DDL2.OVL, and DDL3.OVL DDLI.OVL, files to a working disk. Because MDBS.DDL uses an overlay technique, this working disk must reside on the default drive in order to execute. MDBS.DDL. 2. .. MDBS.. DMS. can be used in either the direct or indirect forms. you intend to use the indirect form, then you need to select one of the fifteen files RlWO, RlWl, ..., R3W4. B shows the Appendix DML commands included on each of these a file fcommands lies. You should select that includes all D ML be used which are to in your application program. This you can specify a file of your own. Alternatively, is created by editing DMSTAB.MAC to eliminate any DML file commands that are not needed by your application program. This edited file must then be assembled by an assembler that The resulting REL file can then be produces REL output. R3W4 o r used in place of RlWO, . . . , in the The file that you choose installation or create procedure. for indirect DML usage will be referred to as RnWm.REL in MDBS.DMS. If. Rlwl,. the following. discussion.. Prior to linking MDBS.DMS and your application program, you need to create a CP/M DMS library called CPFIDFIS.REL. This requires the use of a library manager (e.g., LIB). Create CPMDMS.REL by entering the following operating system command line: LIB. CPMDMS. =. DMS,OSCPM,A,Z/E. This. and Z.REL OSCPM.REL, A.REL, assumes that the DMS.REL, are on the default drive. intend you to use MDBSRTL, the same approach employed, is except use RTL instead of DMS and CPMRTL insteaá of CPMDMS.. files. If. Now copy BASCO!480.REL, LIBASCOM.REL, RnWm.REL, CPMDMS.REL (or CPMRTL.REL) disk. working a to. and. l. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. II-1.

(10) B.. MDBS. Linker. T he. M. linker for selectively application program is on the MLINK.COM, files. MLINK is invoked by: MLINK where. linking. OBS. BASCOM80. pgm. denotes. the. -LCPMDKS. MDBS.DMS with your MLINK1.OVL, and MLINK2.OVL. -LBASLIB. qualified file fully be. (or names) , containing compiled program(s) to linked. more than one is specified, they The linked program is written to a should be separated by spaces. the saíne FI name as the first program file used with MLINK, file havinghas This output file will reside on the a .CO extension. except sanie drive as the first program file. An alternative output file name (and/or drive) can be specified by including -Dalt prior to pgui, where qualified alternative output file name (MLIN k -Oalt alt is the fully The -L option indicates that MLIN k will selectively link pg m .. ..) . needed object modules from the indicated REL. file (e.g., CPFIDMS). As indicated in the following documentation, there are cases where a -KO argument must immediately follow MLINK. pgm. name. If. it. C.. Testing. After the installation of MDBS.DDL and MDBS.DMS, the sample DDL specification and sample application program can be used to test the Two sample application success of the installation procedure. (SAMPLE.BAS). One DML provided. direct invocation are uses programs The other uses the indirect form of DML invocation (SAMPLEI.BAS). e The is recowmend the indirect interface form. direct strongly included only a s a convenience f o r those w h o have developed application programs with 14BASIC and want to use those same programs We do not environment with minimal alterations. in the BASCO mem ory, ore generally recommend the indirect form since it u ses and is not guaranteed to be supported in results in longer programs, the future. W. PI. it). As the following exam ples illustrate, the DBS.DMS differs depending on whether direct or of BASCOM employed and depending on the version M. DTRECT. l.. To. initialize DDL. This. drive. 2. .. To. SAMPLE.. the. BASCOM. II-2. assumes. (C). TN\/OCATTON. sample. data. base,. enter:. DDL. that the DDL. assumes. conípile. This. the. method for utilizing indirect invocation is that you have.. sample. working disk. application. is on the default enter:. program,. =8: SAMPLE/E/C. that. COPYRIGHT. SAMPLE.BAS. 1981,1982. is on drive. B.. Micro Data Base Systems,. Inc..

(11) .. 3. .. For BASCOM versions below MLINK B: SAMPLE For. 5.3. use MLINK. B: BASCOM80. MLINK. versions 5.3 and greater use. BASCOM. MLINK B:. SAMPLE. B :BASCOM80. -LB. follows:. -LB: BASLIB. CPMDMS. -LB:. as. as. follows. -LB :OBSLIB. :CPMDMS. This assumes that you use the /0 switch during compilation. 4. .. To. linked sample application. the. execute. proqram,. enter. :. B: SAMPLE INHIBECT. l. .. To. utilize DDL. the SAMPLE.. This assumes dr ive . 2. .. To. sample. INWCATIQN. data base,. enter:. DDL. working disk. that the DDL. compile the sample application. is on the default enter:. program,. =B : SAMPLEI/E. BASCOM. This assumes that SAMPLEI.BAS is on drive B. 3. .. le,vel of at least 2 and retrieval a write level of at least l, so the file R2Wl is used here. These examples assume that all files to be linked are on The sample. drive For. E4LINK. program. .. a. B.. versions. BASCOM. below. 5.3. use. MLINK. B:SAMPLEI B:LIBASCOM B:R2W1 B: BASCOM80. For BASCOM way except assumes that 4. needs. To. execute. follows:. as. -LB:. CPMDMS. -LB: BASLIB. versions 5.3 and greater use MLINK in the same substitute -LB: OBSLIB for -LB,: BASLIB. This you used the /0 switch during compilation.. the. linked sample application. program,. enter:. B:SAMPLEI. Alternative. D.. MDBS.DMS. Installation. Method. Limitations of the L80 linker do not allow it to support BASCOM There are two alternative DBS. chaining schemes in conjunction with methods One involves creating a installation which do allow chaining. D runtime module. This is described in Appendix C and is recommended because in cases where there is sufficient memory, it and chaining time. saves linking insufficient there is memory for If this method, the approach described in Appendix D should be used. m. M S. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. II-3.

(12) W. This. page. intentionally left blank.. DBS or otherwise accept products not not purchase III software D BS The serial diskette/tape bearing the official colored label. number system the licensee. on the label uniquely identifies If you are approached by a person or organization attempting to illegally distribute MDBS products, please contact Do. M. M. Micro P.O.. Data Base Systems, Inc. 248 Lafayette, IN 47902 (317) 448-1616 TWX8l0-342-1881. We. appreciate your. Box. assistance in preventing software piracy.. Sample. of. MDBS. III. diskette/tape. label: MDBS. g: ::.2::¿.'Ü' Nhcro. -. ;¿. ':-. """". II-4. z,FÉ¥'¿'t':. P.OAOX. 248. ·' -"· · 1AFÁYETTE,ÓN. 47'9©2. III. Z80. Sir@e User. .""'". : · '.. . :7:"""". (C). COPYRIGHT. 1981,1982. :. ·. .. . '. · ". .. '· )í)"·'-)-.')jj,)j)'-'))-'))::j))4i'i'l'j)¿)-j"i¿j^i'¿,',¿j"zj.jjÁiSjF:)bí)))i) ,í¿jjg'ij')),. Micro. .. Data. Base Systems,. Inc..

(13) .. III. The. operating system DDL. where. INVOKING. command. MDBS.DDL. string. fully-qualified-file-name. the fully-qualified-file-name. for executing. omitted, then is ready for. If. a. arguments are optional. the MDBS.DDL program (see interactive usage. fully-qualified-file-name is. specified, then MDBS.DDL is executed on a batch basis The contents of this file must MDBS DDL Manual). For specification. instance, DDL. will cause TRIAL.DDL. TRIAL.. other environment.. (C). COPYRIGHT. (see be a. VI-C of the valid DDL. DDL. MDBS.DDL file on the. The. is:. -Bnnnn. and -Bnnnn. the fully-qualified-file-name is If responds with the :: prompt and vi-a,b of the MDBS DDL Manual).. MDBS.DDL. to analyze the DDL specification default drive.. optional. 1981,1982. argu merit. Micro. Data. (-Bnnnn). can. Base Systems,. be. Inc.. contained in the ignored. in this. III-I.

(14) .. This page. intentionally left blank.. Do not purchase or otherwise accept MDBS products not III software T he DBS diskette/tape bearing the official colored label. serial the system licensee. nú mber on the label uniquely identifies If you are approached by a person or organiz ation attempting to i1le g ally DBS products, please contact distribute M. t4. Micro Data Base Systems, Inc. P.O. Box 248 Lafayette, IN 47902 (317) 448-1616 TWX810-342-1881 We. assistance in preventing software piracy.. appreciate your. Sample. of. MDBS. diskette/tape. III. MOBS. O',,. Sin!µl. A1tr'c' Data Fíasc SÍjstcms, inc. O.BOX. 240. LAFAYETTE,. L ). IN 47902. !. . ,.. COPYRIGHT. Z80. User. :. C. (C). III. " b. O. ÍII-2. label:. 1981,1982. .. COPYRIGHT . ... SERIAL Nñ. 1981 . .. Micro. .-. .. ' ,', " .- ' ",-. ' - . . .. .. -.. . ·.. ' -... Data Base Systems,. ,. .'. -. '. i ,. ¿;.¿ ' ' '.' '.' ' "'· :" : . J" · ".. Inc..

(15) .. IV. a.. File. name. OPERATING. defaults. SYSTEM. for. DEPENDENT. DDL. DEFAULTS. areas. in the specified for the main area main DL area is specification, then the identification base. assigned the a This same name as the data to file file having is not specified for an will have a .DB extension. If a filea name D D L specification, then that area defined in the area section of assigned having a This area is the same name as the area. to file file will have a .DBA extension. The default file names will be in upper case.. If. B.. a. name filesection. is not. of. D. a. File extension defaults. a specifieá without If fileused.nameTheis default extension extensions. is. for a main area file for an extra area file for a file written by MDBS.DDL for RCV scratch files for a page image file for a transaction log file for QRS WRITE or SPEW files the end. In order to suppress. qualifieá file. name. should. C.. area. default. Pages. per. the number of pages. . .. an. extention. are:. D.. is for. Page. default. DB. dba .DDL. $ $$ . PIF . LOG .. .TXT. default extension for with a decimal point.. If then the default specification, both the main default. a. a. file, the fully. an area is not stated in value of 50 pages is used. area and any extra areas.. for. a. DDL. This. size default. I f t h e page siz. area i s n o t stated i n a D D L specification, then the default value of 512 bytes per page is used. This default is for both the main area and any extra areas. E.. page. size. COPYRIGHT. an. restrictions. The minimum. (C). fo r. e. page. 1981,1982. size for any area is 256 bytes.. Micro. Data. Base Systems,. Inc.. IV-l.

(16) .. This page. intentionally left blank.. Do not purchase or otherwise accept !4DBS products not III software DBS T he diskette/tape bearing the official colored label. serial mber system identifies uniquely licensee. on the label the nú If you or organiz ation attempting are approached by a person to illegally distribute FIDBS products, please contact M. Micro Data Base Systems, Inc. P.O. Box 248 Lafayette, IN 47 902 (317) 448-1616 TwX8l0-342-l881 We. appreciate your assistance in preventing software piracy. Sample. of. diskette/tape. III. MDBS. label: MDBS. '. SÚstcnw. P.O.DOX. 248. ~. :.±. °"'""":. lñtcro. .. " '· "'. IN 47902. '. '. .. ". .-. ©COPYRIGHT ,. IV-2. (C). . .. .,- ,.. .. COPYRIGHT. .. Z80. User. .. 1981,1982. -. .. Micro. .,'·. ".. ,. ,. '. '. , .. Data. ' '. '"'. · ·¿,.'. . -. " "L": ' · " " yW.. " -.··mt:!:" ,, . , i '." ' "'" ' "y · ·4t "" ' : · · :., ,: . , . i"~' '", -- ^^ 1.» · ' , ' ' "'"" ·" "" """"Y? .. ,. - .. ' :'.",. ..:,.;, ". ¿: .' :. '. ". -- ·-,.. .. ·) .-:. :) t. ... . . . " O' ',".' - , ,. ,' , , ~ . ". · : ' 4' ': <"' r'. . ., . SERLÁ"NO. 1981. ,,";.7 gT; , ,:" " "u r '. - , , .' . · . .-. ,,,, -' ":-'J;"j. ,,. '. ". . ·-. ... n. LAFAYETTE,. III. "'. -.. ':. -. r.·.¿.-,3'Q,,4"j"-: :."'" :. Base Systems,. jj. Inc.. ¿¿f;".

(17) .. DATA. V.. ITEM. -. HOST. LANGUAGE. VARIABLE. CORRESPONDENCE. that This chapter shows the type, size, and value correspondences Correct usage of exist between MDBS data items and BASCOM variables. DML a knowledge of these create, put, and get commands depends on FMSK) correspondences. Other DML commands (e.g., also require input from a BASCOM variable, where the variable must be consistent with a data item of a particular and type size. Non—numeric. A.. MOBS. PÁt.á. tYpé. I¶JB,S. Data. Items 8A8CñM BASCOM t.Ypé. Ttmn si ze. MDB,S. \/ÁrjÁh1e Si7e. BASCOM. binary. n. string(e.q.[A$). n. character. n. string. n. strinC. n. string. date. -. string. 10. time. -. string. 9. B.. Integer Data Items. The host languaCe with various variables that are consistent sizes of an integer data item are presented This table in Table V-l. also shows the mappings of data values from BASCOM variables into integer data items during data storage (e.g., CRS, PFM, e t C.) . mappings the of data values from integer data items to Similarly, corresponding BASCOM variables during data retrieval (e.g., GFM) are shown.. example, when storing a data value from a BASCOM integer a one byte integer data item, the value must be in the variable into 127. Any other value for the BASCOM integer variable range -128 to be permitted and the DML command that attempts to store such not will a value return a command status of 33. When retrieving a data will data value f rom a three byte integer item into a BASCOM integer value in the range -32768 to 32767 i s variable, an theappropriate BASCOM the stored value is outside of deposited in variable. If BASCOM be then the the contents of range, variable this As a third example, suppose undefined. we want to store the value 32700 into a four byte integer áata item. This is accomplished with a BASCOM command a that uses integer variable having the value put As an. will. 32700. (C). .. COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. v-l.

(18) Y. <I hj. Table. v-l.. Integer Correspondences ,. C). C) C). 'ri t< m FA GJ. = R. ~ 2. MDBS. BASCOM. . Data. Item. ID. % }—'. ID. CD. BASCOM KDBS. type. MOBS. O PI O. U. Cij. rr m. m Rj tn O en. "< cn. rr (D ?9 U) + 1-l ES O 0. BASCOM. type. size. Scurce: variable. . iñf. 1. integer. k.m,. -32768. m. -128. to. reinge. to. , undefined -128 to undefined. -129 127. to. Y?767. -32768. to. 32767. -32768. to. 327G7. 128. Retriev:. Data. Target: data itÉfñ ranjaµ. ·. integer. kj is.. Stcn:. . yarl8b]e. ' 2. integer. inteEer. .. n>2. integer (e.g.,. -128 to. 127. Dat.íí TaréSet:. ariabje. EASCOM. -128. to. "2768 ". to. range. 127. 127 .. 32767. CJ2768. ta. !R767. £P768 to. -32768. to. 32767. .<. Eo. -32769. >. 32768. J2767. U). ". integer (e.g.,. Source: data item ran£e. mg. ít%). .. -32768. 32767. undefined to Y?767 undefined. -32768. '.

(19) P. C.. Unsigned. Data. Items. host languaqe variables that are consistent with various sizes of an unsigned data item are presented in Table V-2. This table also shows the mappings of data values from BASCOM variables into unsigned data items during data storage (e.g., CRS, PUTM, et C.) . mappings of data values from unsigned data items to Similarly, theBASCOM corresponding variables during data retrieval (e.g., GETM) are The. shown.. example, when storing a data value from BASCOM integer variable into a one byte unsigned data item, the value must be in the the valúe is in the range 256 to 65535 or the range 0 to 255. -32768 not be permitted and the DML command that range to -l, will attempts to store such a value will return a command status of 33. When the value 65534 from a 3 byte unsigned data item into retrieving BASCOM a integer variable, the value -2 is deposited into the BASCOM As a third example, suppose we want to store the value variable. 32770 into a two byte unsigned data item. with a This is accomplished BASCOM command a having uses integer the value put that variable -32766. As an. If. D.. Internal. it. Decimal. Data. Items. host language variables with various that are consistent sizes of an idec data item are presented in Table V-3. This table also shows the largest relative error that can occur when storing data into various sizes of idec data items and when retrieving data from various sizes of idec data items. The. When storing data values into an idec data item, there is no When potential for overflow. retrieving data from an idec data item whose size does not exceed eight digits (i.e., n S 8), overflow occurs value greater than f t h e stored data ,value has an absolute il70l4ll783898668308l8769697729071284224. When from an retrieving data 8), overflow idec data item whose size exceeds eight digits (i.e., n the stored data value has an absolute value greater than occurs >. if. 1701411783898668308l8769697729071284224. There the. primary. interfaces bases. data. (C). COPYRIGHT. is. little. incentive to use internal decimal data items when host languages are BASCOM and FORTRAN. Internal decimal permit communication are present to {through BASCOM) to that are also used with host languages such as COBOL.. 1981,1982. Micro. Data. Base Systems,. Inc.. V-3.

(20) .. <I BÉ·. V-2. Table. Correspondences. Unsigned. .. C). n. O 'U. K m. ,. H G]. = R BASCOM. t:. MOBS. Data. Storing. Variable. Item. L. KDBS. #. O. 7 E3 cu. type. MOBS. si. -32768. unUgned. I. unsigned. 2. integer (e .g. ,. O Aft). 256. to to to. Hrget: data item renge. range. Source: data item ráñ€é. undef jned 255 O to undef ined. -1 255 32767. O. to. O. to to. Da!?_. EASCCM. 255. Target: variable C'. to. O. to to. rang;e. 255. ' '. umSgned. integer (e.g., integer (e.g. ,.. n>2. g UJ Rj U) (D. EASCOM. type. ze. '. tO. X F^. Source: variable. BASCCM. ~. Retrje.yd-nE. Data. CD. '. -32768. m. O. to to. 32767. O. to to. 32767. -32768 A¶ i. 32K8 to O to. -1. 32168. -1. O. to to. 65535 Y?767. : 27(58. 65535 32767. O 32768. to to >. l. '. 32767 65535. -32768. 32767, 65535 65536. 32767 -1. to 32767 -1 to undefined O. -32768. e. UJ. '< en. rr (D El en % p-f :J Cl D r.

(21) Table. MDBS. MDBS. Item. Data. type. V-3.. BASCOM. size. MOBS. BASCOM. Internal. Decimal. StorinR. Variable type. Correspondences. RetrievinÁ. Data. Largest Relative. Data. Error Largest Relative. Error. l()"¿j. idec. 1. or. 2. single precision (e.p>, A!). 5.000. * l0"3. 2.980. *. idec. 3. or. 4. single. precision. 5.000. *. IQ"S. 2.980. * I0"8. idec. 5. or. 6. single. precision. 5.000. *. 10"7. 2.980. * 10"8. idec. 7. or. 8. single preci6ion. 5.000. * l0"9. 2.980. *. idec. 9. or. IQ. double precision (e.p>, A#). 5.000. *. l()"il. 6.94 * 10_l8. idec. li. or. 12. double precision. 5.000 *. l0"l3. 6.94 * 1()_i8. uN. _2[rl+l) · í.dec. n. >. 12. 2. 10. . . double precIsIon. 6.94 * l0-18. 2. ,. E.. Real. Data. Items. The. host language variables that are consistent with various of a real data item are presented in Table V-4. This table shows the largest relative error that can occur when storing data into various sizes of real data items and when retrieving data from various sizes of real data items. sizes. Table IV also shows the overflow potential when storing and retrieving data. For instance, an attempt to store 1.85 * l038 into a three byte real data item will result in an undefined value for that data item value.. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. V-5.

(22) t m. Table. V-4.. Real. Correspondences. BASCOM MOBS. — C). Data. Item. Variable. — BASCCM. C). O 'U ·<. MOBS. type. size. MOBS. Z. Gj EC. real. 2. real. 3. real. 4. real. 5. real. 6. real. 7. H. ~ 'd. OD F-'. L. cd CD. type single precision (e.g. A!) single precision single precision. StorinR Absolute Value Beyond. Overflow. Which Occurs. 1.698 * j¿38 1.701. no. * j¿38. overflow. RetrievinR AbBolute Value. Data. Beyond. Largest Relative. Error Overflow. Which Occurs. Data. Largest Relative. * l0"3. no. overflow. O. 7.629 * l0"6. no. overflow. O. no. overflow. O. no. overflow. O. no. overflow. O. no. overflow. O. 1.953. O. Error. bj. X H" Cl m O. tj. double precision (e.g. All) double precision. 1.701. * j¿38. 1.164 * l()"i0. 1,701. * j¿38. 4.549 *. 1.701. * j¿38. 1.770 * lQ"i5. 1Q"i3. A). rr. Cl). tjj. ". A) en (d en. double precision. real. 8. real. >8. double precision. no. overflow. O. no. double precision. no. overflow. O. 1.701. overflow. O. '< m ,1(d. a U) % F-l :J CJ 0. *. jG38. 6,94 * lQ"i8.

(23) .. .. F.. Repeating Data Items When. storing data into or retrieving data from a repeating data item, array is used. The appropriate kind of array for each data item type and size is shown below, where represents the number DDL data the specification (with of replications defined for item in Here, A is the host language array being used for an occurs clause). storage or retrieval. This assumes that all array subscripting begins at 0 (not l) . a. BASCOM. m. Repeating (TJl. HPBS. Data. rep1i.cAtions) tYPé. Form of. Size. MD13,S. the BASCOM A ArrA.Y". binary. n. DIM. A$(m-l). character. n. DIM. A$(m-l). string. n. DIM. A$(m-l). date. -. DIM. A$(m-l). DIM. A$(rrt-l). integer. n. DIE A%(rü-l). unsigned. n. DIM. A%(m-l). dim. A!(m-l). time. (C). Item. idec idec. n=l,2,...,or 9 n. real real. n=2,3,or4. COPYRIGHT. 8. 2:. n. t. DIP! DIM. 5. 1981,1982. Variable. A#(m-l). A!(m-l). DIE A#{m-l). Micro. Data. Base Systems,. Inc.. V-7.

(24) .. This page intentionally. left. blank.. not purchase or otherwise accept MOBS software products not bearing the official colored MDBS diskette/tape label. The serial number on the label uniquely identifies the system licensee. If you are approached by a person or organization attempting to illegally distribute MDBS products, please contact Do. III. Micro Data Base Systems, Inc. P.O. Box 248 Lafayette, IN 47 902 (317) 448-1616 TWX8l0-342-188l We. appreciate your. assistance in preventing software piracy.. Sample. of. MDBS. III. diskette/tape. label: III. MDBS. Z80. Sir@e User. Ailtcro Data Fiasc Su5lcm5, inc.. i. }. '. :. . l . , ,. . P.O.BOX. 24$. LAFAYET¶E,6N. 47902. '. ' ". .. .. ':. "-. .. , ,. ,. V-8. . . - . . .. .,, " . . ... (C). . . .. . ,. . , .. . , . . , - , , ,,. .. .. . . . .. . .. ... ., . , . ., : ".. ." 'T ' ' "' .: A. m ' "' ":" ' -',"j; :"'"- '·"-. - .·. "r ' ' ,","."'.y ,, , . .,. ). '. . - ". '. . .". ·' ". :. " '. .'-". ". -,. ' , "' '. 1·. " '- '" ". "".·.-' '..".: ©COPYRIGHT 1981 -" ' ' NO "" -," SERIAL :", -: -",-,.'",<':í'j^'"6> 'i.f>.7í . b·. '"- · . ..· .- : ' C" A ·,' f · . . , . . .. . s . ¥' . ., , \k,e, , , , , ' ' K' '-' : :7'."" '"" ..' " C.' :¿t..-, ' 4-.t '" " " " _T. · · '"7. . :" " - ., ·' .. T, · · . .,·. ., r,1'- · n., . ; ',",-,,¥¢{.,. . ; a ,A. ' j"· }",", t ' ' ·.· -.: ' ' . ··.,' ' I ·" ·- ' ' .X · .. , - - · . , "' « ^N,,." , . t .. COPYRIGHT. 1981,1982. Micro Data Base Systems,. Inc.. -"1.

(25) .. Running. A.. The. of that. an. VI.. CONTROL. Application. Program. PROCEDURES. following steps are used to control the selective interfacing They assume routines with a BASCOM application program. (or CPMRTL) has been created as described in Chapter II.. MDBS.DMS CPMDMS. l.. Create. indirect indirect. Compile. the. form your. direct. in the usual. program PRG. PRG. is the. Selectively. file. MLINK. the. containing. BASCOM. instance,. program. source. also assumes that this disk is on the. It. PTPF,CT BASCOM. For. manner.. link your compiled program and MDBS.DMS This assumes that all files to be linked are on. together. the working disk. default drive. For. using either the direct or program form Gee Chapter VII). we strongly Continuing support of the form.. is not guaranteed.. BASCOM. where code. 3.. command. DML. recommend 2.. application. your. versions PRG. TN\/OCF\.TTON. below 5.3 use. BASCOM80. -LCPFIDMS. MLINK. as. follows:. -LBASLIB. For BASCOM versions 5.3 and greater, compile with the /0 switch and use the same MLINK line except -LOBSLIB replaces -LBASLIB.. TNPTPECT. For. BASCOM. MLINK. TN\/ncA.TTc)N. versions below PRG. LIBASCOM. 5.3. RnWm. uqe. MLINK. BASCOM80. as. follows:. -LCPMDMS. -LBASLIB. versions 5.3 and greater, compile with the /0 switch and use the same MLINK line except -LOBSLIB replaces. For. BASCOM. -LBASLIB. 4.. Execute. the. linked program:. PRG. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. VI-l.

(26) Special Link Files. B.. Special. link files are provided which These situations.. can be used to optimize NOFLOAT, are FASTIO, NOCALC, NOIDEC, NOREAL, NODATE, and NOTIME. These are not always available in Those environments under releases of !4DBS. which are be FASTIO is can linked with the available application program. desired, you should create CPMDMS with the command line performance. in certain. all. all. CPMDMS. LIB. =. If. DMS,FASTIO,OSCPM,A,Z/E. NOCALC instead of the command line shown in Chapter II. is If NOCALC by desired, then is linked immediately prior to inserting BASCCN80 in the MLINK command line. If you desire to link any of the name(s) other special files, then insert the to BASCOM80 prior ,an9 use -LBASCOM80 BASCOM80 the command MLINK in place of on line.. it. file. of the special link files (except FASTIO) disables certain features. you invoke a DML command that attempts to process a If then a command status of 34 results. disabled feature, Each. MDBS. FASTIO is linked If use conventional. in, then the data base control system will disk access facilities. Instead, a faster not FCBS mechanism disk I/O incorporating buffering of is used. Due to FASTIO various environments' peculiarities, is not guaranteed to in all possible CP/Fl and "Cp/M-like" function or improve performance environments. Its main advantage is realized with version 2.2 CP/M. NOCALC is linked in, then manipulation of calc records is If This can save space (typically about 650 bytes), prohibited. NOCALC processing. is very valuable when calc resulting in faster used. CP/PI. records are not. linked in, the manipulation of real and idec data This can save space (typically about 1150 bytes) NOFLOAT and results in faster processing. is valuable when no idec or real data item processing is needed. NOFLOAT is If items is prohibited.. is linked in, the manipulation of real data items is may This save space, resulting in faster processing. prohibited. NOREAL is valuable when no real data iteirí processing is needed.. If. NOREAL. is linked in, the manipulation of idec data items is rcíay This save space, resulting in faster processing. prohibited. NOIDEC is valuable when no idec data item processing is needed.. If. '. NOIDEC. is linked in, the manipulation of date data items is This can save space (typically about 450 bytes), resulting in faster processing. NODATE is valuable when no date data iteni processing is needed.. If prohibited.. NODATE. NOTIME is linked in, If prohibited. This can save. results in faster processing. needed. item processing is. VI-2. (C). COPYRIGHT. the manipulation. of time data items. is. space (typically about 170 bytes) NOTIME is valuable when no time. data. 1981,1982. Inc.. Micro Data Base Systems,. and.

(27) .. for Chaining. C.. Alternative. used,. the alternative installation method described If rather than the above methods, then the. Control Procedures. procedure is used' for running an application. l.. Create form.. 2.. Compile. your. application. the. 3.. Now. following control. using. the. direct For. DML. command. instance,. =PRG/E/C. file. containing. resolve unsatisfied. externals. PRG. is. C. program.. in the usual manner.. program. BASCOM. where code.. program. in Appendix. is the. the as. BASCOM. program. source. follows:. L80 PRG,DMS700O,PRG/N/E 4.. DMS700O.COM, Run the program by executing previously linked program PRG as an argument. DMS7000. used,. Ifthenthe. (C). COPYRIGHT. using. PRG. alternative in Appendix installation method described D applies. procedure Appendix described control in. the. 1981,1982. the. Micro. Data. Base Systems,. Inc.. D. is. VI-3.

(28) r. This page. intentionally left blank.. software products not not purchase or otherwise accept MDBS MDBS colored bearing the official diskette/tape label. The serial number on the label uniquely identifies the system licensee. If you a person or organization by approached attempting to are illegally distribute MDBS products, please contact Do. III. Micro Data Base Systems, Inc. P.O. Box 248 Lafayette, IN 47902 (317) 448-1616 TWX8l0-342-l881 we. appreciate your assistance in preventing software piracy. Sample. 0, VI-4. of. MDBS. III. diskette/tape. label:. III smµu=. MDBS. é: .O.BOX. 'i:'b::& 248. . ,.. LAFAYET¶E.)N47902. - ,. .. Z80. f ). :.·-,' '. "". O C. COPYRIGHT1981. ·. (C). COPYRIGHT. 1981,1982. l. "" r :. '""SERIALNO .·'.: ... - ". ·,.... .. ..,.. Micro Data Base Systems,. .. . , .. .".. Inc.. .,. . .'.

(29) .. VII.. DML. COMMAND. FORM. language that permits áíres: or is a k1sz: ck oriented DML (see commands the block/direct of or in9Lteck invocation example for each DF4L command in the MDBS DbíS Manual). block/indirect The precise calling f orms for both direct and indirect DML usage are A and are illustrated in the examples below. presented in Appendix since Exclusive use of the direct approach is recommended, is easier to use. The indirect is provided solely for compatability itwith interpretive BASIC (MBASIC), which does not support direct invocation. There is no guarantee of continuing support for the indirect approach.. t. BASCOM. A.. Command. The B.. Status status variable must be. command. Special. this. integer variable.. Commands. The VARCS, used.. an. VARCMD,. environment.. The. SETPBF EXTEND,. and DEFINE commands are commands and ALTEOS. UNDEF. required in can also be. The £íKSt DML command used in any application program must be the command status variable is named E0%, VARCS. For instance, DML command is then the. if. first. CALL. (E0%). VARCS. The. secon,d dml command used in any application program must be argument This command is peculiar to MBASIC and BASCOM. Its When a command a CMD$). DKL host languaqe string variable (e.g., is {other than VARCS, VARC}!D, DEFINE, EXTEND, UNDEFINE, aná SETPBF) is invoked, string. Fo r i t uses the value of CMD$ as its coníniand CMD$: instance, to declare the command string variable. VARCMD.. CALL. As. buffers. VARCMD an. example. as. follows:. DIM. n. CALL. (CMD$). DMSBUFFER% =. of. 4096. SETPBF,. bytes can be allocated. for program. (2047). 4096 SETPBF. (DMSBUFFERE. (O) ,1%). Since 0, the. integers are two bytes and DMSBUFFER% subscripting begins with dimension of DMSBUFFER% is declared to be half of the desired minus buffer size l. Suppose that we want to create a data block called BLK, The following of the two variables VAR1% and VAR2%. consisting examples show how to accomplish the and direct this in indirect forms.. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. VII-I.

(30) k. PTPFCT. TNPTPFCT. X$="BLK" :X%=2 CALL DEFINE (X$,X% To. extend. ,VAR1€. to include another. BLK. X$="DEFINE,BLK": XE=2 CALL DMSD(E0E,X$,X%,VARI%,VAR2%). ,VAR2%). variable. DTPFCT. To. :X%=l EXTEND (X$,X%. undefine. all. data. X$="EXTEND,BLK": X%=1 CALL DMSD(E0€,X$,X%,VAR3%). ,VAR3E). blocks:. PTPECT CALL. We. error. TNDTPECT. X$="UNIJEF" CALL DMSD(E0%,X$). UNDEF. recommend. checking. to. using. ALTEOS. because. ALTEOS,. has. -l.. message. the effect. simplif les ofit changing the. DTBFCT CALL. CMD$="ALTEOS". ALTEOS. Open and Close. Command. TNPTPF,CT. X$="OBLK": X%=4 CALL DEFINE(X$,X%,DBU$,DBP$,DBO$,DBF$). X$="DEFINE,OBLK" :X%=4 CALL DMSD(E0%,X$,X%,DBU$,DBP$, DBO$,DBF$). 0. 0. *. 0 0. e. CMD$="OBLK". CMD$="DBOPN,QBLK". CALL. CALL. DBOPN. 6. 0. 0. 0. DMS. 0. 0. CMD$="DBCLS". DBCLS. CALL. VII-2. DMS. Examples. DTPFCT. CALL. command status 255 end-of-set. TNDTPECT. CALL. C3. :. TNDTRECT. X$="BLK" CALL. (VAR3%). (C). COPYRIGHT. 1981,1982. DMS. Micro. Data. Base Systems,. Inc..

(31) d.. E'ind. Command. Examples TNpTpFicT. DTFFCT. X$="DEFINE,BLK" :x%=l CALL DMSD(E0%,X$,X%,VAR%). X$="BLK" :x%=l CALL DEFINE (X$,X%,VAR%) 0. 0. 0. e. e. Here,. 0. CMD$="SET1,BLK". CMD$="FMSK,SET1,BLK". CALL. CALL. FMSK. SETI. specification. E.. Get. is the. and. put. name. Command. of. a. set. that. has. specified in. 0. DDL. X$="DEFINE,BLK": X%=1 DMSD(E0% CALL ,X$,X%,VAR!) ,. 0. 0 *. 0. 0. CMD$="YTDEARN,. BLK". CMD$="GFC,. GFC. CALL. VAR!=VAR!+1029.00. TKPOPTPNT. NOTFK. taken to character. YTDEARN,BLK". DMS. VAR!=VAR!+1029.00 CMD$= "PFC, YTDEARN,BLK". PFC. CALL. When. DMS. using Get or Put commands, care should be any program variable that corresponds to a The length of each such variable should be maximum e n th e DDL length declared. initialize data item. initialized to t hthe. corresponding data item. specification for observe this rule yields a command status error of. (C). a. TNPTPFCT. X$="BLK" :x%=l CALL DEFINE (X$,X%,VAR!). CALL. been. Examples. DTPFCT. CALL. DMS. COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. i. 33.. Failure t o. VII-3.

(32) P. F.. Assignment. Command. Examples. PTRECT. TNPTPF,CT. X$="BLK": X%=1 CALL DEFINE(X$,X%,VAR%). X$="DEFINE,BLK": X%=1 CALL DMSD(EOE,X$,X%,VAR%). 0 *. e. 0. 0. VAR%=3. VAR%=3. CMD$="SET1,BLK". CI4D$="SE!U,SETI,BLK". CALL. CALL. SMU. 0. 0. 0. 0. 0. 0. CMD$="SET1,SET2". CMD$="SETI,SET2". CALL. CALL. SOM. Here, SETI and SET2 are names of sets DDL specification. G.. DNIS. Utility. DMS. that. specified in. a. TNPTRFCT. X$="BLKI": Y$="BLK2":X%=1 CALL DEFINE(X$,X%,VA.RE) CALL DEFINE(YS,X%,VAR$). X$="DEFINE,BLK1" Y$="DEFINE,BLK2":. 0. 0. 0. P. CMD$="SETI,BLK1". X%=I. DMSD(EO%,X$,X%,VAR%). CALL CALL. .. DMSD(EO%,Y$,X€,VAR$). .. CMD$="GMC,SET1,BLKI". GHC. CALL. . 0. 0. 0. 0. CMD$="SET3,BLK2" CALL. been. Co~and Examples PTPFCT. CALL. have. DMS. e. CMD$="GTM,SET3,BLK2". GTK. CALL. . P. 0. 0. 0. CMD$="SALEMP,POSSESS" CALL TOT. DMS. e. CMD$="TC)T,SALEMP,POSSESS" CALL. DMS. of sets that have been specification. specified in in Table V-2, VAR% must be 4 a integer (i.e., consistent with byte unsigned data item). Notice that RNAMS is character, since GTM requires a variable consistent with The record type name returned by GTÉ4 an 8 byte character data item. be in upper case, with blank (this same convention also will holds for GTO, GTC).. Here,. SETI,. SET3. a. and. POSSESS. DDL. are names shown. As. fill. FI.. Chaining Immediately. VII-4. prior to chaining, (C). COPYRIGHT. DBSAVE. 1981,1982. should. be. invoked.. Micro Data Base Systems,. Inc..

(33) ,. VIII. MDBS. be A.. invoked. add-on packages as follows:. INTERACTIVE are. PACKAGES. ADD-ON. provided on. COM. files.. The packages. can. KDBS-CNV. To. operating. invoke. the. interactive line is. command. system. MDBS.CNV. program,. used:. th e. following. CNV. B.. MDBS-IDML. Before using IDML, be sure that the working disk on the default drive: IDML2.OVL, IDMLI.OVL, IDML7 .OVL, IDML8. OVL. IDML.COM, IDML6. OVL,. Omitting. IDML3.OVL. has. command. To. operating. invoke. the. system. the. IDML3.OVL,. IDML4.OVL,. effect of disabling the. interactive line is. command. following files reside. MDBS.IDML used:. program,. a. IDML5.OVL,. IDML. the. on. DEFINE. following. IDML The. user can optionally specify the name of an alternative startup The default -B parameter on this command line. file and/or the have an STARTUP. the name: alternative (see startup file must If must be name is used on the command line, fully qualified must be followed by the number I-B) . If the -B parameter is used, of bytes being allocated. This number should exceed the minimum DMS by MDBS.DDL buffer reqion size displayed during data base MDBS DDL (VI-B-4 of the Manual). For example, to use initialization the startup information on the and allocate 2560 bytes, START.IDM file the operating system command line is:. file. it it. IDML. If. START.. IDBÍ. -B2560. status of 31 results, then the number of bytes should increased. If an IDML error of insufficient room in memory results then the number of bytes should be reduced. with the -B option, a DMS. command. be. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. VIII-I.

(34) IDML has been configured with MDBS-RTL, a log If file qualified) can be optionally specified on the command For. parameter. LOG.. SUB,. IDML. START.. instance,. IDM. -B256. 0. to execute IDML with -RLOG.. a. line with. file. log. If. a. command. switching floppy disks to change on-line areas, switch the disks, press control-C and re-enter IDML.. When. C.. (fully. a -R named. SUB. a log would be used. from file name is omitted assumed. log file name in the ddl specification is. IDML,. name. line, the exit front. KDBS-QRS. Before using QRS, be sure that the working disk on the default drive: QRS.COM,. QRS0.OVL,. QRS5.OVL,. QRS6.OVL,. Omitting. QRS3. .OVL has. QRSI.OVL, QRS7.OVL,. the effect. following files reside. QRS2.OVL, QRS8.OVL,. a. QRS3.OVL, QRS4.OVL, QRS10.OVL. QRS9.OVL,. of disabling. To invoke the interactive MDBS.QRS operating system command line is used:. on. the. DEFINE. program,. command.. the. following. QRS. The. user can optionally specify the name of an alternative startup The default -B parameter on this command line. file and/or the have an must STARTUP. the name: alternative startup If must be (see name is used on the command line, qualified fully be used, by number -B parameter must is I-B) followed the If the This number should exceed the minimum DF'ÍS of bytes being allocated. by MDBS.DDL during data base buffer region size displayed MDBS DDL For Manual). example, to use (VI-B-4 of the initialization and allocate 2560 bytes, the startup information on the file START.QRS the operating system command line is:. file. .. QRS. file. it it. -B256. START.QRS. 0. status of 31 results, then the number of bytes should a QRS increased. error of insufficient room in memory results If with the -B option, then the number of bytes should be reduced.. If be. a DMS. command. PEW command generated by the i n this 1.07 and format of (version SuperCalc file used, the file name specified with the FN is greater). When SPEW .CAL have the extension so that can be immediately parameter should used as input to SuperCalc.. special format environment is the .CAL The. S. it. VIII-2. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc..

(35) qualified fullywith file name(seemustI-B).be the FN parameter file name must be in quotes (either. A. command and used, the. used When. with. the. the. READ. single or double). switching floppy disks to change on-line areas, disks, press control-C, and re-enter QRS.. When swich D.. QRS. READ. command. is. .. exit. QRS,. MDBS-DMU. invoke. To. the. operating system. interactive line is. command. MDBS.DMU. used:. program,. the. following. DMU. E.. MDBS-RCV A. log. qualified MDBS.RCV. file file. with the RTL form of MDBS must be a fully within CP/M (see I-B). To invoke the interactive the following operating system command line is used:. used. name. program,. RCV. Ee. sjlke Lq wake The. (C). all. log buffer. COPYRIGHT. nece5sÁrY. h(%cP|1pq. before using. RCV.. size in this environment is 128 bytes.. 1981,1982. Micro. Data. Base Systems,. Inc.. VIII-3.

(36) intentionally left blank.. This page. software products not not purchase or otherwise accept MDBS bearing the official colored MDBS diskette/tape label. The serial number on the label uniquely identif les the system licensee. If you attempting to illegally are approached by a person or organization distribute MDBS products, please contact Do. III. Micro Data Base Systems, Inc. P. O. Box 248 Lafayette, IN 47 902 Twx810-342-188l (317) 448-1616 We. aÉereci&te your. assistance in prever'.ting. Sample . ,. '-"" ·'"-. -. "". Y -' "2"" .· " , -. of "'". " .: g - " '. MDBS e -' i -. ·'. .. '". ". :. diskette/tape. "" ""' """ ·, "- ';t " ".""' 4"' -. 'i" -. ' -. III ". '. software piracy.. -,.'. ·-. > -' .'. .. label:. .*"%".W'"k"+\';"9'", &Ü<" " " ,,' , · x ' . ':- - N7 , +€ ' ,. p.o.box. 248. lafayetie,in. g. ;. .' ,' . 7.¿€',.".:k ',' :.'"-'"": .' :'"- ' .- r: 3' "y, .". : '" ., . · ' - ci: . :. . .. , """ , ." Z80. -'.-' 1Z"ÁDBS III ;j"jj ':',j,' ,i sm· U·ek .. ':. Micro Data fiase .Gy: ñcms, inc.. :- ·. '. ·. t'. .. 47902. I .. ©copyright1981 ,. VIII-4. .. .. serial. Nñ. .. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc..

(37) .. Appendix. ptpfct CALL. A. TNvCr7'TTnN. CMD$="SET". ALTEOS. CALL. DRM. CMD$="SETI,SET2,SET3" CALL. CMD$="SET". AMM. CALL. DRO. CMD$="SETI,SET2,SET3" CALL. X$="BLK": x%=n. AMO. CALL. CMD$="SETI,SET2,SET3" CALL. EXTEND(X$,X%,vl,...,vn). CMD$="RECORD,BLK". AOM. CALL. FDRK. CMD$="SET1,SET2,SET3" CALL. CMD$="SET". AOO. CALL. CMD$="BLK" CALL AUI. FFM. CMD$="SET" CALL. FFO. CMD$="BLK" CALL. CMD$="AREA" CALI FFS. CCU. CMD$="RECORD,AREA,BLK" CALL. CMD$="SET". CRA. CALL. FLM. CMD$="RECORD,BLK" CALL. CRS. CALL. DBCLS. CMD$="SET" CALL. FLO. CMD$="ITEM,SET,BLK" CALL FMI. CMD$="AREA" CALL DBCLSA. CMD$="SET,BLK" CMD$="BLK" CALL. CALL. FMSK. DBENV. CMD$="SET" CMD$="BLK" €ALL DBOPN. CALL. FNM. CMD$="ITEM,SET,BLK" CMD$="AREA,BLK" CALL. DBOPNA. CALL. DBSAVE. CALL. FNMI. ". CMD$="SET,BLK" CALL. FNMSK. CMD$="BLK". CMD$="SET". CALL. CALL. DBSTAT. X$="BLK": x%=n. FNO. CMD$="ITEM,SET,BLK". CALL. DEFINE(X$,X%,vl,...,vn). CALL. CALL. DRC. CMD$="SET,BLK" CALL. (c). copyright. 1981,1982. Micro. Data. FNOI. FNOSK. Base Systems,. Inc.. A-l.

(38) CMD$="AREA" CALL FNS. CMD$="SET" CALL lOS. CMD$="ITEM,SET,BLK" CALL FOl. CALL. LGCPLX. CALL. LGENDX. CMD$="SET,BLK" CALL. FOSK. CMD$="BLK" CALL LGFILE. CMD$="SET" CALL. FPM. CALL. LGFLSH. CMD$="SET". CMD$="BLK". CALL. FPO. CALL. CMD$="RECORD,BLK" CALL FRK. CALL. LGMSG. CMD$="BLK" MAU. CMD$="BLK". CMD$="BLK". CALL. GETC. CALL. MCC. CMD$="SET,BLK". CALL. MCF. CALL. MCP. CALL. GETM. CMD$="SET,BLK" CALL. CMD$="RECORD". GETO. CALL. MRTF. CMD$="ITEN!,BLK" CALL. CMD$="RECORD". GFC. CALL. MRTP. CMD$="ITENI,SET,BLK" CALL. CMD$="SET". GFK. CALL. MSF. CMD$="ITEM,SET,BLK" CALL. CMD$="SET". GFO. CALL. MSP. CALL. NCI. CMD$="SET,BLK" CALL. GMC. CMD$="SET,BLK". CMD$="ITEM,BLK". CALL. CALL. GOC. PFC. CMD$="BLK". CMD$="ITEN1,SET,BLK". CALL. CALL. GTC. PFM. CMD$="SET,BLK". CMD$="ITEM,SET,BLK". CALL. CALL. GTM. CMD$="BLK" PIFD. CMD$="SET,BLK" CALL. PFO. CALL. GTO. CMD$="SET". CMD$="BLK". CALL. CALL. IMS. PUTC. t. A—2. COPYRIGHT. 1981.1982. D3Ít7í. RH-ecj. CvePmme.

(39) CMD$="SET,BLK". CMD$="SET". CALL. CALL. PUTM. SON. CMD$="SET,BLK". CMD$="SET1,SET2". CALL. CALL. PUTO. SOO. CMD$="SET". CMD$="SET,BLK". CALL. CALL. RMS. CMD$="SET" CALL. ROS. SOU. CMD$="BLK" CALL. ". SUC. CMD$="SET". CMD$="SET,BLK". CALL. CALL. RSM. SUM. CMD$="SET". CMD$="BLK". CALL. CALL. RSO. SUN. CMD$="SET". CMD$="SET,BLK". CALL. SCM. CALL. CALL. SCN. SUO. ". CMD$="BLK" CALL. SUU. CMD$="SET" CALL. CMD$="RECORD" TCT CALL. SCO. CMD$="BLK" CALL. CMD$="RECORD,SET" CALL TMT. SCU. I%=bufsize. CALL. CMD$="RECORD,SET" TOT CALL. SETPBF(BUF(0),I%). CMD$="SET" CALL. SMC. CMD$="SET" CALL. CALL. TRABT. CALL. TRBGN. CALL. TRCOM. CALL. UNDEF. CALL. VARCS(E0%). CALL. VARCMD(CMD$). SME. CMD$="SET1,SET2" CALL. SMM. CMD$="SET" CALL. SMN. CMD$="SET1,SET2" CALL. SMO. CMD$="SET1,SET2,SET3" CALL. XMM. CI'4D$="SET,BLK" CALL. C14D$="SET1,SET2,SET3". SMU. CALL. XMO. CMD$="SET" CALL. S(JC. CMD$="SETI,SET2,SET3" CALL. XOM. CMD$="SET" CALL. CMD$="SETI,SET2,SET3". SOE. CALL. XOO. CMD$="SETI,SET2" CALL. (C). SOM. COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. A-3.

(40) TNPTRECT. TN\/C)CATTON. CMD$="AI.TEOS". CMD$="DRO,SET". CALL. CALL. DMS. DMS. CMD$="AMM,SETI,SET2,SET3". X$=EXTEND,BLK":. CALL. CALL. DMS. X%=n. DMSD(E0%,X$,X%,vl,...,vn). CHD$="AMO,SETI,SET2,SET3" CALL INS. CMD$="FDRK,RECORD,BLK". CMD$="AOM,SET1,SET2,SET3". CMD$="FFM,SET". CALL. CALL. DMS. CALL. DMS. DMS. CMD$="AOO,SET1,SET2,SET3". CMD$="FFO,SET". CALL. CALL. DMS. DMS. CMD$="AUI,BLK". CMD$="FFS,AREA". CALL. CALL. DMS. DMS. CMD$="CCU,BLK". CMD$="FLM,SET". CALL. CALL. DMS. DMS. CMD$="CRA,RECORD,AREA,BLK". CMD$="FLO,SET". CALL. CALL. DMS. DMS. CMD$="CRS,RECORD,BLK". CMD$="FP!I,ITEM,SET,BLK". CALL. CALL. DMS. DMS. CMD$="DBCLS". CMD$="FNSK,SET,BLK". CALL. CALL. DMS. DMS. CMD$="DBCLSA,AREA". CMD$="FNM,SET". CALL. CALL. DMS. DMS. CMD$="DBENV,BLK". CMD$="FN'MI,ITEM,SET,BLK". CALL. CALL. DMS. CMD$="FNMSK,SET,BLK". CMD$="DBOPN,BLK" CALL. DMS. CALL. DMS. DMS. CMD$="DBOPNA,AREA,BLK". CMD$="FNO,SET". CALL. CALL. DMS. Dl4S. C!4DS="DBSAVE". CMD$="FNOI,ITEM,SET,BLK". CALL. CALL. DMS. DMS. CMD$="DBSTAT,BLK". CMD$="FNOSK,SET,BLK". CALL. CALL. DMS. X$="DEFINE,BLK": CALL. CMD$="FNS,AREA". X%=n. DMSD(E0%,X$,X'í,vl,...,vrí). CALL. DMS. CMD$="FOI,ITEM,SET,BLK". CMD$="DRM,SET" CALL. DMS. CALL. DMS. (C). COPYRIGHT. 1981.1982. DMS. Micro. Dat: a. FUicm. -QueFmme.

(41) CMD$="FOSK,SET,BLK". CMD$="LGFILE,BLK". CALL. CALL. DMS. DMS. CMD$="FPM,SET". CMD$="JJGFLSH". CALL. CALL. DMS. DMS. CMD$="FPO,SET". CMD$="LGMSG,BLK". CALL. CALL. DMS. DMS. CMD$="FRK,RECORD,BLK". CMD$="MAU,BLK". CALL. CALL. DMS. DF4S. CMD$="GETC,BLK". CMD$="MCC,BLK". CALL. CALL. DMS. CMD$="MCF" CALL DMS. CMD$="GETM,SET,BLK" CALL. DMS. CMD$="GETO,SET,BLK" CALL. OMS. CMD$="MCP" CALL DMS. DMS -. CMD$="GFC,ITEM,BLK". CMD$="MRTF,RECORD". CALL. CALL. DMS. DMS. CMD$="GFM,ITEM,SET,BLK". CMD$="KRTP,RECORD". CALL. CALL. DMS. Dl9S. CMD$="GFO,ITEM,SET,BLK". CMD$="KSF,SET". CALL. CALL. DMS. DMS. CMD$="GMC,SET,BLK". CMD$="MSP,SET". CALL. CALL. DMS. DMS. CMD$="GOC,SET,BLK". CMD$="NCI". CALL. CALL. DMS. DMS. CMD$="GTC,BLK". CMD$="PFC,ITEM,BLK". CALL. CALL. DMS. DMS. CMD$="GTM,SET,BLK". CMD$="PFM,ITEM,SET,BLK". CALL. CALL. DMS. DMS. CMD$="PFO,ITE¥,SET,BLK". CMD$="GTO,SET,BLK" INS. CALL. CALL. DMS. CMD$="IMS,SET". CMD$="PIFD,BLK". CALL. CALL. DMS. DMS. CMD$="IOS,SET". CMD$="PUTC,BLK". CALL. CALL. DMS. DMS. CMD$="LGCPLX". CMD$="PUTM,SET,BLK". CALL. CALL. DMS. CMD$="LGENDX" CALL DMS. (C). COPYRIGHT. DMS. CMD$="PUTO,SET,BLK" CALL. 1981,1982. Micro. Data. DMS. Base Systems,. Inc.. a-7.

(42) CMD$="RMS,SET". CMD$="SOO,SETI,SET2". CALL. CALL. DMS. DMS. CMD$="ROS,SET". CMD$="SOU,SET,BLK". CALL. CALL. DMS. DMS. CMD$="RSM,SET". CMD$="SUC,BLK". CALL. CALL. DMS. DMS. CMD$="RSO,SET". CMD$="SUM,SET,BLK". CALL. CALL. DMS. DMS. CMD$="SCM,SET". CMD$="SUN,BLK". CALL. CALL. DMS. DMS. CMD$="SCN". CMD$="SUO,SET,BLK". CALL. CALL. DMS. DMS. CMD$="SCO,SET". CMD$="SUU,BLK". CALL. CALL. DMS. DMS. CMD$="SCU,BLK". CMD$="TCT,RECORD". CALL. CALL. DMS. I%=bufsize. CALL. DMS. CMD$="TMT,RECORD,SET". SETPBF(BUF(0),I%). CALL. DMS. CMD$="SMC,SET". CMD$="TOT,RECORD,SET". CALL. CALL. DMS. DMS. CMD$="SME,SET". CMD$="TRABT". CALL. CALL. DMS. CMD$="SMM,SETI,SET2" CALL. '. CMD$="TRBGN" CALL. DMS. OMS. OMS. CMD$="SMN,SET". CMD$="TRCOM". CALL. CALL. DMS. OMS. CMD$="SMO,SET1,SET2". $X="UNDEF". CALL. CALL. DMSD. CALL. VARCS(E0%). CALL. VARCMD(CMD$). DMS. CMD$="SMU,SET,BLK" CALL. DMS. CMD$="SOC,SET" CALL. CMD$="XMM,SET1,SET2,SET3". DMS. CALL. DMS. CMD$="SOE,SET" CALL. CMDS="XMO,SET1,SET2,SET3". DMS. CALL. DMS. CMD$="SOM,SETI,SET2" CALL. CMD$="XOM,SET1,SET2,SET3". DMS. CALL. DMS. CMD$="SON,SET" CALL. CMD$="XOO,SET1,SET2,SET3". DMS. CALL. A-6. (C). COPYRIGHT. 1981,1982. DMS. Micro. Data. Base Svstems.. Tnc-.

(43) .. APPENDIX. DKL. Retrieval/Write. B. Command. Groups. ,.. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc. .. ·\.

(44) F. Appendix. B. RlW0. alteos dbcls dbopn dbsave. dbstat define. fírisk fnm frío. frk scm. smm smo. sor. ffo flm flo. fosk. sco. scr setpbf. smr soc. srm sro undef varcmd. fdrk ffm. extend. fdrk ffm. fpm fpo. src. som. smc. soo. frío. geto. fosk. getr gfc. sco scr. varcs. R2W0. alteos ábcls dbopn dbsave. dbstat define extend. ffo flin flo finsk. fpm. fpo. .. setpbf. som. soo sor. gfo gfr. smc smm smo. scm. smr. fnmi fnmsk fno. geto. scn sco. soe. fnoi. gfm. scr. son soo sor sou. frk. getc. fnin. gfm. soc. getm. undef varcmd. varcs. src. srm sro. R3W0. alteos aui cct ccu cmt. cot dbcls ábclsa dbenv dbopn dbopna ábsave. dbstat. (C). define extend. fdrk ffm. ffo ffs. findm findo flm. flo. fmi. fmsk fnm. COPYRIGHT. fnosk. fns. fol. getr gfc gfo gfr gmc. fosk. goc. frk. gtm gto. fpm fpo. getc. gtc nci. getm. 1981,1982. scm. Micro. Data. scu. setpbf smc sme sníin smn smo. som. src. sinr. srm srn sro suc. smu. sum. soc. sun. Base Systems,. Inc.. suo suu. tct. tmt toggle. tot. undef varcmd. varcs. B-l.

(45) .. RIWI. alteos cr. cra crs dbcls. dbopn dbsave. dbstat. define. fñjñ frío. lgcplx. fdrk ffni. fosk. lgfile. extend. scr setpbf. soo sor. undef varcmá. src. varcs. trbgn. frk ims. pifd. sinc smm smo smr. scm. los. soc. sco. som. trcom. fosk. gfm. lgmsg. fpo. gfo gfr. pifd. smr soc. scm. som. los lgcplx. sco. getc. soo sor. fpm fpo. ffo flm flo fmsk. lgendx. lgflsh lgmsg. srm sro. trabt. R2Wl. alteos cr cra crs dbcls dbopn dbsave. dbstat define. extená. fdrk ffín. fpm.. ffo flm flo fmsk. frk. getm geto. ims. lgendx. scr setpbf. fno. getr gfc. lgfile. dbstat define. fnmsk frío. gfm gfo. fnoi fnosk fns. gfr. nci pifd. soc soe som. fosk. gtm. sen scn sco scr scu. lgflsh. trcom undef varcmd. varcs. src. smc smm smo. fnm. trbgn. srm. sro. trabt. R3Wl. alteos aui cct ccu cmt. cot cr. cra. crs dbcls dbclsa dbenv dbopn dbopna dbsave. B¿2. extend. fdrk ffm. fol. ffo ffs. fináni findo flm. fpm. fmi. Cetm geto. fpo. frk. flo. getc. fmsk fnm fnmi. getr gfc. (C). COPYRIGHT. gmc. goc. gtc gto. setpbf sríic. los lgcplx. sme smm smn smo smr smu. ims. lgendx. lgfile. lgflsh lgmsg. 1981,1982. Micro. son soo sor sou. src. srm srn sro suc. suu. tct. tint toggle. tot trabt. trbgn trcom. undef varcmd. varcs. sum. sun suo. Data. Base Systems,. Inc..

(46) .. RlW2. fosk. alteos cr. extend. crs dbcls. frk ims. dbopn dbsave. ffo flm flo fmsk. dbstat define. fnm frío. lqendx. cra. fdrk ffm. fpni fpo. lgflsh lgmsg. puto. pfc. scm. pfm. pfo pfr. putr sco scr. sfr smc. src. sinm sino. sro. smr soc. trbgn. srm. trabt. pifd. setpbf sfc sfm. som soc). lgfile. putrrí. sfo. sor. varcs. getc. lgendx. puto. lgfile. putr. smm smo. trbgn. los lgcplx. putc. trcom undef varcmd. "'. .". R2W2. alteos cr cra crs dbcls. ffm. ffo flm flo fmsk. dbopn dbsave. fnm. dbstat define. fpm. extend. fdrk. fno fosk fpo. frk. getm geto. getr gfc qfm. gfo gfr ims. los lgcplx. lgflsh lgmsg pfc. pfm. pfo pfr. pifd putc. putm. scRí. sco. smr soc. scr setpbf sfc. som. sfo sfr. srm sro. sfm smc. soo sor. '. trcom undef varcmd. .,. varcs. ,. src. trabt t. R3W2. .. .. alteos aui cct ccu cmt. cot cr cra crs dbcls dbclsa. extend. fdrk ffm. ffo ffs. findm fináo flm. flo. fmi. dbenv dbopn dbopna dbsave. fnisk fnm fnmi fnmsk fino. dbstat define. fnoi fnosk. (C). ,. COPYRIGHT. fns. fol. fosk. gtrn gto ims. puto. los lgcplx. scn sco scr scu. fpm. fpo. lgendx. frk. lgfile. getc. lgflsh. getm geto. lgmsg. getr gfc. nci pfc. gfo qfr. pfo pfr. gfm. gmc. goc. pfm. pifd putc putm. gtc. 1981,1982. Micro. Data. smr. putr. smu. sch.. soc soe som. setpbf sfc. son soo sor sou. sfo sfr. srm srn. smc sme snun smn smo. sro. sfm. Base Systems,. src. suc. suu. tct tmt toggle. tot. trabt trbgn. trcom undef varcmd varcs 4. sum. sun suo. Inc.. Br3,.

(47) RlW3. alteos cr cra crs dbcls dbopn dbsave. dbstat define drc. drm dro extend. fno fosk. fárk. fpo. fpm. ffrrí. frk ims. ffo flm flo fnisk. los lgcplx lgendx. fnm. lgfile. lgflsh. lgmsq. pfc. pfm. pfo pfr pifd putc putin puto. '. putr. sfo. rms ros rsm rso sco. smc smm smo. scr setpbf sfc. som. sfm. smr soc soo sor. srm sro. trabt. trbgn trcom. undef varcmd. varcs. src. R2W3. alteos cr cra crs dbcls dbopn dbsave. dbstat define drc drm dro. extend. fdrk ffm. frk. lgenáx. getm. lgflsh lgmsg. getc. ffo flm flo fmsk. geto getr gfc gfm gfo. fnm. fno fosk. gfr. ims. los lgcplx. fpm. fpo. lgfile pfc. pfm. pfo pfr pifd putc putm puto. putr tl1\S. ros rsm rso. sfr smc smm smo. scm. smr soc. sco. som. scr setpbf sfc. soo sor. sfm. sfo. trabt. trbgn trcom. undef varcmd. varcs. src. srm sro. R3W3. alteos aui cct ccu cmt. cot cr cra crs dbcls dbclsa dbenv dbopn dbopna dbsave. dbstat define ccrc. EiL4. drm dro extend. fnosk fns. gtin gto ims. fdrk ffm. fosk. los lgcplx. fol. fpm. fpo. ffo ffs. findin findo flm. frk. lgfile. getm geto. lqmg nci pfc. getc. flo. getr gfc. fmi. 'fmsk ""fnm fnmi fnmsk frío. "gfm. fnoi. gtc. gfo. cfr gmc goc. (C). lgendx. COPYRIGHT. lgflsh. pfm. pfo pfr pifá putc putm puto. 1981,1982. putr rms ros rsm rso scIü. scn sco scr scu. setpbf sIc sfm. sfo sfr smc sme smm. Micro. smn smo. smr srnu. soc soe SOIñ. son soo sor sou. src. srm srn sro suc. suo suu. tct. tmt toggle. tot trabt. trbgn trcom. undef várcmd. varcs. "". Base systems,. Inc.. sum. sun. Data.

(48) ¥. RlW4. alteos amm amo ams aom. dbstat define árc. fmsk fnm frío. Ciro. fpm fpo. pfc. frk getr gffr ims. pfo pfr. los lgcplx. putm puto. fosk. drm. drr. aoo cr cra. extend. crs dbcls. ábopn dbsave. fdtk ffm. ffo film flo. lgenáx. lgfile lgflsh lgmsg pfrri. pifd. putc. putr rms ros rsm rso. trabt. smm sino. trcom undef varcmd. smr soc. SCIñ sc-o '. sfm. sfo. trbgn. ". varcs. soo sor. xnim xmo xom. src. xoo. soc. xmo xom. som. scr. setpbf sfc. sfr smc. srm sro. R2W4. alteos amm amo ams aom. drc. fpm. lgendx. drm dro. fpo. lgfile. drr. qetc. cr cra crs dbcls. dbopn dbsave. dbstat define. scm. getm geto. pfc. soo sor. sco. src. getr gfc. pfo pfr. scr setpbf sfc. putc. sfo. trcom undef varcmd. smm smr. varcs. goc. putm puto. gtc. putr. smm smn smo. rrris. smr. ros rsm rso. sidu. scm. som. scn. son soo sor sou. frk. extend. aoo. lgflsh. ros rsm rso. fdrk ffm. ffo flm flo fmsk. gfm gfo. gfr. ims. fnm frío. los lgcplx. fosk. lgmsg pfm. pifá putin. puto putr rms. sfm. sfr smc. som. xoo. srm sro. trabt trbgn. xinm. R3W4. alteos anua amo ams aom. drm cIro. aoo. aui cct. drr. extend. fdrk ffm. ccu cmt. ffo ffs. cot cr cra. crs dbcls dbclsa. dbenv dbopn dbopna. (C). dbsave. dbstat define drc. findm findo flm. fnmi fnmsk fno. gmc. fnoi. gtm. fríosk. fns. los lgcplx. fosk fpm. lgendx. fpo. lgfile. getc. lgmsg. frk. getm geto. flo. fmsk fnm. gfo gfr. COPYRIGHT. ims. fol. getr gfc. fmi. gto. gfm. 1981,1982. sc.o. lgflsh. scr. nci pfc. setpbf sfc. pfo. sfo sfr. pfm. pfr pifd putc. Micro. Data. scu. sfm. smc sme. Base Systems,. soc soe. src. srm srn sro sue. SIlO. suu. tct. tint toggle. tot trabt trbgn. trcom undef varcmd. varcs. xmm ,XIño xom. r. xoo. sum. sun. Inc.. Bm$.

(49) t. APPENDIX. First Alternative. (C). COPYRIGHT. 1981,1982. Micro. MDBS. Data. DMS. C. Installation. Base Systems,. Method. Inc..

(50) .. Appendix. C. This alternative installation method allows the use of chaining within application programs. chained programs are used with a dms If has been then DBSAVE must be the that command installed as described here, and any variables used in the to chaining last VARCMD, invoked prior VARCS, EXTEND, SETPBF commands and DEFINE, must be in COMMON. A.. Installation Copy. MKDMS, MKTAB, A.REL, Z.REL, and. OSCPM.REL,. the. MLINK. BASCOM80.REL. files, to the. DBRUN.REL, same. DMS.REL,. working disk.. This interactive installation program generates a command file which will create a DMS runtime module that Appendix shows f ifteen predef ined supports desired DML commands. DML command groupings. One of these groupings can be selected or a customized group of DML commands can be specif led during interaction with mkdms. Now. execute. MKDM S.. B. When. the permissible responses prompts. for a response, are in parentheses and the default response appears in square Pressing the ENTER key (alone) yields the default response.. MKDMS. indicated. brackets.. session using MKDMS. In this example, the selected and the default command file name of assigned to drive A. Operator responses are shown in bold. Below is a sample command grouping R2Wl is. DMS7000. is. face type.. MKDMS VI .01 (C) COPYRIGHT. 1982,. Micro Data Base Systems,. Inc.. This program creates a command file that will create 'runtime' module supporting selected DML commands.. First, module. a. DMS. determine where in memory the D!'4S runtime reside. This is called the ORG address (org .is will derived from the word origin by the usual means of dropping various letters from a word unt"il i t i s barely You should org the DEIS runtime module as decypherable). high as possible in memory. to If you are not sure where the pick a nice high address (e.g., AOOO). org address is too high, the loader that MKDMS prefixes to the runtime module will inform you as to the highest org address possible for that runtime module. Currently the average runtime module size is about 22k or 58GOh. you must. it,. If. Enter desired org address *Note:. (in hex). :. 7000. *. system This org address is hardware/operating dependent; 7000 is workable in most environments, but address this be address chosen. a should Select fails another very high be informed as to the address. high, you too is If will maximum address that can be used in your environment. In general is advisable to use this maximum address.. if. it. it. (C). COPYRIGHT. 1981,1982. Micro. Data. Base Systems,. Inc.. C-l.

(51) .. Do Do. '. Do Do Do Do Do Do Do. ". ,. -'. have an RTL form of MDBS (y/n) Inj? have a MULTI USER system (y/n) Inl? want FAST I/O (y/n) Inl? want to disable CALC processing (y/n) want to disable DATE processing (y/n) want to disable FLOAT processing (y/n) want to disable IDEC processing (y/n) want to disable REAL processing (y/n) want to disable TIME processing (y/n). you you you you you you you you you. "-· "'. '. ' " .. l) 2). 7). BASCOM CB80 COBOL80 FORTRAN80 PASCALMT+ PASCALZ ASM'. 8). C'. 3) 4) 'j. . S.. 5). '". '. 6). '. ". lnl? lnl? Inl? lnl? Inl? Inl?. '. you. intend to use.. The. -. ' -. interface. '"\. . .. .6 .. Next, select the language languages supported are:. -!. '. ·. ' ' -. '. ". -. ". , .. desired language:. Enter. ". '. BASCOM. which DMS comíriands you need to be you must select , supported by the runtime module. This is acc9m"plished by selecting one of the 15 predefined groupingÓ that are listed in your system specific manual or by selecting each DML command separately The groupings are as is displayed. 3 and RnWm where n is a digit from 'is a digit from to 4 you want to select your own group of DML commands, to . you decide you need all enter an 'S'. For convenience, DML commands, enter an 'A'. Now. it. l. If. . ' .{. " , . ,. ,. the. Enter must i .'. . :. '.'. -.. '. -. '"'. -. (RnWm/A/S). Isl. :. R2Wl. the runtime. fn.MLA fn.COM' f n .REL f n. SYM. ·. = :='. = =. ' i. "-. to. MKTAB. table. '. name and/or a automa,tically appended by a. (C). locations input as. used. ' -t .,. file. COPYRIGHT. drive. MKDMS.. The. proper. L. ?. output. ". ,. just enter. .L ,. Enter. -. of commands for MLINK -list dms" " runtime kroduced by MLÍNK comníahd átis MKTAB produced by of lle' fsymbol -produced by· MLINK and. extensions are .' . -. T ,. ·. .. Remember,. C"2. Íevel. be. g 1. desired. cor,mand. module's output file (fn) and/or drive name will be used for specified. The output file MKDMS. A by the four differént files created single name keep (fn) is'used to track of which set of files belongs to which runtime module.These four fi'i'es will'be named:. Next, '. if. ,. ,. O. m. name. and/or drive. IDMS7000j:. a:. Micro. Data 'Bas¿. Systems)":. 1981 ,1982. '. Inc..

Referenzen

ÄHNLICHE DOKUMENTE

In integrated approach event points out to threat event scope (RSO model) on newly introduced risk and security view (contains all RSO models), as RSO mod- els extends and enhances

Using a DH session key with symmetric encryption instead of simply sending the data to the peer using public key encryption is required for perfect forward secrecy [23] –

• Promotion of library’s subscribed resources, trainings on how to use them, Going deeper into resources and tools provided by library (print, electronic, software). • Media

– Shared tree created according to reverse path forwarding. – Nodes hold children tables

– Shared tree created according to reverse path forwarding. – Nodes hold children tables

– Shared tree created according to reverse path forwarding. – Nodes hold children tables

 Shared tree created according to reverse path forwarding.  Nodes hold children tables

 Shared tree created according to reverse path forwarding.  Nodes hold children tables