InfoWorld, The PC News Weekly, reported in its October 12th issue that the House Subcommittee on TeleCommunications and Finance may introduce legislation to block an FCC proposal to implement access charges for enhanced service providers.
The article also reported that NYNEX, the New York and New England area telephone company is opposed to the implementation of these access charges. They constitute a GENUINE THREAT TO OUR SOCIETY that could create a nation of INFORMATION RICH AND INFORMATION POOR, according to Congressman Edward Markey, chairman of the subcommitte.
Ivan Seidenberg, vice president for external affairs of NYNEX is quoted by InfoWorld as saying, "A DECISION TO IMPOSE SUCH [ACCESS] CHARGES SHOULD BE DEFERRED, because of the administrative difficulties involved in assessing the charges."
InfoWorld also reported that a Markey aide stated that although the subcommittee cannot stop the FCC from imposing the charges, legislation opposing the FCC plan may be introduced in Congress should the FCC appear obstinate about its plan. [BC]
<*><*><*>
For a limited time, Atari BBSers can sign up on GEnie and, (drum roll please!) avoid *all* sign up costs. To take advantage of this offer...
1) Set your modem for 300/1200
half duplex.
2) Dial 1-800-638-8369
3) After connection enter HHH
4) At the 'U#=' prompt enter
XJM11887,ATARI and press
[RETURN].
5) Just follow the prompts and
don't forget to have your
MC/Visa/AE or checking account
number handy.
That's it. The whole process is quick and easy. And remember, you can call at 1200 baud since there is *no* surcharge for calling at the faster rate. If you need more information call: 1-800-638-9636 [JP]
<*><*><*>
Is your E-Mail address registered? Now you can list your preferred company or personal address in the National E-Mail Registry - an online E-Mail phone book.
When you are listed, other BBSers can find you - even if they don't know which E-Mail service you use. Registration is free.
To register:
1) Call via modem, 800-622-0505
(3/12/24/E/1/24hrs)
2) Touch [RETURN] 3 times. [JP]
[EOA]
======================================
= Metamorphomoron- Anyone who keeps =
= changing handles because he always =
= gives each one a bad reputation. =
======================================
[SYS]*******************************
SYSOP'S FABLES *
************************************
BBS ETIQUETTE AND GENERAL GUIDELINES
""""""""""""""""""""""""""""""""""""
The Chairman
This text file will give some users and even some sysops guidelines and etiquette for BBS usage.
Computers and computer users are more abundant now. A lot of people are finding out that computers are fun, educational, and can be an exciting hobby. Especially when one gets a modem and discovers a vast amount of information available. All just a phone call away. Along with this new information comes quite a bit of power, and, as you would guess, the usage of this power requires more responsibility and self-control on the users part. Especially when it comes to using an information service like a Bulletin Board System (BBS).
BBS's are here to stay. Some may come, and some may go, but all of the Sysops of these BBS's deserve recognition and commendations for the hard work they put in. Many an hour can be spent figuring out bugs and getting a board set up. Unfortunately, the majority of users don't know what is involved in running a board. It is hard work, not to mention the small fortune a Sysop must put into the system to keep it running and adding the improvements (this can run into the hundreds of dollars per month!).
The majority of the users are good and they use the system wisely. Their input and suggestions make running a BBS worthwhile. Sysops are not just "Someone on the other end who is never around when you need him...", but human beings. It does make a Sysop happy to have users praise his efforts. On the flip side, it can make a Sysop angry or unhappy when certain users act like total jerks and must put down everything that anyone does. This leads to many problems between users/Sysops, users/users and Sysops/Sysops, or in other words, EVERYONE.
So, here are some guidelines to keep everyone happy and a BBS running smooth and strong:
FOR THE USERS:
1) Don't nag. Most Sysops read their messages from users and they do reply. If you have gotten a reply, take that as the answer until further notice from the sysop.
2) Use the system wisely. Use the BBS like it was meant to be used. Try out all the functions, not just one or two. Keep abreast with things on the board. If you are having problems, look for the help files before you yell for the sysop. You might find your questions answered there.
3) Don't abuse your privilege BBS usage is a privilege, not a right. Nobody is forcing a Sysop to spend his time and money on a board. HE reserves the right as to what he runs the board with, for and how.
4) Enter your user info correctly and truthfully. A large number of Sysops like to verify their callers. Let them call you up. It helps begin a good relationship.
5) Don't knock down other users. If the user is new to BBS's, give him a break. We were all beginners and made mistakes at some point in time. If you don't like what a user does, says or the way he goes about his life then pay no heed to him. If the caller does get abusive, explain the situation to the Sysop and let him take care of the problems.
6) Don't ask a Sysop to delete a user because of the users beliefs, preferences or attitudes. Everyone is different, it is what makes the world go 'round.
7) If you like something about the BBS, give the Sysop some notice. Same if you don't like something. Try to suggest better ways. Again, don't get abusive.
8) If you like a BBS, support it by inputing messages, suggestions and uploads. A lot of Sysops aren't just looking for files. If you don't like a BBS, and nothing is being done positively, then don't call it. It is that simple. Users don't need to mud-sling a BBS. If enough users stop calling the board, it will go down. Very simple, no?
9) Don't try to purposely crash a board. If you do somehow crash a board, get in touch with the Sysop and let him know exactly what you did and what happened at your end. It will help keep the BBS running.
Now for some basic guidelines for all the Sysops.
A) Keep up with your board as much as possible. No user likes to call a dead board. If you can't keep up, make more time or allow a remote to help. If all else fails, take the BBS down. You could use your money for other things.
B) Don't let the Sysop status and power go to your head. It is bad and naive to think you are all-powerful. You are human and just like everyone else.
C) Don't expect ANY special access on other boards just because you are a Sysop. You are a user, and are subject to the same rules as other all other users.
D) Follow all the same guidelines for users that were listed above.
E) Reply to user messages and suggestions often. You might find out that a user has a terrific idea!
F) Don't delete a user unless it is necessary. Don't blacklist a user unless he is an extreme problem.
G) Keep your board up as much as possible. It can get irritating and confusing to a user if your board is up and down for whims. If you do take the board down for a short time, leave advance notice on other boards if it is at all possible.
H) Be patient and helpful with users, especially ones who are new to computers and BBS's. You were there once yourself.
I) Keep you user information confidential. They are trusting you with their phone numbers and/or addresses.
And, lastly, for both Sysops and users, enjoy the boards. I can't think of anything else that can give the same feelings and knowledge to people.
[EOA]
================================
= "I asked for a car. I got a =
= computer." =
= =
= Matthew Broderick, =
= in FERRIS BUELLER'S DAY OFF =
================================
[WAN]*******************************
WANDERING WANDERER *
************************************
THE BORING MESSAGE BASE SYNDROME
""""""""""""""""""""""""""""""""
Wanderer
The message bases are teeming with activity. You name the subject, there's a discussion about it somewhere. Even the 'shy' members are getting in on the fun. Then all of a sudden, the messages being posted slow down to a trickle.
Or, maybe you finally made the plunge and decided to set up your own BBS. It's a beauty too! 15 message bases on just about every topic you could think of. But when someone calls, they go straight to the file section.
For one reason or another, the message bases began to gather dust. It's not your fault. It happens to the best of the boards. But, it doesn't have to be that way. What's the solution?
PEANUT BUTTER!
Yes, you heard me right. For two weeks the hot topic on WC! Orphanage BBS was peanut butter. Which jelly is best on peanut butter? Should the sandwich be folded over or cut in half? Which is better, jelly, jam or preserves? What do you eat with peanut butter? (Would you believe avocados or mayonnaise?)
Then things really started to get crazy. Someone else brought up the question, "Why does one sock always disappear when it's in the dryer?" (My favorite is, "They're forming a sock revolution in Utah.") Another burning issue that has created some interesting message chains, "Do trees moving back and forth cause the wind blow?"
Here's two of the many messages that were posted.
From : BECKY JORDAN To : MICHAEL HERSCHEDE
Subject: Missing Socks
But what is the danger to the general public????? Should we alert the authorities????? Is there ANYPLACE to hide?????? Be very careful, or you might start a panic.....<grin>
<*><*><*>
From : MICHAEL HERSCHEDE
To : BECKY JORDAN
Subject: Missing Socks
By gadfree I think it's time to start a panic Becky, I really do. To long has the general populi just sat/stood by and let socks disappear to Utah or let drying machine programmers have their will with OUR SOCKS!! And the hanger problem... lordyme... it's time someone did something and if fear bred from the truth is the only thing that is going to wake people up than... well... maybe it's better than waking up some day and finding out that all those odd socks are hanging all over town generating enough static cling to disrupt telecommunications (they'll go after us first... lets face it) and then, if that weren't bad enough the hangers will become so populus as to drive us mad with perpetualhanger-chimes. I don't believe they will ever allow themselves to get too many so as they can't bang together like little cheap bells... that's part of their defense system... ever try to separate two hangers so they won't touch?? It never works they always find a way to get back together and chime.
This is not a pretty picture I know but if we all stick together and keep believing in the American Way and keep having faith that this board will stay on-line so we can post timely topics such as these, things will work out. I don't know exactly how but somehow.
;]
<*><*><*>
The point is, have some fun! Many boards concentrate too much on technology. Sure high-tech has a place in the message base, but who likes to spend all there time talking about technology? Put some craziness into the board! Post topics that anyone can get in on. Loosen up! Write a crazy message. It can turn a boring message base around. Take my word for it... I've seen it happen!
[EOA]
[GIF]*******************************
G I F (tm) *
************************************
GRAPHICS INTERCHANGE FORMAT (tm)
""""""""""""""""""""""""""""""""
(c) CompuServe Incorporated, 1987
All rights reserved.
While this document is copyrighted, the information contained within is made available for use in computer software without royalties, or licensing restrictions.
<*><*><*>
CompuServe has developed a new Graphics Interchange Format (GIF) designed to serve a wide variety of graphics needs both within the CompuServe product environment and as a universal standard by which graphics can be exchanged between any parties through a network. This document serves as a simple explanation of what GIF is and what it is capable of.
WHAT IS GIF?
GIF (pronounced "Jif") is a mechanism of storing high-quality color graphics images in a way that can be exchanged between users of differing hardware. For example it allows images created on an Atari ST to be displayed on a Commodore Amiga or IBM-PC and visa versa. The GIF format allows for very high resolution, full color images that can be used in any application that requires the display of graphics information.
WHAT KIND OF IMAGES CAN GIF BE USED
FOR?
GIF images can be part of, but not limited to the following applications:
- Full color associate photo board
- Business charts and graphics
- Merchandise catalogs
- Technical documentation
- Schematic diagrams for field
service personnel
- Color radar maps
- Medical illustrations
- Art gallery
- Exchange of user-created images
HOW MUCH RESOLUTION CAN AN IMAGE HAVE?
In terms of pixels, or image dots, GIF is capable of defining images of over 16,000 by 16,000 individual dots. This compares with the average microcomputer screen of 320 by 200 pixels. Even laser printers are generally limited to about 2000 by 3000 pixels. GIF technology is adequate for graphics applications for years to come.
HOW MANY COLORS CAN A GIF IMAGE HAVE?
Any GIF image can have up to 256 simultaneous colors contained within it. Each individual color can be defined out of a possible set of 16 million colors, making photographic-quality images possible.
DOES THIS MEAN AN IBM-PC CANNOT DISPLAY
GIF IMAGES WITH 256 COLORS?
All GIF images can be processed by all GIF software. The software is designed to make the best use of a specific hardware's capabilities with regard to colors. A best match is made between a desired color in the image, and the possible colors the hardware can display. Generally, detail of an image will be lost, but it should still be recognizable. On the other side, any image originating from an IBM machine should display exactly on a more capable microcomputer.
HOW LARGE ARE THE IMAGE FILES IN GIF?
This will vary a great deal depending on the number of colors present, the size of the image and the amount of detail present. GIF uses a sophisticated compression method that reduces the file size to between 1/2 to 1/8 of the original file size of the image. This means that even complex images can be economically downloaded. An example is an Atari ST image file of 320 by 200 pixels and 16 colors which would require 32,000 bytes on the Atari might only require 8,000 bytes in GIF format, a space savings of 4 to 1.
WHAT MICROS CAN SUPPORT GIF?
Currently CompuServe has developed software for a number of microcomputers to display or create GIF format files. Additional hardware will be supported as time goes on. The GIF standard document will be made public and third party authors will be encouraged to create additional GIF software for other hardware. Machines supported currently include:
- IBM-PC/MS-DOS family with CGA or
EGA graphics boards
- Commodore Amiga
- Atari ST
- Macintosh family
The software files can be found in the appropriate hardware FORUMS and in the Picture Support Forum (GO PICS).
WHERE ARE THE GIF FILES THAT CAN BE
DISPLAYED?
Currently many GIF files are available in DL2 of the Picture Support Forum. Each appropriate hardware forum will also accumulate GIF files as time goes on. The CompuServe FORUM software has a GIF file type established for uploads of GIF image files.
<*><*><*>
If you would like to find out more about GIF, the GRAPHICS DUMP in Newark is now supporting the GIF format.
GRAPHICS DUMP *(201)469-0049
[EOA]
<*><*><*>
====================================
= Parity Parody Party- A BBS party =
= to which no one shows up. =
====================================
[VPT]*******************************
VIEWPOINT *
************************************
RUNNING 300 BAUD? READ THIS!
"""""""""""""""""""""""""""""
BRIAN A. OLIVA
North Shore AMIS BBS, Lynn, MA
*(617)595-0211 10/18/87
The following Bulletin was posted on Telenet Communications Corporation's NET EXCHANGE BBS (C PURSUIT,yourID,yourPW on TELENET, or dial (703)689-3561) concerning elimination of 300 baud service on some PC Pursuit nodes:
<*><*><*>
10-09-87
Due to the high number of users attempting to access our 1200 baud nodes, we are discontinuing 300 baud service to the following cities on Tuesday, Oct 20: San Jose (DIAL408/3), Glendale (DIAL818/3), Milwaukee (DIAL414/3). The modems that had been used on these rotories will be converted for use on the corresponding 1200 baud rotories. Problems, questions, or comments should be addressed to SYSOP here.
<*><*><*>
I sent the SYSOP of NET EXCHANGE the following comments:
To: SYSOP Re: COMMENT
I vehemently OPPOSE your decision to discontinue 300 baud service to San Jose (or anywhere else for that matter). Although I have both 300 baud and 1200 baud modems, many many people are restricted to 300 baud service. San Jose in particular is the home of ALL the Atari corporate BBSs, and the majority of Atari owners in my experience use 300 baud. You are in effect cutting off the majority of the Atari population from their home base. Please DO NOT cut off 300 baud service completely.
There has to be a better compromise (distributing the modems proportionately based on volume, for example.) Cutting it off completely is an act of discrimination and is a dis-service to your subscribers!
<*><*><*>
TeleNet has gone through with their promise to disconnect 300 baud service to the area's previously mentioned. If you have a 300 baud modem, you can NO LONGER call area codes 408, 818, or 414 with PC-Pursuit. My protest message was never answered.
The facts remain that 300 baud subscribers pay the same monthly fee as their 1200 baud counterparts. They should be entitled to the same level of service.
How soon will it be before 300 baud service is cut to other areas? Or eliminated completely? While 2400 baud is here and growing, and 1200 baud is now reasonably affordable and used by the majority of serious telecommunicators, the fact remains that there is a vast number of 300 baud users, and that most new users coming onboard start at 300 baud. Cutting them off from a service such as PC Pursuit is a blow to new users and veterans alike. The fact that they only gave 11 days notice, with no discussion, is inexcusable! Call TeleNet's BBS at (703)689-3561 or 'C PURSUIT,yourID,yourPW' from any TeleNet node and voice your opinion!
For me, to use these areas has become a major inconvenience because I must now take down my BBS to call them. For many other subscribers, who don't have 1200 baud modem, they have just been cut off completely!
[EOA]
=================================
= "When I took over from Warner =
= nearly = 21 months ago, they =
= were losing $10 million a =
= month. For the first three =
= months of this year we earned =
= $9 million. The religion of =
= Atari works." =
= =
= Atari Chairman Jack Tramiel =
=================================
[ASK]*******************************
ASK DOCTOR BOB *
************************************
SELF DEARCING FILES
"""""""""""""""""""
Bob Connors
Wildcat! Orphanage (303)392-6631
Dr. Bob,
What's this "self-deARCing" thing I've seen popping up on various boards lately and how do I use it?
Bill Street
Dear Bill,
The self-deARCing thing (as you put it) is a facility available to MS-DOS users who use an ARC utility called PKARC or PKXARC, published by PKWare, Inc. That ARC utility produces ARC files that are not compatible with the "standard" MS-DOS ARC utility (ARC521 by System Enhancement Associates), although it can read ARC521 files and deARC them. The files produced are not compatible with any other operating system I am afraid. What we have here is a clear need for someone with other systems to produce an ARChiver that is compatible so that self-deARCing files can be produced.
Here is how it works:
1) I produce (or someone uploads) a file in ARC format created either by PKARC or ARC521.
2) I issue the DOS command: COPY/B PKSFX.PGM + FILENAME.ARC FILENAME.EXE
3) Like magic, a self-deARCing file is produced.
The file that is produced is the same as the original file, except that a front-end deARCer is included.
Analyzing the DOS command:
1) COPY is the DOS command to copy a file.
2) "/B" is a parameter switch that tells COPY to be sure to use the file size contained in the DIRectory entry for the file.
3) PKSFX.PGM is the front-end deARCer. What it does is analyze the ARC file that follows and determines how to deARC it and writes the necessary machine language instructions to do it.
4) The "+" tells copy to append the file on the right of the "+" to the file on the left of the "+".
5) FILENAME.ARC is the name of the ARChived file.
6) FILENAME.EXE is the name of the file we are copying to and it must be an EXEcutable file since the machine language at the front end must be loaded and executed. Now all an MS-DOS user has to do is type the FILENAME, minus the ".EXE" to deARC the file. No other command is necessary. Optionally, a drive specification or a DOS path (to a subdirectory) can be specified as the destination of the deARCed files. For example, the file "AUTO401.EXE" you see in the MS-DOS section could be deARCed and the files sent to subdirectory "AUTOMENU" on drive "C:" with the command, "AUTO401 C:\AUTOMENU". That's all there is too it.
The only problem with doing all this is that the "FILENAME.EXE" cannot already be contained in the "FILENAME.ARC" file, otherwise, FILENAME.EXE gets overwritten. So I have to get a verbose listing of the ARC file before creating the EXE file to be sure I don't duplicate a name. I assume that all this is similar in nature to Commodore's Self Dissolving ARC (SDA) files.
Doctor Bob
[EOA]
======================================
= Do you have a question for Doctor =
= Bob? Just contact any "Authorized =
= T/TalkNET BBS!" (See [FND], pg. 2) =
======================================
[PCP]*******************************
HOT PURSUIT! *
************************************
UNDERSTANDING THE 'SET' COMMANDS
""""""""""""""""""""""""""""""""
PATRICK TOWNSON
Net Exchange
The SET commands help to make your use of PCP easier. When you are at the "@" command, you review the settings by entering "SET?" (return).
To change a value, you enter "SET? 4:2" for example, if you wanted to change Parm 4 to value 2. Here are a few of the SET parms and values and what they mean --
PARM VALUE MEANING
1 0 DO NOT allow escape to the
"@" prompt by <CR>@<CR>
1 Allow escape to "@" with
<CR>@<CR>
2 0 DO NOT echo characters sent
from your terminal.
1 Echo characters sent from
your terminal.
3 BITFLAG: When should a
packet be sent?
0 NO FORWARDING except when
full or time expires.
1 Forward on ANY alphanumeric
character.
2 Forward on <CR>.
4 Forward on <ESC>.
8 Forward on editing
characters.
16 Forward on terminator
characters.
32 Forward on form effectors.
64 Forward on control
characters.
128 Forward on other characters.
4 0 No idle time out for packet
forwarding.
2-255 Number of .05 second
increments before
forwarding.
5 0 DO NOT use XON/XOFF to
control flow.
1 HOST may use XON/XOFF to
control flow.
6 0 Supress all service signals
(messages from Telenet)
1 Transmit all service
signals.
7 0 IGNORE break signal.
1 Send interrupt to host when
BREAK sensed.
2 Send reset packet to host
when BREAK sensed.
4 Send BREAK indication to
host when BREAK sensed.
8 Escape to "@" when BREAK
sensed.
16 Disregard output when BREAK
sensed.
8 0 Deliver data to terminal
normally.
1 Disregard output to
terminal.
9 0 DO NOT pad <CR>'s with NULL.
1-7 Pad <CR>'s with this many
NULLS.
10 0 DO NOT fold (insert <CR>'s)
in the data.
1-255 Fold data (insert <CR>'s) at
this column.
12 0 DO NOT use XON/XOFF to
control flow.
1 TERMINAL may use XON/XOFF to
control flow.
Using 4:2 will speed things up, as will 3:1. You would enter SET? 4:2,3:1 at the "@" command.
Also, please note with Parms 5 and 12: They can be used ONLY when your transfer protocol knows NOT to send accidental XON/XOFF characters (as in a binary file with all sorts of junk in it). That is one of the WXMODEM design features. If you use XMODEM, YMODEM CRC or YMODEM with flow control enabled, you are headed for disaster!! If ZMODEM encrypts XON/XOFF, then you are OK.
Last point: BOTH Parms 5 & 12 are ignored if you are in eight-bit transparency mode, as will be indicated by Parm 63 set to 1 (63:1).
Those of you who have trouble with up and downloads via PCP might give especial attention to the settings of 5,12 and 63 as per the above.
My thanks to Jim Robeson for helping get this information together.
[EOA]
==================================
= The difficulty of finding any =
= given trail marker is directly =
= proportional to the importance =
= of the consequences of failing =
= to find it. =
==================================
[TEC]*******************************
TECH CORNER *
************************************
UNDERSTANDING BINARY OPERATIONS
"""""""""""""""""""""""""""""""
Craig Steiner
Vault BBS *(303)796-0539
The 6502 Processor, the CPU which all Atari, Apple, and Commodore 8-bit computers use, supports three bit manipulation functions. These functions can be very powerful in various circumstances--in both BASIC and especially Machine Language. Though Atari BASIC does not truly support these functions, BASIC XE and other similar extentions of BASIC do offer them to the BASIC user. It is assumed throughout this article that the user is familiar with binary and decimal, as well as conversions between them.
One term must be defined before we go further. A "mask" is a number that is used with any of these operations. You must have a mask to use them.
First we will cover the AND function. This function is very much self explanatory. If the bit in the original number AND in the mask are 1, then the result will be 1. If the bit in either of the numbers is 0, then the resulting bit will be 0. To demonstrate this (and all of these functions), we will look at it in both binary and decimal notation.
Bit "Identifier": ABCDEFGH
-------------------------------
Original Number: 51 = 00110011
Mask Number: 15 = 00001111
Resulting Value: 3 = 00000011
This says "The value 51 ANDed with 15 is 3". As you can see, bits G and H contain 1's in BOTH the original number and the mask. Because of this, bis G and H are set in the resulting value. Bits E and F are not set because the original number contains 0's in these bits. Bits C and D are not set because the mask number contains 0's in these bits. THE AND FUNCTION IS GENERALLY USED TO ZERO OUT UNWANTED BITS. For example, if you are getting input but are not interested in whether or not it is inverse (that is, has an ATASCII value of 128 or more), then you could AND the input with 127. This will cause all input to be normal, un-inverse characters. In Machine Language, the format is: AND #mask. The Acumulator will then be ANDed with the mask and the result will be stored in the accumulator.
Next we will deal with the OR function. With this function, if a bit is set in EITHER OR BOTH the original or the mask, then the resulting bit will be set. Here is our demo of this function:
Bit "Identifier" ABCDEFGH
-------------------------------
Original Value: 65 = 01000001
Mask Value: 192 = 11000000
Resulting Value: 193 = 11000001
As you can see, bit A, B, and H are set in the resulting value. Bit H is set because it was set in the original value. Bit B is set because it was set in BOTH the original and the mask. Bit A was set because it was set in the mask. THE OR FUNCTION IS GENERALLY USED TO FORCE SET A BIT. If you wanted to make all characters inverse, you would simply OR it with the value of 128. In Machine Language, the format is: ORA #mask. The value in the accumulator will be ORed with the mask and the result will be stored in the accumulator.
Finally we have the Exclusive OR function (generally shortened to EOR). With the EOR function, the bit is "flipped" if the MASK has a 1 in it. If the mask has a 0, then the bit is left unchanged. Here is the demonstration:
Bit "Identifier": ABCDEFGH
-------------------------------
Original Value: 193 = 11000001
Mask Value: 130 = 10000010
Resulting Value: 67 = 01000011
In the result, bit H is set because bit H was 1 in the original. Since the mask contained a 0, that bit was left unchanged. Bit G contains a 1. This is because Bit G had a 0 in the original value, but since it had a 1 in the mask, the 0 was "flipped", thus becoming the 1. Bits C, D, E, and F are 0 because the 0's in the mask indicate that the bits should be left alone, thus the bits assume the value they had in the original number. Bit B is 1 since the 0 in the mask indicates that the bit should not be changed, and therefore remains the same as in the original. Bit A is 0 because the 1 in the mask says that the original bit should be flipped: and "flipping" a 1 will result in a 0. This function is not used as much as the other two functions but can be useful in some instances. A very basic use of the function would be to flip the value of a flag.
These functions may seem a bit complex, and they are. However, once mastered, these functions can be extremely useful. When used properly, they can speed up programs as well as save many many bytes of memory. When used in some BASIC programs, they can condense a multitude of IF...THENs into a single bit manipulation. You will find many uses for these functions and the time you spend learning them will be well worth it.
[EOA]
[OFF]*******************************
LOG OFF *
************************************
FINDING TeleTalk OnLine Magazine
""""""""""""""""""""""""""""""""
The following bulletin board systems
have agreed with T/TalkNET to be a
distribution point for TeleTalk OnLine
Magazine and to provide a message base
where readers may contact us with
questions, comments and/or to submit
articles for review and possible
publication. All boards listed are
online 24 hours a day.
"An AUTHORIZED T/TalkNET BBS!"
-------------------------------------
WILDCAT! ORPHANAGE (303)392-6631
(3/1200) SYSOP: Bob Connors
THE GRAPHICS DUMP *(201)469-0049
(3/1200/2400) SYSOP: Bob Lindabury
THE VAULT *(303)796-0539
(3/1200) SYSOP: Craig Steiner
MODERN PASTIMES *(414)384-1701
(3/1200) SYSOP: Bruce Berna
NORTH SHORE *(617)595-0211
(3/1200) SYSOP: Brian Oliva
SORMAN'S Info Exc. 1-11-46-470-22183
(SWEDEN) SYSOP: Lennart Olsson
CROWS NEST BBS 010-044-793-813633
(ENGLAND) SYSOP: Steve Carter
ONLINE SERVICES E/MAIL
----------------------
On CompuServe : 74030,467
On GEnie : J.F.PETERS
On People Link: OMS926
The following boards have notified us
that they now offer TeleTalk OnLine
Magazine to their members.
"A TeleTalk OnLine BBS!"
-------------------------------------
ATLANTA INFO (3/12) +*(404)928-9675
BEYOND/TOWERS(3/12) +*(201)463-7941
FIRST STAR (Sweden) + 46-340-51117
HOT MAC BBS (Sweden) + 46-31-948742
KISA MONITORN(Sweden) + 46-494-12997
LOG INN (3/12) + (716)586-0112
M.A.E. BBS (3/12) + (303)564-0618
MAJIK SHOPPE (3/12) + (405)482-2536
MICROLINCS (N/A) (805)943-6837
MODEM NET (3/12/24) *(303)680-8153
SHAMUS (3/12) + (303)591-8673
SPRINGS*NET (3/12) + (303)634-6077
ZMAG INFO NET(3/12) +*(201)968-8148
* = PC Pursuitable
+ = Verified online
as of 07/01/87
=====================================
[EOA]
<*><*><*>
Articles and advertising contained in TeleTalk OnLine do not necessarily mean endorsement. Signed articles are the opinion of the writers and not necessarily the opinion of the publisher or of this BBS system.
<*><*><*>
Every effort is made to verify phone numbers which appear in TeleTalk OnLine Magazine. However, due to the constant changes within the field of telecommunications, accuracy is not guaranteed.
<*><*><*>
No copyrighted material will be acceptable for publication without the express, written permission of the copyright holder. We reserve the right to edit the letters and copy.
Computer clubs, user groups, and Electronic Bulletin Board Systems are free to reprint or republish information in TeleTalk OnLine without limitations provided the following is printed at the top of the article: