home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Collection of Tools & Utilities
/
Collection of Tools and Utilities.iso
/
tex
/
ctoc30.zip
/
CTC.DOC
next >
Wrap
Text File
|
1990-04-21
|
33KB
|
692 lines
C O D E T O C O D E
_____________________
(C) Copyright 1989, 1990
ALPHABTYES, INCORPORATED
111 Eighth Street, S.E.
Washington, D.C. 20003
(202) 546-4119
Bruce Robey
CompuServe: 71131,2734
Version 3.0
┌─────────┐ This program is produced by a
┌─────┴───┐ │ (R) member of the Association of
──│ │o │────────────────── Shareware Professionals (ASP).
│ ┌─────┴╨──┐ │ Association of ASP wants to make sure that
│ │ │─┘ Shareware the shareware principle works
└───│ o │ Professionals for you. If you are unable to
──────│ ║ │──────────────────── resolve a shareware-related
└────╨────┘ MEMBER problem with an ASP member by
contacting the member directly,
ASP may be able to help. The ASP Ombudsman can help you resolve a dispute
or problem with an ASP member, but does not provide technical support for
members' products. Please write to the ASP Ombudsman at P.O. Box 5786,
Bellevue, WA 98006 or send a Compuserve message via easyplex to ASP
Ombudsman 70007,3536
Shareware Concept
_________________
CODE TO CODE is Shareware, not in the Public Domain. You are granted,
at no charge, the right to determine the suitability of this software
for your needs. If you do find CODE TO CODE suitable and make use of
it, you are expected to register with the author. Registration will
remove the delay screen, grant unlimited telephone support privileges
and provide printed documentation with ample screen examples. Your
contribution helps Shareware authors bring better and more affordable
software to you. Please redistribute this program to others.
Registration $29.00
Visa and MasterCard honored
DISCLAIMER OF WARRANTY
______________________
DUE TO THE LARGE NUMBER OF HARDWARE AND SOFTWARE ENVIRONMENTS INTO
WHICH THIS PROGRAM MAY BE PLACED, NO WARRANTY OF FITNESS FOR A
PARTICULAR PURPOSE IS OFFERED. THOROUGHLY TEST THIS PROGRAM WITH
NON-CRITICAL DATA BEFORE RELYING ON IT. THE USER MUST ASSUME THE
ENTIRE RISK OF USING THIS PROGRAM. THE SELLER'S MAXIMUM LIABILITY
WILL BE LIMITED TO REFUND OF THE PURCHASE PRICE OR PROGRAM
REPLACEMENT.
TABLE OF CONTENTS
_________________
Purpose......................................................1
How It Works.................................................1
What It Can't Do.............................................1
Installation
Hard Disk................................................2
Floppy Disk..............................................2
Operation
Decode.......................................................3
Ventura Publisher........................................4
XyWrite..................................................4
Penta....................................................5
Magna....................................................5
Recode.......................................................5
Split........................................................6
Join.........................................................7
Quads........................................................7
Main Screen Options..........................................7
Command Line Options.........................................9
ALPHABYTES, INCORPORATED is a member of:
The Association of Shareware Professionals
Printing Industry of America
Printing Industry of Metropolitan Washington
National Composition Association
Code to Code is a trademark of AlphaBytes, Incorporated
Ventura Publisher is a trademark of Ventura Software, Inc.
XyWrite is a trademark of XyQuest, Inc.
Penta is a trademark of Penta Systems International.
MagnaType is a trademark of Magna Computer Systems.
Page 1
Purpose
_______
CODE TO CODE is a collection of programs, written in Microsoft "C",
designed to move or delete codes from various DTP, word processor,
and typesetter files. With CODE TO CODE you can:
■ Move codes from an encoded file to a separate uncoded
file. The "uncoded" file can be edited without
cumbersome and cryptic codes in the way. After edit-
ing, the codes can be restored to the "decoded" file,
creating a new complete file.
■ Permanently remove (strip) the codes from the file.
■ Store codes in a separate file where they can be easily
and quickly searched and replaced or used to make an index.
■ Split large files into smaller files, with user
controlled break points. The split files may be edited
and then rejoined into one big file.
How It Works
____________
CODE TO CODE reads the ASCII file designated as the Encoded file,
searching for codes. Codes are defined as characters that occur between
two delimiters. The program asks for the delimiters for the type of file
you are converting.
Examples:
Program Delimiters Precedence
Ventura Publisher < > @
XyWrite dec. 174,175 « » none
Penta [ ] ;
Magna < > $
When CODE TO CODE encounters the opening delimiter it begins to write
the subsequent characters to the Code file. The program continues to
do this until it reaches the closing delimiter. The code is considered
complete after the closing delimiter. The program may optionally place
a marker (, ~, *, etc.) in the Uncoded file while continuing to write
the next characters, all the time searching for the next opening
delimiter.
What It Can't Do
________________
Once the markers are placed in the code file they cannot be erased or
reordered. The markers indicate the relative location where the code
is to be returned. The codes are replaced in sequential order, so you
may freely add or delete copy while editing. However, you must be
certain not to move a code out of sequence or delete it.
WordPerfect, WordStart and other word processors that use proprietarty
file formats must be converted to ASCII before using them with CODE TO
CODE. See your word processor manual for ASCII file conversion.
Page 2
Penta files can be coded without a closing delimiter. CODE TO CODE can
be configured in the setup menu to treat a space or CR/LF (carriage
return/linefeed) as a closing delimiter. This will work properly for
most codes. However, codes such as [epNow will not be handled properly.
If there is enough user response, subsequent versions of CODE TO CODE
will handle this situation. See the Penta section of this document for
more details.
Installation
____________
The self-extracting archive file you received will unbundle the
following files:
CTC.EXE This is the main program. It operates as a shell
for the other "EXE" programs. Although each of
of the programs can be ope