home *** CD-ROM | disk | FTP | other *** search
- SECRTARY WORD PROCESSOR PRELIMINARY DOCUMENTATION
-
- Once upon a time many years ago when North Star first started putting
- out systems, there was a need for a word processor that was easy to use,
- easy to learn, and cheap. There were very few word processors available
- and none available for North Star DOS. Video terminals and full screen
- editors were not common, most systems used ASR33 teletypes for I/O and
- most people had much less than 64K of memory.
- This led to the development of MARYELLN, a word processor for the
- North Star DOS. It used less than 8K of memory so the rest of RAM could
- hold the text, it was line oriented instead of screen oriented so it
- could be used with a TTY, and most of the commands were similar to the
- ones used in North Star BASIC. Anyone knowing BASIC could immediately use
- MARYELLN. The source code was assembled using an early assembler that
- required that all of the code be resident in memory at one time. Therefore
- to save memory, comments were kept to a minimum. Later it took 2, 3 and
- eventually 5 files to assemble separately and link together to form
- the final program. MARYELLN did all the usual editor/word processor
- functions: edit, load, save, justify, line fill, center, number pages,
- move, copy, find, list, print, and change.
- Later, MARYELLN, was greatly enhanced and was renamed SECRTARY (8 characters)
- because of so many questions about why it was called MARYELLN. The enhanced
- features included a more sophisticated installation procedure, underlining,
- imbedded commands, line wrap around on input, automatic insertion of names and
- addresses from a BASIC file, additional commands like STATUS, and the ability
- to load North Star BASIC programs in token format, convert them to ASCII,
- and edit them as a normal SECRTARY file. I should point out that a "normal
- SECRTARY file" used the format of the old assembler or programs such as XEK,
- SCS etc where the line consisted of a character count, 2 byte binary line number
- the text, and a carriage return (no line feed).
- SECRTARY still consisted of five source files which had to be assembled
- separately and there were very few comments. SECRTARY is still popular
- today on North Star systems. The source code was merged together and
- maintained under CP/M however (some 5000 lines of it). Later, a CP/M version
- was implemented. By this time, however, full screen editors were popular
- and the limitation of line numbers and memory resident files was unpopular
- for large text files even with the "CHAIN" command.
- SECRTARY is now available to CPM users for people who need a
- word processor for a few letters but do not want the expense or
- complications of the more extensive full screen editors.
- To get SECRTARY to work, first assemble it using ASM or MAC. It uses
- 8080 code not Z80 code. The full user manual is contained in files
- USERMAN0.TXT, USERMAN1.TXT, USERMAN2.TXT etc. After loading the program,
- execute it and enter the command "LOAD USERMAN1.TXT". The program will
- load the file and tell you the size. Then type "LIST" (no quotes) and the
- file will be listed on the screen. To get a hard copy of it, first enter
- the command "DEVICE L" to have the listing or printing go to the list device.
- (LIST shows line numbers and control commands, PRINT justifies, and applies
- the commands to the final text). After setting the device to the list device,
- simply enter the command PRINT. Each file will "CHAIN" in the next file
- and you will have the full user manual which will teach you to use the other
- features. "DEVICE C" returns the print or listing to the console device.
-