Table of Contents
TIP: Use the bullet (•) in the search for
headings.
• Acknowledgements
• Welcome Letter from the President of HMUG
Section I — • About HMUG
I.a. • Organization
I.b. • Officers and Volunteers
I.c. • HMUG Publications
I.d. • Meetings
I.e. • Library
I.f. • The Hotline
I.g. • Telecommunications
I.h. • Activities
I.i. • Special Interest Groups
I.j. • Tutorials
Section II - • Bits and Slices
II.a. • By-Laws of the Huntsville Macintosh User’s Group
II.b. • Tips and Shortcuts
II.c. • Newsletter Advertising Rates
II.d. • Access to Services
II.e. • A Brief Communications Tutorial
II.f. • The Macintosh Family
II.g. • Virus Management on the Macintosh
II.h. • Glossary of Terms
• Acknowledgements
Putting
together a handbook which provides information on a variety of subjects
requires the input and skills of many people. The membership of the Huntsville
Macintosh Users Group is a talented group of people. Everyone did their part by
creating products, researching, typing, lending support when required, and even
editing.
I
will not try to mention all the names here; however, I salute all the dedicated
members who have provided input to this manual. I especially would like to
thank the Washington Apple Pi, Ltd.,
for their electronic files which provided the basis for some of this handbook.
Welcome Letter from
the President of HMUG
Dear New Member:
Welcome!
Over the years, HMUG has helped many computer users to get more from their
equipment. Yet an important objective has always been the individual. You
matter. I think you will find when you reach out to try some of HMUG’s
services that help is there for you. Our members are quite varied. They range
from the very young to retired. They include ‘hackers’ and business
people, men and women. Our members are blue collar, white collar and T-shirted.
We like to think of ourselves as a family organization, offering many things to
our diverse membership.
HMUG
can help you in numerous ways, many of which are discussed in this Handbook.
Among the most important are our: reference library, monthly formal and
informal meetings (with question and answer sessions and interesting,
informative speakers), monthly Newsletter filled with how-to articles and
product reviews, volunteer experts in a host of areas, and an extensive Public
Domain Software Library. Plus, we have an affiliated electronic Bulletin Board.
Any or all of these may help you get more from your computer.
HMUG
is dedicated to the distribution of information about the Macintosh. Our
meetings are organized to provide members a forum to exchange information and
ideas and to promote better use, understanding and interest in Macintosh
computer arts and science. The exchange of information among HMUG members is
normally conducted in an informal forum. Presentations or demonstrations on
subjects of interest or new products are included in every meeting agenda. To
this end, our club has established several programs to enhance the exchange of
information.
As
you may know, we are basically a volunteer organization dedicated to helping
one another and our community to learn about personal computers. While there
are some activities that require technical skills, other simply require a
little time and patience. If you want to help, call another member. If you give
a little of your time, you will probably get more out of being a member.
Regardless of whether you become a very active member or simply enjoy reading
the Newsletter every month, welcome. We are glad to have you!
The
main activity of HMUG is biweekly meetings on the second and fourth Saturday of
each month. Our formal business meeting is held at the Huntsville Public
Library on the second Saturday. The informal meeting is held at BDM
International Inc., 950 Explorer Boulevard, Cummings Research Park (West),
Huntsville. Meetings are scheduled from 10 to 12 noon.
To
gain the most from the club, members and guests are encouraged to express
freely their concerns and ideas on observations, experiences, or problems which
may impact on their use of the Macintosh. Comments are also solicited on club
program and events. Like anything, to get the most out of it you must get
personally involved and make your requirements and desires known. The club is
always looking for ways to improve our programs. If you have an area of special
interest you would like to share with the Group, please feel free to bring it
to our attention and get on the agenda to present it to the club. HMUG is
dedicated to serve you the
member, and this can only be accomplished if you actively participate in your
club.
Most Sincerely,
George Leach, President
I. • About HMUG
This Handbook has been produced to familiarize
new members of the Huntsville Macintosh Users Group (HMUG) with the many
activities that go on within the organization. Services, meeting dates and
locations, procedures, etc., may have changed since the printing of this guide.
Please watch your monthly Newsletter for updated information. If you ever have
questions about how a service works, who is doing what, or when it’s
being done, please call one of the officers for more details.
Interested Macintosh users are encouraged to
come to our HMUG meetings to see how our club operates and participate in our
program before joining. We know once you have seen what we can offer, you will
be hooked like the rest of us.
How to join HMUG: People can join or renew their membership in the
Huntsville Macintosh User’s Group by coming to one of our meetings and
paying directly, or by sending a check to the treasurer. See the other
bulletins for information on meeting times and places.
To Join the Huntsville MUG by mail - send $20
($22 for family membership) to:
Amy
Shelton
103
Scarlet Oak Circle
Harvest,
AL 35749
Include your name, address, and anything else
that you think will help us serve you, such as machine type, level of
expertise, and whether you’d be interested in helping out. This last item
is important as the User’s Group consists solely of volunteers helping
others, and we can always use another volunteer.
You can also leave a message on the
‘General’ message base of the <TBD> BBS (select
‘M’ from the Main Menu, ‘G’ from the Public Message
Area Menu, and ‘E’ from the Message Menu respectively). If you’d
like more information on the <TBD> BBS operation or log-on procedures,
see Section I.g, Telecommunications.
I.a. •
Organization
HMUG is a non-profit, educational, and social
organization for computer enthusiasts. This guide describes HMUG services,
activities and organization. Success of the club depends on the volunteer
efforts of its members in serving on committees, chairing Special Interest
Groups, and helping out with club events.
HMUG offers many different ways for you to
improve your understanding of how microcomputers work and how you can get the
most out of your particular model. This section will briefly cover each of the
services and activities HMUG presently offers. These services are now available
to you, our fellow member. If you are in need of a service that is not listed
here, or you believe that our membership services should be expanded, check
with an officer of the club, the service may have started since this was
written, or you may be able to assist in getting it going. We are always
interested in the expanding needs of our members, and all of our activities
depend on volunteers. If you would like to get a project started, or would like
to lend a hand with an existing service, call us and get involved.
HMUG business is conducted according to the
approved By-Laws which are periodically reviewed and updated. The HMUG Bylaws
are included at the end of this guide.
Staff and Volunteers: All of the services
offered to the members of HMUG are made possible by the committed efforts of
many volunteers. For example:
• The Disk
Librarian, along with many volunteer
helpers, is responsible for collecting, categorizing, cataloging and
duplication of Public Domain and Shareware software programs.
• The Editor with the assistance of several others is responsible
for monitoring all aspects of the Newsletter.
• The � Ambassador
is our interface with Apple ® and
the Macintosh User Group community and their many services and publications.
I.b. • Officers
and Volunteers
The HMUG Executive Committee consists of five
elected officers: President, Vice-President, Secretary, Treasurer, and
Programs, supported by appointed volunteers. The current officers and principal
volunteers are:
Elected Officers
President:................ George
Leach
Vice President:......... Bob
Doehrman
Secretary:................ Lee
Jones
Treasurer:................ Amy
Shelton
Programs:................ John
Celestian
............................... Jackie
Dannenberg
Appointed Officers
Membership:............ Amy
Shelton
Librarians:............... Lipmon
Moy
............................... Bob
Doehrman
............................... George
Leach
Newsletter:............... Ann
Houser
Publisher:................ (
Vacant )
Publicity:................. Gloria
Guay
Apple Ambassador:.. Frank
Baird
Election of officers is by secret
ballot from a slate presented by a Nominating Committee and/or nominations from
the floor by the general membership. Per the Huntsville Macintosh User’s
Group Bylaws, elections are held in February. Nominees must be willing to serve
in the capacity or the name is withdrawn.
Duties of the Officers
The president appoints all committees and is an ex-officio member of all committees.
The vice-president performs in the absence or disability of the
president, and when so acting shall have all the powers of, and be subject to
the restrictions on, the president.
The secretary keeps minutes of all membership and executive officer
meetings. He maintains a file of all official correspondence of the HMUG,
conducts official correspondence of the Group and performs such other duties as
may be designated by the Executive Committee.
The treasurer is responsible for financial records and accounts of
HMUG. The treasurer keeps and maintains adequate and correct books of account
showing the receipts and disbursements of HMUG with such depositories as are
designated by the Executive Committee.
The programs officer
is responsible for arranging for programs for the monthly formal meeting and
announcing the planned program in the monthly newsletter.
Appointed Officers or
Volunteers
The President appoints such volunteers as deemed
necessary to support the normal functions and special activities of the Group.
These appointed officers serve at the discretion of the Executive Committee for
the term of their office or until completion of the activity. These appointed
positions are:
• Membership
Chairman
• Librarian
(Software and Book Libraries)
• Newsletter
• Publisher
• Publicity
• Apple Ambassador
I.c. • HMUG
Publications
The HMUG Newsletter
Who gets the Newsletter? All HMUG members receive the Newsletter. Copies of the Newsletter are available for interested non-members, if
requested.
What is in the Newsletter?
• roster of elected
and volunteer officers
• minutes from the
last formal meeting
• advertisement
rates
• vendor
advertisements
• for sale items
• Apple
Ambassador’s Report
• <TBD>BBS
Report
• President’s
Report
• articles from
other Macintosh newsletter
• time, date, location of future meetings
When is the Newsletter published?
Monthly.
Where is it distributed? The Newsletter is available for pick up at the formal or
informal meeting closest to its print date. If members cannot attend the
meeting, it is mailed to them.
Why is there a newsletter?
The Newsletter
is our primary means of distributing information to all HMUG members. It also
serves as a hard copy record of the formal minutes of our meetings.
How is it produced? Input:
Articles, ads, etc., must be submitted to the editor according to the schedule
shown. Information can be delivered electronically (<TBD>BBS), by
diskette, or by hard copy. The Newsletter is produced using PageMaker on a Macintosh SE.
Output: The diskette containing the completed newsletter is given to the
publisher who produces a laser hard copy. The “master” is used for
reproduction.
How can I become involved in the newsletter?
Contributions to the Newsletter are encouraged. All members are invited to
submit articles. In other words, ANYONE can contribute!
The most popular service HMUG members enjoy is
the monthly Newsletter.
Each issue, which is provided to all members as a benefit of membership,
contains pages devoted to a wide range of computer subjects.
Submitting Items for Publication: The editor solicits articles on any subject
relating to computers: problems solved and those in need of solutions, reviews
of hardware and software you have purchased and think others should buy or
avoid and why, humorous articles, and articles on interesting applications you
have discovered. You do not need to be an expert to write an article. Many of
the best articles are written by novices who are sharing their frustrations and
triumphs in getting the darned things to work in the first place.
Submitting an article for publication is very
simple. The first step is to write one. Then submit the article on paper or on
disk. Alternatively, you may be able to send your article to the Editor via the
<TBD> bulletin board, or directly via modem. The Editor appreciates all
articles in any format and encourages everyone to write something, no matter
how short.
Classified Advertising: The Newsletter also contains a section where members can place
classified advertisements.
Display Advertising: The Newsletter also publishes commercial advertising. Many
advertisers offer special discounts or deals for HMUG members — read
their ads carefully. When you patronize those businesses, be sure you let them
know you saw their ad in the HMUG
Newsletter. If you
would like to run a display advertisement in the Newsletter, contact the Editor for more information.
Newsletter Distribution: The editors attempt to make distribution during
a club meeting to help defray some postage costs.
Back Issues of the Newsletter: Limited
numbers of back issues of the Newsletter are available from the Editor.
Other Publications
Member Handbook-
HMUG offers a few other publications to serve its members. One of these is the
Handbook, which you are now reading.
Membership Directory - HMUG also publishes a Membership Directory to
help you stay in touch with each other. It lists the names, telephone numbers
and cities (but not street addresses) of our members who have given permission
to have this information published in the directory. The Directory is listed
two ways, one is arranged alphabetically and the other is by zip code. We ask
our members not to distribute this list to non-members or use it for commercial
solicitations.
Macintosh Catalog Disk - At least once a year we publish a Macintosh
Catalog Disk listing all the software available in our Macintosh disk library.
The disk usually sells for around $1.00 (or you can copy it to your own disk)
and includes an alphabetical list of all files, as well as descriptions of most
of the files.
Special Interest Groups (SIGs) are set up, as needed, to cover specific
topics, some are machine specific, some are program specific, and still others
are industry specific. There is no additional charge to participate in a SIG,
and you are welcome to attend as many SIG meetings as you would like. See the
SIG Chairman for details on meeting times and more details.
I.d. • Meetings
The Huntsville Macintosh Users Group (HMUG) was
formed to assist its members in getting the most out of their Mac. We do that
by exchanging information and arranging demonstrations of new hardware and
software at regularly scheduled meetings, and managing a large library of
public domain software. These meetings also provide a channel for novice users
to get their questions answered by more experienced MacUsers.
When HMUG Meets: The HMUG holds two scheduled meetings each
month. The meeting on the 2nd Saturday (10 AM) is a formal business meeting,
including a program, etc., while the 4th Saturday meeting is informal,
consisting of swapping MacTips, exchanging public domain software (really! No
commercial stuff!), and of course a program or demonstration. Often tutorials
are presented at the meetings. Send a message to Frank Baird, George Leach, or
Lee Jones if you’d like more information.
Where HMUG Meets: The HMUG meets on the 2nd Saturday of each month
at 10 AM to 12 AM at the Huntsville public library. The informal meeting, held
at BDM in West Research Park, also runs from 10 AM to 12 AM.
Second
Saturday of the Month
Huntsville
Public Library
915 Monroe St.
Fourth
Saturday of the Month
BDM
Cummings
Research Park West
To get to the informal meeting held at BDM, head
west on Bradford Drive until it ends, then turn left (South) onto Explorer
Blvd. Then take the first left into the BDM driveway. Bradford Drive is the new
interchange on Rideout (South of University & North of Madison Pike). Many
of you will want to get on Rideout to get to Bradford.
General Meeting: The largest of HMUG’s monthly meetings is
the General Meeting, usually held on the second Saturday of each month. The
focus of most General Meetings is a program that consists of a speaker or a
panel discussion, then a free-form Questions and Answer session. For many
members, the highlight of these meetings is the Q&A session. This session
provides an opportunity to ask questions and exchange comments and ideas with a
large cross section of users as well as professionals in the industry.
Most General Meetings follow this agenda:
Disk Sales
9:45 a.m. - 12:00 p.m.
Business Meeting
10:00 a.m. - 10:45 a.m.
Flashes
10:45 a.m. - 11:00 a.m.
Macintosh Q&A Session
11:00 a.m. - 11:15 a.m.
Scheduled Demonstration Program(s)
11:15 a.m. - 12:00 p.m.
Occasionally, we alter the agenda of these
meetings to accommodate a special presentation, such as when significant new
products are introduced, when topics (such as music or games) are not
computer-specific, or when nationally recognized figures come to speak.
The HMUG sponsors many different programs
designed to serve the general and specific interests of the micro-computing
community. Our program schedule is planned to coincide with the Club
Officer’s term of office. Here was our proposed schedule for 1990, the
actual schedule was adjusted to meet the needs of the guest speakers or special
club activities. Both the formal and informal programs are shown.
July 14,1990 — Program
Developers’ Workshop
July 28, 1990 — Games
Demonstrations
July 28, 1990 — Flight
Simulator Demonstration
August 11, 90 — Print
Spoolers
August 25, 1990 — PostScript
- What is it and why?
August 25, 1990 — QuickDraw
- What is it and why?
August 25, 1990 — Type Align
September 8, 1990 — Import
Data from IBM Clone
September 22, 1990 — Swap
Shop
September 22, 1990 — Oracle
Video
October 13, 1990 — Explanation
of a Simple HyperCard Program
October 27, 1990 — Training
Session
November 10, 1990 — Watch
the Newsletter Go Together in PageMaker
November 24, 1990 — FileMaker
File from MacDraw and Exel Data
December 8, 1990 — Graphics
Tutorial and Demonstration
December 22, 1990 — No
Meeting
January 12, 1991 — Preparations
for IEEE Fair
January 26, 1991 — System
7.0 Features
February 23, 1991 — MIDI
Demonstration
March 9, 1991 — My
Favorite Desk Accessories
March 9, 1991 — HMUG
Elections
March 23, 1991 — Voyager
Demo
TBD — WINGZ Demonstration
If you’re like most new HMUG members, we
can predict two things:
You’re going to be
amazed at the amount of expertise that people in the club have about personal
computers, and . . .
. . . yet it seems at times
that those people speak an incomprehensible language not meant to be understood
by ordinary humans.
The Question and Answer sessions at monthly HMUG
meetings represent one of the most useful services members provide to each
other. Some of the most knowledgeable computer users in the area —
indeed, in the country—field questions from the audience on any
computer-related subject. Occasionally even these experts are stumped, but
there will often be someone in the audience who knows the answer to the
questions or can direct you to someone who can answer it.
Coping with
Techno-Speak
Welcome to Techno-speak. Every field has its own
jargon; computers are one of the worst. We have included a glossary of computer
terms in this Handbook, which we hope will help.
But just as a French phrase book is of little
use in the middle of a Parisian traffic jam, a glossary of computer terms can
be of only limited assistance when someone is trying to explain at a Mac
Q&A session how the stack sniffer ROM keeps the application heap from
colliding with the stack during a segment load.
There is an overwhelming tendency when faced
with a difficult question to which one knows the answer—just to answer
the question. This leads sometimes to forgetting to explain the answer in more
comprehensible language.
This creates some difficulties for those not
fluent in Techno-speak. There is another tendency many of us have, particularly
when we are new to something—to be shy about asking a question. This is
particularly so when we think that everyone around us knows the answer to the
question. From periodic surveys of people who attend HMUG meetings, we know
that roughly one-fourth of the people at the meeting have never attended more
than two meetings before. Most of them are novices like yourself.
Accordingly, I ask this of you: If someone asks
a question to which you would like to know the answer, and the answer sounds as
if it was given Linear B, do not hesitate to ask the person answering to
explain things in simpler terms. The odds are great that many others in the
room would also like to have the answer explained.
I will hazard another prediction. The odds are
that you will discover, more quickly than you may today imagine, that you are
gradually picking up Techno-speak. Soon, you will be bandying about terms like
CPU, Head Crash, Pseudo-Random Numbers and XMODEM. It will not be long after
that before you move into advanced Techno-speak, using terms not even in our
Glossary. At that point, you can come to the front of the auditorium and give
us a hand!
I.e. • Library
The Huntsville Macintosh Users Group (HMUG) maintains a disk and book library for the use and benefit of the membership. The primary purposes of the library are to promote interest in Macintosh computer use, provide members means of trying new free-ware and shareware, and expanding knowledge and use of the Macintosh computer. Members are encouraged to check-out material or copy any disk at the meetings subject to the policies and procedures below.
Library Policy
Check-out of Disk Library, Books, Publications
and Videos:
Eligibility
Current Membership
Location
Pickup and Return at HMUG
Meetings
Period
Two Week Interval Between
Meetings
Extensions
Approved If No One Is Waiting
Items Available in the
Book Library
Books and Publications: These may not always be the latest edition and
may not apply to the newer series Macintosh systems.
• Macintosh Complete (1984) by Merl Miller & Mary Myers —
Introduction to the Macintosh and its capabilities - 119 pages
• Supermac (1985) by Danny Goodman — How to manage and use
your MAC - 282 pages
• Macintosh Revealed (1985) by Stephen Chernikoff — Volume 1 -
Unlocking the Toolbox - 516 pages — Volume 2 - Programming with the
Toolbox - 625 pages
• Online (1984) by Steve Lambert — Discussion and
examples of modem communications - 319 pages
• The Power
User’s Manual (1986) by Randel
Kottwitz — Hints, tips and shortcuts with extensive index - 162 pages
• 68000 Assembly
Language Programming (1981) by Gary Kane — Programming and architecture
of the MC68000 - 563 pages
• The Little Mac Book (1990) by Robin Williams — Informal guide for
new Mac users - 104 pages
Information Catalogs and Product
Directories: These are
maintained for one year or until the new edition is published.
• ADAPlog
— Information catalog for programmers and developers.
• DEVELOP
with CD ROM Disk — Technical
journal for programmers and developers.
• Macintosh
Development Tools and Languages Guidebook — Summary of available development programs and applications.
• Apple
Guide to Desktop Publishing — A
summary of Apple products and third party hardware and software.
• Apple
Guide to Networking and Communications Products — Discussion on protocols, environments,
products and tools.
• Apple
Vertical Market Product Directory
— A catalog of third party programs and applications.
• Quick
Connect — Apple newsletter for
User Groups.
• Disk Library Catalog with STUFFIT Users Guide v1.5 — Includes an explanation of STUFFIT options.
Technical Support
Publications
• Macintosh Technical Notes
• Sound Manager Notes
• Human Interface Notes
• Script Manager Notes
• Macintosh Sample Code Notes
• Tech Tidbits
Video Material
User Group Connection video tapes are available to any
club member for review or copy. Tapes will be maintained for one year unless it
covers special material of interest to the membership.
Personal Books and
Publications
Club members have extensive libraries of personal books and publications which they may be willing to comment on or loan out for review. Members who have an area of special interest and would like to review selected publications to determine if they meet their needs can often find a member who has purchased the publication. These interests should be discussed at the club meetings for comments or availability to review before purchase.
Software Libraries
HMUG maintains an extensive collection of
software available for members to copy or purchase at minimum expense. This
provides members with a source to obtain inexpensive shareware and public
domain applications and other files useful with your computer. This software
includes a wide variety of utility programs, games and entertainment software,
system software, demo programs and applications for review, educational
programs and - most important of all - programs that members have written to
serve their own needs but which often support the needs of others as well.
The Macintosh disks are organized by functional
categories of programs including Utilities, Desk Accessories, Games, Clip Art,
INITs & Cdevs, Miscellaneous, Sounds, and HyperCard Stackware. The majority
of Macintosh programs are on 3.5" double sided 800K disks.
You can obtain copies of these disks by
purchasing prerecorded disks or by copying to them to your own disk at the
meetings. You can buy disks from the Treasurer.
A catalog is available which describes the
programs available on disk and provides an alphabetized list of all files. The
lists also include information such as file size and date. The catalogs are
updated as time permits and new disks are added to the library.
Our software collection has grown to its present
size by the continuing contributions of our members, and we welcome your
donations. Prepare a disk with any programs that you wish to share with other
members. Have you written a program to keep track of your kitchen recipes? We
want it! Have you computerized your jogging logbook? We need it! We will also
welcome programs typed from magazines, provided that the programs can be
distributed without restriction. If you did not write the entire program
yourself, please let us know its source. It is also helpful if you include a
text file with documentation on the program’s use. You can submit your
disks at the General Meeting to the Treasurer or Disk Librarian. You need not
“fill up” a disk before you contribute it.
If you receive a defective disk, you may
exchange it at no cost at the General Meetings. Defective disks are those which
cannot be read by your computer or that do not contain the material described
in the disk catalog. However, if you damage a disk due to carelessness (my dog
ate it), we are not in a position to exchange it.
You may occasionally find some programs on our
disks that do not work on your computer. This may be due to the configuration
of your particular machine, the system software on your machine or due to an
error that the software author has made. Apple published guidelines for
software authors but they are not always followed and sometimes the guidelines
are changed or added to in ways neither the author or Apple could have
foreseen. In any event, the result may be a program that works on one
configuration of machine or operating system and not others. We ask your
forbearance as we can neither guarantee that programs will work or keep up with
all the variations of configurations that exist. If you get a program that
doesn’t seem to work, try running it with versions of the system software
that are have a date similar to the date on the program.
Although every programmer attempts to write
perfect programs, bugs tend to turn up when the public uses a program in ways
that its author did not test. HMUG cannot guarantee the quality of its
programs. We would appreciate reports of errors and any known fixes. Debugging
someone else’s program is a great way to learn new programming
techniques! We will try to contact the program’s author.
All User Groups are plagued by the problem of
frequent updates to popular software. Sometimes you will see the same file name
on several disks, but this is because we would rather err on the side of making
sure you get the latest version. If you find that one version of an application
does not work your Mac, try an earlier or later incarnation. (Having said that,
we also caution you not to throw out old versions until you’re sure that
the new version works to your satisfaction.)
Safe Computing: Don’t initially run
untested programs from your hard disk; first boot from a floppy disk, unmount
the hard disk and then run the new program. Check any and all new acquisitions
with a current Anti-Virus utility prior to using them. Only when you are
satisfied that the program does what it is supposed to and is well behaved,
should you run it from your hard disk.
A final note: Always keep a backup copy of your
application and data files since your files may be inadvertently damaged at any
time; usually when you least expect it and usually involving your most
important files. This is true using programs on public domain, shareware, or
commercial disks Remember there are only two types of computer users;
“those who have already lost data and those who will lose data.”
Shareware and Public Domain Programs: Programs on our disks are usually one of three
types: public domain, copyrighted with restriction or “shareware.”
Public domain software has been placed in the public domain — that is for
use without any restriction —by the author. Users may freely copy the
whole or any part without reservation. Software that is copyrighted with
restriction may be free, but the author owns the program and reserves specific
legal rights to the code and to the distribution. Shareware is a relatively new
marketing device that permits you to try out software at your convenience for a
reasonable period of time. At the end of the tryout period you are honor bound
to pay the author the fee he or she requests—usually a nominal
amount—if you are going to keep the product.
Shareware is not free! At the end of the trial
period if you decide not to use the product (and not to pay anything), you are
asked to destroy your copy of it or give it to someone else, making sure that
the other person knows the shareware nature of the product. Shareware is a
great alternative to high-priced commercial programs that you usually have to
read about or test in a retail store for only a few minutes before you decide
whether or not to purchase the product. HMUG supports the concept of shareware,
and reminds you our obligation to “pay up if you keep it” after the
stated trial period. All computer users have a vested interest in supporting
developers who produce good shareware. This can only be done by sending your
money to the person(s) who took the time and effort to produce a product that
you find useful. Shareware deserves your support!
Copy Protected Software: Copy protected software is designed and
distributed in a manner that prevents the software from being copied using
standard means, such as Filer in ProDOS or Finder on the Macintosh. Software
publishers use copy-protection to prevent unscrupulous users from giving copies
to their friends. Unfortunately, copy protection also prevents legitimate users
from storing the program on a hard disk, on RAM disks or makes it impossible to
make legitimate copies for back-up purposes.
Probably the most effective deterrent to copying
is the printed material and documentation that comes with each program. At
times, some people will copy a program and then impose upon Hotline Volunteers
to answer questions, the answers to which would be apparent from reading the
documentation. Such deceptions are easily spotted. Hotline Volunteers will
respond only to questions from legitimate owners. Please call our Hotline
Volunteers only after consulting your documentation and if you are truly
stumped.
In general, experienced users avoid using the
original copy of any software. The original is too easily damaged, erased or
accidentally destroyed. Under federal copyright law, a user may make a back-up
or “archival” copy of software he or she owns. Virtually all
publishers attempt to defeat this legal right to some extent by
“licensing” the software to the purchaser instead of selling it.
They package a license agreement in the shrink-wrapping of the package, and
argue that tearing off the shrink-wrap (or using the program) constitutes
acceptance of the terms of the license, whatever they might be. Some
jurisdictions passed laws to make such shrink-wrap licenses binding on buyers,
but at least one court has held that such laws are invalid.
Software Piracy: HMUG opposes software piracy. Software piracy is
not only illegal, it is also self-defeating in the long run. Piracy encourages
publishers to use cumbersome copy protection schemes that hurt legitimate
users. Piracy also discourages future software development, to everyone’s
loss.
One reason some people are tempted to copy
software is to “try it out before buying it.” To address this need,
HMUG has asked publishers to donate software to its Commercial Software
Library. This software is then made available to our members for a test-drive.
As noted above, the lawful copying of software is, by definition, lawful, even if the software is copy-protected. A number of highly effective programs are available for copying copy-protected software on the Mac. For example, Copy II Mac will copy most Mac software. These products come with extensive instructions and product support. Supercopy is a shareware program that will also copy Mac software. Again, we note that the purpose of these programs is to make lawful copies of software that you own and not to permit you or anyone else to distribute copies to non-owners.
I.f. • The
Hotline
One of the most important services HMUG offers
is the Hotline. This is a list of volunteers who are available to help you with
your problems and questions. If you need help with a specific program, a piece
of hardware, a programming language or many other computer related problems,
these kind souls have volunteered to try to help you out. The list of Hotline
volunteers appears in your Newsletter each month. Phone numbers are generally home
phones. Please observe any conditions listed by the name of each volunteer.
Because of the number of inquiries they receive, Hotline volunteers may decline to answer questions from non-members. Please identify yourself as an HMUG member when you call. Also, please do not call with questions about problems with a commercial product unless you have purchased that product. However, Hotline volunteers will gladly entertain reasonable questions about whether a product will do something to meet your needs even if you don’t own it. Many of the volunteers are constant and very enthusiastic users of the products about which they answer questions!
Using the Hotline:
It’s easy! Find the current list of
Hotline Volunteers in the Sign-in Book at the club meetings. To use, simply
locate the topic of the program or problem you are having. Then call the person
listed under that heading.
If you would like to help your fellow members by answering questions on the Hotline, please volunteer by calling a club officer or entering your name in the Sign-in Book.
I.g. •
Telecommunications
The <TBD> BBS is independent from the
Huntsville Macintosh User’s Group (HMUG), and provides HMUG members a
valuable service as outlined below at a reduced price. However, BBS users are
not required to join the HMUG.
The BBS is now running Second Sight 2.1b10, which now has Zmodem support for downloads. Second Sight is the new name for Red Ryder Host (because of licensing problems) so users will not notice any significant changes other than the logoff message and the Zmodem option.
1 - File Transfers
One of the major reasons for a BBS, and by far
the most used aspect of the system, is the capability to exchange software
(S/W) over the phone. What do you, the BBS user, need to accomplish this feat?
This bulletin will answer that question!
First, some background on file types and
transfer methods: The BBS S/W supports four types of files: Macintosh
applications, Mac documents, other applications and documents, and plain text
files. So far this particular BBS has not included the third category, which it
would if we supported an Apple II section. The first two categories can, for
the purposes of file transfer, can be lumped together as ‘Mac
files’ and will be discussed later.
This leaves text files. These files can be
downloaded (DL’ed) in three ways: Xmodem CRC, Xmodem Checksum, and
ASCII. Text files are the ONLY
kind of file that can be DL’ed with a straight ASCII transfer. This means
that the text characters are simply shipped across the telephone line as they
occur within the file. If a noise burst changes one of the characters (like
th{s) there is no way that your computer can detect it and either correct it or
request a retransmission. However, you can both detect it (because
‘th{s’ is not an English word), and correct it (because
‘this’ is what you would expect in an English sentence with that
context).
Before we get too far afield, any computer using
a terminal emulator can save text to a file, which almost all decent emulators
can do. (An emulator is a program that ‘transforms’ your computer
into a terminal, by routing keystrokes from your keyboard to the modem, and by
displaying characters from the modem on your display.) Applications and
non-text documents (e.g., pictures) are much harder to transfer, because they
are binary files. This means that each byte (the unit of information that is
transferred over the phone line) can be any value from 0 to 255. Most of these
bytes aren’t displayable and some mean special things to the communication
protocol. All the bytes in a text file will be printable characters or
<carriage return> or <line feed>, (i.e., values ranging from 32 to
127, and 13 and 10). Also, errors are more critical. If you DL a program and a
noise burst changes a ‘65’ to an ‘85’, the program
probably won’t work and you will be hard pressed to dig through a dump
and figure out which value has changed.
For these reasons, the Xmodem protocol was
developed (by Ward Christiansen). Each file is divided into 128-byte blocks
which are sent one at a time, each with a checksum which is used to determine
if errors occur during transmission. If errors occur, the receiver can request
retransmission until the block is received correctly. There are also standards
within the protocol that specify what to do if there is no transmission within
a time limit, etc. Red Ryder Host (this BBS!) supports both Checksum and CRC.
Xmodems: Checksum is the ‘original’ and is more widely
supported, whereas CRC has significantly better error detection capabilities.
Use Xmodem/CRC if you can.
Most terminal emulators support one or both
versions of Xmodem. Why then are people having trouble downloading files? Well,
files on most computers are just streams of data associated with a name (a
slight simplification). Mac files often include two data streams, the data
‘fork’ and the resource ‘fork’, as well as the file
information such a Creator and File Type. The problem of transmitting Mac files
and preserving this information was solved with the MacBinary protocol, which
defines the data WITHIN the 128-byte blocks of Xmodem.
All Mac file transfers on this system are based
in the MacBinary protocol, thus making file transfers over phone lines almost
as simple as disk-to-disk transfers (though slower). To use download Mac files
from this system, your terminal emulator must support MacBinary! Although older
versions of some software do not, virtually all of the current versions do
support it! This includes Red Ryder 8.0-10.3, MacTerminal 2.0, SmartCom II 2.2,
and Microphone 1.0, (i.e., all of the ‘common’ terminal emulators.)
FreeTerm is a *free* terminal emulator that supports MacBinary, though it
won’t provide all the goodies that these others will. Do NOT buy a
package that doesn’t support MacBinary, unless it has some special
capabilities that you can’t live without (such as Tektronix graphics
emulation).
To summarize: virtually any computer with a decent emulator can do text (ASCII) file captures, while only emulators supporting MacBinary and Xmodem can download Mac files correctly. There are several good reasons that this board will not use alternative protocols, so it is up to the user to get software that supports the standard.
2 - File Uploads
In order to keep duplicates off the BBS and to
aid in the maintenance of the system, uploaders should try to follow the
following guidelines:
Never upload commercial software.
Try to use StuffIt or an equivalent program to
compress the files. This saves both disk space and DL time for everyone who DLs
the file. One exception to this rule is GIF files, which are already compressed
and don’t get significantly smaller after stuffing.
The actual file name (as seen at the Finder
level) of the to-be-uploaded file should include the version. This greatly
assists the SysOp in keeping track of what’s recent and what’s
obsolete.
The BBS allows only 12 characters for the BBS
file name. Use it wisely. An ‘.S’ can be used as shorthand for
‘.SIT’. I sometimes put the .Sit in the Version field.
Before uploading, use the G and S commands (in
the Uploads menu) to search the All_Files and Uploads sections for duplicates.
The name used for the upload may not be exactly the same, so use an uncommon
fragment of the name. Using ‘BBS’ as a search key would list all
files with ‘BBS’ in the name, including ‘HyperBBS’,
‘BBS Report’, ‘Huntsville BBSs’, and so on. For
example, if you were about to UL Sound Master 1.5, you could search for Master,
Sound, Snd, Mstr, etc. If you do find a possible match, check the version of
the existing file. Don’t upload your file if the same version is already
online. (If there are special circumstances, contact the SysOp and explain them
after uploading.)
If your upload supersedes an older version that
is online, send Email to the SysOp or leave a message in the
‘Files’ message base to indicate the old version should be deleted.
(I try to catch these cases, but it helps to have reminders.)
Do not upload pornographic material. The
standards here are roughly the same as commercial services such as GEnie, which
means that R-Rated material is allowed and X-rated isn’t. Nudity is
allowed, but sexual acts or anything extremely suggestive are not.
Unless you are well-known to the SysOp, any ULed
files will not be available for DL immediately until I take a look at them,
which may be a day or two. Feel free to send me a reminder but don’t get
upset if you don’t see it immediately.
All files are uploaded to a special section. I will move the file to the proper section after it is checked. Users may DL from this section, but be aware that the files may be viral, obscene, or just a waste of time. Therefore, do so at your own risk!
3 - File Downloads
The TBD BBS has numerous file sections, which is
a collection of files. The ‘primary’ file sections are organized by
type of file, such as applications, utilities, Mac II files, communications
files, DAs, and so on. The exact categories may change over time as the BBS
evolves, but the basic concept stays the same. There are intrinsic problems in
deciding where a given file should go. For example, should a HyperCard-based
adventure game go into the HyperCard section or the Games section? Does a
terminal emulator DA belong in the DAs or the Communications section? In short,
you may have to try a couple of different locations. Only BBS members (i.e., those
that support the BBS financially) have DL access to these files.
All of the files within the
‘primary’ sections are collected into a single ‘All
Files’ section. When using the Search command to look for a file, this is
the place to go, since files in any of the primary sections can be located. Again,
only BBS members have DL access, but all BBS users can browse.
The ‘Going’ section contains files
that are being purged, usually because they’ve been on-line a long time
and the space is needed for newer files. All BBS users have DL access to these
files.
Apple System and Developers files are on-line as
well, but are NOT included in the All Files section, for legal/licensing
reasons. All users have access after agreeing to Apple’s license.
Some of the Apple files may be a tad large to DL
in the allowable time. BBS members have from 75-95 minutes, but other validated
users only have 45. You can use the ‘More Time’ option between
midnight and 3 AM to get up to 180 minutes of connect time.
All BBS user may upload a file to the HMUG
newsletter by using the ‘N’ command at the top file menu. Only BBS
members may DL from this section.
The ‘L - New-files since Library
Update’ command is not really meaningful due to poor coordination between
the HMUG library and the BBS. The intent was to list all files that are not yet
in the HMUG library.
The ‘Uploads’ section is a holding
area for new uploads.Use at your own risk.
The Private file section is an area for users to
send files to each other. Details are included in a help file under that menu,
but the process will entail an UL followed by a message to the recipient giving
the name of the file. Only users who are told the name will be able to DL. All
files will be deleted in 10 days.
Finally, there is a special section for RRHost Utils support. Eventually current versions of my utilities will be there, and users may UL problem files if they think they’ve found a bug.
4 - StuffIt (.sit) and
Packit (.pit)
Many files here have suffixes of either
‘.pit’ (Packit) or ‘.sit’ (StuffIt). To transform these
files into something usable, you will need to unpack or unstuff the file. Both
Unstuffit (free) or StuffIt (shareware, and worth every dime) will do the job
on everything but encrypted Packed files.
Both programs are used to pack several files
into a single file, and to compress the files into a denser package. This saves
storage space for infrequently used files, and, more important, reduces the
time required to transfer the file across phone lines. By combining several
files into a single entity, uploaders can ensure that anyone who downloads a
file will get all the necessary parts. For example, an application might be
packed with documentation and one or more examples.
Packit was first on the scene and quickly became
essential to anyone who downloaded Mac files, as most were
‘Packit’ed. StuffIt is a more recent arrival, but has superseded
Packit because it is faster, provided random access to the files contained
within a Stuffed archive, and provides better compression resulting in smaller
output files. I have actually compressed a 340K+ file down to 47K. StuffIt also
provides the capability to unpack ‘PackIt’ files.
StuffIt is shareware and may be used to Stuff files. UnstuffIt is free but can only unstuff files that you have downloaded from another system. Both files are available on the <TBD> BBS or the HMUG Disk Library.
5 -
New User Message
Most services on this system are free, but only
BBS members may download (DL) most files. Other users are free to ask
questions, give answers, argue about the topics of the day. They may browse the
file sections to get an idea as to whether BBS membership is worth it. All
users also have access to Apple System and Developer Software after agreeing to
Apple’s License. All users have access to the ‘Going’
section, which contains files that are in the process of being removed from the
BBS.
One point in the last paragraph needs to be
emphasized because some people miss it: download privileges cost money. See the
bulletins for details. Validation: All users should validate immediately. This
system does not show menu options that you don’t have privilege to use.
Unvalidated users won’t even see 80% of the BBS. Validation consists of
leaving your name, address, and phone number, which may be verified at my
option. Leaving false information is grounds for removal of all privileges. All
users should read the bulletins, which are accessed by entering a
‘B’ at the main menu. The bulletins cover all sorts of items,
including how the file system is organized, general BBS tips, how to join the
HMUG, and so on.
After browsing for a session or two, you may
decide that it’s worth joining the BBS in order to get more time per call
and the ability to download files. To join, you’ll need to send in $9 if
you’re a HMUG member or $18 if you’re not. Details are listed in
the bulletins.
6 -
BBS Standards:
The normal restrictions of all BBS’s apply
here:
All messages should be free of profanity and
character slurs, and all messages should meet basic standards of taste.
No illegal or immoral activity will be allowed,
with the SysOp being the judge of what’s immoral or illegal. In keeping
with this policy, the SysOp reserves the right to read all private mail.
However, your privacy will be respected.
If in doubt, keep silent or ask the System
Operator.
7 - Feedback:
Suggestions, complaints, and questions may be
sent to the SysOp in several ways. If other users may be able to help (and this
is often true), then send the question as public mail to the System Operator.
If it is something that only I can answer, such as ‘Did you get my
check?,’ send the question as either private mail (Email) or use the
‘Private Message to SysOp’ option. Entering a ‘C’ at
the Main Menu will take you to the SysCom menu with both these options. In
extremely rare and urgent situations, you may request to Chat with the SysOp
from this menu, but don’t do it unless you have a really good reason.
Also, if you’re having troubles getting connected, it’s OK to call
me (Tom Konantz) at 881-6483 after 6:00 P.M. and before 11:00 P.M., or drop by
the Mac Users Group meetings.
Generally, messages stay up at least 60 days
before they’re flushed. Do not delete public messages, even if addressed
to you, if the message would be of interest to others.
8 -
Validation
This system is based on a priority structure in
which different users can do different things based on their level. Each level
has all capabilities of lower levels. All new users start at level 10.
All users should use the V command to validate
so that the system operator will have correct names and addresses. This is
necessary to protect me and us from legal problems. All users get more access
time and privileges upon validation.
If you are a member of the Huntsville Macintosh
User’s Group, you should have your membership number and expiration date
ready. This number is shown on your HMUG Newsletter address label. Spot checks
are made to ensure the validity of the information.
Levels:
010 — Read Messages and
File Directory; Leave Comments to SysOp
030 — Enter Messages and
Mail
070 — Validated User Level
080 — Upload and Download
Files
090 — Access to HMUG
business Message base
100 — HMUG member with
access to file sections.
110 — Access to HMUG Exec
Msg base. (requires the Executive’s Pass Word)
120 — HMUG executive with
access to file system.
Time Limits:
15 minutes — Unvalidated
Users
45 minutes — Validated
Users
60 minutes — HMUG
Members/BBS Subscribers/Other Privileged Users
75 minutes — BBS Members
90 minutes — HMUG
‘Executives’
As you can see, it is worth the time to
validate.
9 -
How to Use the BBS - Tips
All menus use a ‘Q’ to get to the ‘parent’ menu,
which is usually the previous menu. You can always return to the Main Menu if
you hit ‘Q’ enough times.
Hitting Control-C will usually abort the current operation. This
is especially useful if you want to stop a long text file read or want to stop
a continuous sequence of message reads. It can also be used in public message
bases to skip the remainder of a message. Different terminal emulators generate
this character in different ways, but it will usually be either command-C or
option-C. There is one exception: hitting control-C while reading a private
message will take you back to the beginning of the message, unlike the behavior
during public message reads. You do not have to wait for a menu to be
completely displayed before entering a command. For example, if, at the Main
Menu, you enter ‘M’, ‘A’, ‘R’,
‘N’ as fast as you
can type, then you will start to read the latest messages on the system. The
example presumes that ‘Hot Menus’ is on, which means you
don’t have to hit <return> after each command. I assume that a
similar sequence will work even if this option was turned off.
The Bulletin, “List Of Menus,” shows a list of all the menus in the
system as well as their hierarchy. Users may want to capture a listing of this
file to become more familiar with the services of the BBS. All of the file
sections are also listed, as well as which Menus reference which file section.
Within the ‘Terminal Parameters’ option,
in the Utilities Menu (off Main Menu), there is an option to select the method
of screen clear (either a Form Feed or 24 <returns>) or to turn screen
clear off altogether. The BBS is easier to use if you turn this off completely,
especially if you have your terminal emulator remembering (scrolling but
saving) past screens. You have less white space to look at. It’s
especially helpful to be able to list recent files and be able to see the list
as you enter the filename to be downloaded. I often Copy the name into the
clipboard, then Paste it directly after the FileName prompt, thus saving any
typing and avoiding any chance of misspelling. If you want to try this, answer
the ‘Hello World’ question with an ‘X’.
10 -
BBS Rates
The <TBD> BBS is now independent from the
Huntsville Macintosh User’s Group (HMUG). It does not mean that we will
be severing all ties with the HMUG, but, in practical terms, that BBS users can
support the BBS in dollar terms without joining the HMUG.
There will be several levels of BBS membership,
each providing more privileges than lower levels, and lasting for 1 year.
Base
Time
Cost Limit Privileges
$0................ 30 minutes —
Message base access
$9................ 75 minutes — Full
Access (HMUG Member)
$18 per Year * 75 minutes — Full
access. No
limit
to file access.
* This category will be offered at a 50%
discount to Huntsville HMUG members. See HMUG/BBS Agreement Bulletin.
“Isn’t $1.50 per month still pretty
expensive?”- Remember this doesn’t include time spent logging in,
communicating with the SysOp, reading messages, etc. The cost is much cheaper
than getting the same file off a national information service, and the BBS
needs cash to continue to stay online without being a personal sacrifice to the
SysOp.
“What BBS rules are in effect for
‘official,’ paid-up, users?”- All rules regarding BBS conduct
apply to everyone. The time limits reflect the maximum time that a caller may
stay on PER DAY during normal hours. (Time limits are extended for early
morning callers.) This allows others to get a chance to use the system.
Users are encouraged to invest in high speed
modems, as it speeds file transfers, and allows the BBS to be used by more
people.
11 -
This System
This BBS is running on a Mac Plus (originally
purchased as a 128K Mac, now upgrade to a 4 megabyte machine) with a DataFrame
20 megabyte and a Jasmine Direct Drive 80 megabyte drive. The modem is usually
a Practical Peripherals PM2400SA 2400 baud modem (when available) or a FHR 1200
Intelligent Modem (from Jade Computer).
The system is connected via EasyNet connectors
to both an AppleTalk ImageWriter II printer and a Mac II (40 megabyte HD,
Color, 5 megabyte RAM). A MagicTape 150 tape drive is connected to the Mac II
and is used to do backups.
During periods of intense BBS maintenance the
DD-80 is connected to the Mac II and the BBS runs on the Plus via TOPS (a
distributed file server). During these periods, BBS performance will be slower
and may drop to nothing during intensive disk activity on the Mac II.
The BBS uses Second Sight (formerly Red Ryder
Host) 2.1b10 software by Scott Watson, author of the Red Ryder/White Knight
communications package (an entirely different program). Several RRHost
utilities are also used: The Message Manager, Host File Editor, Guest Editor,
FSP, TSX, ListMenus, and AnalyzeCL, the last 4 of which were written by the
SysOp and are distributed as shareware to other RRHost systems..
12 -
Main Menu Help File:
B - Used to reach a Bulletin selection menu. All new
users should read
M - Used to enter Message Subsystem. Another menu
listing the different message bases will appear. Selecting one of the bases
will put you into a menu which allows you to read, scan, browse (scan with
option to read), kill, and enter messages.
E - Used to enter Private Mail subsystem. Private mail
may be read by the System Operator at his discretion.
F - Enter the file transfer system. This option may not
exist if your priority level is too low.
U - Used to enter subsystem containing various and
sundry options, including chat with SysOp, change terminal preferences, and
change password.
R - Gets the Red Ryder Utility Support.
C - Comment to SysOp: Use to request raises in priority
level and to make suggestions. Requests must be accompanied with real name,
address, and phone number. If you are a member of the Huntsville Mac Users
Group, include your membership number and expiration date. This will get you
all generally available options on the BBS. If you are interested in Mac
development, say so and you will have access to the MacDev message base.
X - Toggle Expert Mode; Try it and see! When in expert
mode, hitting ‘return’ without a command will list the complete
menu.
G - Good-bye: Logoff... This is done immediately, with
no ‘Are you sure?’ message, so be careful.
13 -
? - Help:
The <TBD> BBS file system is divided into
several different subsystems.
The ‘A’ command will take you to the All Files
section which is an aggregate containing all files in any of the ‘By
Type’ sections. This includes most of the files available for download,
but does not include Newsletter files, files waiting in the Uploads section, or
private files. Off-line files are also excluded.
The ‘T’ command will take to the Files by Type
submenu. Users can specify one of the several different categories, such as
Utilities, CDEV/INITs, Art, Sounds, and Demos. Users are invited to browse for
a current list. Some of the categories, such as Art, Hypercard, and DA’s
(Desk Accessories) are divided into subcategories.
Files from the Communications and AntiViral
sections are available to all BBS users, including non-BBS members (i.e., those
who have not paid a yearly fee).
The ‘O’ command will take you to the
‘Off-line’ section. Off-line files includes a list of files which
are not resident on the BBS but are on backup media and may be retrieved on
request. This service is available only to BBS members. See the help command
within that menu for more details.
‘G’ will take you to the Going section. This is a list of files
that are about to be taken off the system. All users (including non-BBS-members)
can download these files. Files within this section may disappear at any time.
The ‘S’ command will take either take you to the
Apple System SW menu, or to a survey so that you can read and agree to the
Apple license (if you haven’t already). Apple Developer’s Software
(including the latest ResEdit) is available indirectly through this section.
The ‘N’ command will take you to the HMUG
Newsletter file section. All users can UL files for eventual inclusion in the
newsletter. HMUG members can also download from this section.
The ‘P’ command will take you to the
‘Private’ file section, which is intended to provide a means for
BBS users to exchange files without making them available to everyone. See the
Help (‘?’) command within this section for details.
I.h.
• Activities
HMUG “Work” Parties: Despite the awesome title that conjures up
images of drudges shackled to their Mac’s doing penance for unspeakable
crimes against humanity, HMUG “Work” Parties are enjoyable events.
From time to time it is worthwhile to gather a group of HMUG volunteers at a
convenient location to tackle a project of common interest. On other occasions,
a single individual will tackle a chore of common interest and benefit to the
group. Examples include:
a. HMUG Software Library cataloging
session - Our public
domain/freeware/shareware collection of Mac software grows constantly.
Unfortunately, the new programs do not come nicely sorted into collections of
desk accessories, collections of clip art, games, HyperCard collections, etc.
Periodically HMUG members have gathered to sort disks to group software
logically for our library.
b. HMUG Software Library descriptions - What’s on this disk? Our Software
Librarian is in no position to describe the contents of every disk in our
software library. One member, as an individual effort, has reviewed and
prepared short summaries of the content of the Library disks.
c. HMUG Handbook - HMUG members responded to a member’s
leadership in preparing individual sections of this Handbook.
d. IEEE Computer Fair Preparations and
Participation - Annually
(February or March) the Institute of Electrical and Electronic Engineers hosts
a Computer Fair in the Von Braun Civic Center. This is a gathering of most of
the major computer manufacturers, local computer dealers, and local computer
user groups. The Huntsville Macintosh Users Group participates each year in
this activity. Such participation does not come without some planning and
preparations. It is an excellent opportunity for the HMUG to enhance public
awareness of the capabilities of the Macintosh and the benefits of joining the
HMUG. This is usually the single most important event in terms of boosting
membership. We depend heavily on member participation to make this activity
successful. Please volunteer when it is discussed at member meetings.
e. Tutorial Sessions - As interest supports the effort, HMUG
organizes tutorial sessions in major popular Mac commercial software topics.
These sessions are targeted for the new users and do demand considerable “Work”
Party participation.
f. Other Possibilities - You name it, we’ll consider it. Help
the Huntsville Public Library with our software collection? Help a youth group
with computer utilization?
I.i.
• Special Interest Groups (SIGs)
HMUG’s membership is remarkable in its
diversity. Our group can
accommodate a wide range of our members’ interests. The club can form any number of Special
Interest Groups (which can be affectionately refer to as SIGs) if members
express a need and willingness to support them. The assortment of SIGs can reflect the diversity of areas
which can be explored with your computer.
By spending a moment to review your needs, you can define the SIGs which
best match your interests. Then
bring it up at a club meeting and take the lead in forming the SIG. Remember, as you set off to explore
unchartered continents in the Apple world, a SIG can help to guide you on your
explorations. Also, remember that
SIGs come and go depending on the interest of the members. As this publication goes to press,
there are no organized SIG activities.
Special
Interest Groups:
Desktop Publishing SIG: If you have an interest in keeping up with the latest developments
in this rapidly changing field, see the newsletter for the time and place of
the next meeting.
Potential
Special Interest Groups:
Art and Video SIG: Members,
both professional and amateur, can join together to explore graphics and fine
arts, video animation, or just explore existing and upcoming software and
hardware for their particular interests.
Education SIG: An Education
SIG (ED SIG) is another area where a special interest group could be formed to
look at all aspects of using microcomputers for education. Above all, ED SIG is
a place where people involved in the educational use of microcomputers could
exchange experiences and solutions to problems.
Game SIG: Games are
always of interest to a large number of our members. A SIG which demonstrates the latest games and entertainment
programs and provides hints for new game users is another area which can be
explored if you take the lead.
HyperCard SIG: While there
is little current interest in HyperCard among our members, this area can also
be developed. We have a need for
someone to demonstrate the latest stacks and discuss HyperTalk Programming
techniques to expand our involvement in this interesting and challenging area.
Macintosh Programmers’ SIG: Macintosh programmers include not only amateur and professional
programmers, but also non-programmers with an interest in the technical side of
the Mac. Dan Richard has
demonstrated his own projects and conducted classes on the latest programming
tools, and reports on developer conferences.
Programmers’ Interface SIG: A Programmers’ Interface SIG can be oriented toward writing
assembly language routines which would hook into Applesoft programs, DOS,
ProDOS, and Pascal.
All it takes to activate a SIG is your interest
and a willingness to take the lead.
I.j.
• Tutorials
-
To be published later.
II. • Bits and
Slices
This section contains a myriad of information,
from the HMUG By-Laws to helpful hints and definitions that can help you to be
a happy computer.
II.a • By-Laws
of the Huntsville Macintosh User’s Group
Article I
The name of this organization shall be
Huntsville Macintosh Users Group hereinafter referred to as the
“Group”. Further, all references to “he” hereinafter
shall be construed to mean “he or she.”
Article II
The purposes for which this organization is
formed are:
Section 1 — Specific and Primary Purposes.
The specific and primary purposes of this
organization are to promote and encourage educational interest in Macintosh
computer arts and sciences with particular emphasis upon defining, enlarging
upon and applying the computer to education and to the social, scientific and
environmental problems of society. To this end, the Group, with the consent of
a majority of the Executive Committee, may cooperate with, and, if appropriate,
provide services to persons, other groups, any local, state or federal
governmental body or agency, or to any school, college or university.
Section 2 — General Purposes and Powers.
A. To exchange and disseminate information
among the Group members concerning Macintosh computer arts and sciences.
B. To provide technical assistance to other
members of the Group in those computer projects which are not undertaken for
pecuniary gain or profit including, but not limited to, hardware, software and
computer programming.
C. To publish books, newsletters, magazines
and other periodicals for the educational benefit of the Group members and the
general public.
D. To conduct and sponsor seminars,
lectures and courses relating to the Macintosh computer arts and sciences.
E. To maintain a Group library consisting
of books, films, catalogues, disks, tapes, programs, journals or other
materials relating to the Macintosh computer arts and sciences.
F. To develop and maintain computer and
laboratory workshops for the members of the Group and the general public,
including provisions for time-sharing operations. Subject to the provisions of
article II, Section 1, the computer centers and their capabilities would be
available to the Group members, governmental agencies, educational institutions
and those members of the general public whose use is non-profit in nature as defined
and enumerated in these By-laws.
G. It shall be the policy of the Group to
actively discourage the unauthorized copying of software, except for that which
is classified as within the Public Domain, also known as “Freeware”
and “Shareware”. Such unauthorized copying shall under no
circumstances be conducted under the auspices of the Group.
H. To engage in any activity not
inconsistent with the provisions of these By-laws.
Section 3 — Non-Profit status.
The Group is not organized, nor shall it be
operated for, pecuniary gain or profit, and it does not contemplate the
distribution of gains, profits or dividends to its members, and is organized
solely for non-profit purposes. The property, assets, profits and net income of
the Group are irrevocably dedicated to scientific, educational and community
services, and no part of the profit and net income shall inure to the benefit
of any officer, member or individual. Should the Group ever be dissolved or
cease to exist, its assets remaining after payment of all debts and liabilities
shall be distributed to a non-profit fund, foundation, corporation or
governmental body that is organized and operated exclusively for scientific,
educational or community service purposes and has established its tax exempt
status under the Internal Revenue Code and the Revenue and Taxation code.
Section 4 — Additional Purposes.
A. To buy, lease, rent or otherwise
acquire, hold or use, own, enjoy, sell, exchange, lease as lessor, mortgage,
deed in trust, pledge, encumber, transfer or trust or otherwise dispose of any
and all kinds of property, whether real, personal or mixed, and to receive
property by gift, bequest or devise.
B. To enter into,
make, perform and carry out contracts of every kind for any lawful purpose with
any person, firm, corporation or governmental agency.
C. To solicit,
receive funds and property by gift, will or otherwise, from individuals,
trusts, corporations, associations, societies, institutions or other
organizations or authorities desirous of contributing to the purposes for which
this group is formed.
D. Notwithstanding any of the above statements of purposes and powers, this Group shall not engage in activities that in themselves are not in furtherance of the purposes set forth Section 1 of this Article II, and nothing contained in the foregoing statement of purposes shall be construed to authorize the Group to carry on any activity for the profit of its members, or to distribute any property, gains or profits to any of its members.
Article III
The county in the State of Alabama which is the
principal office for the transaction of the business of the Group is Madison
County.
Article IV
Membership in the Group shall be open to all
persons without regard to age, race, religion, sex, creed or national origin
and shall be governed by the following:
Section 1 — Members.
There shall be two classes of member of the
Group which shall be termed regular member, and additional family member(s). A
regular member’s membership entitles him to all privileges of the Group
including receipt of the periodic newsletter. An additional family membership
entitles him to all privileges of the Group except that only one newsletter
shall be distributed to each family. One vote shall be allowed for each regular
membership, and each additional family membership above the age of thirteen.
Section 2 — Group Membership
The members of the Group shall consist of those
persons who, upon the date of the adoption of these By-laws, shall have paid
current dues to the Group for a regular membership or an additional family
membership(s). Thereafter, members shall be those persons who pay such dues and
assessments as are determined by the Executive Committee and approved by a
two-thirds (2/3) majority of the voting members present. Regular membership in
the Group without the payment of dues may be granted by the Executive Committee
in those cases of financial hardship. If dues are waived, no additional family
membership will be allowed. Memberships are not transferable.
Section 3 — Admission to Membership
No person shall be excluded from membership
because of age, race, religion, sex, color or creed. The only qualification for
membership shall be payment of such dues or subscription fee, or waiver of dues
when determined by the majority vote of the Executive Committee. No membership
may be terminated for any reason other than the non-payment of dues or
assessments or a violation of these By-laws. Termination of membership for a
violation of these By-laws must be by a three-fourths (3/4) vote of the voting
members present.
Section 4 — Meetings of the Members.
The General Membership meeting of the members of
the Group shall be held at a time determined by the executive committee and by
a two-thirds (2/3) vote of the group. Other meetings shall be called and held
at a time and place to be designated by the Executive Committee. The General
Membership Meeting shall be conducted in accordance with Robert’s Rules
of Order. A quorum, which shall be 10% of the membership, shall be required for
the conduct of official business. In the eventuality that a quorum is not
obtained at a monthly membership meeting, the quorum requirements will be
reduced by 25% at each succeeding meeting until such time as a quorum is
obtained. The quorum requirements will then revert to the 10% figure.
Section 5 — Voting
All regular members, and additional family members over the age of thirteen shall have equal voting rights and each such membership shall be entitled to one (1) vote.
Article V
Section 1 — Executive Committee
The Executive Committee is the governing body of
the Group shall be composed of the elected officers of the Group, president,
vice president, treasurer, secretary and programs.
Section 2 — Meetings.
Executive Committee Meetings shall be conducted
in accordance with Robert’s Rules of Order. Fifty (50%) percent of the
executive officers holding office shall constitute a quorum for the transaction
of business. In case of a tie vote, the president shall cast the deciding vote.
Meetings of the Executive Committee shall be
held as required to conduct the business of the Group, at a time and place as
determined by the majority of the committee. Special meetings of the Executive
Committee shall be held at such times and places as directed by the president.
Section 3 — Powers of the Executive Committee.
Subject to the limitations of these By-laws, the
business and affairs of the Group shall be controlled by the Executive
Committee including, but not limited to, the following:
A. To conduct,
manage and control the affairs and business of the Group.
B. To receive on
behalf of the Group, gifts, bequests and devices in the form of property or
moneys.
C. To formulate
policies and programs which will be presented to the general membership for
vote.
Article VI
Section 1
— Officers
The officers of the Group
shall be a President, a Vice-President, a Secretary , a Treasurer and a
Programs officer who shall constitute the Executive Committee.
Section 2 — Election.
The Executive Committee
shall appoint a Nominating Committee of not less than 3 members and announce
the committee at the November general membership meeting. The Nominating
Committee will insure that all persons whom they nominate for office will
accept the position if elected. The Nominating Committee will present a
recommended slate of officers at the December general membership meeting.
Nominations from the general membership on the floor will also be accepted at
the December meeting and then nominations will be closed. Any person nominated
from the floor at the general membership meeting will announce his willingness
to accept the office, if elected, prior to the close of nominations. The
election of officers shall be by secret ballot at the March formal meeting.
Ballots from members not attending the meeting must be signed and delivered to
an officer or member of the Nominating Committee before the March formal
meeting. Ballots will be published in the January and February newsletters. The
person receiving the highest number of votes for an office shall hold the
office for the ensuing term. Incumbents may be reelected without restriction.
Section 3 — Term of Office.
Officers shall be elected
at each March formal
meeting of regular members, or at any special meeting of the members held in
lieu of the meeting. All officers shall hold office until their respective
successors take office, except in the case of resignation, death, disability,
or removal of an officer. New officers will take office in April at the formal meeting, one month after the election, at which time the
previous officers’ terms shall expire.
Section 4 — Removal and Resignation.
An officer may resign or
may be removed from office by a majority vote of the members. The Executive
Committee shall appoint a person to complete the remaining terms of vacant
offices with the appointee having all of the rights and responsibilities of the
office.
Section 5 — Duties.
A. President. The president shall be the executive officer of the
Group and shall have general supervision of the affairs of the Group. He shall
preside at all meetings of the Executive Committee and General Membership. At
the April formal meeting of
each year, the outgoing president shall make a report of the general business
of the Group during the previous year. At the same meeting, the incoming
president will then assume office and present a proposed budget for the ensuing
year. The proposed budget must be accepted by a majority of the regular members
present, or must be amended so as to be acceptable. The president shall appoint
all committees and shall be an ex-officio member of all committees.
B. Vice-President. The vice-president shall, in the absence or
disability of the president, perform all the duties of the president, and when
so acting shall have all the powers of, and be subject to the restrictions on,
the president. The vice-president shall perform such other duties as may be
designated by the president.
C. Secretary. The secretary shall keep the minutes of all
membership and executive officers meetings. In his absence, another club
officer will be designated to take the minutes. The secretary shall maintain a
file of all minutes and official correspondence of the Group, conduct the
official correspondence of the Group and shall perform such other duties as may
be designated by the Executive Committee. Files will be retired with the
approval of the Executive Committee.
D. Treasurer. The treasurer shall be responsible for the financial
records and accounts of the Group and shall keep and maintain adequate and
correct books of account showing the receipts and disbursements of the Group
with such depositories as are designated by the Executive Committee. He shall
render to the president or the Executive Committee, on request, statements of
the financial condition of the Group. He shall insure the timely payment of all
bills, submittal of all taxes and other financial papers. The treasurer shall
be responsible for maintaining current records of the membership. He shall
provide membership information to authorized persons, when required, to support
the Group’s activities. He shall maintain a membership file containing
the name and address, and other such information as may be required, of each
member of the Group.
E. Programs. The Programs officer shall be responsible for
recommending club programs, and with approval of the Executive Committee
arranging for programs for the monthly formal and informal meetings. He shall
prepare and update the planned program schedule, and prepare the announcements
for the monthly newsletter.
Section 6 — Appointed Officers/Volunteers.
The President with the concurrence of the Executive Committee shall appoint such volunteers as deemed necessary to support the normal functions and special activities of the Group. These appointed officers shall serve at the discretion of the President for his term of office or until completion of the activity.
Article VII
Section 1 — Execution of Documents.
The Executive Committee may authorize any
officer or agent to enter into any contract or execute any instrument in the
name of and on behalf of the Group, and this authority may be general or
confined to specific instances; and, unless so authorized by the Executive
Committee, no officer or agent or other person shall have any power or
authority to bind the Group by any contract or engagement or to pledge its
credit or to render it liable for any purpose or amount.
Section 2 — Fiscal Year.
The fiscal year of the Group shall begin on the
first day of April
and end on the last day of March of each year.
Section 3 — Budget.
Acceptance of the budget constitutes authority
for disbursement of funds up to the extent of the authorized expenditures.
Section 4 — Inspection of By-laws.
The Group shall keep in its principal office the original or a copy of these By-laws, as amended or otherwise altered to date, certified by the secretary, which shall be open to inspection by the members at all reasonable times.
Article VIII
These By-Laws may be amended only in the
following manner:
A. The Executive Committee, whenever
two-thirds (2/3) of the officers shall consider it necessary, shall propose
amendments to these by-laws, or,
B. Ten percent (10%) or five (5) of the
regular members (whichever is less) may petition the Committee to amend the
By-laws. The petition shall clearly set forth the ARTICLES and Sections to be amended,
and thereafter the Executive Committee must propose said amendments to the
general membership within forty-five days.
C. Any proposed amendment shall be
submitted to the regular members in written form no less than five (5) and no
more than forty-five (45) days before a vote shall be taken.
D. Any amendment shall be valid to all
intents and purposes, as part of these By-Laws, when ratified by the vote of
two-thirds (2/3) vote of the regular members present at a meeting called for
that purpose. Notice of such meeting shall be given to all regular members no
less than five (5) days prior to such meeting.
Adopted this 10th day of November, 1990 by a
majority vote of the members present.
Certified:
Lee W. Jones - Secretary
24 November 1990
II.b. • Tips and
Shortcuts
This sub-section is divided into two parts. The first part is tips or shortcuts selected for people who are new to the Macintosh, or new to HMUG. The second part is a brief review of books and other materials which contain tips, shortcuts or items of interest to all users.
Part 1: Tips for new
users.
Compressed Files: Nearly all of the HMUG shareware library has
been compressed (to save disk space) by using StuffIt ® If you want to use the HMUG library you will
need to know how to use StuffIt or
Unstuffit (a freeware
version used only to unstuff StuffIt files) StuffIt and
Unstuffit are on HMUG disk
#NS100. Stuffit Deluxe ($63)
is an enhanced commercial
version. There is also a new version 1.6 of Stuffit Classic and UnStuffIt
Deluxe in the HMUG library.
You can open Stuffit like any application (program) by either double
clicking on the application or a Stuffit file. A Stuffit file
can usually be recognized because the file name ends with .sit (NAME.sit)
Select the file(s) that you want to unstuff and click on “extract”
at the bottom of the dialog box. (see Figure II-1):
After you click on “extract” a
second dialog box will appear (Right hand side of Figure). This box is for
choosing a name for the unstuffed file. One will be suggested and highlighted
by the program. (Household Inventory in our example) If you want another name
just type it in. This box is also where you choose where the unstuffed file
will be placed. In our example it will be placed on the disk “HARD
DRIVE” and in the folder HOME. If you want to put the file somewhere
else, just change the disk and/or folder as you would in any other dialog box.
Once
you have completed your changes, click on ‘Save’ (or ‘Save
all’ if you began by selecting more than one item in the first box) The
program will now run and display a new box with several items in it. All you
need to do is sit back and watch. When it is finished, the program beeps at you
to let you know it’s done, and only the first box remains on your screen.
Stuffit
has a 30+ page manual that is on the
HMUG disk with very detailed information, but these notes are hopefully enough
to get you started.
SPECIAL
NOTE: Stuffit is like cooking rice. A little bit swells up to fill a
large pot when you cook it. In our example above, the four items in the first
box are 61K, but after it “cooks” it will swell up to 125K. Look
above the “extract” box to see the before and after sizes. Make
sure that the disk has enough open space to accept the unstuffed file.
Shareware
Documents: You’ve just gotten a
copy of “SuperDuper DA” and you want to find out what it is and how
to use it. The title could mean anything (or nothing), so what do you do now?
Go back to the disk and look for a shareware document (file) that will answer
your questions. Frequently the document will share the item’s name, i.e.,
“SuperDuper doc” or be in the same folder and be a “Teach
Text” or a “Read Me.”
Now
that you have located the document, open it and read it. Unfortunately for
people new to Mac, that can be one of the hardest things to do. If you look in
front of the document name you will see an icon. If it looks like an
application icon (SuperDuper
doc.) you’re in luck, by double clicking on it, it should open itself as
an application and you will be able to read and/or print it. Mission
accomplished.
However
if the icon is a document (file) icon (SuperDuper
doc.) more work is involved. You will have to have to find a word processor
application (program) that can read the document. Most of the shareware
documents that I have seen were written with either MacWrite or Word. If
you have either of these applications installed on your hard drive (see note on
hard drives below) you should be able to double click on the document and open
it. If, like myself, you do not have these applications you will have to try to
import the document into your word processing application. Now the fun begins.
Open
your word processing application. Go to the FILE menu and select OPEN. A
dialogue box will appear for you to select the disk, folder and document that
you want to open. Do not be surprised if the document you want does not appear
where it should be. This means that the document was written with another word
processor, and your application can not “see” this document. It
will have to change the document to a form that it can “see.” (see Figure II-2)
Look
at the dialog box. There should be one (or more) selection or button that are
labeled like “IMPORT,” “TEXT” or “TEXT WITH LINE
BREAKS.” (on the right hand side of Figure II-2) By selecting this item
you are telling your application to attempt to import a document (file). If
your program can import the document its name will now appear in the selection
box ( SuperDuper doc.) and you can open it
like a regular document. If the document name still does not appear, your
application is not able to import the document. If you have another word
processor application you can try the same procedures with it. If that also
fails you have run into a dead end. Come to the next meeting and ask someone to
open the document with their program.
Some
additional notes on opening mystery documents. Works v2.00a has been able to import and open most documents. WriteNow
v2.0 has been able to open about half
of the documents that I’ve tried. There are now programs such as Can
Opener ($65+) that claims to be able
to open any file regardless of
what program was used to write the file.
Hard
Drives — WARNING!! — If you do not have a hard drive
with your system, Do not use another system that has a hard drive. Once you
have used a hard drive and know how much easier and quicker all your work is
with a hard drive, you will become so frustrated without one that you will
gladly sell two of your kids and the dog in order to get a hard drive. (Please
note: HMUG does not approve of
this, however the price for hard drives has been coming down recently, so you
may not have to sell the dog)
Keyboard Commands
Shift-Clicking:
One way to select a number of
different objects is with the selection rectangle (which is used by holding
down the mouse button as you drag around your selection). Shift-clicking is
another essential technique. Normally when you click on something to select it,
the item you selected last is automatically deselected. If you hold down the
shift key, previously selected items stay selected. You can see how useful this
would be. Let’s say you’re working with the Font/DA Mover and want
to copy fifteen fonts into the System file. Instead of having to select one,
click on the Copy button, select another, hit the Copy button, and so on; you
must select all fifteen by shift-clicking on each one, hit the Copy button once
and let the copying take place.
Shift-Clicking Text: Shift-clicking also can be used to select large
portions of continuous material like text. Let’s say you want to select
the whole MacWrite document. You’d click in front of the first character
in the document, then use the scroll bar to move to the end of the document,
position the I-beam after the last character, hold the shift key down, and
click again. This causes everything between the two clicks - the whole document
in this case - to be selected. Shift-clicking works in a similar manner in
spreadsheets: if you click in one cell, then shift-click in another, a
rectangle of cells will be selected, with those two cells in the corners.
Rebuilding the desktop file: If a disk bombs when inserted, you may still be
able to recover the information it contains by rebuilding the desktop file on
the disk. This file contains special information which tells your Macintosh
where to find your files on the surface of the disk. Occasionally, this file
may become damaged and will need to be reconstructed by the Macintosh before
the disk can be used. To do this, hold down the option key while inserting the
disk and keep it held down. A message will appear asking if you want to rebuild
the desktop. Click on Yes. If the recovery succeeds, the desktop will appear
after a minute or two (how long it takes depends on the number of files in the
disk).
Recovering trashed disks: If you can’t, or don’t need to,
recover the data from a trashed disk, here’s a way to at least try to
recycle it, so you can use it for new data. Hold down the option key while
inserting the trashed disk. You’ll get the standard dialog box asking you
if you want to initialize the disk. Click on the selection you prefer. The
trashed disk should now initialize with no further problems. If this
doesn’t work, your disk is really trashed and you should recycle it as a
high-tech coaster for drinks.
Closing multiple windows: You can create a real mess on your desktop if
you open several folders to look for a specific file. Instead of clicking the
close box on each window, you can tell the Macintosh to close them all at once.
Just hold down the option key when you click on the first window’s close
box and like magic all the rest will automatically close; you’ll be
returned to an empty desktop - with no open windows - in much less time than it
would otherwise take.
Dragging unselected windows: It can be annoying always to have to select a
window before moving it. To move a window that’s not active on the
desktop, just hold down the command key ( ) while dragging it. The window will
stay unselected even after it is moved.
Dialog box shortcuts: If you do not want to take your hands off the
keyboard when an Open dialog box appears, you can use these keyboard shortcuts.
Instead of using the mouse to select a file, use the up and down arrows to move
through the list of files or folders, to move to the end of the list, to move up
through a hierarchy of folders. Option down arrow to move down through a
hierarchy of folder is the same as clicking on the Open button.
Alphabetizing files with “View by
name”: Here is a way to
organize all the icons in a window alphabetically. Create a new folder on the
desktop, open it, and select View by Name from the View menu. Then open the
folder you want to organize and choose Select All from the Edit menu (or
press-A key), and drag all the icons out of the folder and into the new folder.
Go to the closed old folder and then to the View menu and select View by Icon.
Open the new folder on the desktop. Choose Select All from the Edit menu and
drag the icons back to the old folder. Throw away the new folder you created.
Go back to your old folder and your files and folders will now be arranged
alphabetically from left to right.
Easy way to put away files: If you have a file out on the desktop that you
want to put away, you don’t have to drag it back to its original folder
(which can be quite a task if it’s nested several folders deep). Just
select the file icon, then choose Put Away from the File menu. The file will
scurry back to wherever it came from.
Duplicating a file between folders: The Macintosh only duplicates a file if you move
it from one disk to another (leaving a copy on the source disk as well as on
the destination disk); when you drag it from one folder to another on the same
disk, the file actually moves (that is, it disappears from the source folder).
Sometimes that is what you want, but you do have a choice: if you hold down the
option key when dragging the icon, the Macintosh will leave a copy of the file
in the source folder as well as in the destination folder.
Locking documents with “Get
info”: The File
menu’s Get Info option tells you many things about a file including its
size, creation date, type and the amount of space it uses on the disk, and if
the file is locked. You can also lock a file with the Get Info window. To lock
a file simply click on the box marked Locked in the window. To unlock the
document simply choose Get Info again and click on the Locked box. The X in the
box will disappear and you’ll be able to modify the document and save it
under its own name. You can lock and unlock documents as often as you like.
Overriding file locking: If you want to throw away a file which is
locked, without going through the process of unlocking the file with the Get
Info box, there is a shortcut. Hold down the option key while you select the
file, then continue to hold down as you drag the file to the Trash. This will
suppress the file locking while the file is deleted from your disk. Note: If
you do this while you throw away an application, it will also suppress the
standard “Are you really sure you want to throw this away?” dialog
box.
Switch launching MultiFinder: You can temporarily switch from using the Finder
to using MultiFinder without restarting your Macintosh. Just open your System
Folder and hold down option key while you double-click on the MultiFinder icon.
MultiFinder will launch and become active for the remainder of your session,
but will not be active the next time you boot your Macintosh.
Temporarily disabling MultiFinder: If you normally use MultiFinder, and for some
reason you want to disable it temporarily, hold down the command key as the
Macintosh starts up (keep holding it down until the desktop comes up on the
screen). This forces the Finder to take over, but leaves MultiFinder still set
for start-up the next time.
Defragmenting disks: Hard disks write data wherever there’s
room on the disk and this results in files being fragmented - that is, parts of
the same file are written in different places on the surface of the disk. When
this happens often enough, the access speed of the disk slows way down. Then
it’s time to defragment. This involves rewriting all the files to your
disk so they occupy contiguous portions of the disk. There are a couple of
programs that do that - DiskExpress™ and PowerUP™ are two of the
more popular ones DiskExpress™ has been around longer and costs less, but
PowerUP™ seems to work faster.
Ejecting floppy disks: There are several ways to eject floppy disks.
The most common method is to drag the disk’s icon to the Trash. You can
also choose Eject from the File menu, or hit the Eject button in the Save As or
Open dialog box. Or you can use the following keyboard commands to eject any
disk, including the start-up disk, regardless of whether you’re on the
desktop or in an application. CONTROL-E ejects a selected disk(s),
CONTROL-SHIFT-1 ejects the disk in the internal drive (or right side drive on a
Mac II), and CONTROL-SHIFT-2 ejects the disk in the external drive (or left
side drive on a Macintosh II). When you use these keyboard commands from the
Finder, a dimmed version of the disk’s icon remains on the desktop. When
you throw the disk’s icon in the trash, all trace of it disappears from
the desktop.
No colons in filenames: You can use just about any character or symbol you want in the name of a Macintosh file, except for the colon If you try to put it in, the Macintosh will automatically turn it into a hyphen This is because the colon is used as a special character internally by the Macintosh to maintain the list of file names in the desktop file.
Part 2: Sources of
Additional Tips and Shortcuts.
The Macintosh Bible, 2nd edition -1988-89. This is one of the best
books of tips and shortcuts for the Macintosh. The authors have released not
only a second edition, but also two updates in an effort to keep this fine book
useful.
MacUser and MacWorld are
monthly magazines which have sections devoted to tips and shortcuts.
Owners manuals. When all else fails, re-read the manuals.
Re-reading the manuals after you have used your applications for some time can
be especially helpful, because items that you missed, or did not understand
clearly, may now jump out at you.
The Fully Powered Mac - 1988. This book deals not so much with
“tips and shortcuts“ as the Bible, but more with ways to organize and personalize
your Mac. Topics range from basic file and disk organization, to step by step
procedures using Resedit to modify your System.
Huntsville-Madison Public Library - Main Branch: The library has two Macs which can be reserved and used (at the library) by any adult who has a library card (which is free). One of the Macs has a CD reader(Compact Disk). These CDs are an external disk drive and work like a floppy disk, except instead of 400K or 800K they have up to 600 Meg (about 250,000 typed pages) of information on a READ ONLY disk. The library has several disk (Educorp. PB MUG, Whole Earth Catalogue etc.) with a amazing amount of information and/or shareware on them. There are two problems with CDs. One is that they are slow. The second problem is that after a couple of hours your mind suffers from information overload, melts and oozes out of your ears.
II.c. •
Newsletter Advertising Rates
( as of November 12, 1991 )
Full page (7.5"x10")
1 issue = $21.50 3
issues = $43.00
6 issues = $80.00 12
issues = $150.00
Half page (7.5"x5")
1 issue = $16.00 3
issues = $32.00
6 issues = $60.00 12
issues = $105.00
Quarter page (3.75"x5")
1 issue = $12.00 3
issues = $24.00
6 issues = $40.00 12
issues = $75.00
Eighth of a page (3.75"x2.5")
1 issue = $8.00 3
issues = $16.00
6 issues = $30.00 12
issues = $55.00
Business Card Size (2.5"x1.5")
1 issue = $4.00 3
issues = $8.00
6 issues = $15.00 12
issues = $25.00
For addition information call George Leach
837-4212.
• Ads submitted must be, perferably, a file acceptable
to PageMaker or camera ready art.
• Multiple insertions must be consecutive to obtain the
reduced rate.
• Add 10% for guaranteed position except for the Label Page. No ads can be placed on the front page.
II.d.
• Access to Services
Don’t you wish you had a scanner, tape
backup unit, compact disk reader, photo slide maker, color laser printer,
optical character reader, and all those other expensive goodies as the big boys
have? Don’t despair. Many of these devices are available to you as
services. If you don’t need these services every day and if you can schedule
your needs, you may find it cheaper to rent or borrow the service.
Compact Disks and Readers for the Macintosh - The Huntsville Public Library has some
Macintosh Computers that are available for public use at the Library. The
Library has a good collection of Compact Disks with Macintosh usable files on
them just for the asking. Bring lots of floppy diskettes if you are thinking
about copying individual files for your own use - each compact diskette will
hold up to about 600 megabytes of Mac files.
Tape Backup Services - HMUG Member Tom Konantz, Systems Operator of
the <TBD> Bulletin Board System (see Telecommunications) has purchased a
tape backup unit for maintaining the <TBD> BBS Hard Disk(s) with their
many public domain files. On occasion Tom has brought that tape backup system
to HMUG meetings for demonstration. Tom has indicated a willingness to provide
tape backup services for your hard drive for a reasonable service fee. You need
to contact Tom to make any arrangements for such services.
Scanning Services - Take a look in the Yellow Pages of the phone
book under Printers. Several provide scanning services, e. g. Desk Top
Printing, @ 539-6776, Third Wave Technologies @ 880-1622, and probably more as
time goes on.
Optical Character Recognition - Printing/Desk Top Publishing services
offering scanning services often have optical character recognition (scanning a
printed page of text and out-putting to a diskette an ASCII file that can be
read into your word processor). Typically this may cost about $7.50 per page
for scanning and converting (without any editing). Again, take a look in the
Yellow Pages of the phone book under Printers.
Desk Top Publishing - Again, take a look in the Yellow Pages of the
phone book under Printers. Several specifically advertise these services.
Laser Printing - Once more to the Yellow pages, e.g.,
Kinko’s has two Macintoshes with most popular software hooked up to a
Laser printer. They charge by the hour for self-service at the Macintoshes and
by the page for the Laser Printers.
Laser Printer Cartridge Refills - Refill cartridges for Laser printers are
expensive. Many people have had very satisfactory results in having the
cartridges refilled at about half the cost of new cartridges. You can even get
color toner put into the cartridges. Remember to include the felt cover roller
cleaner pad (with the green handle) when you turn in your old cartridge. Check
your Yellow Pages under Computers for these services.
Apple ImageWriter I and II Ribbon
Rejuvenation - You won’t
find this one in the Yellow Pages, but you can gently open the case of your
ribbon cartridge to find many folds of ribbon semi-neatly stowed inside. Watch
that the roller in the little window doesn’t jump out of position when
you open the case. Spray WD-40 liberally over the exposed ribbon, close the
case, and store the ribbon cartridge in a sandwich baggie for a few days while
the WD-40 acts as a solvent for the ink, redistributing the ink onto those two
tracks that have dried out from repeated impact/ink transfers by the print
head. You can get several reuses from a printer ribbon this way with no ill
effects to your print head.
Slides, Overheads, Color Hard Copies - Check the classified section of MacWeek and
of the Macintosh magazines. Several advertisers list 24 hour turnaround on
these services.
Other Places to Look - One good place to look for limited access to
some of these services is right in your own Huntsville Macintosh Users Group.
Perhaps someone else in the group has, on his own or through his place of
employment on a non-interference basis, limited access to some of these
services. Check your employer, too. If you are not working on classified
projects, your company or the government agency with whom you are associated
may have equipment available for “demonstration” access. MSFC has a
Computer Technical Center with much equipment and most of the latest software
for demonstration or on site occasional use.
Group Purchases - Organized as required. The club receives
special discount offers throughout the year.
II.e.
• A Brief Communications Tutorial
(published by permission of the
Washington Apple Pi, Ltd., Users Group.)
Communication between computers is one of the most powerful and useful things you can do with your computer. It is also one of the most difficult, particularly for novices, because it requires that the user master a series of steps: connecting the computer with a modem, learning how to use telecommunications software, calling into a telecommunications service, and, finally, getting something useful from that service. The following tutorial was written by George Kinal of the Washington Apple Pi.
1. Introduction: Forms
of Computer Communications.
Most communication between personal computers
uses ordinary telephone lines, and that is what we will primarily deal with
here. The device that allows the computer to do this is called a
“modem,” short for “modulator- demodulator.” The modem
modulates digital signals from the computer into sounds that can be transmitted
over ordinary telephone lines. At the other end another modem demodulates those
sounds into the digital electronic signals the computer is accustomed to using.
Many of the same techniques, however, apply to connecting two computers right
next to each other (called “direct-connect”), as well as to communications
over radio (usually amateur radio) frequencies.
Computers communicate with each other using
several established sets of “rules of the road,” called
“protocols.” One of the most fundamental rules of these protocols
is whether data transmissions occur at times determined by a clock or timing
signal, or whether they can occur whenever one of the computers has something
to send. The former protocol is called “synchronous.” Most
communication with large mainframe computers, especially those made by IBM, is
synchronous. (You will also hear the terms: bi-sync, SNA, SDLC, 3270 or 3780 in
this connection.) If you have a need to make your Apple communicate with such a
system, it is possible but expensive. The remainder of this tutorial will not
have any relevance to synchronous communications, because it is seldom used by
personal computers.
Most computer communications, particularly
personal computer communications, are “asynchronous.” Asynchronous
communications are not synchronized to a clock or timing signal (hence the
name). Knowing that your computer uses “async” is, however, only
part of the story. There are a number of other things you need to know before
you can start to connect with other systems.
The first is the speed at which your computer
(or your modem) transmits data. The most common speed today is 2400 bits per
second (bps), sometimes (but erroneously) called 1200 “baud.”
(“Baud” actually refers to the number of discrete signal state
changes per second. Sometimes baud and bps are identical—300 baud is
indeed 300 bps, however, 1200 bps is actually 600 baud).
In order to communicate over telephone lines,
the modems at each end have to use an agreed-upon set of tones. These
“agreements” are also governed by protocols. Virtually all 1200 bps
modems in the United States today use Bell 212A protocol. (There is also
something called 202 protocol, which is discussed below in connection with the
Novation Apple-Cat modem, one of the few modems that uses it.)
Other common speeds now in use are 300 bps (using
Bell 103J protocol) and 1200 bps. Speeds of 4800 and 9600 using direct
connections are now quite common (you use 9600 bps to communicate with the
ImageWriter printer, for example), but to send signals over telephone lines at
these speeds requires modems that, at present, are very expensive.
Another aspect of computer communications is
something called “duplex.” Unfortunately, duplex has two meanings.
Its most technical meaning refers to whether both parties can transmit and
receive at the same time. A system that permits this is referred to as
“full duplex.” Telephones are examples of full duplex systems,
since both you and the person on the other end can be speaking at the same
time. (Understanding each other under such circumstances is however, a separate
matter.) Citizens’ band radio is “half duplex,” in that only
one party can send at a time. There has to be a convention for when one party
is through sending and is ready to receive for a time. In CB radio this is done
by saying “over.” Virtually all computer communications are full
duplex, as the term is used in this context.
The other meaning of “duplex” refers
to whether the sending computer displays the characters it sends on its own
monitor, or whether it expects the other computer to echo the characters back.
The former is called “half duplex,” and the latter is called
“full duplex.” When your system has the responsibility of echoing
the other computer’s characters back to it, your system is using
“echoplex.” Most bulletin board systems and on-line services use
echoplex, which means that when you call them you should use full duplex. Half
duplex is generally used only when you are communicating directly with a
friend’s personal computer. This depends on the communications software
that each of you is using. If you use half duplex on a system that is using
echoplex, every character will appear twice (lliikkee tthhiiss), once because
the character is put on the screen by your computer and once because the
character is sent back to you by the host computer.
Thus far we have not addressed how characters
themselves are actually sent. Each character, regardless of speed or duplex
setting, can be formatted in a number of ways. One of the most basic is the
number of data bits. Each character consists of a number of data bits, usually
eight (the number of bits in a byte, the basic unit of computing) but sometimes
seven.
Some computer systems use a “parity”
bit to give the receiving computer a quick way of checking to see if data were
lost or garbled in transmission. For example, a system transmitting using
“even” parity would count the number of “1” bits during
transmission of a character and, if necessary, transmit a parity bit of
“1” to make the number of “1” bits come out even. If
the character already had an even number of “1” bits, the
transmitting computer would send a parity bit of “0.” The receiving
computer could look at the character as received and determine whether a bit
had been changed in transmission. A moment’s thought will reveal the
weakness in such a scheme, which is why more powerful error-checking protocols,
discussed below, were developed. Because parity checking is so primitive, most
computer systems today do not transmit a parity bit. This is called “no
parity.”
A final formatting option is the number of stop
bits that are transmitted with each character. One of the requirements of
asynchronous transmission is that there has to be a “start bit,”
which is a signal that tells the receiving computer that something is coming.
But there also has to be a “stop bit” to say that the character has
been transmitted. Some systems use two stop bits at the end of each character,
but by far the most common is one stop bit.
The number of data bits, parity, and the number
of stop bits are usually referred to in one breath by an abbreviation such as
“8-N-1,” which means eight data bits, no parity and one stop bit.
8-N-1 is, incidentally, virtually universal today. If you do not know the
character format of a computer system you are calling for the first time, try
8-N-1. Occasionally one comes across systems that are “7-E-1”,
seven data bits, even parity, and one stop bit. 7-E-1 does not work, however,
with some of the popular error-checking protocols.
As a consequence of 8-N-1, each character
transmitted over a modem has ten bits: one start bit, eight data bits and one
stop bit. Thus, transmission speed in bits per second is effectively ten times
the transmission speed in characters per second: 1200 bps is 120 characters per
second; 300 bps is 30 characters per second.
Characters themselves are sent using a standard
called “ASCII” (pronounced ASK-ee), short for “American
Standard Code for Information Interchange.” ASCII uses numerical values
from 0 and 127 to represent all letters (“A” is 65, “a”
is 97), numbers (“0” is 48, “1” is 49), other
characters (the “space” character is 32) and command symbols (the
“return” is 13). The numerical values from 128 to 255 are also sometimes
used for non-standard characters. For example, the Macintosh uses values
greater than 127 to represent international characters.
To confuse matters, some computers transmit (or
want to receive) ASCII characters using 128-255 rather than 0-127. If your
transmission comes across as nonsense characters, and if you are sure that you
are using the correct speed, number of data bits, parity and number of stop
bits, see if this could be the problem.
When you call up a bulletin board or CompuServe
or America On-Line, you are operating in what might be called
“free-wheeling” ASCII. This is sometimes referred to as
“TTY” mode, short for teletype, an early computer communications
device. These services can be called using nothing more than a portable
“dumb terminal” such as the Texas Instruments Silent 700. You type
a character on the keyboard and it gets printed on your monitor or paper.
Since computers can usually transmit data faster
than you can read it, or faster than your printer can print it, most systems
recognize a protocol called “X-On/X-Off.” You may be aware of how
Control-S stops the listing of a BASIC program. In most systems, the Control-S
is the so-called “X-Off” character, which tells the transmitting
computer to stop sending. The counterpart command to resume sending is
Control-Q, called “X-On.”
Using X-On/X-Off as a means of flow control is
one way of transmitting data, but it does not have any way of correcting for
errors in transmission caused by noisy telephone lines or other problems. To
get around this limitation, there is a class of protocols that perform verified
file transfers. By “file transfer” we mean the sending of a file
from one computer to the other computer, usually to a disk on that computer.
“Verified” means that as each block of data is received, its
accuracy is checked. If the data is not received correctly, the block is sent
again. Verified transfer is not essential for most ordinary text transmission,
but is important when sending “binary” files including computer
applications and formatted files.
The most popular error-correcting protocol for
computers today is properly called the Christensen protocol, after its
developer Ward Christensen, but it is more commonly know as
“XMODEM,” after one of the CP/M programs that first used it. It is
commonly used to download files from bulletin boards and information services
such as CompuServe and GEnie.
There are commercial communications programs on the market that use other verified transfer protocols. Some of them are better (in some respects) than Christensen’s but they are all incompatible with one another. One public-domain protocol that is popular is KERMIT. It is rarely used between two microcomputers, but can be useful for downloading from large computers.
2. What Do I Need
Your Apple does not come equipped with a
built-in modem equipped with its own telephone cord and plug, unlike some
computers on the market. In order to turn it into a communications device, you
usually need three things:
• A Modem
• Communications Software (program)
• An Interface Card (depends on your
computer)
Incidentally, you should be careful about
compatibility among these three elements. As with most computer-oriented
applications, it is generally good advice to choose the software first. Then,
be sure that the interface and the modem you choose can be accommodated by that
software.
The biggest problem with giving specific
examples or recommendations is that whatever is written can be obsolete within
a year. The Apple Super Serial Card and the Macintosh have had a big influence
on the overall picture of Apple-oriented communications.
Modems: As noted above, the modem converts the digital signals from the
computer into audio tones that can be sent over a telephone line (and it also
converts audio tones back into digital signals). At one time virtually all
microcomputer modems operated at 300-bps. The market for 300-bps modems is
virtually non-existent; most new modem buyers get a modem capable of using
triple speed (300/1200/2400-bps). Modems of interest to Apple owners fall into
three categories:
Single-Board Interfaces/Modems: A single-board modem plugs into one of the
Apple’s slots, usually slot 2. D.C. Hayes invented this kind of modem,
though its MicroModem II no longer dominates the Apple communications scene as
it did in the early 1980’s. The Hayes MicroModem is a 300-bps modem with
the usual “smart” features such as autodialing (in which the modem
dials the bulletin board or on-line service), and is usually sold with the
Hayes Smartcom software package.
The Novation Apple-Cat is functionally very
similar to the Micromodem. All sorts of optional accessories, such as a printer
port, tone decoder, BSR controller, telephone handset, etc., are available.
This modem operates at 300 bps, as well as at 1200-bps using a half-duplex
“202” protocol. (Warning—this mode is only useful for communicating
with other Apple-Cats and those now-extremely-rare computer centers that
support 202-mode.) The Apple-Cat also can be used for “Deafnet”
communications to connect with the so-called Weitbrecht modem used by the
hearing-impaired. The Apple-Cat comes with a very competent software package
called Com-Ware. Novation offers an upgrade module for this modem that adds
1200-bps full duplex capability (using the standard 212A protocol), but it is
usually cheaper now to buy an external 300/1200/2400 modem than to add the
Novation 212 upgrade.
The Prometheus 1200A is an internal modem for
the II and IIe that operates at both 300 and 1200-bps. Electrically (and as far
as any software is concerned), it behaves just as an Apple Super Serial card
connected to an external Prometheus 1200 modem, but without the clock that the
later has.
Dumb Modems: No manufacturer actually calls its modems
“dumb,” but it’s a good distinction to make relative to
so-called “smart” modems. Dumb modems are external modems that
connect to the computer’s serial port. (The serial port uses a
communications protocol called RS-232C.) You can still find at garage sales and
surplus outlets 300-bps acoustically-coupled modems—the kind that you
place your telephone handset into when connection has been made. Many
criticisms have been leveled against acoustic couplers, but unless you work in
a high noise area, couplers work pretty well. Some of them, in fact, were
designed and built for commercial use, and have excellent circuit designs.
Then there are what might be called the
“commercial grade” modems built by Racal-Vadic, Anderson-Jacobson,
UDS, Rixon, GDC, CODEX and AT&T. You probably wouldn’t want to buy
one of these for home use, but for some business applications they are better
suited than the “consumer grade” modems, since they tend to be
designed for 24-hour use, and have more sophisticated circuit designs.
Smart Modems: Most modems in use on personal computers today
are so called “smart” modems. Most people associate this type of
modem with D.C. Hayes, although who invented the smart modem is a matter of
some dispute. A company called Bizcomp holds a patent on some of the smart
modem technology. Still, “Smartmodem” is a Hayes trade name.
Smart modems (used in the generic sense) have
built-in microprocessors that interpret sequences of characters sent to them,
and act accordingly. Thus, they can be commanded to dial a phone number, to
answer a call, to hang up, and so on. Many manufacturers now make modems that
are “Hayes compatible,” meaning they respond to the exact same
commands as the Hayes products. Many software programs today are designed to
work with “Hayes compatible” modems, and because of this, many
people may want to make sure that any modem they buy is Hayes compatible.
Interface Cards: (Only Apple II and IIe owners need to read this.
For Apple IIc and IIGS owners the choice has been made for you—your
serial interface is essentially the same as the Apple Super Serial card.
Likewise for Macintosh owners the serial port is built in.)
For a long time, the demand for serial interface
cards was pretty small. Most printers used parallel interfaces, and virtually
all Apple owners who wanted to communicate used the Micro-modem. That situation
changed dramatically in 1983 with the new series of Apple printers, which used
serial interfaces and with lower-cost 1200-bps modems.
The Apple Super Serial Card (SSC) took the place
of two older Apple products, the Apple Serial card (meant for printers, not
modems), and the Apple Communications card. The SSC is a good product, and has
been “cloned” by other manufacturers. For example, the Seri-All and
the CCS 7711 are electrically equivalent to the Super Serial Card in most, but
not all, respects, and they sell for less than the SSC.
At garage sales, etc., you may still run across
older interface cards at very low cost. The CCS 7710 and the SSM ASIO, AIO, and
AIO-II were all popular enough that most software can be configured for them.
Be careful: some of the newest software assumes you have the SSC or an
equivalent. You would be best off to choose and check software first!
Most serial cards contain built-ion firmware
that supports a very rudimentary terminal program. This allows you to
communicate with other computers, but you cannot send or receive files unless
you have communications software.
Software: Without question the most popular advanced
communications software package for the Apple II family is ASCII Express-the
Professional (AE-Pro), supplied by United Software Industries. There is very
little this communications program cannot do. It supports the Christensen
protocol, and has a built-in editor. AE-Pro can be purchased in DOS 3.3 or
ProDOS versions.
If you have CP/M on your Apple, you really
should get the MODEM7/XMODEM programs. The latest version, MODEM 7/40, is
available through WAP’s public-domain software collection is several
versions. MODEM 7/40 will do many of the same things as AE-Pro, and, being
public-domain, is available at an unbeatable price. This software will also
allow you to download programs from the various RCPM (remote CP-M) systems.
Some WAP members have a library of hundreds of public domain programs acquired
in this way.
If your Apple is used commercially, and your
communications involve both other (non-Apple) microcomputers and long-distance
transfer, you might want to look at BLAST from Comm. Research Group, Baton
Rouge. The protocol this program uses is not Christensen, but is more efficient
and allows simultaneous transfers in both directions.
COMM-TERM is a very simple communications
package. It’s enough to get you started, and does a bit more than the
firmware on an interface card. For example, it will receive data and write it
out to disk, or it will send out a DOS 3.3 text file.
Many communications programs are available for
the Mac, for example, Hayes’ SmartCom II for the Mac. But probably the
most popular program is the “shareware” product Red Ryder. Use it,
and if you decide to, keep it.
The consensus is that Apple’s own communications products, such as Apple Access II and Mac Terminal, are not up to the quality or value of the independent brand products.
3. What is It All Good
For
I list, “for the record,” five major
categories of uses for computer communications:
1. Calling computer bulletin boards, This
is a great way to have questions answered (“Help!”), to keep up on
the latest Apple developments, to buy or sell hardware and software, and to
download software, text, graphics, and so on.
2. Calling commercial on-line services such
as The Source, CompuServe, DIALOG, Dow-Jones Information Service, or GEnie.
It’s impossible to even begin to list all the things you can do on these
systems.
3. Communications with other Apples, other
microcomputers (including portable “laptops”), word processors,
typesetting services, or to exchange programs or text.
4. Dialing in to specific mainframe
computers such as your employer or university uses. Using computer
communications allows you to work at home.
5. Electronic mail - you can use services
such as MCI Mail, Western Union’s Easy-Link and others to send messages,
including international telexes. The networks such as Telenet, Tymnet, UNINET,
and GE also provide a variety of electronic mail services, as do CompuServe and
the The Source.
REFERENCES: The best selling general reference on microcomputer communications is, The Complete Handbook of Personal Computer Communications by A. Glossbrenner, published by St. Martin’s Press. Another good book for prospective AE-Pro users is Joy of Telecommunication by Washington Apple Pi’s own Bill Cook (Dell Trade #54412). If you need to understand the RS-232 interface, consult The RS-232 Solution by Joe Campbell, SYBEX Books, 1984.
II.f. • The
Macintosh Family
Lisa — In
1983 Apple introduced a revolutionary $10,000 computer built around the
Motorola 68000 microprocessor running at 4 MHz and containing 512K of RAM.
Taking some cues from the Xerox Star, it offered an icon-based interface and
integrated software. Unfortunately, the high price, non-standard disk-drives,
and relatively slow software hindered sales. However, the choice of the 68000
chip (as distinct from the 8088 line upon which subsequent MS-DOS machines were
to be built) was to direct the Macintosh family into the future.
Macintosh (128K) — In January of 1984, Apple introduced the
Macintosh, a much less expensive and only slightly less powerful version of the
Lisa. Originally sporting only 128K of RAM, it was one of the first
mass-distributed computers to offer the now-standard 3.5-inch disk drives.
However, only one side of each disk was used, so each disk could store only
400K of data. For Lisa owners, Apple offered “MacWorks” to allow
Mac software to run on that machine as well. Like the Lisa, the Mac used the
68000 microprocessor but ran somewhat faster, 8MHz. It included a 64K ROM which
contained Apple’s famous ToolBox firmware. This novel software gave the
Mac its strength and forced upon program developers the uniformity in program
appearance and operation that has been the cause for the Mac’s success.
The Macintosh XL (ex-Lisa) was the new name assigned to the Lisa
after refitting it with 3.5 inch drives. Apple offered a conversion kit to
permit the Lisa to display the Mac’s square screen pixels instead of the
original Lisa’s rectangular pixels.
The Macintosh 512, offered first in 1985 quadrupled the RAM on
the earliest Macintoshes, which made the machine able to run more complex
programs.
The Macintosh 512E was a new version of the Mac 512 with a
built-in double-sided disk drive and expanded 128K ROM. A major detriment to
the Macintosh’s development was the lack of a hard disk. The 512E offered
only a serial interface. Apple began marketing a sluggish serial 20 megabyte
hard disk which it made obsolete within six months of introduction!
The Macintosh Plus appeared in 1986. It featured a full megabyte
(1024K) of RAM, expandable to four megabytes, and the 128K ROMS found in the
512E. It came with a SCSI (Small Computer System Interface) connector which
enabled the Plus to communicate with up to seven external devices, including
the fastest hard disks available, scanners, tape back-up systems and CD Roms.
The Mac Plus “legitimized” the Macintosh in the eyes of many people
who viewed Apple’s graphics interface as somehow less
“serious” than that used on other computers.
Introduced in March 1987, the Macintosh SE featured a megabyte of RAM, expandable to four
megabytes. The ROM grew to 256K. The SE used a IIGS-style keyboard and the
Apple Desktop Bus. It was the first modular-style Mac to offer a built-in hard
disk drive (20 MB). It was also the first modular style Mac to be expandable
(hence its name System Expandable) due to its single expansion slot.
The Macintosh II was the first member of Apple’s next
generation Macintosh. It used a 15.7-megahertz Motorola 68020 processor with a
68881 math co-processor. It featured 256K of ROM and 1024K of RAM theoretically
expandable to two gigabytes
using the 8 single in-line memory module (SIMM) RAM slots. It had six Nubus
slots and was the first Macintosh to support color, which it does in dazzling
style and many different shades of gray. The sound capabilities of the Mac II
exceed even those of the IIGS. The Mac II could be equipped with an internal
hard disk drive. By adding a 68851 Paged Memory Management Unit (PMMU) chip,
you can use virtual memory to your Mac under System 7.
The Macintosh IIx is a somewhat more powerful version of the Mac
II. It was the first Mac based on the 68030 microprocessor which includes a
built-in Memory Management Unit (MMU), and both instruction and data caches.
The MMU is required to run A/UX, Apple’s version of the UNIX operating
system. It included the 68882 floating-point unit (FPU) for math coprocessing.
The Macintosh IIcx appeared in early 1989. It is a trimmed down
version of the II machines containing only three slots. It has a desktop foot
print little bigger than the Plus/SE machines. It comes with a 68030
microprocessor and 68882 FPU, also running at 16 MHz.
At the same time, Apple upgraded its SE line
with the Macintosh SE/30, a
16-MHz 68030 based version of the SE family. Unlike the SE or Plus which have
only 4 SIMM slots, the SE/30 has 8, enabling it to use up to 8 MB of RAM. It
contains one processor direct slot for additional expansion. The Mac SE/30 has
been the only modular Mac to be the fastest Mac since the introduction of the
II family. It was a bit faster than the IIcx since it did not have to watch any
NuBus slots.
The Macintosh SE/30 and IIci were the first Macintoshes to feature the the 1.44MB SuperDrive,
now standard on all Macintosh systems, which allows users to easily exchange
data files between Macintosh, OS/2, MS-DOS, and Apple II ProDOS systems.
Hitting the market in late 1989, the Macintosh
IIci runs at a brisk 25 MHz,
and has the same foot print and 68030 and 68882 chips that its baby brother,
the IIcx, includes. The Mac IIci was the first Mac to offer a built-in color
video interface and a slot for a cache card. The built-in video interface frees
up one of its three NuBus slots from this burden.
At the same time that the IIci was introduced,
Apple brought the Macintosh Portable to the marketplace. The Mac Portable uses a
fast 68000 running at 16 MHz, making it about twice as fast as a Plus/SE and
half as fast as a II or IIcx. The portable could be operated from long-life
rechargable lead-acid batteries. The active-matrix liquid crystal display was
unusually crisp for a portable. It included a track ball as well as a mouse. It
also featured a modem slot, a RAM slot which used expensive low-power static
RAM, a ROM slot, and a processor direct slot. The Portable came with 1 MB of
RAM, expandable to 9 MB. It also had the innovative Power Manager software
which put the Portable to sleep or disabled certain functions after a time to
conserve power. The Mac Portable disappointed many uses by having an overly large
footprint and weighing too much, causing it to be nicknamed the
“Luggable.” Later in its life, the Portable was upgraded to include
a backlit screen.
The Macintosh IIfx was for quite some time Apple’s fastest
machine by a long shot. It had 40-MHz 68030 and 68882 processors as well as
several peripheral processors to off-load the main processor. It included two
20-MHz I/O processors, a SCSI direct memory access (DMA) chip to speed hard
disk transfers, and six NuBus slots. Unfortunately, the system software never
took advantage of the DMA. The IIfx was probably the last of Apple’s
large footprint, six-slotted machines.
None of the above machines are currently
manufactured. The current Macintosh family consists of those machines described
below.
On October 15, 1990, Apple announced the Macintosh Classic, Macintosh
II LC, and Macintosh
IIsi. The goal of the new
systems was to offer an affordable family of computers. These three systems
were the first to have sound input/output, allowing users to play back voice messages
and sounds. The sound I/O feature includes a microphone that allows users to
record and store their voice in Macintosh documents in much the same way
handwritten notes are added to printed documents. Stereo jacks are also
included.
The Macintosh Classic features improved performance (30 percent faster) over the
Macintosh Plus. It uses an 8-megahertz (MHz) Motorola 68000 microprocessor. It
has 1 MB of RAM soldered to the motherboard, and with a RAM expansion card, is
expandable up to 4 MB of RAM. However, it has no additional expansion
capability. The Classic was basically introduced to provide a low-cost computer
for Apple to offer to the consumer electronics market. It is essentially a Plus
with low manufacturing costs.
The Macintosh II LC computer comes with 2MB of RAM (expandable up
to 10MB) and built-in support for a choice of monitors (Macintosh 12-inch RGB
Display, (up to 256 colors), Macintosh 12-inch Monochrome Display (up to 16
shades of gray), and AppleColor High-Resolution RGB Monitor (up to 16 colors).
It uses a 16-MHz 68020 microprocessor. The Mac II LC was the first Macintosh to
use a high-end 68000-family microprocessor but not include the 6888X math
coprocessor, much to the consternation of Mac developers. A processor direct
slot (PDS) gives users the ability to customize their system with additional
capabilities such as an accelerator, math coprocessor, networking, cache card,
and other options.
The Macintosh IIsi uses the Motorola 68030 microprocessor which
runs at 20-megahertz (MHz). The Motorola 68882 FPU is optional on the IIsi. It
also contains only one expansion slot for an industry standard NuBus card or an
030 Direct Slot card. Either of these adapter card includes a 68882 math
co-processor. Like other Macintosh II computers, the IIsi can support more than
one monitor at a time through an optional video expansion card.
On October 21, 1991, Apple introduced the
largest number of computers at any single time. These were the Macintosh
Classic II, the Macintosh
Quadra 700 and 900, and the Macintosh PowerBook 100, 140, and 170.
The Macintosh Classic II is essentially a low-cost Mac II in a
modular-style case. It has a 16-MHz 68030 processor, but with only a 16-bit bus
as opposed to the SE/30’s 32-bit bus, it has a performance roughly
equivalent to the 68020-based Mac II LC. It has limited expansion capabilities
with its only expansion slot accommodating only an optional math coprocessor or
a ROM card. It has 2 MB of RAM soldered to the motherboard, and is expandable
up to 10 MB of RAM.
The Macintosh Quadra 700 and 900 are the first Macintoshes to feature the Motorola 68040 processor.
The 68040 runs at 25 MHz, making it roughly twice as fast as a Mac IIfx. The
68040 has a built-in PMMU, FPU, and copyback caching. Copyback caching writes
the contents to RAM only when needed to make room in the cache or when the
system software forces it, whereas the writethrough caching used by the 68030
copies the cache’s contents to RAM immediately. This caching schem gives
the 68040 higher speed than the 68030 but has presented some compatibility
problems. The Quadras are also the first Mac to use the NuBus 90 SCSI bus which
runs at 20 MHz, twice as fast as the NuBus slots in previous Macs. The Quadras
are also the first Macs to offer built-in Ethernet for much faster networking.
They also have separate video RAM so that video accesses can never conflict
with regular accesses, thereby improving perfomance. Both machines have 32-bit
video on the motherboard with up to 2 MB of video RAM. They both come with a
minimum of 4 MB of RAM.
The Macintosh Quadra 700 fits in a IIci size box. It has only two NuBus
slots and is expandable to 20 MB. The Macintosh Quadra 900 is the first Mac to be intended for standing
operation, and as such is the first “tower” Mac. It has five NuBus
slots and has 16 SIMM slots. Thus it is currently expandable to 64 MB, but its
ROMs should allow expansion up to 256 MB. The Quadra 900 is intended to be
usaable as a dedicated server. As such it is the first Mac to have a key
switch. It can also accomodate up to four internal storage devices, such as
hard drives, CD drives, and tape drives.
The Macintosh PowerBook 100, 140, and 170 are
Apple’s newest line of portables. The major improvement is size and
weight. These portable are truly portable. All three PowerBooks have backlit
screens, but only the 170 has an active-matrix LCD screen. The 100 and 140 have
a supertwist LCD scrren, sacrificing clarity for cost. All the PowerBooks come
with AppleTalk Remote Access which allows users to dial into their machine and
access its files. A 2400 data/9600 fax-send internal modem is available for all
the portables. They also use pseudostatic RAM, which is much cheaper than the
static RAM used in the original Portable. All come standard with 2 MB of RAM, expandable
to 8 MB, but at least 4 MB is needed for easy use.
The Macintosh PowerBook 100 is the cheapest PowerBook, having only a 16-MHz
68000 processor and no internal floppy drive. An external drive is optional.
The internal hard drive is only 20 MB in size. Its lead-acid battery lasts 2-4
hours. The Macintosh PowerBook 140
is the middle model, sporting a much more powerful 16-MHz 68030 processor, but
no FPU. It comes with either a 20 MB or 40 MB hard drive and an internal floppy
drive. It has a NiCad battery which lasts about 2-3 hours. The Macintosh
PowerBook 170 is the most
powerful of the Powerbooks, featuring a 25-MHz 68030 with FPU, internal floppy
drive, 40 MB hard drive, backlit active-matrix display, a NiCad battery, and
the internal modem standard.
II.g. • Virus
Management on the Macintosh
by Dan Richard
This section covers:
• What is a Computer Virus and a
Computer Worm?
• How to detect a virus.
• How to determine when and where a
virus first appeared.
• How to get rid of a virus.
• How to protect your Macintosh from
a virus.
• Where to get more information on virus and Macintosh?
What is a Computer
VIRUS and a Computer WORM
Computer VIRUS — A routine or code that
surreptitiously (made, done or acquired by stealth) copies itself into another
program.
Computer WORM: A program that copies itself to
other systems via a network. Mac is currently immune to WORMs. A WORM requires:
1) a multi-tasking system, 2) a network connection and, 3) a means of remote
login.
How is this possible?
• In today’s computers,
executable code (programs), can be manipulated like data.
• In modem operating systems, like
VAX/VMS, PS/2 and Macintosh, the Operating Systems (OS) may be modified during
start up or boot time. This allows for updates to the OS, i.e., new device
drivers or new features. This modification is the primary path for a VIRUS to
attack an operating system. Once the operating system is attacked, no user
application is safe.
• UNIX, NOS and VM, are almost immune from a system virus, but not WORMs.
HOW to Detect a VIRUS
You should suspect you have a VIRUS when:
• You lose files without reason.
• Programs that previously worked,
fail.
• Normal system functions stop
working.
• Applications sizes are larger than
normal and/or were modified in the last few days.
You know you have a VIRUS when:
• You run Virus RX (detection
program) from a write protected disk and it lists infected files.
• You run N.O.M.A.D. from a write
protected disk and it says you have to reinstall the system.
• You run ResEdit and find in an
application the resources “nVIR”, “MEV#”,
“ANTI”, “Hpat”, or other resources named after the
infecting virus.
NOTE: Every application you run on an infected system also becomes
infected, unless it is run from a write protected disk. Always run from a
backup disk!
How to Determine when
a Virus First Appeared
Once you have determined you are infected, you
should find out where the infection came from. To help determine this you need
to know just when the earliest infection appeared. The following steps will
assist you in determining the earliest time and possible origin of the VIRUS.
1. Examine Finder’s last modification
date. This date tells when the Finder was infected. The date the Finder was
infected dates the introduction of the infection into your system.
2. Next look for an infected file that has
an earlier modification date then the Finder. This will tell you the
application which infected your system. If their is no infected file on your hard drive dated prior to the
finder modification date, then you were infected from an application introduced
from a floppy!
3. Try and remember which disks were in
your system and which applications were executed or copied from that disk. Run
a Virus Rx program (residing on a write protected disk) on all the disks that
have been mounted without write protection since the infection.
4. Once you have found the source and removed its infection, you can then work on removing the infection from your hard drive and other disks, or system disk.
How to Get Rid of a
Virus
To remove a virus you may:
• Delete all infected applications.
This is the preferred method. The original disk “last modified
date” is available for verification it was not modified by the infection.
Apple’s Virus Rx identifies infected files. Any infected data files could
be a new virus!
• Run a virus removal program such as
N.O.M.A.D. for “nVIR”; SAM Virus Clinic, Disinfectant or Virex for
all know viruses. This operation also updates the “last modified”
date.
• Once the infected applications have
been repaired or removed, the System and Finder will have to be deleted and
rebuilt.
To rebuild your hard drive or system floppy and
any application disks, you should:
1. Reboot the machine from a write
protected system installation disk.
2. Remove the System and Finder files from
your hard drive.
3. Reinstall the System which will also
reinstall the Finder.
4. Reboot using the machine with the
rebuilt system.
5. Run your Virus detection program again
to insure you have a clean system.
6. Reinstall all deleted applications from
locked master disks.
7. Run your Virus detection program again.
8. Backup your clean system and application
disk.
9. Remain vigilant against reinfection! Install a virus intercept program!
How to Protect your Macintosh from a Virus
Listed below are some basic rules for
“safe computing” practices:
• Run Virus Rx on your hard drive or
system floppy, on a regular basis and when ever other people have used your
system.
• Run Virus Rx or equivalent program
on all floppy disk before using any applications from those disk.
• Write protect all floppy disk that
contain original programs. This protects the disk from infection, but not your
system.
• Backup your hard drive or system
floppy and application disks on a regular basis. The best time to backup your
files is after you have run Virus Rx and gotten a clean bill of health.
• Install Vaccine or another Virus
intercept application. These INITs will detect and prevent a virus from
attaching itself to your programs. If you do software development, Vaccine and
other intercept programs can be annoying.
• Use Virex or another repair program
to detect and repair infected files (suggest you replace infected applications
from a master disk). Virex is $99.95 but comes highly recommended. Other
programs are available which range from $15 to $65. Don’t forget to look
at the upgrade costs before you select a program for your own use.
• On file servers, put applications
in folders in which Make Changes is enabled for only the system administrator.
Allow only the system manager to install new applications.
Remember: A locked disk is like a condom. Vaccine is like AZT. Neither one is a cure, only by knowing and testing your applications can you be safe.
Additional References
About Computer Virus
Stefanac, Suzanne; Mad Macs, MacWorld, November 1988, pages 93 to 101. This article introduces
the three main families of Macintosh virus. It covers the SCORES, nVIR and
“peace virus”.
Communications of the ACM, June 1989, Volume 32, number 6. This issue has
a special section of five articles on the Internet Worm.
Scanlin, Mike; A Vaccine for the
‘nVIR’ Virus,
MacTutor, Volume 4, Number 5 May 1989, pages 46 to 51. This article describes
how to remove the ‘nVIR’ both manually and also by using a C
program included in the article. This article is recommended for Mac
programmers.
Lundell, Allan; VIRUS!, Contemporary Books, 1989. This book covers the
history, science, science-fiction, lore, mind set, and culture that has grown
up about computer virus. This book captures some of the “Silicon
Valley” culture about computers and software. The book is both
fascinating and frightening.
Apple Computer, Technical Introduction to the Macintosh Family, Addison Wesley, 1987. This is an excellent, light technical introduction to the Macintosh. This book is excellent for anyone who wants more information than is in the user manuals but not so much as may be needed to program the Mac. This book covers the MacPlus, SE and Mac II (information on the SE 30, IIcx and IIx has not been published in book form yet).
II.h. • Glossary
of Terms
by
Vernon McMillan
This
glossary is ordered, as you might expect, in alphabetical order, numbers first.
Each entry is shown in boldface,
with cross-references in italics. Some
extremely obvious terms have not been defined, e.g., “Macintosh,”
and “printer.” If you can think of terms that should be included in
this glossary but are not, please provide them to us. Similarly, if you have a
better or more clear definition for any of the terms, please provide it for incorporation
in future updates.
All definitions in this glossary have been
copied from the references listed at the end of the Glossary.
6551: A version of Asynchronous
Communications Interface Adapter (ACIA) used in the Apple Super Serial Card and
other popular serial cards. The 6551 has largely supplanted the 6850 ACIA.
(Ref. 13)
6850: A version of ACIA used on
early serial cards. Most serial cards made in the last few years use the 6551
ACIA. (Ref. 13)
68000: The microprocessor used in the
Macintosh family of computers. (Ref. 13)
68020: The microprocessor used in the
Macintosh II computer and in the LaserWriter printer. (Ref. 13)
68881: A special-purpose chip that
performs calculations using floating-point numbers at speeds greater than those
calculations can be carried out using a more conventional microprocessor. The
68881 belongs to a type of chip usually called “math
co-processors.” (Ref. 13)
abnormal behavior: Any unusual or unexpected
Macintosh behavior, such as the cursor freezing or icons not staying in the
Trash, that lets you know that there is a problem. (Ref. 6)
accessory card: A hardware board (card), on
which electronic circuitry has been printed, that adds features to a computer.
See also expansion card and expansion slot. (Ref. 7)
access time: The measurement of how quickly
the read/write heads of a hard disk can retrieve data from storage.
(Ref. 9)
ACIA: An acronym for Asynchronous Communication Interface Adapter. An integrated circuit that
converts data from parallel to serial form and vice versa. See 6551 and 6850. (Ref. 13)
ACK: A control character (^ F)
issued by the computer’s transfer protocol subroutine to acknowledge that
a block of data has been properly received. (Ref. 29)
acoustic coupler, acoustic modem: A modem with cups that fit
snugly around the earpiece and mouthpiece of a standard telephone handset and
contains a small speaker and microphone to convert a computer’s digital
signals into sound and back again. Acoustic couplers are not common today; most
modems use standard modular connectors to connect with jacks in the wall, as
regular telephones do. See also direct-connect modem. (Refs. 7 and 13)
acronym: A term formed by generally
combining the first letter of every word in a popular expression. “What
you see, is what you get” becomes WYSIWYG. (Ref. 10)
active text: The paragraph that contains
the insertion point or the current selection. (Ref. 28)
active window: The frontmost window on the
desktop; the window where the next action can take place. Its title bar is
highlighted and its scrolling and sizing controls are visible. (Ref. 28)
ADB: An acronym for Apple Desktop Bus. A simple local area network
circuit designed to handle a keyboard, mouse, and other low-speed input
devices. (Ref. 7)
address: The number that identifies a
device on the SCSI bus or a location in the computer’s memory.
(Ref. 9) A specific location in memory. (Ref. 12) Addresses can be
expressed as decimal (base 10) integers (such as 255) or as hexadecimal (base
16) numbers; the equivalent of 255 (in decimal notation) is $FF (in hexadecimal
notation). (Ref. 13)
alarm Clock: A desk accessory that displays
the current date and time, and lets you set an alarm. (Ref. 1)
alert box: A box that contains a warning
that you’re asking the Macintosh to do something it can’t do, or
that you’re about to destroy some information. The warning is accompanied
by a beep; usually you must respond before you can proceed. (Refs. 1 and
7)
algorithm: A step-by-step procedure for
solving a problem or computing a result; specifically, the computer program
code that does this. (Ref. 7) In FM sound synthesis, one particular
combination of a synthesizer’s operators used to create a patch. (Ref. 24)
allocate: To reserve memory space for a
particular purpose, usually from the heap. (Ref. 12)
alphanumeric: The set of characters that are
either Arabic numerals (0-9), letters of the alphabet (a-z and A-Z) or
international characters (such as å, ñ, é, or ç).
(Ref. 29)
alpha testing: Early debugging of a product
within the company developing it. It’s followed by beta testing.
(Ref. 22)
American Standard Code for
Information Interchange: See ASCII.
analog signal: A signal that carries
information represented by continuously varying quantities of voltage,
frequency, or amplitude. Compare with digital signal. (Ref. 29)
analog-to-digital converter: An electronic circuit that
changes continuous analog signals into discrete digital signals (bits);
abbreviated A/D. (Ref. 7)
anomaly: An event or activity that is
not consistent with normal Macintosh practices. (Ref. 14)
ANSI: An acronym for American National Standards Institute. The U.S. branch of the
International Standards Organization. ANSI is responsible for establishing
various standards for the U.S. computer industry, such as data transmission
protocols, programming languages, computer terminal definitions and magnetic
storage media standards. (Ref. 29)
Apple DeskTop Bus:
See ADB.
apple key: See Command key.
apple Menu: The menu on the far left side
of the menu bar, under the Apple symbol. Items available from this menu may
include information about the current application, a list of other applications
running under MultiFinder and the desk accessories installed in the system.
(Ref. 29)
Applesoft BASIC: An extended version of the
BASIC programming language used with the Apple II family of computers.
(Ref. 4)
AppleShare: A dedicated file server.
(Ref. 14)
AppleTalk: A local area network (LAN)
developed by Apple Computer that can handle up to 32 nodes on a cable up to
1000 feet long. It allows them to exchange information and share hardware such
as printers and hard disks. See LocalTalk. (Refs. 6 and 7) AppleTalk
is used primarily to connect computers to Apple’s LaserWriter printer.
(Ref. 13)
application or application program: A program written for some
specific purpose, such as writing (word processing), financial calculations
(spreadsheet work), illustrations (graphics), lists (data base management), and
telecommunications. Applications are launched by double-clicking on an icon.
(Refs. 2, 4, 7 and 9)
architecture: The structure or actual
physical organization of a computer circuit. The circuit’s architecture
determines its behavior. (Ref. 13)
archival data: Information that the user has
preserved, but does not need to have readily available. (Ref. 9)
archive: A standby copy of the contents
of a mass storage volume, usually comprising a collection of floppy disks.
(Ref. 9)
arrow: The pointer used to choose
commands from menus, manipulate window and ruler controls, resize and
horizontally reposition pictures, and select paragraphs, pictures, rulers, page
breaks, ranges, or any combination of these. (Ref. 28)
arrow keys: A set of (usually) four keys
found on many computer keyboards that move the cursor (insertion point) left,
right, up, or down on the screen; also called cursor keys or direction keys. (Ref. 7)
ascender: The part of a lowercase
letter, such as in a “b” or “h,” that rises above the
x-height. (Ref. 18)
ASCII: An acronym for American Standard Code for Information Interchange (pronounced
“ask’ee”). A code for representing text characters and other
data inside a computer and between a computer and any peripheral device; each
character is represented by seven bits. (Refs. 4 and 7) The characters are
assigned a numerical representation from 0 to 127. In ASCII, the letter
“A” is represented by the number 65. The letter “a” is
97. A space is 32. A Return character is 13. On some computers, such as the
Macintosh, values greater than 127 have a special meaning. On the Mac, the
Letter “Ä” is 128. Most computer reference manuals have tables
showing the ASCII character set. (Ref. 13)
assembler: A low-level programming
language that is closely related to the intrinsic operation of a computer.
Programs in assembler are fast and flexible but hard to read and write.
(Ref. 7) A program that converts assembly-language programs into machine
language. (Ref. 12)
assembly language: A low-level (programming)
language (in contrast to high-level languages like Pascal and BASIC that are
easier for humans to understand) in which individual machine language
instructions are written in a symbolic form that is easier to understand than
machine language itself. Each assembly language instruction produces one
machine language instruction. The program that translates assembly language
into machine language is called an assembler. (Ref. 13)
asynchronous: A mode of data transmission in
which characters are sent at varying time intervals. Each character is preceded
by a start bit and followed by a stop bit. Asynchronous communication
eliminates the need for computers to have a common synchronized clock to
coordinate communication. Compare with synchronous. (Ref. 29)
asynchronous communication: A means of transmitting data
between computers in which a special signal indicates when each transmitted
character starts and stops. See also synchronous communication. (Ref. 7)
attribute bits: The attribute bits modify the
way a file is handled. They are properties that the Macintosh associates with a
given file. From a file recovery standpoint, the important file attributes are:
locked, invisible, bundle, system, and protected. (Ref. 6)
audio output port: In the Macintosh, the
electrical connection that transmits sound output; connected internally to a
built-in speaker and externally to a 1/8-inch audio jack. (Ref. 7)
backup: (v) To make a spare copy of a
disk or of a file. (Ref. 2)
backup: (n) A copy of your data on a
different disk. Provides protection if the original file should become lost or
damaged. Backups may use floppy disks, hard disks, or other mass storage
devices. (Refs. 6 and 9)
backspace key: A key that moves the insertion
point backward, removing the previously typed character, or that removes the
current selection. (Ref. 1)
background program: A program operates “in
the background” if it continues to function, automatically, while you use
another program. (Ref. 5)
bad sector: A sector that contains a bit
that has “flipped.” This renders the sector unreadable, hence all
data in it is inaccessible. (Ref. 6)
baseline: An invisible line on which
characters sit. In some typefaces, rounded characters such as “e”
and “o” dip slightly below the baseline to visually line up with
the other characters. (Ref. 21)
BASIC: An acronym for Beginner’s All-purpose Symbolic Instruction Code. The most common programming
language for microcomputers. It is relatively easy to learn but not especially
flexible. (Ref. 7)
baud: A measure of the speed with
which data is transmitted over a serial connection. (Literally, baud is the
number of discrete signal state changes per second.) Baud is sometimes
functionally equivalent to bits per second (bps), and oftentimes baud is used when
bits per second is meant. (Ref. 13) At low speeds (300 baud or less), one
baud represents one bps (bit per second); at higher speeds, one baud represents
two or more bits. (Refs. 4 and 7)
BBS: An acronym for [computer] Bulletin Board Service. A computer program that allows
users with a modem and a password to call the computer system running the
program and store or retrieve messages or computer programs. (Ref. 13)
Also called Bulletin Board System.
BCD: An acronym for Binary-Coded Decimal. A method of floating-point
arithmetic that prevents the normal round-off error inherent in computer-based
arithmetic. (Ref. 12)
Bell 212: A standard U.S. protocol for
exchanging information at 1200 baud. (Ref. 29)
benchmark: A point of reference used to
measure the performance of hardware and/or software. (Ref. 11)
beta testing: Debugging of a product using
people outside the company developing the product. Beta testing comes after
alpha testing and before the release version is shipped. (Ref. 22)
Bezier curve: A type of cubic spline curve
that is easily and smoothly joined with other curves and straight lines.
(Ref. 20) Mathematically generated lines that can display nonuniform
curvatures (as opposed to curves with uniform curvature, which are called
arcs). Named after Pierre Bezier (pronounced Bez-yay), they’re defined by
four “control points.” It’s relatively easy to make Bezier
curves assume complex shapes and to join their endpoints smoothly, which makes
them particularly useful for creating letter shapes and other computer
graphics. (Ref. 22)
binary: The representation of numbers
and other characters in the base-2 system, using only the two digits 0 and 1.
(Ref. 5)
Binary-Coded Decimal: See BCD.
binary file: A file in which the data are
stored in machine-readable (as opposed to human-readable) form. Binary files
either require another computer program to read and interpret them, or else
they are themselves computer programs that are meant to be run and understood
by the computer. In contrast to binary files, text files are easy for people to
understand. (Ref. 13)
bit: A contraction of binary digit. The smallest unit of data. A
bit is coded either a one or a zero, an electronic on or off. It is combined
with others to represent numbers, characters, or instructions. (Refs. 4, 7
and 9)
bitmap: A grid of bits that makes up
your Macintosh screen. (Ref. 11) Type of artwork created with Paint
programs (MacPaint, SuperPaint, and so on). (Ref. 17) Bit-mapped
characters are used as screen fonts and tend to be jagged, as opposed to smooth
outline characters that are used as printer fonts. (Ref. 18)
bitmap font: A font made up of dots and
designed primarily for use on dot-matrix printers. Also called an ImageWriter
font. Compare with outline font and screen font. (Ref. 22) The representation of a
PostScript font which you see on screen, also known as screen font. Bitmap
fonts tend to have a jagged appearance. (Ref. 20)
bitmapped image: A screen or printed computer
image consisting of dots, in which one dot in the image corresponds to one or
more bits in the section of random-access memory set aside as a
“map” of the screen. (Ref. 7)
blank paragraph: A paragraph that contains no
text, usually created by pressing Return twice. Blank paragraphs can take up
valuable disk and memory space and can confuse numbering schemes, so use
Shift-Return to create blank lines instead of Return wherever possible.
(Ref. 28)
block: A file storage unit (consists
of one or more sectors). (Ref. 6) A group of words or characters that may
be transported as a unit across a network or communications line. See also packet.
(Ref. 29)
bold: A characteristic of a typeface
that indicates a wider, darker representation. (Ref. 18)
bomb box: The dialog box displayed when
a software problem has caused the operating system to lose control of the
Macintosh. Distinguished by the round bomb icon in the upper-left corner.
(Ref. 9)
Boolean: A data type that can have a
value of True or False. (Ref. 12)
Boolean operator: An operator such as AND or NOT
that combines logical expression into “logical” results, i.e., TRUE
or FALSE. (George Boole was a mathematician and logician.) (Ref. 13)
boot: A computer’s start-up
process, the instructions for which are stored in ROM. The term comes from
“pulling yourself up by your own bootstraps.” (Ref. 7) Also
called a “cold boot.” (A warm boot refers to loading the system on
an already-switched-on computer.) (Ref. 9)
boot blocks: The first two sectors of every
Macintosh disk. Contains information for starting the Macintosh. Damage to the
boot blocks causes the “Sad Mac” icon to appear on startup.
(Ref. 6)
boot disk: A disk containing all the
information necessary to start a computer. See also startup disk. (Ref. 7)
bps: An acronym for bits per second. A measure of data transfer
speed. See also baud. (Ref. 7) In serial connections, each eight-bit character is
preceded by a start bit and followed, usually, by one stop bit, so that it
takes ten bits to send one character. Thus, the speed of a connection in bits
per second is usually ten times the transmission rate in characters per second:
300 bps is 30 characters a second, 1200 bps is 120 characters a second, and so
on. (Ref. 13)
bridge: A device that lets you connect
AppleTalk networks together. See zone. (Ref. 1) In a computer network, the
hardware and software connecting two or more similar networks; all users on all
connected networks have access to one another. See also gateway. (Ref. 7)
brownout: A period of low-voltage
electrical power, usually caused by heavy demand or problems at the electrical
utility. (Ref. 7)
buffer: An area of RAM memory used as
interim storage for data being transferred from the computer to a peripheral.
Since the Macintosh can export data faster than most printers and other devices
can import it, holding data in a buffer allows the CPU to return to other
tasks. (Ref. 9)
bug: A software problem; named
after a moth that caused the failure of an early (1945) digital computer at
Harvard. Evocative but inaccurate entomology: Moths (and butterflies) belong to
the order Lepidoptera, whereas true bugs belong to the order Hemiptera.
(Ref. 7)
Bulletin Board System: See BBS.
bundle (attribute bit): Set for all applications to
indicate that they have icons and files to which particular attention must be
paid. See attribute bits. (Ref. 6)
burn in: Occurs when the face of a CRT
picks up a permanent image that looks like a (photographic) negative of the
normal display. Even when the computer is off, you can still see the image.
(Ref. 10)
bus: A communication pathway. The
Mac communicates with other SCSI devices by way of the SCSI bus; the mouse and
keyboard by way of the Apple Desktop bus. (Ref. 9) The number of bits that
a bus can move in a single operation is one indication of the power of a
computer. The Macintosh’s bus moves 16 bits at a time. The Macintosh
II’s bus moves data 32 bits at a time. (Ref. 13)
buttons: The pushbutton-like images in
dialog boxes where you click to designate, confirm, or cancel an action. See
also mouse button. (Ref. 2)
byte: A unit of information, often
amounting to a single text character. A byte consists of eight bits.
(Ref. 4)
bache: A buffer storage that is
constantly updated with recently accessed main-storage items. (Ref. 12)
CAD: An acronym for Computer-Assisted Design. The design of objects or
systems with the assistance of a computer. Compare with CAM. (Ref. 13)
CAI: An acronym for Computer-Assisted Instruction. A teaching method that
facilitates self-paced learning. (Ref. 13)
calculator: A desk accessory that works
like a four-function pocket calculator. You can cut and paste calculation
results into your documents. (Ref. 1)
CAM: Acronym for Computer-Assisted Manufacturing. Compare with CAD. (Ref. 13)
cancel button: A button that appears in
dialog boxes. Clicking this button cancels the command. (Ref. 1)
cap height: The height of a face’s
capital letters. In many faces, the capitals are shorter than the ascenders.
(Ref. 21)
caps lock key: A key that, when engaged,
causes subsequently typed letters to appear in uppercase, except that it
doesn’t affect numbers or symbols. (Ref. 1)
card: A removable printed-circuit
board that plugs into one of the expansion slots found on the computer’s
main circuit board. Cards can provide additional memory, the ability to display
80 columns of text per line, the ability to communicate with printers and
modems, or other purposes. (Ref. 13)
caret (^): The ^ symbol. Often used in
combination with a letter to denote a control character. For example, ^ M
represents a carriage return. See also control character. (Ref. 29)
carriage return: A control character (^ M) that
instructs the computer to move the cursor to the beginning of the line. On the
Macintosh, a carriage return is sent by pressing the key marked Return. Often,
a carriage return must be sent to the host computer before the host will
process the contents of the line just typed. (Ref. 29) An ASCII character
(decimal 13) that ordinarily causes a printer or display device to print the
character following it at the left margin. (Ref. 4) See Return.
carrier: The analog signal used by
modems to transmit data. When calling another modem, if the signal is missing,
full of noise or somehow distorted, most modems will report “NO CARRIER”
and hang up. If the carrier signal is free of trouble, most modems will report
“CONNECT” and then allow data to be sent. (Ref. 29)
Carrier Sense Multiple Access with
Collision Detection: See CSMA/CD.
cascading: In automatically establishing
an XMODEM, YMODEM or YMODEM-G transfer, “cascading” refers to
dropping down to less and less sophisticated protocols until a match is found
with the remote computer. (Ref. 29)
catalog: Also sometimes called directory, this is a command that lists
the files on a disk. It can also refer to the listing of files itself.
(Ref. 13)
catalog tree: Part of the diskkeeping
information. Exists only on HFS disks. It keeps track of the files and folders
on the disk in a hierarchical fashion; makes it much faster to access a file
and makes working with a large number of files possible without slowing down
operations. (Ref. 6)
cathode-ray tube: See CRT.
CCITT: An acronym for Comité Consultatif Internationale de Télégraphie et Téléphonie. International Telegraph and
Telephone Consultative Committee; an international body, part of the
International Telecommunications Union of the United Nations, which sets
standards for international telecommunications via computers or telecopiers
(also called facsimile or fax machines). (Refs. 7 and 13)
CD: An acronym for Compact Disk. A storage technology,
employing an optical rather than a magnetic media platter, on which data is
created and accessed by a laser. CD drives for the Macintosh can store
considerably more data than most hard disks. CD-ROM, WORM, and erasable optical
disks are examples. (Ref. 9)
CDev: An acronym for control panel device. Auxiliary files used by the
Control Panel desk accessory. (Ref. 6) Some CDevs are supplied with
Apple’s System software and others are offered by third parties.
(Ref. 8)
CD-ROM: An acronym for Compact Disk Read-Only Memory. An optical device or medium
capable of storing large amounts of permanent, unalterable data. (Ref. 9)
central processing unit: See CPU.
character: A letter of the alphabet,
numeral, punctuation mark or symbol. (Ref. 29)
character keys: The following keys on the
Macintosh keyboard — letters, numbers, symbols, punctuation, Return, Tab,
and the Space bar. (Ref. 1)
character pitch: The number of characters per
inch printed on a horizontal line. (Ref. 4)
character set: The entire set of characters
that a printer can print. (Ref. 4)
character width: A term used by Apple in its
communication programs to refer to the number of bits, generally seven or
eight, in a transmitted character; usually referred to as the number of data
bits. (Ref. 7)
check box: The small box or circle
associated with an option in a dialog box that, when clicked, adds or removes
the option. (Ref. 1)
checksum: A simple mathematical method
of checking to determine if an error has been introduced during transmission of
a file. Also, the data that is the result of such a check. See also CRC. (Ref. 29)
chip: A tiny wafer of silicon with a
complex integrated electronic circuit photoengraved on its surface.
(Ref. 7)
choose: To pick a command by dragging
through a menu. You often choose a command after you’ve selected
something for the program to act on. See also select. (Ref. 5)
chooser: A desk accessory that allows
you to configure your Macintosh system to print on any printer for which
there’s a printing resource on the current startup disk. You also use
Chooser to designate the port to which a printer is attached. If you’re
part of an AppleTalk network, you use the Chooser to connect and disconnect
from the network and choose among devices connected to the network. You can
also specify a user name that the Macintosh uses from time to time — when
you’re printing on a LaserWriter, for example. (Refs. 1 and 2)
chooser device: See RDEV.
chooser resource: A controller, or driver, for
an external device such as a printer, network modem, or file server. Chooser
resources are installed in the System Folder, and then appear as options in the
Chooser. (Ref. 8)
circuit board: A collection of integrated
circuits (chips) wired together on a board. (Ref. 4)
clear: To remove something by
selecting it and choosing Clear from the Edit menu or pressing Backspace.
Unless you reclaim it immediately with an Undo command, anything you clear is
lost. (Ref. 28)
click: To position the pointer on
something, then press and quickly release the mouse button. (Ref. 1)
client: A computer connected to a
network that can access information from other computers or from file servers.
(Ref. 9)
clipboard: The holding place for what you
last cut or copied. (Ref. 1) A region of random-access memory (RAM) that
stores information copied or cut from a document you are working on with a
Macintosh application. Clipboard information can be pasted into the same
document, a different document created with the same application program, or a
document created with a different program. Compare with Scrapbook. (Ref. 7)
clock battery: On the 128K to the Mac Plus, a
4.5-volt alkaline battery located in a small compartment just above the power
switch. On the Mac SE, a 3.0-volt lithium battery soldered to the logic board.
Clock batteries maintain the correct time and date and provide power to an area
of memory where the volume setting and other Control Panel information is
stored. (Ref. 10)
close: To turn a window back into the
icon that represents it. (Ref. 1)
close box: The box on the left side of
the title bar of the active window. Clicking the close box closes the window,
and, if the window was the first opened on a document, closes the document as
well. (Ref. 28)
comma-delimited file: A data file in which commas
separate data elements. (Ref. 7)
command: A word or phrase, usually in a
menu, describing an action for the Macintosh to perform. (Ref. 1)
command key: A key that, when held down
while another key is pressed or a mouse action is performed, causes a command
to take effect. Also referred to as the Apple key. (Ref. 1)
command-line interface: An old-fashioned way to get
information into and out of a computer by means of cryptic commands displayed
one line at a time on the screen. (Ref. 7)
communications protocol: A format or set of rules for
sending and receiving data. (Ref. 4)
communications settings: A collection of settings that
specifies the parameters linking the local computer with the host computer.
(Ref. 29)
compact disk: See CD.
compact disk read-only memory: See CD-ROM.
compiler: A program that translates a
high-level programming language (source code) into machine code that the
computer understands; an entire program is generally compiled as a unit. See
also interpreter. (Ref. 7)
concatenate: The operation of joining two
strings together. For example, if you had one string with the value
“Huntsville” and another with the value “Macintosh Users
Group” and concatenated them, the result would be “Huntsville
Macintosh Users Group.” (Ref. 13)
configuration: The hardware and software
elements that constitute a computer system. (Ref. 4)
configuring: The act of changing software
or hardware actions by changing settings. For example, you give software the
necessary settings for communicating with a printer. You can configure hardware
(a printer or interface card) by resetting physical elements like DIP switches
or jumper blocks. Configurations can also be set or reset in software.
(Ref. 4)
connectivity: The ability to link with
another computer using compatible software, standard data exchange, and other
things that ensure the best connection between the computers. (Ref. 14)
constant: A symbol in a computer program
that represents a fixed, unchanging value. For example, “3” is a
constant. Compare with variable. (Ref. 13)
construction set: A type of program that permits
the user to create a new or special-purpose application by combining
pre-existing elements, rather than by programming each activity “from
scratch.” (Ref. 13)
context switching: A type of processing in which
several programs are loaded into memory simultaneously, but only one, the
foreground program, is active at a time; background programs are frozen but can
be brought into the foreground instantly. See also multi-tasking. (Ref. 7)
contiguous RAM: RAM that’s not split
apart by other pieces of RAM used by other programs. Compare with fragmented
memory. (Ref. 22)
control character: On ProDOS and MS-DOS
computers, a nonprinting character that controls or modifies the way
information is printed or displayed. Control characters are typed by holding
down the Control key while pressing some other key. In the Macintosh family,
the Command key performs a similar function. (Ref. 5)
control key: A key used in conjunction with
other keys to enter (or, in telecommunications, send) control characters.
(Ref. 13)
controller: The circuitry that manages a
hard disk’s physical data access operations, such as moving read/write
heads and erasing tracks and sectors. The term is sometimes used to mean the
software that runs this circuitry (more correctly called the driver). (Ref. 9)
control panel: A desk accessory that you use
to personalize your computer to your own way of doing things. Use the Control
Panel to change the speaker volume, set the system clock, create a RAM cache,
and set other preferences. (Ref. 1)
control panel device: See CDev.
Control Program for Microprocessors: See CP/M.
copy: To move selected text or
graphics to the Clipboard so that it can be copied to a different location.
(Ref. 29)
copy protect: To make a disk uncopyable.
Software publishers frequently try to copy protect their disks to prevent them
from being illegally duplicated by software pirates. (Ref. 1)
copy-protected disk: A disk that cannot be copied,
usually because it is in a nonstandard format. (Ref. 7)
copy protection: Hardware and software methods
of limiting data duplication to discourage illegal use and piracy of software.
Some copy-protected software can be copied only a few times, some not at all;
others require a password or special floppy disk to work. (Ref. 9)
CP/M: An acronym for Control Program for Microprocessors. CP/M is the ancestor of
MS-DOS, the operating system used on IBM PCs and compatibles. Although
recognized by many as clumsy and difficult to learn (some maintained that the
initials stood for “Conspiracy to Protect the Ministry [of computer
initiates]”), at one time CP/M was the most widely used microcomputer
operating system — which says something about the way computers have
improved over the years. (Ref. 13)
CPU: An acronym for Central Processing Unit. A computer’s main
information-processing circuit. In a microcomputer, the CPU is a single silicon
chip called the microprocessor or CPU chip; on larger computers, the CPU may
consist of many chips. (Ref. 7)
crash: To stop working suddenly,
possibly destroying information in the process. A “crashed” disk
may be recovered partially using certain specialized programs written for the
purpose. See also head crash. (Ref. 13) When a system stops working (or is
working incorrectly), forcing you to restart your system without an error
message. (Ref. 15)
CRC: An acronym for Cyclic Redundancy Check. The last part of every sector.
Provides a check on the accuracy of data within the sector. It is the means by
which bit flips are detected. (Ref. 6) A method of checking for
transmission errors during protocol file transfers. CRC is a more reliable
method of error checking than checksum. (Ref. 29)
creator: A four-character identifier
associated with each file on the Macintosh that tells the Finder what
application created it. For example, files created by MacWrite have a creator
“MACA.” Compare with type. (Ref. 13)
creator code (or ID): The four letter identification
shared by a program and all the documents that it creates. In most cases, a
document must have the creator code of its parent application for that
application to be able to recognize it and thus open, work with, and/or print
it. MacWrite’s creator code is MACA and HyperCard’s is WILD. (Refs. 6 and 9)
CRT: An acronym for Cathode-Ray Tube. The screen used in nearly all
television and most computers, in which light is produced by an electron beam
(the cathode ray) striking a phosphor coating on the screen. (Ref. 7)
CSMA/CD: An acronym for Carrier Sense Multiple Access with Collision Detection. A network protocol that
permits any node to send information when the network cable is free; if two
nodes start at the same time, each node pauses for a random interval before
trying again. (Ref. 7)
current startup disk: The disk that contains the
system files the computer is currently using. The startup disk icon is usually
in the upper-right corner of the desktop. (Ref. 2)
cursor: The symbol used to indicate
position on the screen, usually manipulated with the mouse or keyboard. On the
Mac, the cursor is a pointer arrow when items can be selected by pointing and
clicking; an I-beam when text can be inserted; a flashing marker indicating the
current working location on a computer screen; or a wait cursor when the
computer is busy carrying out a command and can’t acknowledge any new
ones. (Ref. 9)
cursor keys: See arrow keys.
cut: To remove something by
selecting it and choosing Cut from the Edit menu. What you cut is placed on the
Clipboard. (Ref. 1)
Cyclic Redundancy Check: See CRC.
cylinder: On a disk, the aggregate of
all the disk tracks that can be written or read for a specific head position.
On a double-sided floppy disk, a cylinder consists of two tracks; on a hard
disk, it consists of four or more tracks. (Ref. 7)
daisy chain: A configuration used by SCSI
to connect multiple peripherals to a single Macintosh. Units are linked in a
row, and each serves as an input/output relay for the others. (Ref. 9)
daisy wheel: The printing element in one
type of letter-quality printer, which resembles a daisy with embossed letters
at the tips of plastic “petals.” (Ref. 7)
DAs: An acronym for Desk Accessories.
“Mini-applications” that are available from the Apple menu
regardless of which application you’re using. Examples are the
Calculator, Alarm Clock, and Scrapbook. DAs are installed and removed with
Font/DA Mover. (Ref. 1, 5 and 9)
data: The output of a program.
Synonymous terms are: document, file, and data file. The most universal usage is that the output from
a program is called its data and the Macintosh refers to the file it is stored
in as a document. (Ref. 6)
database: A structured collection of
information, such as an address book, organized for storage, retrieval, and
updating. (Ref. 7)
data bits: In computer communication, the
bits that code for a transmitted character, usually a sequence of seven or
eight bits; same as Apple’s term character width. (Ref. 7)
data byte: The basic unit of data the
computer sends to the printer. (Ref. 4)
data byte length: The number of bits in a data
byte. The ImageWriter II receives data in 8-bit data bytes. (Ref. 4)
data disk: A disk that contains only
data, without programs or start-up information. (Ref. 7)
data encryption: A data protection method that
makes use of codes. Data-encrypted files cannot be read except by users who
know the code. (Ref. 9)
data fork: Part of all files. For most
documents it is the part of the file that contains the text information. When a
document is badly damaged, it may be possible to extract the text that is
stored in the data fork, thereby recovering the data even if the document
itself cannot be recovered. (Ref. 6) Part of the file that contains the
data accessed through the Macintosh’s File Manager. (Ref. 14)
data storage area: The 512-byte area of a sector
in which the actual file information is stored. Only one file at a time can be
stored in a sector. (Ref. 6)
Data Terminal Ready: See DTR.
DB-9: The popular name for a small
connector that connects computers to peripheral devices. The DB-9 connector is
a small trapezoid with space for nine pins in the male version of the
connector. (Ref. 13)
DB-25: A trapezoidal connector with
up to 25 pins used to connect computers with peripheral devices. Most modems
and many non-Apple serial printers use DB-25 connectors. The DB-25 is a
commonly used connector because it provides enough wires to implement the popular
RS-232 protocol that makes it possible for computer devices to
“speak” to each other. (Ref. 13)
DCA: An acronym for Document Content Architecture. IBM’s format for
transmitting text documents from one computer system to another; comes in two
forms: RFTDCA (revisable) and FFTDCA (final form). (Ref. 7)
DCE: An acronym for Data Communication Equipment. A device on one side of an
RS-232C serial communication link; the other side is DTE (Data Terminal
Equipment). DCE and DTE differ in the direction that signals travel through
their connector pins; A DCE device can usually be converted to a DTE device with
a change in connecting cables. The distinction is not made in the RS-422 ports
on the Macintosh, which are wired identically. (Ref. 7)
dead key: A keystroke or keystroke
combination that modifies the subsequent character rather than producing a
character of its own. Option-U, for instance, will place an umlaut (¨) over
the following letter. (Ref. 9)
debugger: A special program that
provides capabilities to start and stop execution of a program at will, as well
as analyze values that the program is manipulating. (Ref. 12)
default: A value, action, or setting
that a computer system assumes, unless the user gives an explicit instruction
to the contrary. (Ref. 4)
defective media: Disks that do not take/hold
the pattern of magnetization that is written on them by the disk drive.
(Ref. 6)
delete-log: A special file that is used to
record information about files as they are deleted. (Ref. 6)
deleted file: A file that has been thrown in
the Trash. Until new data is written into the sectors that had been used by a
deleted file, it can be recovered (undeleted). (Ref. 6)
descender: The part of character that
extends below the baseline, as in “g” or “p”.
(Ref. 18)
desk accessories: See DAs.
desktop: Macintosh’s working
environment — the menu bar and the gray area on the screen. The visual
representation of disks, folders, and files on the Macintosh screen. This is
the basis of the user interface for performing operations on disks and files.
The terms Finder
and desktop
are sometimes used interchangeably. (Refs. 1 and 6)
desktop file: An invisible file that exists
on every disk. It 1) maintains a record of folders on the disk, 2) stores
comments for the Get Info Box of each file, and 3) keeps track of the icons
used by files. (Ref. 6)
destination: (adj.) Describes the disk or
folder that receives a copied or translated file, as in destination disk.
(Ref. 5)
device: Any unit that can be
controlled by the Macintosh to access, store, or display information. Hard
disks and floppy drives are devices, and so is the internal speaker that emits
warning beeps. External video displays (monitors) also perform as devices.
(Ref. 9)
device partition: A special type of volume that
is actually part of a larger volume and is created either by the device
manufacturer or by a Macintosh user with the help of software provided by the
manufacturer. Often referred to as hard partitions, SCSI partitions, and various other names. Not
to be confused with volume partitions or soft partitions. (Ref. 15)
diacritic: An accent or mark placed on a
letter to indicate a particular pronunciation. Common diacritical marks are the
acute accent (é), grave accent (è), umlaut (ü), circumflex
(î), tilde (ñ), and cedilla (ç). (Ref. 21)
dialog box: A box that contains a message
requesting more information from you. Sometimes the message is a warning that
you’re asking your Macintosh to do something it can’t do, or that
you’re about to destroy some information. In these cases the message is
often accompanied by a beep. See also alert box. (Ref. 1)
digital circuit: Electronic circuit that works
with information coded in binary digits. (Ref. 7)
digital signal: A signal that can be fully
represented by binary digits. Analog signals are usually converted to digital
signals before being stored or processed by a computer. Compare with analog
signal. (Ref. 29)
digital-to-analog converter: An electronic circuit that
changes discrete digital signals (bits) into continuous analog signals;
abbreviated D/A. (Ref. 7)
digitizer: A device that converts an
image into a bit-mapped file that can be manipulated. (Ref. 9)
dimmed button: An inactive button with gray,
rather than black, text. Clicking on a dimmed button has no effect.
(Ref. 29)
dimmed command: A command that appears dimmed
compared to other commands in the menu. You can’t choose a dimmed
command. (Ref. 1)
dimmed icon: An icon that represents an
ejected disk, or document, folder, or application on a disk that has been
ejected. You can select and open dimmed disk or folder icons, but you
can’t open the documents and applications on them. (Ref. 1)
dingbats: Ornamental typographic
elements such as stars, arrows, pointing hands, and so on. Used for decorative
touches, highlights, and borders. (Ref. 21)
DIN plug: A standard type of plug used
at each end of MIDI cable. (Ref. 24)
DIP switch: DIP is an acronym for Dual In-line Package. A small block containing a
number of switches. Setting these switches sets options on the device of which
the switch is a part, like a printer, modem, or an interface card.
(Ref. 4)
direct connect modem: A modem that bypasses the
telephone handset and plugs directly into a telephone line. See also acoustic
modem. (Ref. 7)
direction keys: See arrow keys.
directory: A list of the contents of a
folder or a disk. The contents can be listed pictorially, alphabetically,
chronologically, by size, by date, or by kind. (Refs. 1 and 2) A file
stored on a disk that indexes the location of information on that disk.
(Ref. 7) If the directory is unreadable for any reason, the disk may be
unreadable even though the data on the disk are intact. Use a recovery program
to try to recover such disks. (Ref. 13)
directory window: The window that shows you the
contents of a disk or folder. (Ref. 1)
DirID: On an HFS volume, folders are
directories. Each folder has a unique number associated with it that programs
can use to remember where things are. These numbers are called DirIDs, which is
short for Directory Identification numbers. (Ref. 25)
disassembler: A program that converts
machine language programs into a higher level language, such as assembly
language. (Ref. 13)
disk: A round, flat object used to
store data. Disks are usually (but not always) coated with ferrous oxide that
can be magnetized so as to preserve information. Disks can be floppy, i.e.,
made of flexible plastic, or hard, i.e., made of rigid metal. (Ref. 13)
Often referred to generically as a volume. (Ref. 14)
disk buffer: A special portion of
random-access memory that temporarily holds often-used information (for
example, the directory) from a disk; speeds operations because the information
does not have to be constantly exchanged with the disk. (Ref. 7)
disk controller: An electronic circuit that
converts information on the microcomputer bus into a signal used by the disk
drive heads to read and write on a disk. (Ref.7)
disk drive: An electromechanical device
that holds the disk, retrieves information from it and saves information on it.
A hard disk drive has the disk permanently encased. A 3.5-inch disk drive
requires that you insert a 3.5-inch disk. (Ref. 1)
disk drive port: In the Macintosh, a parallel
port designed for connection to an external microfloppy disk drive. See also parallel
port. (Ref. 7)
diskette: A flat, circular piece of
plastic coated with a thin film of a magnetic substance. (Ref. 6)
diskkeeping information: Organizational information
stored on every disk. The integrity of this information affects the ability to
work with the whole disk and all of the files on it. It consists of the desktop
file, boot blocks, volume directory, and file directory. (Ref. 6)
Disk Operating System: See DOS.
disk server: A disk drive on a network that
is available to any user. Disk-server software divides a single disk into
several logical volumes, which behave as if they were individual disks, and
controls access to them. (Ref. 7)
DISOSS: An acronym for DIStributed Office Support System. The standard
information-exchange format developed by IBM for its office products and now
used by other vendors; incorporates DCA. See also SNA. (Ref. 7)
display font: Also known as the screen font,
it is used to accurately display and manipulate a specific type style on the
screen. The printer font is the one used to display type on a PostScript
printer. The display font is installed and removed with Font/DA Mover.
(Ref. 9)
Distributed Office Support System: See DISOSS.
dithering: A technique that exploits the
human eye’s ability to blend two different colors together, creating the
illusion of a third color. (Ref. 20)
document: Whatever you create with
Macintosh applications — information you enter, modify, view, or save.
Every document stores information as text and/or formatting. (Refs. 1 and
6)
dominant disk: The disk whose desk
accessories, fonts, Clipboard, Scrapbook, etc. are currently available to the
Macintosh. (Ref. 6)
DOS: An acronym for Disk Operating System. A program that organizes,
stores and retrieves information from a disk. MS-DOS is a disk operating
system, as is the Macintosh Hierarchical File System (HFS). “DOS”
rhymes with “Boss.” (Ref. 13)
dot matrix printer: A printer that forms
characters with patterns of dots. Usually refers to an impact dot-matrix
printer, like the ImageWriter II, in which the dots are pressed onto the paper
by a pin pushing on an inked ribbon, but other printer types, including laser
printers, also work in dot-matrix fashion. (Refs. 4 and 7) Dot matrix
printers are generally faster than daisy wheel printers but the quality of the
print of a dot matrix printer is not as good. (Ref. 13)
dots per inch: See dpi.
dots per
square inch:
See dpsi.
double-click: To position the pointer where
you want an action to take place, and then press and release the mouse button
twice in quick succession without moving the mouse. A technique used in
selecting and opening. (Ref. 1)
download: To transfer a computer program
from a host computer, usually a mainframe, to your computer, usually over
telephone lines using a modem. Compare with upload. (Ref. 13) The process of
copying a file (document or application) from an on-line service to your
Macintosh. This is normally accomplished using a modem to transmit the file
over the telephone lines. Typical on-line services include bulletin boards,
CompuServe, America Online, and others. (Ref. 14)
downloadable fonts: Fonts for a PostScript printer
that reside on the Mac and can be downloaded to a printer for temporary use.
(Ref. 9)
dpi: An acronym for dots per inch. A linear measure most often
applied to screen and printer resolution. 9-inch Macs display 72 dots-per-inch
horizontally by 72 dots-per-inch vertically. (Refs. 7 and 10)
dpsi: An acronym for dots per square inch. An areal measure applied to
screen and printer resolution. (Ref. 7)
drag: To position the pointer on
something, press and hold the mouse button, move the mouse and release the
mouse button. When you release the mouse button, you either confirm a selection
or move an object to a new location. A technique used in choosing commands,
selecting text, and moving icons. (Ref. 1)
DRAM (pronounced DEE-ram): An acronym for Dynamic RAM. A memory chip. Dynamic simply
means that it loses its memory when you shut off the computer. (Ref. 22)
driver: A program that lets a
peripheral device and a computer send and receive information. Printer drivers
control printers; a hard disk driver controls exchanges between a hard disk and
a computer. (Ref. 5)
driver resource: A file in a System Folder that
tells the computer how to work with a device. (Ref. 1)
drop cap: A large capital letter, placed
at the beginning of a chapter or paragraph, that drops into the surrounding
text. (Ref. 21)
DTE: An acronym for Data Terminal Equipment. See DCE.
DTR: An acronym for Data Terminal Ready. One of the handshake lines in
a data transmission interface. Also, a name for the default communications
protocol for the ImageWriter II. Also known as hardware handshake. (Ref. 4)
dumb terminal: A device consisting of a
screen and a keyboard for communicating with a computer, usually a mainframe.
Dumb terminals are called “dumb” because all the processing and
computing is done by the host computer, and the terminal only passes information
back and forth. (Ref. 29)
duplex: In telecommunication, allowing
two-way transmission. In full-duplex communication, such as conventional voice
telephone calls, transmission occurs both ways simultaneously; in half-duplex,
such as citizens-band radio, transmission can go only one way at a time. (Ref. 7)
Dvorak keyboard: A keyboard layout devised by
August Dvorak that puts the most-often-used letters in English near the most
powerful fingers. (Ref. 7)
Dynamic RAM: See DRAM.
dysfunction: Any or all of the conditions
under which the Macintosh becomes entirely unusable. Bombs, crashes, freezes,
and hangs are all dysfunctions. (Ref. 9)
EBCDIC: An acronym for Extended Binary Coded Decimal Interchange Code. A standard scheme for coding
characters in which each character is represented by a sequence of eight bits;
used primarily by large computers. See also ASCII. (Ref. 7)
echo: In computer communication,
characters returned to the sender by the receiving computer. The echo mirrors
the original transmission. (Ref. 7)
electronic mail: A form of computer communication
in which the sender transmits a message to a central computer, which stores the
message until the recipient can retrieve it electronically. (Ref. 7)
eligible: (adj.) In Apple File Exchange,
a file is eligible
if it can be translated with a selected translator or translators.
(Ref. 5)
ellipsis: A character made up of three
periods. Ellipses are used to indicate an omission; often used when portions of
quoted matter are omitted. (Ref. 21) Ellipsis are created by pressing both
the Option key and the “;” key.
em: The “em” is a
measurement commonly used to adjust kerning. For example, kerning two letters
closer by 0.1 em moves them closer by 1/10 of their point size, no matter what
it is. (Ref. 19) A typographical term referring to the width of the
character “M”, which is usually the widest character in a font. It
is a relative measurement; i.e., and em is 10 points wide when the face is set
at 10 points, 12 points in 12-point type, etc. Letter spacing, line spacing
,and pair kerning are measured in ems. (Ref. 20)
E-mail: Electronic mail; messages sent
from computer to computer over phone lines. (Ref. 22)
emulation: The technique of getting one
piece of hardware or software to mimic another. (Ref. 7)
Encapsulated PostScript format: See EPS format.
encryption: Converting information into an
unintelligible form for security, most often with a password that acts as a key
for later decryption. (Ref. 7)
end-of-line character: Any character that tells the
printer that the preceding text constitutes a full line and may now be printed.
(Ref. 4)
Enter key: A key that confirms or
terminates an entry or sometimes a command. (Ref. 1)
EOF: An acronym for End Of File. A condition that occurs when
the last piece of data from a file has been read. In some operating systems,
EOF refers to the control character (^ Z) that marks the end of a file.
(Ref. 29)
EPS: An acronym for Encapsulated PostScript. A format for graphic images
that consists of structured PostScript code. Compare with MacPaint, PICT, and TIFF. (Ref. 22)
EPSF: An acronym for Encapsulated Post Script File(s).
EPS format: A graphic image format that
combines two versions of an image, one in PostScript and one bit-mapped for the
Mac screen. They can be printed in detail only on a PostScript printer.
(Ref. 9)
erasable optical disk: A mass storage device that
records and writes files to a photo-optical medium. (Ref. 9)
ergonomics: Considering the human element
in engineering design. The standards are ill-defined; whether a device is
“ergonomic” is usually decided by the advertising department.
(Ref. 7)
error-checking: A technique used to verify the
accuracy of data transmission. (Ref. 29)
error message: Any indication that there is a
problem. Error messages can be written alerts that the Macintosh provides,
abnormal behaviors, or system crashes. (Ref. 6)
Escape key: A special key on a computer
keyboard which generates an “escape” code (ASCII 1B hex); needed by
a Mac only when communicating with another type of computer. (Ref. 7)
escape sequence: A sequence of keystrokes or
characters beginning with ESC, or the ASCII code for Escape. Such sequences
issue commands to the printer that position the cursor and otherwise control
text formatting in a printout. (Ref. 4)
evangelist: Someone who creates enthusiasm
for particular products or services. (Ref. 13)
even parity: A method of parity error
checking in which a parity bit is added to a group of bits to keep the total
number of 1s in the group even. If the number of 1s in the group is odd, the
parity bit is set to 1, so that the final total for the group is even. If the
number of 1s in the group is already even, then the parity bit is set to 0,
keeping the total number of 1s even. See also parity. (Ref. 29)
expansion card: A physical circuit card that
plugs into a slot on the computer (Mac SE, Mac II, etc.) to add more functions.
(Ref. 9)
expansion slot: A place inside the computer
for connecting expansion cards. See also accessory card. (Ref. 7)
export: To write data out (usually to
a disk file) in a form other programs can use. (Ref. 14)
Extended Binary Coded
Decimal Interchange Code: See EBCDIC.
extents tree: Part of the file directory of
all HFS disks. It is an auxiliary structure to the catalog tree. It is needed
only when an individual file becomes very large and fragmented. (Ref. 6)
external hard disk: A hard disk drive with its own
enclosure and power supply, designed to be connected to a computer rather than
installed inside one. (Ref. 9)
extracting text: The process of extracting all
text data from a document. The extracted text will not contain the
document’s formatting. It may contain “junk” characters (the
print representation of the formatting) which must be cleaned out before the
file is usable. This process is used for file recovery when no other technique
will work. (Ref. 6)
facsimile (fax): A method for sending pictures
over ordinary dial-up telephone lines. (Ref. 7)
family: A group of related typefaces,
known as styles. Times Roman, Times Bold, Times Italic, and Times Bold Italic
are all part of the Times family. See also Style. (Ref. 19)
FAT: An acronym for File Allocation Table. A table showing which files
are located on which sectors of a hard disk. To read a file to the disk, the
Mac must first consult the FAT. (Ref. 9)
FFTDCA: An acronym for Final Form Text Document Content Architecture. A computer text-file format
that contains the final page image. See also DCA. (Ref. 7)
FID (File Number): Disks keep track of files by
assigning each file a unique file number. This information is disk-specific,
i.e., if the same file is copied to several disks it will have a different FID
on each disk. FIDs can sometimes be an aid in re-identifying files which have
lost their identities. (Ref. 6)
field: A unit of information, such as
an item in a database; a collection of related fields constitutes a record. In
an address database, the street address and the zip code are fields; the entire
address is a record. See also record. (Ref. 7)
file: A collection of information
stored on a disk. There are two major types of files: programs and data.
(Refs. 1 and 6)
file allocation table: See FAT.
file creator code: A code (which is part of a
file) that tells the Macintosh which application created the file.
(Ref. 14) See also creator and creator code.
file compressing utility: A program that compresses
files, making them both easier to store and less expensive to send over a
modem. (Ref. 9)
file dialog box: The screen display used to
open or save a document. Often it is modified for other purposes as well. The
contents and configuration of the box vary depending on the application being
used and the task being performed. (Ref. 9)
file directory: Part of the general
diskkeeping information on every disk. Contains detailed information about each
file on the disk. On HFS disks it has two components, the catalog tree and the
extents tree. Damage to the file directory affects your ability to work with
files. (Ref. 6)
file fragment: Incomplete files recovered
from damaged disks. This type of file can never be used. The only option is to
extract its text to recover what data remains. (Ref. 6)
filemark: Position in the file from
which next file reading or writing operation begins. (Ref. 29)
filename: The name that identifies a
file. The maximum character length of a Macintosh filename is 31 characters for
a document or folder, 27 characters for a disk. A name can’t contain a
colon (:), and it should not begin with a period (.). (Ref. 2)
file server: A file server allows multiple
Macintoshes to access files on a shared hard disk via an AppleTalk (or equivalent)
network. (Ref. 6) A node on a network that contains a disk drive,
processor, and controlling software; available to any user. File-serving
software controls access to individual files; multiuser software allows several
users access to the same file simultaneously, although only one person at a
time can make changes. (Ref. 7)
file system: The process of reading and
writing files on your disks is handled by the Macintosh file system. The system
keeps track of each file’s location, size, creation date, and so forth.
When an application needs to read or write a file, it calls on the Macintosh
file system to do most of the work. (Ref. 14)
file type: A four-character code that
identifies the category to which a file belongs. For example, all
Mac-compatible applications have the file type APPL. (Ref. 9) A special
four-character code used by the Macintosh to distinguish one type of file from
another. For example, when you create a document with MacPaint and store it on
disk, the application automatically assigns it the type code PNTG. The MacPaint
application program itself is assigned the type code APPL when it is created.
(Ref. 14)
filter: A utility that helps an
application read or write documents created by another application.
(Ref. 28)
Final Form Text Document Content
Architecture: See FFTDCA.
Finder: An application that’s
always available on the desktop. It maintains the desktop display of files and
folders, updating the diskkeeping information when disks are reorganized (for
example, files are moved, renamed, thrown away, etc.). (Refs. 1 and 6)
firmware: Programs embedded in a
computer’s circuitry; cannot be changed as easily as programs on disk
(software) but are not as fixed as the other electronic circuits (hardware).
Read-only memory programs are often called firmware. (Ref. 7)
FKeys: Short utility programs that
are started by pressing Command, Shift, and a number key from 1 through 0.
(Ref. 7)
flawed data: The storing of incorrect data
on the disk. There are two common types of flaws in data. The first is when the
data is inaccurate, the second is when accurate data is assigned to the wrong
place on the disk. (Ref. 6)
flipped bits: Adverse conditions such as
magnetic fields, radiation, physical damage, etc. can affect the magnetic
properties of a bit. When a “0” bit changes to a “1” or
vice versa, we say that the bit has “flipped.” If a sector contains
a flipped bit, all the data in the sector is considered unreliable and cannot
be read. (Ref. 6)
floating-point number: A method of representing
numbers inside the computer in which the decimal point (more correctly, the
binary point) is permitted to “float” to different positions within
the number. Some of the bits within the number itself are used to keep track of
the point’s position. (Ref. 13)
floppy disk: A removable storage unit
comprising a thin magnetic-medium platter in a protective enclosure. The
Macintosh uses 3-1/2-inch floppies, which can be single- or double-sided.
(Ref. 9)
floppy disk drive: The internal or external
mechanism that reads and writes data to and from a floppy disk. (Ref. 9)
folder: A holder of documents,
applications, or other folders on the desktop. Folders allow you to organize
information in any way you want. (Ref. 1) Under HFS, a device that
contains a group of files to set them apart from others in a disk’s
directory. Folders can contain either files or other folders. Under MFS, a
folder is a cosmetic device that temporarily hides files or other folders from
view, but does not set them apart in a disk’s directory. (Ref. 8) Folders
are actually subdirectories, i.e., directories within other directories.
(Ref. 13)
font: In typography, a complete set
of type in one size and style of character. In computer usage, a collection of
letters, numbers, punctuation marks, and other typographical symbols with a
consistent appearance. (Refs. 1 and 2) In ordinary typography, roman
type (like this) is a distinct font from italic type (like this), but in standard
micro-computer typography, for example, Times roman and Times italic would be
treated simply as variants of the same font. (Ref. 13)
Font/DA Mover: A utility program provided
with the System software; it is used for installing and removing fonts and desk
accessories to and from the System file. (Ref. 9)
Font menu: In many applications, a
pull-down menu that allows you to select a specific font. (Ref. 18)
font size: A means of indicating how tall
a font is, measured from the baseline of one line to the baseline of the next.
(The baseline is the line on which characters “rest.”). Font size
is usually measured in points, 1/72 of an inch, but on some computer systems,
such as the Macintosh, a point is not a rigid unit of measure — for
example, 9-point Geneva is actually one point taller than 9-point Monaco. Font
size, which is vertical, is not the same as font pitch, which is horizontal.
When you speak of 10-pitch type, you are talking about a font that has 10
characters to the inch. (Ref. 13)
font style: A special attribute given to
the characters in a font. Examples: bold, italic, inverse. (Ref. 17)
footer: An identifying line or lines
at the bottom of a page, analogous to a header, which is at the top of a page.
Footers are distinct from footnotes, which are textual asides or references
that do not form part of the principal text. (Ref. 13)
footprint: The amount of space a device
takes up on the surface where it sits. (Ref. 22)
foreground program: The active program (and active
window) when several programs are in memory at the same time. See also multi-tasking.
(Ref. 7)
format: The arrangement of text within
the text column, as determined by the margins, paragraph indent, tabs, line
spacing, and text alignment. (Ref. 28)
formatting (in documents): The part of a document that
directs such things as page layout, margins, tab locations, fonts, style, etc.
It is stored along with the actual words (text) that were written. When a file
is saved as Text-only or its text is extracted, the formatting is lost.
(Ref. 6)
formatting (a disk): The process of magnetically
marking out actual physical spaces on the disk. It is done by placing
concentric rings of sectors on the disk. (Ref. 6)
formatting marks: Information that comes at the
beginning of every sector. It tells the Macintosh what sector it is working
with. It is set when the disk is initialized and never changes thereafter.
(Ref. 6)
form feed: An ASCII character (decimal
12) that causes a printer or other paper-handling device to advance to the top
of the next page. (Ref. 4)
FORTRAN: An acronym for FORmula TRANslation. One of the oldest high-level
computer languages; used today mostly by scientists and engineers.
(Ref. 13)
fragmentation: When new sectors are added to
a file, its sectors may no longer be next to each other. Fragmented files are
not damaged, but they are less efficient to work with because they require more
time to be read from the disk. (Ref. 6)
fragmented memory: If you open and close lots of
applications during a work session, your system’s memory gets fragmented
— split up into little pieces. This can be a problem, because a segment
initially set aside for one application may not be big enough for another.
Compare with contiguous memory. (Ref. 22)
freeze: When everything on the screen,
including the mouse cursor, cannot be altered. (Ref. 9)
full duplex: A mode of communication in
which information is transferred in both directions simultaneously. Compare
with half duplex. (Ref. 29)
function key: A keystroke combination that
activates a small program incorporated in the system file. For example,
Shift-Command-3 saves the current screen as a MacPaint file and Shift-Command-4
prints the screen on an ImageWriter. Not to be confused with the keys labeled
F1 to F15 on the extended keyboard. (Ref. 9)
gateway: In a computer network, the
hardware and software connecting two or more dissimilar networks. See also bridge.
(Ref. 7)
generic icon: If a file does not have its
own icon, it will be assigned a generic one. There are two generic icons, one
for programs and one for documents. (Ref. 6)
Get Info window: The window that appears when
you choose Get Info from the File menu (or press the Command-I keys). It tells
you the size of the file, folder or disk, where it resides, and when it was
created and last modified. There’s also a space for entering comments
and, for a file or a disk, a box for locking and unlocking it. (Ref. 22)
gigabyte (GB): A unit for data technically
totaling 1,073,741,824 bytes (1024 megabytes). Usually it is defined as either
a million kilobytes, or a thousand megabytes. (Refs. 7 and 9)
glitch: A false or spurious electronic
signal. (Ref. 29)
global backup: The process of backing up all
the files on a hard disk. (Ref. 2)
graphics: Displayed or printed pictures
or images, as opposed to text. (Ref. 4)
half duplex: A mode of communication in
which information can be transmitted in only one direction at a time. Compare
with full duplex. (Ref. 29)
handshake: In computer communication, an
electrical signal used by the receiving device to stop transmission from the
sending device until the transmitted data can be processed. (Ref. 7)
hang: When the Mac stalls and
ignores commands from the mouse and keyboard. (Ref. 9) A state where the
computer has (a) stopped executing instructions or commands or (b) is executing
instructions in an endless loop and refuses to accept further instructions or
commands. The way out is to reset the system, but the (not always achievable)
object is to do so in such a way as not to damage anything or lose data.
Consult your computer’s manual for how best to do this — and good
luck! In point of fact, unless the computer was in the process of writing to
the disk when it hung, you should be able to recover with the loss only of what
you had done since you last saved your work. To minimize the effect of this,
save you work often. (Ref. 13)
hanging indent: First-line indentation to the
left of the subsequent lines of a paragraph; useful for bulleted or numbered
items. (Ref. 16)
hard copy: Information printed on paper,
rather than on disk or on the monitor. (Ref. 13)
hard disk: A disk composed of one or more
rigid metal platters. It has much greater storage capacity and access speed
than diskettes. (Ref. 6)
hard partition: See device partition.
hardware: The physical parts of the
computer system. Any part of the Macintosh or any peripheral devices that you
can touch. (Ref. 1)
hardware configuration: The specific type of Macintosh
and the types of any additional attachments (such as disk drives, video
displays, printers, modems, etc.) that are connected to it. (Ref. 6)
hardware handshake: A protocol that tells the
computer to start or stop sending data by setting the DTR (Data Terminal Ready)
line logic state. The ImageWriter II changes the line’s state depending
on the capacity of its input buffer. Also known as the Data Transfer Ready protocol. Compare with XON/XOFF.
(Ref. 4)
Hayes-compatible modem: A modem that sets modes and
features with a standard set of commands developed originally by Hayes
Microcomputer Products. (Ref. 7)
head crash: Condition that occurs when
read/write heads of a hard disk collide with surface of a platter and damage
magnetic-media coating and data contained in the area of contact. (Ref. 9)
head parking: Moving a hard disk’s
read/write heads from their operational position (hovering above a platter) to
a safe “landing zone” when the drive is shut down. Unparked heads
may touch the platter surface when the drive is moved, possibly causing a head
crash. (Ref. 9)
heap: A portion of memory used by
compilers to store pointer variables during program execution. A heap’s
memory is organized like a stack; that is, from the bottom up. (Ref. 11)
Hz: An abbreviation for hertz (named for physicist Heinrich
Hertz). It is the unit of frequency of vibration or oscillation, defined as the
number of cycles per second. The 68000 microprocessor used in the Macintosh
operates at 7.8336 MHz. (Ref. 13)
hexadecimal: A number represented in
base-16 notation, in contrast to the more familiar decimal (or base-10)
numbers, with which we are all more familiar. Hexadecimal digits go from 0-9
and A-F, where 10 (decimal) is $A, 11 (decimal) is $B, and so on. One byte can
thus be represented by two hexadecimal digits. Hexadecimal numbers are often
written with a preceding “$”, e.g., $FF means 255 (15 in the
16’s place, and 15 in the one’s place = 15 x 16 + 15 = 255).
Hexadecimal is usually referred to in shorthand as “hex.”
(Ref. 13)
HFS: An acronym for Hierarchical File System. The feature that lets you use
folders to organize documents, applications, and other folders on a disk.
Folders (analogous to subdirectories in other systems) can be nested in other
folders to create as many levels in a hierarchy as you need. Opening a folder
presents only the information you’ve put in that folder, so you can
concentrate on that information without viewing everything on the disk. HFS is
the second and current volume directory standard used by the Macintosh; MFS
(Macintosh File System) was the first. (Refs. 1 and 9)
Hierarchical File System: See HFS.
high ASCII characters: ASCII characters with decimal
values ranging from 128 through 255. Called high because the first, or high,
bit of each character is set to 1 (for on) rather than to 0 (for off). (Ref. 4)
high-level language: A programming language such as
BASIC or Pascal that incorporates elements of English into its syntax.
(Ref. 7) A language that is (relatively!) easier for people to understand,
in contrast to a low-level language like assembly language that is closer to
the machine-language form the computer actually uses. (Ref. 13)
highlight: To make something visually
distinct from its background, usually to show that it has been selected or
chosen. (Ref. 1)
hollow icon: An icon that represents an
opened disk or folder. (Ref. 1)
host: A computer set up to receive
calls from other computers and interact in a controlled environment.
(Ref. 29)
hot spot: The actual part of the pointer
that has to be positioned over something for a click to select it (or have some
other effect on it). The hot spot of the arrow pointer is its tip, and the hot
spot of the crosshairs pointer is its center (where the two lines cross).
(Ref. 22)
HyperCard: A program distributed by Apple
that provides a graphical data storage and development environment.
(Ref. 29)
HyperTalk: HyperCard’s built-in
script language for HyperCard users. (Ref. 3)
I-beam: The I-shaped cursor used in
entering and editing text. (Refs. 1 and 9)
IC: An acronym for Integrated Circuit. A single chip on which a
number of circuit elements are combined. (Ref. 13)
icon: An image that graphically
represents an object, a concept, or a message. For example, Disk First Aid is
represented by an ambulance; CloseView is represented by a magnifying glass.
(Ref. 5)
impact printer: A printer that forms
characters or images by striking an inked ribbon against paper. (Ref. 7)
incremental backup: Process of backing up all
files on a hard disk that were created, modified, or copied onto the disk since
last global backup. See also progressive backup. (Ref. 2)
information network: A series of interconnected
computer systems used to gather and disseminate information. (Ref. 29)
information service: A large commercial timesharing
computer that gives users access to a wide variety of information. CompuServe,
GEnie, and America Online are three examples. (Ref. 22)
information window: The window that appears when
you select an icon, document, application, or folder, and choose Get Info from
the File menu. It supplies information such as size, type, and date, and it
includes a place for adding notes. (Ref. 1)
INIT file: An acronym for INITialization Resource. An easy way to customize the
Macintosh’s operations with instructions which override the normal
functioning of the ROM. INIT files are designed to be automatically launched
whenever the Macintosh is booted up. To be activated, they must first be placed
in the System Folder; if not, they will be ignored. (Refs. 6 and 9)
initialize: (1) To set something such as a
variable to an initial state or value in preparation for some computation. (2)
To prepare a blank disk to receive information by organizing its surface to
tracks and sectors. You can initialize 800K disks on both sides or on just one
side. (Refs. 1, 2 and 13) In the case of a floppy disk, it eliminates any
chance of recovering data because the disk is completely cleared of
information. (Ref. 14)
initiator: The SCSI device that initiates
communication with another device on the daisychain. (Ref. 9)
ink-jet printer: A printer that forms
characters or images by squirting tiny drops of ink onto paper. (Ref. 7)
insertion point: The place where something will
be added or removed. Select the insertion point by clicking anywhere the I-beam
pointer appears. The insertion point is highlighted by a blinking vertical bar.
(Ref. 28)
install: To configure a program so as
to work with a user’s or a computer’s specific requirements.
(Ref. 13)
Installer: An application program
provided by Apple that facilitates the installation of Chooser resources and
updated System files on the Macintosh. Some third-party programs have their own
installer programs as well. (Ref. 8)
integer: A whole number that can
represent only integer (non-fractional) values within a certain range that
depends on the number of bits used to store the integer, in contrast to a
floating-point number, which can represent fractions and numbers larger than
can be represented with an integer. (Ref. 13)
Integer BASIC: A version of the BASIC
language that processes numbers in integer (fixed-point) form rather than in
decimal (floating-point) form. Available for the Apple II family of computers.
(Ref. 4)
integrated circuit: See IC.
Integrated Services Digital Network: See ISDN.
integrated software: Software that can perform more
than one task. (Ref. 7)
interface: (1) The point at which
independent systems or diverse groups interact. Specifically, the point of
communication between a person and a computer. (2) The devices, rules, or
conventions by which one component of a system communicates with another. (3)
The part of a program that defines constants, variables, and data structures,
rather than procedures. (Ref. 13) Hardware or software that links the
computer to a device, such as a printer or modem. (Ref. 4) The manner in
which two things communicate with each other. The Macintosh has a
“graphic interface,” referring to the graphical nature of much of
the information that is communicated between the user and the computer. By
contrast, a “command line interface” describes the way a user
communicates with a computer by typing commands one line at a time. Many
information services have a command line interface. (Ref. 29)
interface card: See peripheral card. (Ref. 4)
interleave ratio: The ratio of hard disk platter
rotations to the number of sectors to which the read/write heads read or write.
For example, a drive with an interleave ratio of 1:1 will read or write to each
sector as soon as it passes underneath the head. One with a 2:1 ratio will skip
alternate sectors, waiting for them to rotate one more time before proceeding.
(Ref. 9)
internal hard disk: A hard disk drive installed in
the same casing as the computer it serves. (Ref. 9)
interpreter: A program that translates a
high-level programming language into machine-readable code; the translation is
done line by line. (Ref. 7) A language translator that reads a program
instruction by instruction and immediately translates each instruction for the
computer to carry out. A compiler, on the other hand, translates a whole series
of instructions into machine language before anything can be executed.
Applesoft BASIC is interpreted; Pascal is compiled. (Ref. 13)
interrupt: A temporary suspension in the
execution of a program that allows the computer to perform some other,
higher-priority task, typically in response to a signal from a peripheral
device or other source external to the computer. (Ref. 13)
invert: To change a portion or all of
your Macintosh screen so it appears as white on black instead of as black on
white. (Ref. 5)
invisible attribute bit: When set, it prevents a file
from being displayed on the desktop. See attribute bits. (Ref. 6)
invisible file: A file whose icon
doesn’t appear in the Finder or Standard File boxes. (Ref. 9)
I/O: An acronym for Input/Output. The process of moving data to
or from the computer, or to or from the central processing unit (CPU).
(Ref. 13)
I/O connectors: Refers to the mouse, disk
drive, printer, modem, and audio connectors at the back of the motherboard.
(Ref. 10)
I/O errors: The failure of the Macintosh
to read (input) or write (output) data on a disk. Flipped bits are the most
common cause of I/O errors. (Ref. 6)
irregularity: Certain standards exist for
how all Macintosh applications should be constructed. When an application
deviates from these standards, this is an irregularity. However, applications
containing irregularities are neither ill-behaved nor poorly designed, they are
simply non-standard. (Ref. 14)
ISDN: An acronym for Integrated Services Digital Network. An internationally
standardized telephone service based on digital signals. (Ref. 7)
ISO-7: A group of variants of the
standard ASCII character set. The ISO-7 is a group of 7-bit standard character
sets for British, French, French Canadian, German, Italian, Spanish, and
Swedish as established by the International Standards Organization.
(Ref. 29)
italic: A characteristic of a typeface
that has upright strokes at an angle to the vertical axis. (Ref. 18)
JSR: An acronym for Jump to SubRoutine. (Ref. 11)
jumper: A small metal area on a
printed-circuit board that is intended to be cut or soldered to another metal
area to break or make a connection. Such connections usually enable or disable
features that the manufacturer wanted some but not all users to be able to use.
(Ref. 13)
justify: To space every line of a
paragraph (except the last) so that it’s aligned with both the left and
the right margins. (Ref. 16)
K: From the Greek prefix
“kilo,” or 1,000. In the computer field “K”usually
means 1,024, or 2 to the 10th power. Random-access memory sizes are usually
given in kilobytes, or “K’s.” The lowercase “k,”
however, usually refers to kilobits, not bytes. Thus “256k RAM
chips” mean that each chip has one-eighth of the total RAM in a 256K
computer. (Ref. 13)
Kbps: See kilobits per second.
Kermit: A file transfer protocol
developed in the early 1980s under the guidance of Frank da Cruz at Columbia
University. This file transfer protocol features error correction, batch
transfers, the ability to transmit 8-bit binary files in a 7-bit environment, and
special text transfer capabilities. Kermit is used widely by universities,
research institutions, government agencies, and businesses. (Ref. 29)
kerning: In phototypesetting, adjusting
the spacing between letters; specifically, reducing the space between certain
pairs of letters (kerning pairs) for the best appearance. (Ref. 7)
keyboard: On a computer, several rows of
keys with characters on the key caps, used to type commands and data. On a
synthesizer, a row of black and white keys used to play musical notes.
(Ref. 24)
keyboard equivalent key: A key you press together with
the Command key (and sometimes in combination with the Shift key and/or Option
key) to issue a menu command. (Ref. 3)
keyboard macro: A single set of keystrokes or
a single command key that, when pressed, executes many keystrokes, mouse
movements, or both; the user assigns macros with a keyboard redefinition
program. (Ref. 7)
key disk: In a copy-protected program,
the floppy disk you must use to start the program. (Ref. 7)
kilobits per second (Kbps): Thousands of bits per second;
a measure of data transfer speed. (Ref. 7)
kilobyte: 1024 bytes; the most common
measure of computer file size or memory capacity. Often abbreviated as KB or K
(as in 800K floppy). A typical double-spaced typewritten page is 1.5 KB.
(Refs. 7 and 9)
LAN: An acronym for Local Area Network. A group of computers linked
physically by a network of communications cables. (Ref. 1) It usually
includes cabling, network software, and application software. (Ref. 14)
Laser Prep file: One of the two files —
the other is the LaserWriter Chooser resource — used by the Macintosh to
print onto a LaserWriter or other PostScript device. The Laser Prep file
translates the Mac screen’s QuickDraw image into the PostScript language
for printing. (Ref. 8)
laser printer: A high-speed printer that uses
laser light to charge a plate on which toner is deposited to print text or
graphics. Laser printers are, in effect, like small photocopiers, and use much
of the same technology. Laser printers are generally faster than dot-matrix
printers and produce type that is virtually indistinguishable from daisy-wheel
printers. They are also very quiet and, unfortunately, more expensive than
other types of printers. (Ref. 13)
launching: The act of starting an
application, it is done in a number of ways: automatically during startup, by
double-clicking on an icon, or when a document created with a particular
application is opened. (Ref. 9)
LCD: An acronym for Liquid-Crystal Display. A type of display that uses
polarized liquid crystals to create text and graphics. The technology involved
is commonly employed in synthesizer displays and sometimes in computer
monitors. (Ref. 24)
leader: A series of characters (dots,
dashes, or an underline) that fill the space between text and a tab stop.
(Ref. 17)
leading: Pronounced
“LED-ing.” Leading refers to the space between the baseline of one
line of text and the baseline of the next line of text. Leading is sometimes
used to refer to the blank space between two lines of text, although this is
usually regarded as loose usage. (Ref. 13)
least significant bit: In a binary number, the bit
that is located farthest to the right. (Ref. 24)
least significant byte: See LSB.
LED: An acronym for Light Emitting Diode. 400K Mac drives, most hard
drives, and some external 800K drives use LEDs for lights. (Ref. 10)
LED display: A type of display that uses
glowing diodes to create text and graphics. The technology involved is commonly
employed in synthesizer displays and occasionally in computer monitors.
(Ref. 24)
lever: The little arm that appears
when you choose the Alarm Clock desk accessory. When you click the lever, two
panels appear that let you set the time, the date, and the alarm. (Ref. 1)
light emitting diode: See LED.
line feed: A control character (ASCII
value 10) that advances the printer to the next line of paper or the cursor to
the next line of the screen. See return. (Ref. 13)
line feed pitch: The number of lines of text
printed per vertical inch. (Ref. 4)
line noise: Spurious signals that are
introduced between points of communication. Line noise can slow down data
transmission and reduce the accuracy of the information sent. (Ref. 29)
linked files, live links: Interdependent documents
organized so that when a change is made in one document, the dependent
documents are also automatically changed. (Ref. 7)
liquid-crystal display: See LCD.
loading: The process in which the
Macintosh conveys data from a storage volume to a location where it can be used
or rapidly accessed (usually the RAM). (Ref. 9)
local area network: See LAN.
local echo: A setting that assures that
every character typed on the keyboard is immediately displayed on the screen as
well as transmitted to its destination. Local echo is useful when the remote
computer does not send back to the local terminal characters typed on the local
keyboard. See also echo. (Ref. 29)
LocalTalk: Apple’s connection
standard, which allows multiple Macs to share laser printers and other
AppleTalk devices. Formerly called AppleTalk. (Ref. 9)
lock: To prevent documents from
being edited, discarded, or renamed, or to prevent entire disks from being
altered. (Ref. 1) Files can be locked with software commands. Entire disks
can be physically locked by using a write-protect tab on the disk jacket; in
this sense “lock” is synonymous with write-protect. (Ref. 13)
locked attribute bits: When set, it prevents a file
from being modified, deleted, or replaced, thereby keeping a file from being
unintentionally lost or destroyed. See attribute bits. (Ref. 6)
logical volume: A software-defined partition
in a single physical disk; to the user, each logical volume behaves as if it
were an independent disk in an independent disk drive. (Ref. 7)
loop: A loop is a block of
instructions in a script or program that is executed repeatedly until some
defined condition is reached. (Ref. 29)
low-level language: A language like assembly
language that is close to the machine language that a computer understands, in
contrast to a high-level language like Pascal that is easier for people to
understand. (Ref. 13)
LQ: An acronym for Letter-Quality. Said of printers.
(Ref. 22)
LSB: An acronym for Least Significant Byte The byte in a series of
combined bytes located farthest to the right. (Ref. 24)
MacBinary: A superset of the XMODEM
telecommunications protocol that transmits, in addition to the file itself,
other information about the file that the Macintosh normally stores separately,
such as the file’s icon, the file type and the file’s creator.
(Ref. 13)
machine code: Instructions to the computer
in binary code (that is, 0s and 1s). A compiler takes your high-level
instructions and translates them into machine code. (Ref. 11)
machine language: See machine code.
Macintosh File System: See MFS.
MacPaint: In addition to being the first
paint program on the Mac, MacPaint is also the name of a standard graphics
format for low-resolution (72-dpi) bit-mapped images. Compare with EPS, PICT, and TIFF. (Ref. 22)
macro: A sequence of commands
distilled into a single, shorter command. Macro utilities save time by
automating often-used functions. A complex series of commands can be activated
with a single keystroke. (Ref. 9) Telecommunication programs can use
macros to dial a phone number, log onto a BBS, download messages, and log off
— all without human intervention. (Ref. 13) See also keyboard
macro.
magnetic media: The types of media to which a
computer can write magnetic patterns. These patterns are interpreted as data by
the computer during the reading process. Magnetic tape, hard disks, and floppy
disks are examples. (Ref. 9)
mainframe: A large traditional computer
usually shared by many users. The central processing unit, disk drives, and
tape drives are normally housed in an air-conditioned room; user-operated
terminals may be scattered all over. (Ref. 7)
main unit: The computer console, which
contains the processor, memory, the built-in disk drive, and the screen.
(Ref. 1)
mark parity: A method of parity error
checking in which the parity bit is always set to 1. See also parity. (Ref. 29)
Mbps: See megabits per second.
megabits per second (Mbps): Millions of bits per second; a
measure of data transfer speed. (Ref. 7)
megabyte (MB): A unit of measurement equal to
1024 kilobytes. (Refs. 1 and 9) From the Greek prefix “mega,”
or million, in the computer field it means 1,048,576 bytes, a number equal to 2
to the 20th power. Also called a “meg.” Hard disk sizes are usually
given in megabytes. In case you want to know, the next larger increment is
“terabytes,” or a trillion bytes. (Ref. 13)
megahertz (MHz): One million hertz. Abbreviated
MHz. (Ref. 13)
memory: The place in the
computer’s main unit that stores information. The Macintosh has three
types of memory: ROM, RAM, and Parameter RAM. (Refs. 1 and 6)
menu: A list of commands that
appears when you point to and press the menu title in the menu bar. Dragging
through the menu and releasing the mouse button while a command is highlighted
chooses that command. (Ref. 1)
menu bar: The horizontal strip at the
top of the screen that contains menu titles. (Ref. 1)
menu-driven interface: A boundary between user and
computer in which the user issues commands by choosing items from a series of
menus. (Ref. 7)
menu-initial interface: A boundary between user and
computer in which the user issues commands by choosing menu items identified by
a single letter. (Ref. 7)
menu-word interface: A boundary between user and
computer in which the user issues commands by choosing menu items identified by
single words arranged in a line or two on the screen. (Ref. 7)
menu title: A word or phrase in the menu
bar that designates one menu. Pressing on the menu title causes the title to be
highlighted and its menu to appear below it. (Ref. 1)
MFS: An acronym for Macintosh File System. Used by the 128K Macintosh,
the 512K Macintosh, and the Macintosh XL. Under MFS, detailed information is
maintained about the individual files that are stored on a disk, but not about
folders. Folders can’t be nested under MFS, so it has been replaced by
HFS. (Refs. 6 and 9)
MHz: See megahertz.
microcomputer: A small computer designed in
size and price to serve (primarily) a single person; also known as personal
computer and home computer. (Ref. 7)
microfloppy (disk): A 3-1/2-inch flexible disk
within a semirigid plastic envelope; used in the Macintosh and many other
computer brands. (Ref. 7)
microprocessor: A small, integrated circuit
component that performs a complete set of computing functions. The
computer’s brain. (Ref. 4) The microprocessor is the
computer’s central processing unit. (Ref. 13)
MIDI: An acronym for Musical Instrument Digital Interface. MIDI is a communications
standard for exchanging data between musical instruments and associated
devices. (Ref. 24)
MIDI port: A 5-pin socket built into a
MIDI device, used to plug in a MIDI cable. There are three kinds of MIDI ports:
MIDI In, which receives MIDI data; MIDI Out, which sends MIDI data; and MIDI
Thru, which passes a copy of MIDI data received through the MIDI In port.
(Ref. 24)
millisecond (ms): One thousandth of a second.
(Ref. 7)
minicomputer: A computer the size of which
is smaller than a mainframe but larger than a microcomputer. (Ref. 13)
minifloppy: A 5-1/4-inch flexible computer
disk, very common in microcomputers. (Ref. 7)
modem: An acronym for MOdulator/DEModulator; a peripheral device through
which a computer can send and receive data over telephone lines. (Ref. 4)
A device that converts a computer’s digital output into sounds that can
be transmitted over telephone lines, and, at the other end, can convert those
sounds back into digital input to another computer. (Ref. 13)
modifier key: A key that you press in
combination with a readable character to change its meaning. Sometimes you
press a modifier key to change the action of clicking or dragging.
(Ref. 5) The standard modifier keys are Shift, Option, Command, Caps Lock,
and control. (Ref. 14)
monitor: A video device that receives
signals from a computer for display on a cathode-ray tube (CRT). (Ref. 13)
monospaced: Said of fonts where all the
characters occupy the same amount of horizontal space. One such font on the Mac
is Monaco. Compare with proportional spacing. (Ref. 22)
most significant bit: In a binary number, the bit
that is located farthest to the left. (Ref. 24)
most significant byte: See MSB.
motherboard: The printed-circuit board
which contains the most important parts of the computer system — CPU,
memory, keyboard controller, etc. (Ref. 9) Also referred to as the logic
board. (Ref. 10) Sometimes the power supply (and other support circuitry)
is located on the motherboard, but usually it is on a separate board or mounted
separately in the computer. (Ref. 13)
mounted volume: An online volume. (Ref. 9)
mounting: The act of rendering a storage
volume usable during the current work session. A hard disk, floppy, or other
volume is mounted when its icon appears on the desktop. (Ref. 9)
mouse: A small device about the size
of a deck of cards you move around on a flat surface next to your computer. The
mouse controls a pointer on the screen whose relative movements correspond to
those the mouse makes while in contact with the desktop. You use the pointer to
select operations, to move data, and to draw. (Ref. 13)
mouse button: The button on the top of the
mouse. In general, pressing the mouse button initiates some action on whatever
is under the pointer, and releasing the button confirms the action.
(Ref. 1)
MPW: An acronym for Macintosh Programming Workshop.
MSB: An acronym for Most Significant Byte. In a series of combined bytes,
the byte located farthest to the left. (Ref. 24)
MS-DOS: An acronym for Microsoft Disk Operating System. It’s the operating
system that governs the IBM PC (under the name PC-DOS) and compatible
computers. (Ref. 5)
MultiFinder: A program that manages
Apple’s multi-tasking environment. It permits multiple applications to be
open simultaneously. (Ref. 6)
multiple selection: A selection that contains more
than one item. (Ref. 28)
multi-tasking: A computer processing
technique in which several programs are loaded simultaneously into memory; the
CPU pays attention to all the programs by switching rapidly among them in a
procedure known as time slicing. See also context switching. (Ref. 7) The ability (of a
computer) to perform more than one task at the same time. For example, a
computer capable of multi-tasking would be able to recalculate a spreadsheet at
the same time it is printing. (Ref. 13)
musical notation software: A type of computer program
that allows the user to write, edit, and print music in traditional musical
notation. Some musical notation software can translate a musical performance
directly into notated music. (Ref. 24)
NAK: A control character (^ U) sent
by a receiver of a file to inform the sender that a block of data was not
properly received. (Ref. 29)
name: Every file on a disk has a
unique name. It cannot include a colon (:) and (under MFS) it cannot have the
same name as the disk or another file on the disk. (Ref. 6)
nanosecond (ns): One billionth of a second.
(Ref. 7)
nesting: Placing folders inside other
folders. See HFS
(hierarchical file system). (Ref. 1)
network: A group of individually
controlled computers linked together with peripherals. Through hardware and
software, the computers can share information and other resources. AppleTalk is
an office network. (Ref. 4)
nibble: Half a byte. We’re
serious — a nibble is four bits (a byte is eight bits). (Ref. 13)
NLQ: An acronym for Near Letter-Quality. Said of printers.
(Ref. 22)
node: Any device on a network that
can send and/or receive information. (Ref. 7)
noise: Random electrical pulses that
may occur in the telephone lines; such impulses may be caused by hardware
components or external electrical interference. (Ref. 29)
nonprinting characters: Characters that appear only as
blank space when printed (for example: spaces, Return characters, and page
break characters). (Ref. 16) Compare with printing characters.
NOP: An acronym for No OPeration. An assembly-language
instruction that does nothing, i.e., it performs no operation. Some say that
the difference between a computer and some other “lower”
computational device is that only a computer could have an instruction that
doesn’t do anything. (Ref. 13)
ns: An acronym for nanosecond.
NTSC: An acronym for the National Television Standards Committee, which defined the standard
format used for transmitting broadcast video signals in the United States.
(Ref. 13)
NuBus: The bus used in the Mac II.
(Ref. 9)
null: A value of nothing. Null is
different from zero. A null string, for example, would be “”, or no
characters at all. A null line is a line with no characters in it, i.e., it has
only a Return character to signify the end of the line. (Ref. 13)
null modem: A communication cable between
two computers; used in lieu of modems. (Ref. 7)
numeric keys: Keys on the right of the
keyboard that let you enter numbers and perform calculations quickly.
(Ref. 1)
object code: In programming, the executable
code or machine-language program produced by the compiler. (Ref. 7) The
usually-machine-readable result of a compiler’s or assembler’s
translation of source code. (Ref. 13)
oblique: A slanted version of a roman
typeface. Some oblique faces are created by type designers, while others are
produced with computer commands. (Ref. 21)
OCR: An acronym for Optical Character Recognition. The technology by which typed
or printed documents are optically scanned and the text turned into the codes
for characters that a computer can process; the device for software that does
this. See also scanner. (Ref. 7)
odd parity: A method of parity error
checking in which a parity is added to a group of bits to keep the total number
of 1s in the group odd. If the number of 1s in the group is even, the parity
bit is set to 1, so that the final total for the group is odd. If the number of
1s in the group is already odd, then the parity bit is set to 0, keeping the
total number of 1s odd. See also parity. (Ref. 29)
off-line: A device not currently
accessible by the Macintosh. It may be nonoperational, turned off, or
improperly connected, or it may be that the computer does not have the software
necessary to control it. Volumes are considered off-line when not mounted on
the desktop. (Ref. 9)
on-line: A device currently accessible
by the Macintosh, properly powered and connected, with the necessary
controlling software provided. Synonymous with “mounted” in respect
to storage volumes. (Ref. 9) Currently connected to a BBS or mainframe
service such as America Online or CompuServe. (Ref. 13)
on-line help: Assistance you can get from an
application program while it’s running. (Ref. 3)
OOP: An acronym for Object Oriented Programming.
open: Create a window from an icon
so you can view a document or directory. (Ref. 1) A command used to run an
application or load a document into the computer. (Ref. 13)
operating system: A program that organizes the
actions of the parts of the computer and its peripheral devices. (Ref. 5)
Operating systems typically control such things as the display of text on the
monitor; the computer’s response to pressing keys; the disk drives,
printers and other peripherals; and basic sounds. (Ref. 13)
operating system software: Programs such as the System,
Finder, printer files, etc. which applications rely upon for common operations.
They are necessary to start up the Mac and/or for the proper functioning of
applications. To be accessed properly, they must be kept in the System Folder.
(Ref. 6)
operator: Special symbols such as +
(addition), - (subtraction), * (multiplication), and / (division) that call for
the program to compute a value in an expression. For example, “+”
is an operator in the expression “2 + 3”. (Ref. 29)
optical character recognition,
optical character reader: See OCR.
optical disk: A disk with a reflective
finish, on whose surface music or data is recorded in the form of tiny
deformations and from which the music or data can be played back by a laser
beam. (Ref. 7)
optical fiber: A long thin strand of glass
that carries information as a modulated light beam: can handle far higher
communication rates than wire connections. (Ref. 7)
option card: Specialized functions
controlled by an electronic function card; some examples include accelerators
and co-processors. (Ref. 15)
Option key: A key used like the Shift key
to give an alternate interpretation to another key you type. You use it to type
foreign characters or special symbols. (Ref. 1)
orientation: A page’s position:
regular (portrait) or sideways (landscape). (Ref. 17)
orphan: In word processing and
typography, a condition when the last line of a paragraph appears at the top of
the following page. Compare with widow. (Ref. 27)
outline font: A type of font defined
mathematically, with lines and curves, rather than with bitmaps. PostScript
fonts are outline fonts. Examples of non-outline Macintosh fonts are Chicago,
San Francisco and Los Angeles. (Ref. 19)
output: Data transferred from a
computer to a peripheral device, such as a video display, printer, disk drive,
or modem. (Ref. 4)
overlay: A program fragment stored on
disk until needed by the program core. Necessary with some large programs that
cannot entirely fit into random-access memory; the overlays are brought in as
needed, each replacing one no longer in use. (Ref. 7)
override: To modify or cancel one
instruction with another. For example, you might override a DIP switch setting
with an escape sequence. (Ref. 4)
packet: A formatted stream of bits,
consisting of data and control elements, that is transmitted as a single unit.
File transfer protocols divide a file into a series of packets, which differ in
format and meaning from protocol to protocol. Also called block. (Ref. 29)
page: Area of memory containing text
or graphic information displayed on the screen. (Ref. 13)
paragraph: Text ended with a Return
keystroke. (Ref. 28)
parallel: A method of transmitting
several bits of information, typically eight (a full byte) at one time from a
computer to a peripheral device such as a printer. Most peripherals today use
the serial interface standard. (Ref. 13)
parallel interface: An interface that transmits
multiple bits simultaneously (usually in one-byte lengths). Compare with serial
interface. (Ref. 4)
parallel port: An electrical connection to a
computer through which eight or more bits are transmitted simultaneously in one
direction; specifically, a Centronics parallel port. (Ref. 7)
Parameter RAM: See PRAM.
parent application: The application used to create
a document, as opposed to any others that may be able to open, convert, or
modify it. In order to know which application to launch when a document is
opened, the Macintosh labels each document with the parent application’s
distinctive creator ID. (Ref. 9)
parity: The sameness of level or
count, usually the count of 1 bits in each character, used for error checking
in data transmission. Most data transmission does not use parity to check for
errors, hence the expression “no parity.” If parity is used, it is
usually even parity, i.e., if the number of 1 bits transmitted in a character
is odd, a parity bit of 1 is sent to make the total number of 1 bits come out
even. If the number of 1 bits in the character is even, a parity bit of 0 is
sent, keeping the count even. A receiving computer can check the number of 1
bits in a character, and if the number is not even, something is wrong and the
character should be rejected. Parity can also be odd, mark, or space —
the latter two of which are beyond the scope of this glossary, as they are
seldom used in microcomputers today. (Ref. 13)
partition: A volume created by dividing
the storage space on a hard disk into two or more separate entities. Also known
as a logical volume. (Ref. 9)
Pascal: A high-level programming
language invented by Niklaus Wirth, a Swiss professor of computer science who
believed that programs should consist of well-defined data structures and
well-structured procedural steps. (Ref. 13)
password: A confidential string of
alphanumeric characters that permits a user access to a system, database or
application. (Ref. 29)
paste: To put a copy of the contents
of the Clipboard — whatever was last cut or copied — at the
insertion point. (Ref. 1)
path: The specific route to be
navigated from a disk directory and through folders or subdirectories to locate
a particular file or folder. (Ref. 8)
path name: The written expression of a
path. A file called Reports inside a folder called Business on a disk called Work would have the path name, Work:Business:Reports. Path names always contain
colons between the directory, folder, and file names, without any extra spaces,
as shown in the example. (Ref. 8)
PBX (Private Branch Exchange): The private telephone
switchboard within an organization. (Ref. 7)
PC: Acronym for Personal Computer. “PC” without other
letters or words is not a trademark. (Ref. 13)
PC board: A shortened version of printed-circuit
board. (Ref. 10)
PEEK: A BASIC command that retrieves
the contents of a specified memory location. Thus, J = PEEK (34) would store
the value of memory location 34 in the variable J. Compare with POKE. (Ref. 13)
peripheral card: A removable printed circuit
board that plugs into one of the expansion slots in a computer. Such cards can
either transfer computer data to a peripheral device, such as a printer or
modem, or expand the computer’s own capabilities by adding extra memory
or an extra microprocessor. (Ref. 4)
peripheral device: A piece of computer hardware
— such as a disk drive, printer, or modem — used in conjunction
with a computer and under the computer’s control. Peripheral devices are
usually physically separate from the computer and connected to it by wires or
cables. (Ref. 1)
perphory: The portion of pin-feed paper
that contains the sprocket holes and is torn off after printing is complete.
(Ref. 13)
phosphor: Any material that emits
visible light when struck by an electron beam; used in CRTs. (Ref. 7)
pica: A unit of measure equal to
one-sixth of an inch. Picas are usually used by printers to determine the width
of columns. (Ref. 13)
PICT: The standard format for
exchanging graphics between applications on the Macintosh. A PICT can contain
bitmaps or objects, or both. (Ref. 19) A file format for object-oriented
graphic images. (Ref. 20)
pin-feed paper: Special paper with sprocket
holes along both edges so that the paper can be pulled evenly by the pins on
the paper tractor of the printer. (Ref. 13)
pitch: The number of printed
characters that fill up an inch in horizontal measure. For example, many
printers will print in 10-pitch, or ten characters per inch. See font size and compare with point. (Ref. 13)
pixel: A picture element, or dot, in
an image. Sometimes elaborated into two types: a pel consisting only of on/off
or black/white information and a pixel containing further attributes, such as
shades of gray or color. (Ref. 7) Abbreviation of picture element, a pixel is usually the
smallest resolvable point on a computer’s screen. (Ref. 13) The
original Macintosh screen is 512 pixels wide by 342 pixels high. Dividing its
width (7.1 inches) by its height (4.75 inches) by these numbers gives a resolution
of 72 pixels per inch, commonly called dots per inch (dpi). (Ref. 19)
platen: The rubber roller in a printer
that provides support for the paper while the printhead prints on it.
(Ref. 13)
platters: A flat, circular, rotating
disk on which data is stored. (Ref. 9)
point: In typography, a unit of
measurement approximately equal to 1/72-inch. (Ref. 7) Points can be
measured either horizontally or vertically, but typeface sizes are measured in
vertical distances. Unfortunately, some fonts that appear to be the same size
are not: 9-point Geneva is actually one pixel taller than 9-point Monaco. See pitch and font size. (Ref. 13)
pointer: A small shape on the screen,
most often an arrow pointing up and to the left, that follows the movement of
the mouse. Used to select items and initiate commands. (Refs. 1 and 9)
POKE: A BASIC command that stores a
specific value in a specified memory location. Thus, POKE 34, 10 would store
the value 10 in memory location 34. Compare with PEEK. (Ref. 13)
pop-up menu: A menu that appears somewhere
else other than the menu bar, usually in a dialog box, and is identified by a
shadowed box. (Ref. 14)
port: A socket on the back panel of
the computer where you can plug in a cable to connect a peripheral device,
another computer, or a network. (Ref. 1)
PostScript: A computer language developed
by Adobe Systems, Inc., to describe an image — text as well as graphics
— for printing; used by the LaserWriter and other PostScript-compatible
printers to specify exactly what is printed from a file. Can also be adapted to
driving a video display. (Refs. 7 and 8)
power strip: An electrical device with
multiple sockets for plugging in a computer and peripheral devices. Power
strips usually include a master on-off switch and often contain a voltage
filter to protect against spikes caused by thunderstorms and other power
surges. (Ref. 13)
power user: Someone who demands more from
hardware and software than the average user. Power users want the most
efficient and flexible tools with which to perform their work. (Ref. 26)
PRAM: An acronym for Parameter RAM. The part of the Macintosh that
remembers the information that is set by the Control Panel desk accessory. This
information is not lost when the Mac is turned off because the Parameter RAM is
powered by a battery. (Ref. 6) For example, Parameter RAM may store the
current time or the user’s preferred desktop pattern. (Ref. 13)
press: To position the pointer on
something and then hold down the mouse button without moving the mouse.
(Ref. 1)
printed circuit: Refers to the copper tracing
on a circuit board. (Ref. 10)
printed-circuit board: A hardware component of a
computer or other electronic device, consisting of a flat, rectangular piece of
rigid material, commonly fiberglass, to which integrated circuits and other
electronic components are connected. (Ref. 13)
printer driver: See printing resource.
printer font: A file used by a printer or
other output device to render text at a high degree of resolution.
(Ref. 9)
printhead: The part of a printer that
moves horizontally along the platen and performs the actual printing.
(Ref. 13)
printing characters: Characters that are visible
both on the screen and when the document is printed (for example: letters,
numbers, and punctuation marks). (Ref. 16) Compare with nonprinting
characters.
printout: Text and graphics printed on
paper by a printer. (Ref. 4)
printer port: The serial port designed for
connection to a printer. (Ref. 7)
printing resource: A system file that lets you
print on a corresponding printer attached to the Macintosh. Sometimes called a printer
driver. (Ref. 1)
printer server: A printer on a network;
available to all network users. (Ref. 7)
printer spooler: An application that takes over
the process of printing a file, handling the processing and transmission of the
printed file from a special area of a disk or memory so you regain use of the
computer more quickly than if the Mac’s normal resources had to handle
printing. (Ref. 8)
priority number: A number assigned to each SCSI
device connected to a computer telling the computer which device to give
priority when sending and receiving files. Some devices, such as internal hard
disks, have preset priority numbers. On others, such as external hard disks,
you use a priority switch to set priority. (Ref. 2)
procedure: In Pascal, LOGO, and other
languages, a set of instructions that work as a unit. (Ref. 13)
processor: A shortened version of central
processing unit
(CPU).
ProDOS: An acronym for Professional Disk Operating System. It’s the operating
system that today controls most Apple II-family computers. (Ref. 5)
program: Software that gives
instructions to the Macintosh about how to do something. Programs fall into two
general categories: applications and operating system software. (Ref. 6)
(n) A set of instructions describing actions for a computer to perform to
accomplish some task, conforming to the rules and conventions of a particular
programming language. (v) To write a program. (Ref. 13)
programming language: The words, symbols, numbers,
and grammar used to give instructions to a computer. (Ref. 7)
progressive backup: Backing up all files that have
changed since the last backup. See also incremental backup. (Ref. 9)
PROM: An acronym for Programmable ROM. One you can change with a
special device. (Refs. 10 and 22)
proportional spacing: Printing in which wider
letters (such as “M” or “W”) take up more space than
narrow ones (such as “i” or “l”). Compare with monospaced.
(Ref. 7)
protected attribute bit: When set, indicates that the
file is protected, and prevents the file from being moved or duplicated. See attribute
bits. (Ref. 6)
protocol: In telecommunications, a set
of rules and procedures governing how information travels between computers and
other electronic devices. Hardware protocols define parameters such as the
timing and frequency of the electrical signal; software protocols specify the
details of the signal’s content. (Ref. 7) Protocols are generally
determined by a particular company (for example, Apple Computer, Inc.’s
AppleTalk) or by industry agreement (such as RS-232 or CCITT). (Ref. 13)
pseudo-random numbers: A sequence of numbers,
determined by some defined arithmetic process, that is satisfactorily close to
a true random sequence for a given purpose. Pseudo-random numbers are used to
simulate games of chance, such as card or dice games. (Ref. 13)
public-domain software: Programs may be used and
copied without further permis-sion from (or royalty payments to) the author.
Compare with shareware. (Ref. 13)
pull-down menu: A computer menu that appears
on the screen only when requested; until then, only the menu titles are
visible. (Ref. 7)
queue: An ordered arrangement of
items or tasks to be processed in that order. For example, the Macintosh uses
an event queue to keep track of keypresses and mouse clicks until they can be
processed by an application. (Ref. 13)
QuickDraw: The programs in the Macintosh
ROM that generate images (text and graphics) on the screen and for printers.
Designed principally for video screen and dot-matrix printer resolution; does
not offer the fine control of PostScript. (Ref. 7)
QWERTY keyboard: The standard layout of keys on
a typewriter keyboard; named for the first six letters on the top row of letter
keys. Compare with Dvorak keyboard. (Ref. 13)
radio buttons: A series of buttons in which
only one button can be selected. Selecting one radio button in a set
automatically deselects the one previously selected. (Ref. 28)
RAM: An acronym for Random-Access Memory. The part of the Macintosh
memory that stores information temporarily while you’re working on it.
Also known as working memory. When you load a program and data into the computer, you
load them into RAM. Likewise, what you type at the keyboard goes into RAM.
Information in RAM is temporary, gone forever if you switch the power off. An
exception to this is a small amount of memory used to save settings, such as
the clock and the speaker volume, that’s powered by a battery when your
Macintosh is switched off. Compare with ROM. (Refs. 1 and 4)
RAM cache: RAM you can designate to store
certain information an application uses repeatedly. Using the RAM cache can
greatly speed up your work, but may need to be used sparingly or not at all
with applications that require large amounts of memory. You set the RAM cache
in the Control Panel. (Ref. 1)
RAM disk: Portion of random-access
memory set aside to behave like a disk. (Ref. 7)
random-access memory: See RAM.
raw data transfer rate: In a disk drive or on a
network, the peak speed at which information is transferred to and from the
computer; usually much higher than the average transfer rate. (Ref. 7)
RDEV: An acronym for ChooseR
DEVice. RDEVs are special resources
your Macintosh uses in conjunction with your various output components, such as
a printer. When you select the Chooser from the Apple menu, the RDEVs located
in the top level of your System Folder are accessible through the Chooser
window. (Ref. 14)
read: To transfer information from a
source outside the computer, such as a disk, into the computer’s memory.
Compare with write. (Ref. 13)
Read Me documents: Documents that are included on
application and system software disks that provide you with late-breaking
information about the product. You’ll usually find Read Me documents in
the Update Folder on the disk. (Ref. 1)
read-only memory: See ROM.
read/write heads: The component of a hard disk
that records and retrieves data to and from the sectors. (Ref. 9)
reboot: To restart the computer. See
also boot. (Ref. 29)
record: A set of items (fields) in a
database. In an address database, a complete address is a record. (Ref. 7)
relational database: A database in which any field
or record can be associated with any other field or record. (Ref. 7)
Databases that are not relational are sometimes called “flat”
databases or “file managers.” (Ref. 13)
remote: A computer that is physically
connected via a modem or cable. (Ref. 29)
resolution: The density of dots for any
given output device. The unit of measure is dots per inch (dpi). Higher
resolution means smoother curves and angles as well as a better match to
traditional typeface designs. The screen is a relatively low-resolution device,
containing approximately 72 dpi. The LaserWriter printer is a medium-resolution
device, with approximately 300 dpi. An example of a high-resolution device is a
Linotronic 300 typesetter with 2540 dpi. (Ref. 18)
resource: A piece of information, stored
in a resource file, that can be accessed by its type and ID. (Ref. 11)
resource file: A file containing resources
used by an application. (Ref. 9)
resource fork: The portion of a Macintosh
disk file that contains the program code, font information, and other data not
normally generated directly by the user. Most programs consist primarily of
resources which are stored in the resource fork. If a program is damaged, it is
sometimes possible to identify it by the text in the resource fork.
(Refs. 6 and 7) A typical Macintosh file is comprised of two separate
forks; the resource fork and the data fork. Each fork contains separate and
distinct data. The data fork contains data. The resource fork, among other
things, can contain executable code, dialog boxes, and other entities the
Macintosh uses. For example, when you are running an application and you choose
the “Save” command, the resource fork contains the instructions
that take care of the steps required to move the document you have created from
the application onto the volume where you want it stored (for example, your
hard disk). (Ref. 14)
resource ID: A number that helps identify a
resource in a resource file. Each resource must have an ID number.
(Ref. 9)
resource manager: The part of the Macintosh
operating system software that handles functions relating to various resources.
For example, when an application needs to display a dialog box, it calls on the
resource manager to locate the dialog box. (Ref. 14)
Restart: The command on the
Finder’s Special menu that causes your Macintosh to start up as if you turned it
on. (Ref. 14)
restore: The process of taking files
which have been backed up and putting them back onto a disk so they can again
be used. (Ref. 26)
Return: A character, sometimes called carriage
return, that
makes the cursor or insertion point (on a computer monitor) or the printhead on
a printer move to the left-most position on the line. Today, Return almost
always also means advancing to the next line as well; but in olden days, Return
did not advance to the next line — line feed did that. The ASCII value of
Return is 13. (Ref. 13)
Return key: A key that makes the insertion
point move to the beginning of the next line. It’s sometimes used to
confirm or terminate an entry or a command. (Ref. 1)
RFI: An acronym for Radio Frequency Interference. The RFI shield is a thin piece
of aluminum-colored material which covers the I/O connectors at the back of the
Macintosh. It helps to keep the computer from interfering with radio/TV
reception. (Ref. 10)
RF Modulator: A device that modulates the
Radio Frequencies (more accurately, television frequencies) that come out of
your computer’s “video out” port into other frequencies that
will work with a television set (Ref. 13)
RFTDCA: An acronym for Revisable-Form-Text Document Content Architecture. A computer text-file format
that contains both text and formatting information; used for converting
documents from one word processor to another. See also DCA. (Ref. 7)
ROM: An acronym for Read-Only Memory. A memory chip, the contents of
which can only be read. ROM cannot be written to or otherwise modified; used
for storing firmware. ROM carries data built into it when manufactured.
ROM’s normally store the basic startup and operating information for
computers and peripherals. Information in ROM is permanent; it doesn’t
vanish when you switch the power off. Compare with RAM. (Refs. 1 and 4)
roman: The medium-weight, non-italic
member of a typeface family. (Ref. 18) Called “plain” in Mac
font menus. (Ref. 21)
root directory: On an HFS disk, the main
directory, which corresponds to the disk window, is called the root directory.
All files in the disk window or on the desktop are kept track of here.
(Ref. 25)
round-robin: A computer processing
technique in which several programs are simultaneously loaded into memory, and
the CPU pays attention to each one in turn. (Ref. 7)
RS-170: Recommended standard (RS)
specification for a composite video signal compatible with broadcast standards
in North America and Japan (straight video, not radio-frequency modulated); set
by the Electronic Industries Association. (Ref. 7)
RS-232: An industry-standard protocol
for two devices, such as a computer and a printer or a computer and a modem, to
communicate over a serial connection. In RS-232, one of the devices is called Data
Communications Equipment (DCE) and the other is called Data Terminal Equipment (DTE). Each of the devices
uses certain pins in a DB-25 or similar connector to send and receive signals.
(Ref. 13)
RS-422, -423, -232C: Recommended standards (RS) for
serial computer interfaces; set by the Electronic Industries Association.
(Ref. 7)
RTF: An acronym for Rich Text Format. A file format developed by
Microsoft Corporation that serves as an intermediate step in the process of
converting from one document type to another. (Ref. 16)
run: To instruct a computer program
to begin. See open. (Ref. 13)
run-time error: An error that occurs while a
program is executing. (Ref. 11)
SANE: An acronym for Standard Apple Numeric Environment. A set of algorithms used to
perform certain mathematical calculations in a way that complies with the IEEE
standard for precision and accuracy. (Ref. 13)
sans serif: Said of a font that has no
serifs. (Ref. 22)
save: To store information (either
data or a program) currently in memory onto a disk. (Ref. 13)
scanner: A device that scans a printed
page and converts graphic images into a form that can be processed by a
computer. See also optical character recognition. (Ref. 7)
Scrapbook: A desk accessory in which you
save and transfer frequently used information (text, pictures, and other data)
among files created with different programs. The Scrapbook operates like the
Clipboard except that it is saved on disk. (Refs. 1 and 7)
scratch: Disk space not normally
available in the Macintosh operating system, but requested by some programs
— for use as temporary storage. (Ref. 5)
screen dump: A pixel-for-pixel screen image
printed on paper or stored in a disk file. (Ref. 7)
screen font: A font designed for screen
display and for printing by an ImageWriter or LaserWriter IISC. (Ref. 7) A
bitmap screen representation of a PostScript font. (Ref. 20)
screen shot: A MacPaint document that is
like a snapshot of your Macintosh screen. You make a screen shot by holding
down the Command and Shift keys while pressing 3. (Ref. 5)
script: A series of commands written
in HyperTalk and associated with a particular object. (Ref. 3) A list of
instructions to be carried out; a procedure to be followed. (Ref. 26)
scroll: To move a document or
directory in its window so that you can see a different part of it. You can
also scroll the directory in some dialog boxes. (Ref. 1)
scroll arrow: An arrow on either end of a
scroll bar. Clicking a scroll arrow moves the document or directory one line.
Pressing a scroll arrow scrolls the document continuously. (Ref. 1)
scroll bar: A rectangular bar that may be
along the right or bottom of a window. Clicking or dragging in the scroll bar
causes the view of the document to change. (Ref. 1)
scroll box: The white box in a scroll bar.
The position of the scroll box in the scroll bar indicates the position of
what’s in the window relative to the entire document. (Ref. 1)
SCSI: An acronym for Small Computer System Interface. An industry standard interface
(mechanical, electrical, and functional) that provides high-speed access
between peripheral devices (such as hard disks, printers, and optical disks)
and small computers. Pronounced “Scuzzy.” Up to seven additional
SCSI devices can be connected to a Mac in a chain, from one device to the next.
(Refs. 1, 2 and 8)
SCSI bus: The bus which connects SCSI
devices. (Ref. 9)
SCSI device: Any device that can be linked
on the SCSI bus. Hard disks, printers, and optical disks are examples.
(Ref. 9)
SCSI ID number (or address): A number assigned to each SCSI
device connected to a computer. The device with the highest number has priority
if a conflict occurs while sending or receiving data. Some devices, such as
internal hard disks, have preset SCSI ID numbers. On others, such as external
hard disks, you use a SCSI ID switch to set the ID number. Each SCSI device
must have a unique address numbered between 0 and 7. (Refs. 5 and 8)
(NOTE: The Macintosh always has a SCSI ID of 7.)
SCSI partition: See device partition. (Ref. 15)
SCSI port: The port on the back panel of
the main unit that you connect SCSI devices to. A relatively high-speed
bidirectional parallel port; most often used to connect a hard disk drive to a
computer. (Refs. 1 and 7)
search path: The route the computer must
follow to retrieve a file you ask for. (Ref. 3)
sector: The basic file storage unit of
a disk; the smallest contiguous physical unit for recording information;
several sectors make up a track. On an 800K floppy disk, one sector can store
up to 512 bytes. (Refs. 6, 7 and 8)
sector copy: Making a duplicate of a disk
by copying each sector of the disk. (Ref. 6)
sector reader: Software that can read and
change disk sectors directly. (Ref. 7)
sector tag: Information stored with each
sector that records which file a sector is associated with and the order of the
sector within the file. Sector tags are critical for restoring deleted files
and reconstructing files when disk directories have become damaged.
(Ref. 6)
select: To designate where the next
action will take place. To select, you click an icon or drag across
information. (Ref. 2)
selection: The information affected by
the next command. The selection is usually highlighted. (The insertion point is
also a selection.) (Ref. 1)
sequential file: A disk file of data stored one
byte after another. Sequential files can be accessed only in sequence, i.e., if
you want the 135th record, you have to read records 1-134. (Ref. 13)
serial: A method of transmitting data
one bit at a time. Compare with parallel. (Ref. 13)
serial hard disk: A hard disk connected via a
serial port. (Ref. 9)
serial interface: An interface in which
information is transmitted sequentially, a bit at a time, over a single wire or
channel. Compare with parallel interface. (Ref. 1)
serial port: The connector on the back
panel of the main unit for devices that use a serial interface. (Ref. 1)
An electrical connection to a computer through which data are transmitted in
series, one bit after another; specifically, an RS-232C or RS-422 port and, in
the Macintosh, the printer and modem ports. (Ref. 7)
serif: Short, usually horizontal,
marks that appear on letters in some fonts that most people believe make those
letters easier to read. (Ref. 13)
server: In a network, any device that
can be shared by all users. (Ref. 7)
setup string: A group of characters that
sends a format command to a printer. Some application programs, such as
spreadsheets, give you the option of changing format, such as character width,
by entering a setup string before printing. (Ref. 4)
SFGet Box: The standard dialog box that
allows Mac users to select files or programs to open from a list, such as the
“Open…” box found in most programs. (Ref. 8)
shareware: Programs distributed usually
through user groups and similar non-commercial channels with the expectation
that if the user uses the program beyond a brief trial period, the user will
pay the author the requested fee. (Ref. 13)
shielded cable: A cable with a special
metallic wrapping around its wires. This wrapping reduces radio frequency
interference. (Ref. 4)
Shift-click: A technique that lets you
extend or shorten a selection by holding down the Shift key while you select
(or deselect) something related to the current selection. (Ref. 1)
Shift-drag: A technique that allows you to
select multiple objects by holding down the Shift key while you drag diagonally
to enclose the objects in a rectangle. (Ref. 25)
Shift key: A key that, when pressed,
causes subsequently typed letters to appear in uppercase and causes the upper
symbol to appear when number or symbol keys are typed. (Ref. 1)
Shut Down: Command on the Finder’s Special menu that prepares your Macintosh
to be turned off. (Ref. 14)
SIG: An acronym for Special Interest Group. A group of people within a
user group whose interests focus on a particular subject. (Ref. 13) Part
of a larger organization like a user group. (Ref. 22)
signal-to-noise-ratio (S/N): The ratio of the voltage of a
received electric signal to the voltage of the interfering noise; usually given
in decibels. (Ref. 7)
signature: A four-character code with
which the Finder identifies an application. (Ref. 9)
SIMM: An acronym for Single Inline Memory Module. A package of memory chips that
plugs into a Mac or other computer peripheral to increase memory size.
(Ref. 9)
simplex: In telecommunication, allowing
one-way transmission only, as in ordinary radio or television broadcasting.
(Ref. 7)
Single Inline Memory Module: See SIMM.
SIP: An acronym for Single Inline Package. Refers to ICs and other parts
with one (a single) line of pins. (Ref.10)
size box: A box on the bottom-right
corner of most active windows that lets you resize the window. (Ref. 1)
slot: A socket on a computer’s
main circuit board in which the user can plug cards. (Ref. 13)
Small Computer System Interface: See SCSI.
smart device: A modem or terminal is
considered “smart” if it has its own circuitry to respond to or
control other devices. (Ref. 29)
SMD: An acronym for Surface Mount Device. (Ref. 10)
SMPTE: An acronym for Society of Motion Picture and Television Engineers. The term (pronounced SIMP-ty)
is also used to describe the timing standard that SMPTE adopted to synchronize
video playback devices, tape decks, and other equipment used in creating movies
or video productions. (Ref. 24)
SNA: An acronym for System Network Architecture. IBM’s umbrella term for
a wide range of protocols and standards for computer communications.
(Ref. 7)
socket: In the AppleTalk network, a
logical concept that routes data coming into a node to the correct application
program, distinguishing an electronic mail program from a database, for
example. (Ref. 7)
soft partition: See volume partition. (Ref. 15)
software: Programs, or instructions, for
the computer to carry out. The computer reads these instructions from disks
inserted into the disk drive or from a hard disk. Software includes
applications like word processing programs and programs that control the activities
of the computer and its peripherals. (Refs. 1 and 4)
source: (adj.) Describes files that
are being copied or translated as well as the disk or folder containing source
files. (Ref. 5)
source code or program: The original instructions (usually
written in a high-level programming language) that an interpreter or compiler
turns into machine code for execution on a computer. (Ref. 7)
space parity: A method of parity error
checking in which the parity bit is always set to 0. See also parity. (Ref. 29)
Special Interest Group: See SIG.
spliced application: An application too large for a
single floppy disk, it is spread across several floppy disks for later
installation on a hard disk. Usually one of the disks contains an installation
program. (Ref. 9)
spool: When transmitting a file to
another device or computer, the ability to place that file in a temporary area
until it can be processed by I/O. (Ref. 29)
spooler: A software routine that
permits transmitted documents to be queued up in a temporary file and returns
the control of the computer to the user. The spooler continues to work in the
background, transmitting the document to external destination. (Ref. 29)
spool folder: A folder created on a disk by
a printer spooler for storing print files during processing and printing.
(Ref. 8)
spreadsheet: An application program used
for financial planning, cost estimates, and other number-crunching tasks. The
user specifies interrelationships among the values, and the program can
calculate results based on these relationships. In a spreadsheet, information
is laid out in columns and rows. (Refs. 4 and 7)
Standard Apple Numeric Environment: See SANE.
Standard File Box: A general name for SFGet and
SFPut boxes. (Ref. 8)
start bit: In serial data transmission,
the one bit preceding a data byte that indicates the beginning of a character.
(Ref. 4)
startup disk: Any disk that contains the
system files the computer needs to get itself started. A startup disk must have
at least a Finder and a System file. It may also contain other files such as
printing resources, Scrapbook, and Clipboard. Ref. 1)
startup document: See INIT. (Ref. 14)
startup program: A program that is run
automatically when the computer is started. (Ref. 13)
stop bit: In serial data transmission, the
one or two bits preceding a data byte that indicate the end of a character.
(Ref. 4)
storage device: Device that store data. e.g.
hard disks, floppies, and optical disks. (Ref. 9)
string: Any specified sequence of
characters — a word, a phrase, a number, whatever. The term is usually
used in the context of searching and replacing. For example: type in the string
you want to find, hit the tab key, then type in the string you want to replace
it with. (Ref. 22)
strip 8th bit: When transmitting or receiving
8-bit data, the 8th bit is set to 0. This option is used primarily for systems
that limit themselves to the 7-bit ASCII standard. (Ref. 29)
structured data program: Any application program that
stores information in a regular, defined way. A spreadsheet is a structured
data program; a word processor or free-form graphics program is not.
(Ref. 7)
Style: A member of a group of related
typefaces known as a family. Roman, Bold, Italic, and Bold Italic are all
styles of the Times family. Also refers to settings which can be used with
fonts on the Macintosh, such as outline, underline and shadow. (Ref. 19)
subdirectory: A subgroup of files grouped
together inside a directory of files. On the Macintosh under HFS,
subdirectories are known as folders. (Ref. 8)
surge suppressor: A device that plugs into an
electric power circuit between the electric outlet and the computer; the surge
suppressor absorbs unusually high levels of electric power without passing them
onto the computer, where they could do damage. Surge suppressors are sometimes
also part of a power strip. (Ref. 13)
SYLK: An acronym for SYmbolic LinK. The file format developed by
Microsoft for business applications such as spreadsheets and databases; used
for transferring data between otherwise incompatible programs. (Ref. 7)
synchronous: Transmission of data in which
bits, characters or units of data are transmitted at constant time intervals.
(Ref. 29) See also asynchronous.
synchronous communication: A means of transmitting data
between computers in blocks of many characters, with a timing (synchronizing)
signal at the beginning of each block instead of start and stop signals for
each character. See also asynchronous communication. (Ref. 7)
syntax: The rules of a programming
language that specify how the language symbols can be put together to form
meaningful statements. If a program violates the language syntax rules, a
syntax error occurs. (Ref. 11)
syntax error: A type of error in a computer
program (particularly one written in BASIC) that indicates that the statement
the computer tried to execute has a problem with its syntax, i.e., it is not a
valid instruction in that language. (Ref. 13)
system (attribute bit): Set for system files. Prevents
the file from being renamed and also issues a warning when you try to throw a
System file in the Trash. See attribute bits. (Ref. 6)
system disk: In the Macintosh, any disk
containing the System file that can be used to start the computer.
(Ref. 7)
System file: A file the computer uses to
start itself or to provide system-wide information. Although system files are
represented by icons just as documents and applications are, they can’t
be opened in the usual way. You can, however, alter the contents of system
files. For example, you can use the Font/DA Mover to change the contents of the
System file or change the contents of the Scrapbook or Note Pad files by using
those desk accessories. See also startup disk. (Ref. 1)
System Folder: A folder containing the System
file plus other important programs for controlling the Macintosh and its
peripheral devices. (Ref. 5)
system heap: An area of memory used to
store system information about desk accessories, fonts, INIT files, and so
forth. (Ref. 14) Compare with heap.
System Network Architecture: See SNA.
system software: The set of files and resources
in the System Folder that the computer uses to run itself. (Ref. 1)
System Tools disk: A disk that comes packaged
with the Macintosh. The System Tools disk contains important utilities and
resources that you can use to maintain and update your computer system and
application disks. (Ref. 1)
tab: An ASCII character that
commands a device, such as a printer, to begin printing at a preset location.
Similar to a typewriter tab. (Ref. 4) The character that creates space
between the place where you press the Tab key and the position of the tab marker.
(Ref. 28)
tab-delimited file: A data file in which tabs
separate data elements. (Ref. 7)
Tab key: A key that, when pressed,
moves the insertion point to the next tab marker or, in a dialog box with more
than one place to enter information, to the next text box. (Ref. 1)
tab marker: A ruler control that marks the
position to which the insertion point will move when the Tab key is pressed. To
set a tab, drag a tab marker from the tab well and position it at the desired
location on the ruler. (Ref. 28) Depending upon the capabilities of the
application, tab markers may align the left edge, the right edge, a decimal
point, or the center of the tabbed text.
tab well: The source of left edge, right
edge, centering, and decimal tab markers. (Ref. 28)
target device: The device on the SCSI
daisychain that receives requests from the initiator to carry out an operation.
(Ref. 9)
TeachText: An application on the System
Tools disk that lets you read “Read Me” documents. (Ref. 1)
tear-off menu: A menu that can be converted
to a movable window by dragging the pointer beyond its edge. (Ref. 29)
tech notes: An abbreviation for
“Technical Notes.” Short reference papers, usually intended for
programmers and developers, that deal with how to solve a particular
programming problem or how to use a particular feature or command.
(Ref. 13)
telecommunication: Communication over a distance
by electronic means. (Ref. 29)
Telex: A limited worldwide commercial
teletypewriter communication service owned and operated by Western Union.
(Ref. 29)
template: A set of formulas and
relationships used to program a spreadsheet or similar application to fulfill a
particular function, such as computing income tax returns or home mortgage
payments. (Ref. 13)
terminal: An I/O device for
communication between a user and a computer. (Ref. 12) A device that
allows a user to access a computer, usually a mainframe or minicomputer.
Sometimes called “dumb” terminals to distinguish them from
“smart” terminals, i.e., microcomputers. (Ref. 13)
Terminator: A physical device used to
signify the ends of a chain of SCSI devices. The first and last SCSI devices
connected to a Mac in a chain must each have a terminator. (Ref. 8) The
Macintosh itself does not count as an “end,” however. If you have
one SCSI device (not including the Macintosh), it should be terminated. If you
have two or more SCSI devices, two should by terminated. (Ref. 23)
Text: Information presented in the
form of alphabetic, numeric, and punctuation characters. Compare with graphics.
(Ref. 4)
text box: The place or places in any
dialog box where you can type information. (Ref. 1)
text file: A file that contains
information stored in the form of readable characters. On the Macintosh, they
are known as text-only documents. On the Apple II, they are called TXT files.
(Ref. 5)
text insertion point: The blinking vertical line
that shows where the next character will appear when typed. (Ref. 29)
text-only document: A document that contains the
words that you have written but no formatting. It has the Type code TEXT and
has the property that it can be opened by many different applications, not just
the one that created it. (Ref. 6)
TEXT: The Type code that designates
a text-only document that can be used by many different applications, not just
the one that created them. This is possible because they have a standard format
which includes carriage returns and tabs as well as the words you have
generated. (Ref. 6)
thermal-transfer printer: A dot-matrix printer that uses
small heated pins to melt small dots of pigment onto paper. (Ref. 7)
3.5-inch disk: A flexible, plastic disk
measuring 3.5 inches in diameter and having a hard-shell plastic jacket.
Double-sided 3.5-inch disks can store almost six times more data than
single-sided 5.25-inch disks. (Ref. 25)
TIFF: An acronym for Tagged Image File Format. A standard graphics format for
high-resolution (greater than 72-dpi) bit-mapped images, like those generated
by most scanners. Compare with EPS, MacPaint, and PICT. (Ref. 22)
timesharing: A method in which a computer
is shared by many users at what appears to be the same time. The computer
actually serves each user in sequence, but the high speed of the computer makes
it appear as if all the users were being handled simultaneously. (Ref. 29)
title bar: The horizontal bar at the top
of a window that shows the name of the window’s contents and lets you
move the window. (Ref. 1)
toner: The black plastic powder that
functions as ink in photocopiers and laser printers. (Ref. 7)
Toolbox: The software in the ROM whose
purpose is to present the user interface of an application. (Ref. 9)
TOPS: An acronym for Transcendental OPeration System. Using the LocalTalk network,
it allows Macintosh and IBM-compatible computers to communicate. (Ref. 14)
touch pad: A computer pointing device
that is operated by moving one’s finger over a flat surface.
(Ref. 7)
touch screen: A computer screen that allows
the user to point at objects by touching the screen. (Ref. 7)
track: A path on magnetic media for
information storage. On a disk, tracks are concentric circles on the surface,
made up of sectors; one or more tracks make up a cylinder. (Ref. 7)
transfer speed: The rate at which data can be
carried between devices. (Ref. 9)
translation menu: A menu, such as “Mac to
MS-DOS” or “Mac to Mac,” that appears when two disks are
shown in the Apple File Exchange window. (Ref. 5)
translator: The information that the Apple
File Exchange utility needs to translate a document created with an application
on one operating system into a document that can be used with a similar
application on another operating system. (Ref. 5)
translator file: A file containing one or more
Apple File Exchange translators. (Ref. 5)
Trash: An icon on the desktop that you
use to discard documents, folders, and applications. (Ref. 1)
Trojan Horse: A type of rogue software that
pretends to be a useful application but actually carries a virus. (Ref. 9)
A seemingly innocuous program with a hidden purpose. The Trojan Horse presents
itself as a useful, normal application. But once resident on your system,
hidden routines are unleashed to inflict damage. (Ref. 14)
Troubleshoot: To locate and correct an error
or the cause of a problem or malfunction in hardware or software. (Ref. 25)
TTL: An acronym for Transistor-Transistor Logic. A standard way that ICs
communicate with each other using defined voltages to represent the binary
values 0 and 1. (Ref. 13)
TTY: Originally an abbreviation for
Teletypewriter. The original teletypewriters consisted of a keyboard, a noisy
printer, and reams of paper. Now TTY refers to terminals that follow the same
communications protocols as the original teletypewriters. (Ref. 29)
tutorial: A class that offers hands-on
instruction to a small group. (Ref. 13)
type: A four-character identifier
associated with each file on the Macintosh that tells applications whether the
file is, for example, a text-only file or a specially formatted file containing
codes for formatting text by a word processing application. Text files have a
type of, logically, “TEXT” whereas MacWrite files have a type of
“WORD.” (Microsoft Word files have a type of “WDBN”.)
Applications themselves have a type of “APPL.” Compare with creator.
(Ref. 13)
Type code: The four-letter identification
that is used to distinguish between different kinds of documents created by the
same application. It identifies the nature of the information within the file.
TEXT is the Type code used by all text-only documents. (Ref. 6)
typeface: A particular family and style
of type. Refers to the visual appearance of the type. (Ref. 19)
undelete a file: Restore a file that has been
thrown in the Trash (deleted). If none of the sectors of the file have been
used by other files, it may be possible to recover the file. (Ref. 6)
uninterruptable power supply: See UPS.
UNIX: A popular operating system
developed by AT&T and used primarily by academic and research institutions.
(Ref. 29)
unreadable disks: Disks that cannot be read by
the Macintosh. There are two possible reasons for this: 1) the disk is a new
uninitialized blank disk, or 2) the disk contains one or more bad sectors.
(Ref. 6)
Update Folder: A folder on the System Tools
disk, and on other applications and system disks, that contains Read Me
documents. (Ref. 1)
upgrade: Replacement of hardware or
software with a new version. Upgrades are usually offered to owners of a
product at a price below the list price of the new product. (Ref. 13)
upload: To transfer a computer program
from your personal computer to a host computer, usually a mainframe, usually
over telephone lines using a modem. Compare with download. (Ref. 13)
UPS: An acronym for Uninterruptable Power Supply. A power system that protects
against power failures by operating continuously from a rechargeable battery.
(Ref. 7)
user interface: The way a computer
communicates, with dialog boxes, icons, etc. (Ref. 9) The system a
computer program provides to communicate with you as a user. (Ref. 24)
users group: A computer club where computer
users exchange tips and information, usually about a particular brand of
computer. (Ref. 1)
Utilities disk: A disk that comes packaged
with the Macintosh. The Utilities disk contains important utilities that you
can use to maintain your computer system and application disks. The utilities
on the Utilities disk are explained in the Macintosh Utilities User’s
Guide.
(Ref. 1)
utility program: A special-purpose application
that alters a system file or lets you perform some useful function on your
files. Examples are the Font/DA Mover and the Installer. (Ref. 1) A
program that does not generate a document but instead performs service-oriented
tasks, like spell-checking or screen color customization. (Ref. 9) A
program that performs a standardized housekeeping task, such as installing
fonts or copying files, in contrast to personal productivity software such as a
spreadsheet or database. (Ref. 13)
V.22 bis: Modem protocol (data-link
layer) for 2400-bits-per-second transmission over telephone lines; set by the
CCITT. V.22 is a 1200-bps standard; the word bis is French for a second
time.
(Ref. 7)
vaccine: A program that is meant to
provide virus protection. (Ref. 14)
vaporware: Software that was announced a
while ago but still hasn’t shipped. (Ref. 22)
variable: (1) A location in the computer’s
memory where a value can be stored. (2) The symbol used in a program to
represent such a location. Compare with constant. (Ref. 13)
VAX: A family of computers that are
based on a 32-bit processing architecture made by Digital Equipment
Corporation. VAX stands for Virtual Address Extension. (Ref. 29)
verify a disk: To check each sector on a disk
for flipped bits. (Ref. 6)
view format: The various ways of seeing
files and folders on the desktop. The Mac offers seven view formats: by icon,
small icon, name, date, size, kind, and color. (Ref. 9)
viral resources: A resource that belongs to a
virus. (Ref. 14)
virus: A program which can
“infect” (modify) system files or other programs, causing them to
automatically make copies of the virus. Viruses are designed to surreptitiously
alter the Macintosh’s behavior — the effect may range from an amusing
prank to malicious sabotage. (Ref. 6) A program designed to infect and
modify data, altering your Macintosh’s behavior, and often meant for
destruction. (Ref. 14)
virus inhibitors: One or more resources added to
a file that prevents infection by a specific, known virus. (Ref. 14)
VMS: An operating system that runs
on all VAX computers. VMS stands for Virtual Memory System. (Ref. 29)
volume: A general term referring to a
storage device; a source of or a destination for information. Each mounted
volume appears as an icon on the desktop. (Refs. 2 and 9) A storage
unit such as a particular disk (a so-called “physical volume”) or a
portion of a disk (a “logical volume”). (Ref. 13)
volume directory: Part of the general
“diskkeeping” information on every disk. Contains information about
both the specific disk and also about the location of files on the disk. Damage
to the Volume Directory affects your ability to use both the disk and specific
files on it. (Ref. 6)
volume parameter: A directory of information
regarding your hard disk; examples include size, drivers, etc. (Ref. 15)
volume partition: A segment of a larger volume
that is created with a special application and can only be accessed using the
same application. (Ref. 14)
volunteer: HMUG’s most treasured
asset. Please become one.
VT52: A terminal manufactured by
Digital Equipment Corporation before the development of the ANSI terminal.
(Ref. 29)
VT100: A terminal manufactured by
Digital Equipment Corporation that complies with the ANSI standard terminal. It
is very popular and relatively easy to emulate with software. (Ref. 29)
VT102: A terminal manufactured by
Digital Equipment Corporation that incorporates all the features of VT100 and
recognizes some additional commands as well. (Ref. 29)
wait cursor: Usually a wristwatch but
sometimes a spinning beachball, it tells the user to wait while the Macintosh
completes a task. (Ref. 9)
warm boot: The process of resetting a
computer to its start-up state without shutting off the power. (Ref. 7)
wide area network: A communication pathway
linking computers and accessory devices over cross-continental distances, for
example, the Department of Defense’s ARPANET (Advanced Research Projects
Agency Network). See also network and local area network (LAN). (Ref. 7)
widow: In word processing and
typography, a condition when the first line of a paragraph appears at the bottom of a
page. Compare with orphan. (Ref. 27)
Winchester drive: The standard hard disk drive,
with read/write heads, platters, a fan, and a hermetically sealed case.
(Ref. 9)
window: The area that displays
information on the desktop. Disks and folder icons open into windows; you view
documents through a window. You can open or close a window, move it around on
the desktop, and sometimes change its size, edit its contents, and scroll
through it. (Refs. 1 and 9)
word wraparound: The automatic continuation of
text from the end of one line to the beginning of the next. Word wraparound
lets you avoid pressing the Return key at the end of each line as you type.
(Ref. 1)
working memory: See random-access memory (RAM). (Ref. 4)
Worm: A malicious program, which
once resident on your system, inflicts damage by “burrowing”
through your files to corrupt data. (Ref. 14)
WORM drive: WORM is an acronym for Write-Once Read-Many. An optical mass storage
device, it is used only for storing large amounts of data. Files are inscribed
with a high-intensity laser and read with another, weaker laser beam.
(Ref. 9)
wristwatch: The pointer’s icon that
you see on the screen when the computer is performing an action that causes you
to wait. (Ref. 1)
write: To transfer information from
the computer to an external device such as a disk, printer, or modem. Compare
with read. (Ref. 13)
write-protect: To alter a disk in such a way
that you cannot write data onto the disk. (Ref. 13)
write-protect tab: The small shutter in the upper
left-hand corner (backside) of Macintosh floppy disks. When the tab is pushed
up to reveal a square opening, the disk’s contents can be read but not
deleted or added to. Pushing the tab down will restore the floppy for normal
writing functions. (Ref. 9)
x-height: The average height of
lowercase letters, excluding ascenders. (Ref. 18)
XMODEM: A protocol devised by Ward
Christiansen for sending data across a serial communications link in a way that
corrects for errors in transmission due to noisy telephone lines or other
reasons. In XMODEM, data are sent in 128-byte blocks, and after each block is
sent, the receiving computer sends a character to acknowledge that the block
was received correctly or a different character to indicate that the block has
to be re-sent. (Ref. 13) A file transfer protocol that includes automatic
error checking and error correction during the file transfer. (Ref. 29)
XON/XOFF: A communications protocol that
tells the computer to start or stop sending data by sending the appropriate
character: either an XON or XOFF. The ImageWriter II sends an XOFF when its
input buffer is nearly full and an XON when it has room for more data. Compare
with hardware handshake. (Ref. 4) A protocol for sending data across a
serial communication link in which the flow of data can be stopped by the
receiving system by sending a Control-S character, which is called X-Off. This
allows the receiving system time to save data to disk or to print it on paper.
When the receiving system is ready for the flow of data to resume, it sends a
Control-Q character, called X-On. While X-On/X-Off normally prevents the
receiving computer from losing characters due to the fact that the receiving
system may be slower than the transmitting system, it does not correct for
errors in transmission. Compare with XMODEM. (Ref. 13)
XOR: An abbreviation for eXclusive-OR, a logical operation that is
true, i.e., 1, if and only if one of two values is true and the other is false.
Thus,
1 XOR 1 = 0 (both can’t
be true)
1 XOR 0 = 1
0 XOR 1 = 1
0 XOR 0 = 0 (both can’t
be false) (Ref. 13)
YMODEM: A file transfer protocol that
is an extension of XMODEM. YMODEM adds the ability to send multiple files and
include the name and size of a file along with the file. (Ref. 29)
YMODEM-G: A variant of the YMODEM file
transfer protocol that does not wait for positive acknowledgement after each
block is sent, but rather sends blocks in rapid succession. If any block is
unsuccessfully transferred, the entire transfer is canceled. YMODEM-G is faster
than YMODEM but only suitable for error-free connections. (Ref. 29)
ZMODEM: Like YMODEM-G, ZMODEM does not
wait for positive acknowledgment before sending each block. But unlike
YMODEM-G, ZMODEM retransmits unsuccessful packets. If a ZMODEM transfer is
canceled or interrupted for any reason, the transfer can be resurrected later
and the previously transferred information need not be resent. ZMODEM is
considered one of the most advanced transfer protocols available.
(Ref. 29)
zoom box: The small box on the right
side of the title bar of some windows. Clicking the zoom box expands a window
to its maximum size. Clicking again returns the window to its original size.
(Ref. 1)
zone: A network in a series of
interconnected networks, joined through bridges. (Ref. 1)
References
1. Macintosh Plus
Owner’s Guide (1987)
2. Macintosh Utilities
User’s Guide (1987)
3. HyperCard
User’s Guide (1987)
4. ImageWriter II
Owner’s Manual (1985)
5. Macintosh Utilities
User’s Guide (1988)
6. The 1st Aid Kit (1989)
7. The Apple Macintosh
Book, 3rd Edition (1988)
8. Macintosh Hard Disk
Management (1988)
9. Understanding Hard
Disk Management on the Macintosh (1989)
10. Macintosh Repair
and Upgrade Secrets
(1990)
11. Turbo Pascal for
the Mac (1986)
12. Turbo Pascal Tutor (1987)
13. Washington Apple Pi
Member Reference Book (1987)
14. Symantec AntiVirus
for Macintosh (SAM) (1989-1990)
15. Symantec Utilities for
Macintosh (SUM II) (1989)
16. WriteNow for
Macintosh, 2.2 (1989,
1990)
17. Springboard
Publisher II (1989)
18. Adobe Type Library (1987)
19. TypeAlign
User’s Guide (1989)
20. TypeStyler
User’s Guide (1989)
21. The Macintosh Font
Book (1989)
22. The Macintosh
Bible, 2nd edition (1988-89)
23. Jasmine Hard Disk
Encyclopedia (1988)
24. Music Through MIDI (1987)
25. QuicKeys
User’s Manual (1987)
26. Jasmine DriveTools
Owner’s Guide (1988)
27. Macworld (Nov. 1988, p. 131)
28. MindWrite (1986, 1987, 1988)
29. Microphone II
User’s Guide (1985-1990)