perm filename ERRATA.XGP[OK,TES]1 blob sn#116594 filedate 1974-08-22 generic text, type T, neo UTF8
/LMAR=216/FONT#4=BASB30/FONT#3=FIX20[DOC,BH]/FONT#2=FIX25/FONT#1=BASI30/FONT#0=BASL30



␈↓∧STANFORD ARTIFICIAL INTELLIGENCE LABORATORY␈↓ 
?August, 1974
␈↓∧OPERATING NOTE 54.3 1/2









␈↓∧␈α?␈α?␈α?␈α?␈α4M O N I T O R   C O M M A N D   M A N U A L
␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈απ(addenda and errata)



␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α↓by


␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α6Brian Harvey














␈↓This␈α∂document␈α⊂contains␈α∂corrections␈α⊂and␈α∂additions␈α⊂to␈α∂the␈α⊂Monitor␈α∂Command␈α⊂Manual,␈α∂SAILON
␈↓54.3,␈αre∨ecting␈αimprovements␈αin␈αthe␈αsystem␈αfacilities␈αas␈αof␈αthe␈αdate␈αabove.␈αA␈αline␈αprinter␈αversion␈αof
␈↓this␈α∀document␈α∀is␈α∀available␈α∀for␈α∀network␈α∀users␈α∀in␈α∀the␈α∀≡le␈α∀ERRATA.BH[S,DOC].␈α∀ Note:␈α∀page
␈↓numbers␈αmentioned␈αherein␈αrefer␈αto␈αthe␈αXGP␈αedition␈α
of␈αSAILON␈α54.3,␈αeven␈αin␈αthe␈αLPT␈αversion␈α
of
␈↓this document.







␈↓This␈αwork␈α
was␈αsupported␈α
by␈αthe␈α
Advanced␈αResearch␈α
Projects␈αAgency␈α
of␈αthe␈α
O≠ce␈αof␈αthe␈α
Secretary
␈↓of Defense under contract DAHC15-73-C-0435.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 7    i␈↓


␈↓This edition includes the following changes since the August, 1974 edition:

␈↓MAIL/A to append to an earlier message.

␈↓RESOURCES␈α↔command␈α↔no␈α↔longer␈α↔lists␈α_job␈α↔slots␈α↔and␈α↔Data␈α↔Disc␈α↔channels␈α_available;␈α↔this
␈↓information can be derived from the system WHO line.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    1␈↓


␈↓------

␈↓∧The ≡rst sentence of the third paragraph on page 4 (section 1.3) should be replaced as follows:

␈↓A␈αvacant␈αterminal␈αshould␈αsay␈α␈↓αTAKE␈αME␈αI'M␈αYOURS!␈↓␈αalong␈αwith␈αa␈αline␈αof␈αcryptic␈αinformation␈αon␈αan
␈↓otherwise blank screen.  The cryptic information is the ␈↓↓system WHO line,␈↓ described on page 17.


␈↓------

␈↓∧The␈α∂following␈α∂lines␈α∂should␈α∂be␈α∂added␈α∂to␈α∂the␈α⊂device␈α∂table␈α∂on␈α∂page␈α∂7␈α∂(section␈α∂1.5)␈α∂The␈α⊂old␈α∂AD
␈↓∧device is still present but not for long.

␈↓β␈↓ ↓xIMP␈↓ βλInterface Message Processor for ARPA network connections
␈↓β␈↓ ↓xADC␈↓ βλAnalog to digital converter
␈↓β␈↓ ↓xDAC␈↓ βλDigital to analog converter


␈↓------

␈↓∧On␈α
page␈α18␈α
(section␈α2.5,␈α
WHO␈αline),␈α
in␈α
the␈αparagraph␈α
about␈αXTIME,␈α
change␈αthe␈α
last␈αsentence␈α
to
␈↓∧``␈↓... will be ␈↓α"␈↓ instead of ␈↓α'␈↓ as it usually is.␈↓∧''


␈↓------

␈↓∧Add␈αthe␈αfollowing␈αparagraph␈αto␈αthe␈αdescription␈αof␈αthe␈αaudio␈αswitch␈αescape␈αcommands␈αon␈αpage
␈↓∧21 (section 2.9):

␈↓Your␈α∪program␈α∩can␈α∪control␈α∪the␈α∩audio␈α∪switch␈α∩selection␈α∪for␈α∪your␈α∩terminal␈α∪by␈α∪UUO.␈α∩ Although
␈↓programs␈αcannot␈αin␈αgeneral␈αchange␈αthe␈αaudio␈αswitch␈αsetting␈αfor␈αanother␈αterminal,␈αthere␈αis␈αa␈αBEEP
␈↓UUO␈αwhich␈αcan␈αbe␈α
used␈αto␈αcause␈αany␈α
terminal's␈αloudspeaker␈αto␈αbe␈α
connected␈αto␈αthe␈αbeep␈α
generator
␈↓for␈α⊂a␈α∂short␈α⊂time␈α∂(less␈α⊂than␈α∂one␈α⊂second).␈α⊂ This␈α∂is␈α⊂used␈α∂by,␈α⊂e.g.,␈α∂the␈α⊂SEND␈α∂command␈α⊂to␈α⊂call␈α∂the
␈↓recipient's␈αattention␈α
to␈αa␈α
message␈αon␈α
his␈αscreen.␈α
 You␈αcan␈α
permit␈αor␈α
refuse␈αsuch␈α
beep␈αconnections␈α
by
␈↓UUO␈αor␈αby␈αescape␈α
commands;␈αBREAK␈αB␈αrefuses␈α
beeps,␈αand␈αESC␈αB␈α
permits␈αthem.␈α Any␈αchange␈α
to
␈↓your␈αaudio␈αswitch␈αsetting␈αby␈αother␈αmeans␈α(e.g.␈αESC␈αU)␈αalso␈αcancels␈αthe␈αe≥ect␈αof␈αBREAK␈αB,␈αso␈αyou
␈↓must repeat the BREAK B command after changing your selection.


␈↓------

␈↓∧Add the following paragraph to section 4.2, page 24:

␈↓If␈α
your␈α
core␈α
image␈α
includes␈α
an␈α
upper␈α
segment␈α
(see␈α
page␈α
11),␈α
you␈α
can␈α
set␈α
or␈α
clear␈α
the␈αwrite␈α
protection
␈↓bit␈αwith␈αthe␈αSETUWP␈αor␈αCLRUWP␈αcommands.␈α You␈αcannot␈αclear␈αwrite␈αprotection␈αfor␈αa␈αsharable
␈↓upper␈α
segment␈α
if␈α∞it␈α
is␈α
protected␈α
against␈α∞you.␈α
 (See␈α
the␈α
␈↓↓UUO␈α∞Manual␈↓␈α
for␈α
a␈α
complete␈α∞discussion␈α
of
␈↓upper␈αsegment␈αprotection.)␈αThese␈αcommands␈αalso␈αtake␈αan␈αoptional␈αoctal␈αargument,␈αwhich␈αis␈αused␈αto
␈↓set the protection code for the segment if you are permitted to change the code.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    2␈↓


␈↓------

␈↓∧Add the following sentence to the description of the START command on page 25 (section 4.3):

␈↓If␈α⊃the␈α⊂octal␈α⊃argument␈α⊃is␈α⊂preceded␈α⊃by␈α⊂␈↓α+␈↓␈α⊃or␈α⊃␈↓α-␈↓,␈α⊂the␈α⊃number␈α⊂is␈α⊃added␈α⊃to␈α⊂or␈α⊃subtracted␈α⊃from␈α⊂the
␈↓program's normal starting address to determine the desired starting address.

␈↓∧Also␈α∞add␈α∂the␈α∞following␈α∂sentence␈α∞to␈α∂the␈α∞description␈α∞of␈α∂the␈α∞REENTER␈α∂command␈α∞on␈α∂the␈α∞same
␈↓∧page:

␈↓An␈α
octal␈αargument␈α
preceded␈αby␈α
␈↓α+␈↓␈α(optional␈α
in␈αthis␈α
case)␈αor␈α
␈↓α-␈↓␈αwill␈α
be␈αadded␈α
to␈αor␈α
subtracted␈αfrom
␈↓the reenter address.


␈↓------

␈↓∧Add the following sentence to the description of the FORK command on page 26 (section 4.4):

␈↓If␈α∞the␈α∞system's␈α∞job␈α
capacity␈α∞is␈α∞used␈α∞up,␈α∞so␈α
that␈α∞it␈α∞is␈α∞impossible␈α∞to␈α
start␈α∞a␈α∞new␈α∞job,␈α∞your␈α
terminal
␈↓remains attached to the existing job.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    3␈↓



␈↓------

␈↓∧Add the following to the description of the ATTACH command on page 27 (section 4.5):

␈↓Non-local␈α
guest␈αaccount␈α
users␈α
(see␈αLOGIN,␈α
section␈α5.1)␈α
cannot␈α
use␈αmost␈α
non-sharable␈αdevices,␈α
either
␈↓by␈α
program␈α
request␈αor␈α
by␈α
the␈α
ASSIGN␈αcommand.␈α
 Since␈α
there␈α
is␈αno␈α
operator␈α
on␈α
this␈αsystem,␈α
remote
␈↓users␈αhave␈αno␈αway␈αto␈αmount␈αtapes,␈αcollect␈αlistings,␈αetc.;␈αhence,␈αthe␈αmonitor␈αdoes␈αnot␈αallow␈αsuch␈α
users
␈↓to attempt I/O on those devices.

␈↓The␈αASSIGN␈αcommand␈αis␈αused␈αin␈α
a␈αspecial␈αway␈αfor␈αUser␈αDisk␈α
Packs.␈α A␈αUDP␈αmay␈αbe␈αused␈α
as␈αa
␈↓␈↓↓public␈↓␈αor␈αa␈α␈↓↓private␈↓␈αdevice.␈α In␈α
the␈αformer␈αcase,␈αother␈αjobs␈αmay␈α
use␈αthe␈αsame␈αUDP␈αat␈αthe␈αsame␈α
time,
␈↓as␈α
with␈αthe␈α
system␈α
≡le␈αdisks.␈α
 A␈α
privately␈αassigned␈α
UDP,␈α
however,␈αis␈α
restricted␈α
to␈αthe␈α
one␈αjob␈α
which
␈↓assigned␈α∞it.␈α∞ (Note:␈α∞a␈α∞privately␈α∞assigned␈α∞UDP␈α∞is␈α∂still␈α∞a␈α∞␈↓↓sharable␈↓␈α∞device,␈α∞in␈α∞the␈α∞sense␈α∞that␈α∂the␈α∞job
␈↓which␈α
owns␈α
it␈α
can␈α
operate␈α
on␈αseveral␈α
≡les␈α
simultaneously,␈α
unlike␈α
non-sharable␈α
devices␈αlike␈α
DECtape
␈↓drives,␈α⊃on␈α∩which␈α⊃only␈α∩one␈α⊃operation␈α∩can␈α⊃be␈α∩in␈α⊃progress␈α∩at␈α⊃any␈α∩time.)␈α⊃A␈α∩UDP␈α⊃is␈α∩normally␈α⊃a
␈↓≡le-structured␈αdevice,␈αwith␈αa␈αdirectory␈αstructure␈αjust␈αlike␈αthe␈αone␈αdescribed␈αfor␈αthe␈αmain␈α≡le␈αdisk␈αin
␈↓section␈α∩1.5.␈α∩ However,␈α∩it␈α∩is␈α∩also␈α∩possible␈α∩to␈α∩use␈α∩a␈α∩UDP␈α∩as␈α∩an␈α∩unstructured␈α∩device,␈α∪in␈α∩which
␈↓allocation␈αof␈αstorage␈αon␈αthe␈αdisk␈αpack␈αis␈αdone␈αexplicitly␈αby␈αthe␈αuser␈αprogram.␈α This␈αmode␈αof␈αusing
␈↓the␈α
UDP␈α∞is␈α
called␈α∞␈↓↓old␈↓␈α
mode␈α∞(because␈α
it␈α∞used␈α
to␈α
be␈α∞the␈α
only␈α∞mode␈α
available).␈α∞ The␈α
format␈α∞of␈α
the
␈↓ASSIGN command for a UDP is

␈↓αASSIGN mode UDPn logical-name

␈↓The optional mode argument can be

␈↓β␈↓ ↓xPUBLIC␈↓ βλpublic access, file structured UDP
␈↓β␈↓ ↓xPRIVATE␈↓ βλprivate access, file structured UDP
␈↓β␈↓ ↓xOLD␈↓ βλprivate access, non-structured UDP

␈↓The␈α∂default␈α∞mode␈α∂is␈α∞PUBLIC.␈α∂ A␈α∞later␈α∂ASSIGN␈α∞command␈α∂for␈α∞the␈α∂same␈α∞device␈α∂can␈α∞be␈α∂used␈α∞to
␈↓change␈α
the␈α
mode␈α
from␈α
PRIVATE␈α
to␈α
PUBLIC,␈α
or␈α
from␈α
PUBLIC␈α
to␈α
PRIVATE␈α
if␈α
no␈α
other␈α
jobs
␈↓are␈α⊂using␈α⊂the␈α∂device.␈α⊂ However,␈α⊂to␈α∂change␈α⊂into␈α⊂or␈α⊂out␈α∂of␈α⊂OLD␈α⊂mode,␈α∂the␈α⊂device␈α⊂must␈α⊂≡rst␈α∂be
␈↓deassigned␈α
by␈αall␈α
jobs␈α
using␈αit.␈α
 This␈αis␈α
because␈α
a␈αparticular␈α
pack␈αeither␈α
is␈α
or␈αisn't␈α
formatted␈αfor␈α
≡le
␈↓structured␈α∞use,␈α∞and␈α∞the␈α∞mode␈α∞given␈α∞in␈α∞the␈α∞ASSIGN␈α∞command␈α∞must␈α∞agree␈α∞with␈α∞that␈α∞of␈α∞the␈α
pack
␈↓itself.␈α (A␈αmismatch␈αis␈αnot␈αdetected␈αwhen␈αyou␈α
give␈αthe␈αASSIGN␈αcommand,␈αbut␈αwill␈αbe␈αcaught␈α
when
␈↓your␈αprogram␈αactually␈αtries␈αto␈αuse␈αthe␈αdevice.)␈αThe␈αonly␈αexception␈αis␈αthat␈αa␈αformatted␈αpack␈αmay␈αbe
␈↓read, but not written, in OLD mode.

␈↓Although␈α∂we␈α∂have␈α∂only␈α∂one␈α⊂disk␈α∂drive␈α∂for␈α∂user␈α∂packs␈α⊂at␈α∂present,␈α∂the␈α∂monitor␈α∂provides␈α⊂for␈α∂the
␈↓possibility␈α∪of␈α∪several␈α∪such␈α∪drives,␈α∪and␈α∪treats␈α∪␈↓αUDP␈↓␈α∪as␈α∪a␈α∪generic␈α∪device␈α∪name.␈α∀ The␈α∪command
␈↓␈↓αASSIGN UDP␈↓␈α⊂will␈α⊂select␈α∂a␈α⊂drive␈α⊂only␈α∂if␈α⊂it␈α⊂is␈α⊂not␈α∂in␈α⊂use,␈α⊂although␈α∂a␈α⊂command␈α⊂which␈α⊂speci≡es␈α∂a
␈↓particular␈α⊂drive␈α⊂(␈↓αASSIGN UDP1␈↓)␈α∂will␈α⊂succeed␈α⊂if␈α⊂the␈α∂drive␈α⊂is␈α⊂in␈α∂use␈α⊂but␈α⊂PUBLIC.␈α⊂ Unlike␈α∂other
␈↓devices,␈α⊂the␈α∂UDP␈α⊂must␈α∂be␈α⊂ASSIGNed␈α∂before␈α⊂it␈α∂can␈α⊂be␈α∂used␈α⊂by␈α∂a␈α⊂program,␈α∂to␈α⊂ensure␈α⊂that␈α∂the
␈↓proper mode is used.  For more details on the use of user packs, see the ␈↓↓UUO Manual␈↓.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    4␈↓



␈↓------

␈↓∧Add this paragraph to the description of DEASSIGN on page 27:

␈↓Because␈α
UDPs␈α∞can␈α
be␈α
assigned␈α∞in␈α
a␈α
way␈α∞which␈α
permits␈α
public␈α∞access,␈α
the␈α∞DEASSIGN␈α
command
␈↓for␈α∩a␈α∩UDP␈α∩types␈α∩a␈α∩message␈α∩at␈α∩your␈α∩terminal␈α∩indicating␈α∩whether␈α∩or␈α∩not␈α∩the␈α∩pack␈α∪should␈α∩be
␈↓dismounted.␈α If␈αyou␈αinterrupt␈αa␈αprogram␈αwhich␈αis␈αusing␈αa␈αUDP␈αand␈αdeassign␈αthe␈αUDP,␈αit␈αwill␈αstill
␈↓be␈α∞considered␈α
in␈α∞use␈α
by␈α∞your␈α
program␈α∞until␈α
you␈α∞reset␈α
it␈α∞(for␈α
example,␈α∞by␈α
the␈α∞␈↓αCORE 0␈↓␈α
command).
␈↓You will then be told that you may dismount the pack.


␈↓------

␈↓∧Add this to the description of the PJOB command on page 27 (section 4.6):

␈↓The␈αargument␈αcan␈αbe␈αa␈αname␈αof␈αthe␈αform␈α␈↓αDDn␈↓,␈αto␈α≡nd␈αout␈αwho␈αis␈αusing␈αData␈αDisc␈αchannel␈αn.␈α
 You
␈↓will␈α
be␈α
told␈α
the␈α
TTY␈α
line␈α
number,␈α
if␈α
any,␈α
as␈αwell␈α
as␈α
the␈α
job␈α
number.␈α
 Also,␈α
if␈α
the␈α
argument␈α
is␈αa
␈↓UDP,␈α
the␈αcommand␈α
may␈α
type␈αout␈α
␈↓αUDP1␈α
PUBLIC␈↓␈αif␈α
applicable,␈α
and␈αwill␈α
type␈α
a␈αjob␈α
number␈α
only␈αif
␈↓that job has assigned the drive as PRIVATE or OLD.


␈↓------

␈↓∧Add the following sentence to the description of the command ␈↓αTIME 0␈↓∧ on page 28 (section 4.6):

␈↓It␈αalso␈α
types␈αthe␈α
percentage␈αspent␈α
in␈αthe␈αmonitor␈α
at␈αinterrupt␈α
level,␈αbut␈α
this␈αinformation␈αis␈α
provided
␈↓for the bene≡t of system wizards and is not particularly meaningful to users.

␈↓∧Also, add this to the description of the DAYTIME command on that page:

␈↓If␈α
the␈αjob␈α
has␈αbeen␈α
logged␈α
in␈αsince␈α
the␈αprevious␈α
day,␈αdates␈α
(day␈α
of␈αthe␈α
month)␈αare␈α
typed␈αalong␈α
with
␈↓the three times.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    5␈↓



␈↓------

␈↓∧Replace the description of RESOURCES (page 28, section 4.6) with this:

␈↓The␈αRESOURCES␈α
command␈αlists␈α
the␈αavailable␈α
system␈αresources:␈α
it␈αtypes␈α
the␈αnumber␈α
of␈αfree␈α
tracks
␈↓on␈α⊂the␈α∂≡le␈α⊂disk,␈α⊂and␈α∂the␈α⊂names␈α∂of␈α⊂free␈α⊂devices␈α∂(mag␈α⊂tape,␈α∂etc.)␈α⊂other␈α⊂than␈α∂the␈α⊂disk,␈α⊂IMP,␈α∂and
␈↓terminals.␈α∂ A␈α∞separate␈α∂line␈α∂is␈α∞typed␈α∂for␈α∂each␈α∞UDP␈α∂drive␈α∞(currently␈α∂there␈α∂is␈α∞only␈α∂one)␈α∂unless␈α∞the
␈↓drive␈α
is␈α
detached␈αfrom␈α
the␈α
system␈αor␈α
being␈α
used␈αfor␈α
swapping.␈α
 The␈αline␈α
contains␈α
just␈α
the␈αdevice
␈↓name␈αif␈αthe␈α
drive␈αis␈αfree;␈α
otherwise␈αit␈αindicates␈α
whether␈αit␈αis␈α
␈↓αPUBLIC␈↓␈αor␈α␈↓αPRIVATE␈↓;␈α
if␈αthe␈αdrive␈αhas␈α
a
␈↓≡le-structured␈αpack␈αmounted,␈αits␈αname␈α(volume␈αID)␈αand␈αthe␈αnumber␈αof␈αfree␈αtracks,␈αas␈αfor␈αthe␈αDSK
␈↓device,␈αwill␈αbe␈α
typed␈αif␈αknown␈α
to␈αthe␈αmonitor.␈α
 (That␈αis,␈αthe␈α
name␈αwill␈αbe␈α
typed␈αif␈αany␈α
input/output
␈↓operation has actually happened on that pack since it was mounted.)

␈↓∧Also,␈α∩add␈α∩this␈α∩to␈α∩the␈α∩FILES␈α∩description␈α∪in␈α∩the␈α∩next␈α∩paragraph,␈α∩after␈α∩the␈α∩sentence␈α∪``␈↓...␈α∩for
␈↓end-of-≡le seen.␈↓∧''

␈↓The letter U indicates that the ≡le is on a UDP.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    6␈↓



␈↓------

␈↓∧Replace␈αthe␈αlast␈αparagraph␈αon␈αpage␈α30␈αand␈αthe␈α≡rst␈αparagraph␈αon␈αpage␈α31␈α(section␈α5.1,␈αLOGIN)
␈↓∧as follows:

␈↓It␈α
is␈α
possible␈α
to␈α
set␈α
a␈α
password␈α
and␈α
≡le␈α
protection␈α
codes␈α
to␈α
restrict␈α
access␈α
to␈α
a␈α
particular␈α
PPN.␈α If␈α
the
␈↓PPN␈α∂you␈α∂specify␈α∂to␈α∂LOGIN␈α∂has␈α∂a␈α∂password,␈α∂LOGIN␈α∂types␈α∂␈↓αPassword=␈↓␈α∂and␈α∂you␈α∂must␈α∂type␈α∞the
␈↓correct␈α∂password␈α∂to␈α∂log␈α∂in.␈α∂ Echoing␈α∂of␈α∂input␈α∞characters␈α∂is␈α∂turned␈α∂o≥␈α∂so␈α∂the␈α∂password␈α∂does␈α∞not
␈↓print.␈α Passwords␈α
may␈αbe␈αone␈α
to␈αsix␈α
letters␈αor␈αdigits␈α
followed␈αby␈αRETURN.␈α
 To␈αprotect␈α
≡les␈αfrom
␈↓unauthorized␈α∂access,␈α∂there␈α∂is␈α⊂a␈α∂protection␈α∂code␈α∂associated␈α∂with␈α⊂each␈α∂≡le.␈α∂ The␈α∂code␈α⊂speci≡es␈α∂the
␈↓access␈α⊃allowed␈α⊃to␈α⊂the␈α⊃≡le␈α⊃for␈α⊃its␈α⊂owner␈α⊃(i.e.,␈α⊃a␈α⊂user␈α⊃logged␈α⊃in␈α⊃under␈α⊂the␈α⊃≡le's␈α⊃PPN),␈α⊃for␈α⊂other
␈↓authorized␈αAI␈α
Lab␈αusers,␈αand␈α
for␈αguest␈αusers␈α
who␈αare␈α
logged␈αin␈αremotely␈α
(from␈αthe␈αARPA␈α
network,
␈↓dial-up␈αtelephone␈αlines,␈α
or␈αcampus␈αterminals).␈α
 You␈αcan␈αset␈α
the␈αprotection␈αcode␈α
for␈αa␈α≡le␈α
using␈αthe
␈↓COPY␈α∪program␈α∩(see␈α∪Appendix␈α∩2).␈α∪ However,␈α∩you␈α∪must␈α∩use␈α∪the␈α∩LOGIN␈α∪program␈α∩to␈α∪set␈α∩the
␈↓protection␈α
code␈αof␈α
your␈α
≡le␈αdirectory␈α
itself,␈αand␈α
the␈α
default␈αprotection␈α
code␈α
which␈αis␈α
assigned␈αto␈α
new
␈↓≡les␈αcreated␈αin␈αyour␈αdirectory␈αif␈αthe␈αprogram␈αwriting␈αthe␈α≡le␈αdoes␈αnot␈αspecify␈αa␈αvalue␈αexplicitly.␈α If
␈↓you␈α
use␈α
%␈αas␈α
the␈α
delimiter␈αbetween␈α
the␈α
project␈αand␈α
programmer␈α
names␈αwhen␈α
you␈α
log␈α
in,␈αLOGIN
␈↓will␈αgive␈αyou␈α
the␈αopportunity␈αto␈α
change␈αyour␈αpassword,␈α
the␈α≡le␈αdirectory␈α
protection,␈αand␈αthe␈α
default
␈↓protection␈α∞for␈α∞new␈α∂≡les.␈α∞ The␈α∞protection␈α∂codes␈α∞are␈α∞entered␈α∞as␈α∂three-digit␈α∞octal␈α∞numbers,␈α∂with␈α∞the
␈↓following meanings:

␈↓β␈↓ ↓xBit␈↓ α8Meaning in directory protection code␈↓ π_Meaning in file protection code

␈↓β␈↓ ↓x400␈↓ α8password is for remote logins only (see below)␈↓ π_don't dump this file (see DART, Appendix 5)
␈↓β␈↓ ↓x200␈↓ α8unused␈↓ π_delete protect (see COPY, Appendix 2)
␈↓β␈↓ ↓x100␈↓ α8owner may not write files␈↓ π_owner may not overwrite this file
␈↓β␈↓ ↓x040␈↓ α8local users may not change protection of files␈↓ π_... of this file
␈↓β␈↓ ↓x020␈↓ α8local users may not read directory or any files␈↓ π_... read this file
␈↓β␈↓ ↓x010␈↓ α8local users may not write any files␈↓ π_... overwrite this file
␈↓β␈↓ ↓x004␈↓ α8guest users may not change protection of files␈↓ π_... of this file
␈↓β␈↓ ↓x002␈↓ α8guest users may not read directory or any files␈↓ π_... read this file
␈↓β␈↓ ↓x001␈↓ α8guest users may not write any files␈↓ π_... overwrite this file

␈↓If␈α
the␈α
400␈α
bit␈αis␈α
on␈α
in␈α
the␈α
protection␈αcode␈α
for␈α
a␈α
≡le␈α
directory,␈αthe␈α
password␈α
associated␈α
with␈αthat␈α
area
␈↓is␈α
used␈α
only␈α
for␈α
logins␈α
from␈α
a␈α
remote␈α
site;␈α
no␈α
password␈α
will␈α
be␈α
required␈α
for␈α
local␈α
login␈α
on␈α
that␈α
PPN.
␈↓Except␈α∞for␈α
the␈α∞special␈α
␈↓αNET,GUE␈↓␈α∞guest␈α
account␈α∞(see␈α∞below),␈α
remote␈α∞login␈α
is␈α∞not␈α
allowed␈α∞on␈α∞a␈α
PPN
␈↓which␈αdoes␈αnot␈α
have␈αa␈αpassword;␈α
thus,␈αif␈αyou␈α
want␈αto␈αbe␈α
able␈αto␈αlog␈α
in␈αremotely␈αbut␈α
do␈αnot␈αwant␈α
to
␈↓have␈αto␈αtype␈αa␈αpassword␈αfor␈αlocal␈αlogin,␈αyou␈αcan␈αset␈αthe␈α400␈αbit␈αin␈αyour␈αdirectory's␈αprotection␈αcode.
␈↓Remote␈α∂users␈α⊂without␈α∂accounts␈α⊂on␈α∂the␈α∂system␈α⊂can␈α∂log␈α⊂in␈α∂as␈α∂␈↓αNET,GUE␈↓␈α⊂(network␈α∂guest)␈α⊂without␈α∂a
␈↓password.␈α (Instead,␈α
if␈αyou␈αlog␈α
in␈αas␈α
␈↓αNET,GUE␈↓␈αyou␈αwill␈α
be␈αasked␈α
to␈αtype␈αin␈α
your␈αname.␈α
 Any␈αname
␈↓you␈αgive␈αis␈αaccepted␈αand␈αstored␈αto␈αidentify␈αyour␈αjob␈αas␈αlong␈αas␈αyou␈αremain␈αlogged␈αin;␈αthe␈αFINGER
␈↓command␈α
(see␈αSection␈α
5.11)␈α
will␈αtype␈α
the␈α
name␈αyou␈α
give␈α
to␈αidentify␈α
you␈α
to␈αother␈α
users.)␈α
It␈αis␈α
possible
␈↓to␈α
set␈α
up␈α
special␈α
guest␈α
accounts␈α
without␈α
the␈α
password␈α
requirement␈α
for␈α
use␈α
by␈α
speci≡c␈α
AI␈αLab␈α
project
␈↓groups; consult a system programmer for more information on this.

␈↓Users␈α
with␈αaccess␈α
to␈αlocal␈α
terminals␈αwho␈α
sometimes␈αneed␈α
to␈αlog␈α
in␈αremotely␈α
can␈αset␈α
a␈αpassword␈α
(with
␈↓%)␈α∩for␈α∩their␈α∩own␈α∩PPNs;␈α∩remote␈α∩users␈α∩who␈α∩want␈α∩to␈α∩establish␈α∩their␈α∩own␈α∩≡le␈α∩directories␈α⊃should
␈↓communicate␈α∞with␈α∞Lester␈α∞Earnest.␈α∞ (Log␈α∞in␈α∞as␈α∞␈↓αNET,GUE␈↓␈α∞and␈α∞type␈α∞␈↓αMAIL␈α∞LES␈↓.)␈α∞Sometimes␈α∞you␈α
may
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    7␈↓


␈↓≡nd␈α
the␈αsystem␈α
is␈αin␈α
␈↓↓maintenance␈αmode,␈↓␈α
which␈αmeans␈α
that␈αthe␈α
monitor␈αis␈α
being␈αdebugged␈α
and␈αthe
␈↓system␈αis␈αnot␈α
available␈αfor␈αnormal␈α
use.␈α If␈αyou␈α
try␈αto␈αlog␈α
in␈αat␈αsuch␈α
a␈αtime␈αyou␈α
will␈αbe␈αasked␈αfor␈α
the
␈↓maintenance password.


␈↓------

␈↓∧Change the reference to ␈↓APE␈↓∧ on page 32 (section 5.1, LOGIN) to ␈↓NS␈↓∧.


␈↓------

␈↓∧Add the following at the end of the LOGOUT description (page 33, section 5.2):

␈↓Any␈αof␈αthese␈αcommands,␈αwhen␈αtyped␈αat␈αa␈αPTY␈αwhich␈αis␈αnot␈αowned␈αby␈αa␈αTELNET␈αserver␈α(that␈αis,
␈↓not␈α⊂the␈α⊃virtual␈α⊂terminal␈α⊃of␈α⊂an␈α⊂ARPA␈α⊃network␈α⊂user),␈α⊃simply␈α⊂kills␈α⊂the␈α⊃job␈α⊂without␈α⊃running␈α⊂the
␈↓LOGOUT program.  This has approximately the e≥ect of KJOB/F.


␈↓------

␈↓∧Add the following to the table of E commands on page 33 (section 5.3):

␈↓β␈↓ ↓xREAD␈↓ βλedit with E in book mode

␈↓∧Also, the second line of the table of compile-type RPG commands should be:

␈↓β␈↓ ↓xLOAD␈↓ βλcompile and load programs


␈↓------

␈↓∧Delete␈α
␈↓αHELP␈↓∧␈α
from␈α
the␈α
list␈α
of␈α
COPY␈α∞commands.␈α
 (There␈α
is␈α
now␈α
a␈α
separate␈α
HELP␈α∞program␈α
for
␈↓∧this command.)


␈↓------

␈↓∧Add this to the table of MAIL commands on page 35 (section 5.5):

␈↓β␈↓ ↓xPLAN␈↓ βλcreate plan file for FINGER (see page 40)


␈↓------

␈↓∧In␈αthe␈αtable␈α
of␈αspecial␈αcharacters␈α
for␈αDO␈α(section␈α5.7,␈α
page␈α36),␈αthe␈α
description␈αof␈α?␈α
should␈αsay
␈↓∧``␈↓αDO types out "A=    " and waits␈↓∧...'' rather than ␈↓α?A␈↓∧.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    8␈↓



␈↓------

␈↓∧Add the following paragraph to the WHO command writeup (section 5.9, page 38):

␈↓From␈αa␈αnon-display␈αterminal␈αonly,␈αthe␈αcommand␈α␈↓αWHO/Q␈↓␈αwill␈αtype␈αonly␈αPPN␈αand␈αTTY␈αfor␈αeach␈αjob
␈↓which␈α∂is␈α∂not␈α⊂detached.␈α∂ ARPA␈α∂network␈α⊂users␈α∂are␈α∂listed␈α∂separately.␈α⊂ This␈α∂is␈α∂intended␈α⊂for␈α∂Quick
␈↓typeout.


␈↓------

␈↓∧Add the following to the description of FINGER on page 40 (section 5.11):

␈↓If␈α
the␈α
programmer␈α
speci≡ed␈α
as␈α
the␈α
argument␈α
to␈α
FINGER␈α
is␈α
not␈α
logged␈α
in,␈α
the␈α
program␈α
types␈αthe
␈↓date␈α∞and␈α∂time␈α∞of␈α∞his␈α∂last␈α∞logout.␈α∞ Also,␈α∂if␈α∞he␈α∞has␈α∂created␈α∞a␈α∞plan␈α∂≡le␈α∞(with␈α∞the␈α∂PLAN␈α∞command,
␈↓Appendix␈α∪4)␈α∪it␈α∪is␈α∀typed.␈α∪ FINGER␈α∪will␈α∪accept␈α∪human␈α∀being␈α∪names␈α∪as␈α∪argument␈α∀instead␈α∪of
␈↓programmer names, if desired.


␈↓------

␈↓∧Replace the description of HELP on page 40 (section 5.11) with

␈↓The␈α∞HELP␈α∞command␈α∞provides␈α∞information␈α∞about␈α∞system␈α∞programs␈α∞and␈α∞facilities.␈α∞ It␈α∞takes␈α∂as␈α∞its
␈↓argument␈α⊃the␈α⊂name␈α⊃of␈α⊂some␈α⊃program␈α⊃or␈α⊂concept,␈α⊃and␈α⊂provides␈α⊃some␈α⊂short␈α⊃description␈α⊃of␈α⊂that
␈↓facility,␈αif␈αsuch␈αa␈αdescription␈α
exists.␈α The␈αdata␈αfor␈αHELP␈α
comes␈αfrom␈αthe␈α[3,2]␈αdirectory;␈α
this␈αdata
␈↓consists␈α∂mostly␈α∂of␈α∂short␈α∂text␈α∂≡les␈α∂which␈α∂are␈α∞typed␈α∂by␈α∂HELP,␈α∂but␈α∂may␈α∂also␈α∂include␈α∂programs␈α∞or
␈↓monitor␈αcommands␈αwhich␈αHELP␈αwill␈αrun␈αfor␈αyou.␈α If␈αno␈αHELP␈αis␈αavailable,␈αbut␈αthere␈αis␈αa␈αlonger
␈↓document␈α
available␈αin␈α
one␈α
of␈αthe␈α
standard␈α
documentation␈α≡le␈α
directories,␈α
HELP␈αwill␈α
so␈αinform␈α
you.
␈↓If␈αyou␈α
type␈α␈↓αHELP␈↓␈αwith␈α
no␈αargument,␈αthe␈α
program␈αwill␈αlist␈α
the␈αtopics␈αon␈α
which␈αHELP␈α
is␈αavailable.
␈↓(Some␈αof␈α
the␈αHELPers␈αwhich␈α
run␈αprograms␈αrather␈α
than␈αjust␈αtyping␈α
text␈αat␈αyou␈α
require␈αthat␈αyou␈α
be
␈↓logged in. ␈↓αHELP LOGIN␈↓ is cleverly not among those.)


␈↓------

␈↓∧Replace the description of SYSTAT on page 40 (section 5.11) with

␈↓The␈αSYSTAT␈αcommand␈αruns␈αthe␈αWHO␈αprogram␈α(see␈αsection␈α5.9).␈α The␈αold␈αSYSTAT␈αprogram␈αis
␈↓no␈α∞longer␈α∞supported␈α∞on␈α∂this␈α∞system,␈α∞but␈α∞the␈α∞command␈α∂name␈α∞was␈α∞retained␈α∞for␈α∂compatibility␈α∞with
␈↓other systems.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1    9␈↓



␈↓------

␈↓∧Delete␈αthe␈αsentence␈αbeginning␈α``␈↓If␈αyou␈αend␈αthe␈αcommand␈αline␈αwith␈αALT␈α...␈↓∧''␈αin␈αthe␈αdescription␈αof
␈↓∧the␈αTELNET␈αcommand␈αon␈αpage␈α41␈α(section␈α5.12).␈α The␈αe≥ect␈αformerly␈αachieved␈αby␈αALT␈αis␈αnow
␈↓∧used␈α⊗automatically␈α∃in␈α⊗all␈α∃cases.␈α⊗ Also,␈α⊗add␈α∃the␈α⊗following␈α∃paragraph␈α⊗after␈α⊗the␈α∃TELNET
␈↓∧description:

␈↓It␈α∃is␈α⊗possible␈α∃to␈α∃establish␈α⊗TELNET-like␈α∃connections␈α∃to␈α⊗remote␈α∃computers␈α∃by␈α⊗using␈α∃dial-up
␈↓connections␈α∂via␈α∂the␈α∂dataphones␈α∞normally␈α∂used␈α∂for␈α∂incoming␈α∞dial-up␈α∂lines.␈α∂ Such␈α∂dataphones␈α∞are
␈↓presently␈α∂associated␈α∂with␈α∂TTY10␈α∂and␈α∂TTY11;␈α∂the␈α∂dataphone␈α∂on␈α∂TTY11␈α∂includes␈α∂an␈α∂automatic
␈↓dialing␈α∃circuit.␈α∃ The␈α⊗DIAL␈α∃command␈α∃will␈α∃establish␈α⊗an␈α∃outgoing␈α∃dataphone␈α⊗connection␈α∃and
␈↓thereafter␈α∂behave␈α∂like␈α∂a␈α∂TELNET.␈α∂ The␈α∂dial␈α∞command␈α∂takes␈α∂as␈α∂its␈α∂argument␈α∂either␈α∂the␈α∞device
␈↓name␈α∞of␈α∞a␈α∞TTY,␈α∞in␈α∞which␈α∞case␈α∞you␈α
must␈α∞dial␈α∞the␈α∞number␈α∞you␈α∞want␈α∞manually␈α∞on␈α∞the␈α
associated
␈↓dataphone, or a telephone number in the form

␈↓α{(ddd)}ddd{-}dddd

␈↓where␈α␈↓αd␈↓␈αrepresents␈αa␈αdigit␈αand␈αbraces␈αenclose␈αoptional␈αcharacters.␈α In␈αthe␈αlatter␈αcase,␈αthe␈αtelephone
␈↓number is dialed automatically on TTY11's dataphone.


␈↓------

␈↓∧Add the following to the end of page 41 (section 5.12):

␈↓The␈αNS␈αcommand␈αruns␈αthe␈αNews␈αService␈αprogram,␈αwhich␈αallows␈αaccess␈αto␈αnews␈αstories␈αwhich␈αhave
␈↓been␈αreceived␈αfrom␈αthe␈αAssociated␈αPress␈αnews␈αwire.␈α The␈αHOT␈αcommand␈αruns␈αthe␈αHOT␈αprogram,
␈↓which␈α⊂types␈α⊂A.P.␈α⊂stories␈α⊂as␈α⊂they␈α⊂come␈α⊂in.␈α∂ These␈α⊂commands␈α⊂are␈α⊂restricted␈α⊂to␈α⊂local␈α⊂users␈α⊂at␈α∂the
␈↓request␈α∂of␈α∂the␈α∂Associated␈α∂Press.␈α∞ Full␈α∂documentation␈α∂on␈α∂the␈α∂A.P.␈α∞service␈α∂is␈α∂contained␈α∂in␈α∂the␈α∞≡le
␈↓NS.ME[S,DOC].

␈↓The␈α
UDPUFD␈α
command␈α
runs␈α∞the␈α
UDPUFD␈α
program,␈α
which␈α
is␈α∞used␈α
to␈α
create␈α
or␈α
delete␈α∞user␈α
≡le
␈↓directories␈αon␈α≡le-structured␈αuser␈αdisk␈αpacks.␈α The␈αcommand␈αformat␈αis␈α␈↓αUDPUFD␈αPRJ,PRG␈↓␈α
(you␈αmust
␈↓≡rst␈αASSIGN␈αthe␈αUDP).␈α To␈αcreate␈αa␈αnew␈αdirectory,␈αyou␈αmust␈αknow␈αthe␈αpack␈αpassword;␈αto␈αchange
␈↓or␈αdelete␈αa␈αdirectory␈αyou␈αmust␈αknow␈αits␈αpassword.␈α You␈αcan␈αchange␈αthe␈αdirectory's␈αpassword␈αor␈α≡le
␈↓protection␈α
codes␈α
with␈α∞UDPUFD␈α
as␈α
you␈α
can␈α∞for␈α
the␈α
main␈α
≡le␈α∞disk␈α
with␈α
LOGIN␈α
(see␈α∞Section␈α
5.1).
␈↓You␈αcan␈αdelete␈αa␈αdirectory␈αonly␈αif␈αit␈αis␈αempty.␈α This␈αis␈αa␈αprivileged␈αprogram,␈αand␈αthe␈α
command␈αis
␈↓restricted to local users (as is the UDP itself).
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    10␈↓



␈↓------

␈↓∧Add the following to section 6, page 42:

␈↓Privileges␈α
can␈α
be␈α
enabled␈αor␈α
disabled␈α
at␈α
any␈αtime.␈α
 That␈α
is,␈α
for␈αeach␈α
job,␈α
the␈α
monitor␈αremembers
␈↓the␈α⊂privileges␈α⊂to␈α⊂which␈α⊂the␈α⊂job␈α⊂is␈α⊂entitled␈α⊂as␈α⊂well␈α⊂as␈α⊂the␈α⊂ones␈α⊂which␈α⊂are␈α⊂presently␈α⊃active.␈α⊂ All
␈↓privileges␈αto␈αwhich␈αyou␈αare␈αentitled␈αare␈αnormally␈α
activated␈αwhen␈αyou␈αlog␈αin,␈αbut␈αyou␈αmay␈αchoose␈α
to
␈↓disable␈α
any␈αor␈α
all␈αfor␈α
safety␈αreasons.␈α
 The␈α
ENABLE␈αand␈α
DISABLE␈αcommands,␈α
with␈αno␈α
arguments,
␈↓turn␈α
on␈α
or␈α
o≥␈αall␈α
privileges␈α
to␈α
which␈α
you␈αare␈α
entitled.␈α
These␈α
commands␈αmay␈α
also␈α
be␈α
used␈α
with␈αa
␈↓privilege␈αname␈αas␈αargument,␈αto␈αenable␈αor␈αdisable␈αspeci≡c␈αprivileges.␈α If␈αyou␈αhave␈αthe␈αPRI␈α
privilege,
␈↓you␈α∞can␈α∞enable␈α
speci≡c␈α∞privileges␈α∞to␈α∞which␈α
you␈α∞are␈α∞not␈α∞entitled,␈α
except␈α∞that␈α∞privileges␈α∞which␈α
are
␈↓intended␈α
only␈α
for␈αspeci≡c␈α
programs␈α
(XGP␈αfont␈α
compiler,␈α
service␈αlevel␈α
monitor)␈α
cannot␈α
be␈αenabled
␈↓by any user.

␈↓Also,␈α
a␈α
few␈αsystem␈α
programs␈α
intended␈αfor␈α
general␈α
use␈α
require␈αspecial␈α
privileges.␈α
 Such␈αprograms␈α
are
␈↓run␈α⊂by␈α⊂special␈α⊂commands␈α⊂(not␈α⊂R␈α⊂or␈α⊂RUN),␈α⊂and␈α⊂any␈α⊂attempt␈α⊂to␈α⊂modify␈α⊂your␈α⊂core␈α⊂image␈α∂while
␈↓running such a program will disable the temporary privileges involved.


␈↓------

␈↓∧In␈αthe␈αdescription␈αof␈αthe␈αCETV␈αand␈αETV␈αcommands␈αon␈αpage␈α44␈α(appendix␈α1),␈αin␈αthe␈α
last␈αline
␈↓∧of␈αthe␈αparagraph␈αnumbered␈α1,␈αthe␈αword␈α``␈↓of␈↓∧''␈αshould␈αbe␈α``␈↓if␈↓∧''.␈α Also,␈αdelete␈αthe␈αlast␈αsentence␈αin␈αthe
␈↓∧last␈α∀paragraph␈α∀on␈α∃that␈α∀page,␈α∀numbered␈α∃3.␈α∀ (TMPCOR␈α∀≡les␈α∀for␈α∃each␈α∀job␈α∀are␈α∃now␈α∀saved
␈↓∧separately for each alias used by that job.) Add the following paragraph at the end of the page:

␈↓READ

␈↓The␈αREAD␈αcommand␈αstarts␈α
E␈αin␈αa␈αspecial␈α
mode,␈αcalled␈α␈↓↓book␈αmode,␈↓␈αused␈α
to␈αread␈αlong␈α≡les␈α
over␈αan
␈↓extended␈α⊂time␈α⊂period.␈α∂ In␈α⊂this␈α⊂mode,␈α⊂E␈α∂does␈α⊂several␈α⊂things␈α∂di≥erently␈α⊂from␈α⊂the␈α⊂normal␈α∂editing
␈↓procedure:

␈↓1.␈α
 If␈α
there␈α
is␈α
a␈α
≡le␈α
with␈α
the␈α
name␈α
in␈α
the␈α
READ␈α
command,␈α
extension␈α
BKP,␈α
and␈α
PPN␈αmatching␈α
that
␈↓given␈αin␈αthe␈αcommand,␈αyour␈αALIAS␈αPPN,␈αor␈αyour␈αlogin␈αPPN␈α(tried␈αin␈αthat␈αorder),␈αit␈αis␈αused␈αas␈αan
␈↓RPG␈α≡le␈α
to␈αdetermine␈αwhere␈α
to␈αstart␈α
editing␈αthe␈αspeci≡ed␈α
≡le.␈α This␈α``bookmark''␈α
≡le␈αis␈α
not␈αdeleted
␈↓by␈αLOGOUT,␈αso␈αyou␈αcan␈αcontinue␈αreading␈αat␈αa␈αlater␈αsession.␈α The␈α≡le,␈αif␈αfound,␈αis␈αupdated␈αwhen
␈↓you exit from E; if there was no BKP ≡le, one is created on your (alias) area when you exit.

␈↓2.␈α⊃ A␈α⊃READ␈α⊃command␈α⊃with␈α⊃no␈α⊃argument␈α∩uses␈α⊃RPG␈α⊃(TMPCOR)␈α⊃≡les␈α⊃as␈α⊃ETV␈α⊃does,␈α∩but␈α⊃the
␈↓≡lename␈αused␈αis␈αdi≥erent,␈α
so␈αyou␈αcan␈αalternate␈αETV␈α
and␈αREAD␈αcommands␈αfor␈αdi≥erent␈α
≡les␈αwith
␈↓no confusion.

␈↓3.  E does not allow you to modify the ≡le when using book mode.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    11␈↓



␈↓------

␈↓∧Insert the following entry in the table of ``≡lehack selectors'' on page 58 (appendix 2, COPY):

␈↓β␈↓ ↓xPLAN␈↓ βλ<pn>.PLN[2,2]␈↓ ¬HCurrent user's PLAN file


␈↓------

␈↓∧In the paragraph about page lists on page 58 (appendix 2, COPY), add this:

␈↓An␈αasterisk␈α
(␈↓α*␈↓)␈αmay␈αbe␈α
used␈αin␈αa␈α
page␈αlist␈αinstead␈α
of␈αthe␈α≡nal␈α
page␈αnumber,␈αto␈α
denote␈αthe␈αlast␈α
page,
␈↓e.g., ␈↓αLIST COPY(3:*)␈↓ would list all but the ≡rst two pages of the ≡le COPY.


␈↓------

␈↓∧Insert this sentence in the paragraph about DECtapes on page 59 (appendix 2, COPY):

␈↓The total ≡le capacity of a DECtape is about 71.4K words.


␈↓------

␈↓∧Insert the following on page 60 (appendix 2, COPY), before the ``Switches'' section:

␈↓Spooling pseudo-devices:

␈↓COPY␈α∞recognizes␈α∞two␈α
pseudo-device␈α∞names,␈α∞TPL:␈α∞and␈α
PGX:,␈α∞to␈α∞allow␈α
spooling␈α∞of␈α∞the␈α∞output␈α
of
␈↓some␈α
copy␈α∞function␈α
to␈α∞the␈α
LPT␈α∞or␈α
XGP,␈α
respectively.␈α∞ These␈α
device␈α∞names␈α
may␈α∞be␈α
used␈α∞only␈α
in
␈↓output␈α∩terms,␈α⊃and␈α∩may␈α⊃not␈α∩be␈α⊃used␈α∩with␈α⊃≡le␈α∩names.␈α⊃ COPY␈α∩creates␈α⊃a␈α∩≡le␈α⊃on␈α∩the␈α⊃[SPL,SYS]
␈↓directory␈α
containing␈α
the␈α
desired␈α∞output,␈α
and␈α
enters␈α
a␈α∞spooling␈α
request␈α
for␈α
the␈α∞appropriate␈α
device.
␈↓The␈α∪≡le␈α∪is␈α∪deleted␈α∪after␈α∪spooling.␈α∪ For␈α∪a␈α∪standard␈α∪COPY␈α∪command,␈α∪the␈α∪e≥ect␈α∀is␈α∪essentially
␈↓equivalent␈α⊃to␈α⊃the␈α∩recommended␈α⊃SPOOL/RECOPY␈α⊃(see␈α⊃page␈α∩66);␈α⊃the␈α⊃main␈α⊃advantage␈α∩of␈α⊃this
␈↓capability is for direct spooling of list terms, e.g.,

␈↓αDIRECT TPL:←[*,SYS]

␈↓to␈α∞spool␈α∞a␈α∞list␈α∞of␈α
the␈α∞[*,SYS]␈α∞≡le␈α∞directories.␈α∞ (Note:␈α
It␈α∞is␈α∞claimed␈α∞that␈α∞these␈α∞pseudo-device␈α
names
␈↓stand for The Pseudo Lpt and Pseudo Graphic Xerox-machine respectively.)
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    12␈↓



␈↓------

␈↓∧In the list of COPY switches (page 61, appendix 2), add this entry:

␈↓β␈↓ ↓xNOSPACES␈↓ βhNOS␈↓ ∧8This switch eliminates spaces at the end of a line.

␈↓∧Also, on page 62, add ␈↓α/REFERENCE␈↓∧ and change the abbreviation for ␈↓α/RENAME␈↓∧ as follows:

␈↓β␈↓ ↓xREFERENCE␈↓ βhREF␈↓ ∧8This␈αswitch␈αis␈αlike␈α/SEARCH␈αbelow,␈αbut␈αincludes␈αin␈αthe␈αdirectory␈αlisting
␈↓β␈↓ ∧8an␈α⊂extra␈α⊂column␈α⊂containing␈α⊂the␈α⊂date␈α⊂on␈α⊂which␈α⊂each␈α⊂file␈α⊂was␈α⊂last␈α⊂read
␈↓β␈↓ ∧8(referenced by LOOKUP).
␈↓β␈↓ ↓xRENAME␈↓ βhREN␈↓ ∧8A␈α⊂rename␈α⊂is␈α⊂done␈α⊂on␈α⊂the␈α⊂input␈α⊂file␈α⊂with␈α⊂the␈α⊂output␈α⊂file␈α⊂information.
␈↓β␈↓ ∧8/QUIET applies when the output filnam.ext already exists.


␈↓------

␈↓∧Remove ␈↓αHELP␈↓∧ from the list of monitor commands which run COPY (page 63, appendix 2).


␈↓------

␈↓∧In the table of spooler switches (page 66, appendix 3), the entry for ␈↓α/REPEAT␈↓∧ should be

␈↓β␈↓ ↓xREPEAT=n␈↓ β8Make n copies of the listing.  (REPEAT is NOT sticky,
␈↓β␈↓ ↓x␈↓ β8and is not allowed in XSPOOL.)


␈↓------

␈↓∧Insert the following on page 66 (appendix 3, SPOOL), before the ``Delayed Listing'' section:

␈↓File␈α
speci≡cations␈α
may␈α
be␈α
read␈αfrom␈α
an␈α
auxiliary␈α
≡le␈α
by␈α
including␈αin␈α
the␈α
command␈α
line␈α
the␈αname␈α
of
␈↓the auxiliary ≡le preceded by ␈↓α@␈↓. This ≡le may include ≡le names and switches.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    13␈↓



␈↓------

␈↓∧Add the following to the table of XSPOOL switches, page 68:

␈↓β␈↓ ↓xNOXGP␈↓ βλOpposite of /XGP.
␈↓β␈↓ ↓xNTNODE=n␈↓ βλSets the number of text nodes allocated by the monitor (see below).
␈↓β␈↓ ↓xNVNODE=n␈↓ βλSets the number of vector nodes allocated.

␈↓∧Also add the following at the end of page 68:

␈↓␈↓↓Text␈αnodes␈↓␈αand␈α␈↓↓vector␈αnodes␈↓␈αare␈αunits␈αof␈αcore␈αstorage␈αallocation␈αused␈αby␈αthe␈αmonitor's␈αXGP␈αservice
␈↓routines.␈α
 Generally,␈α
you␈α
need␈α
not␈α
worry␈α
about␈α
them,␈α
but␈α
if␈α
you␈α
have␈α
trouble␈α
printing␈α
a␈αcomplex
␈↓document the allocation control switches may be able to help you.  See a system wizard to ≡nd out.

␈↓The␈α∞␈↓α/XGP␈↓␈α∞switch,␈α∞when␈α∞present,␈α∞turns␈α∞o≥␈α∞the␈α∞usual␈α∞default␈α∞assumptions␈α∞about␈α∞other␈α∞switches;␈α∞in
␈↓particular,␈α⊂␈↓α/HEADING␈↓␈α⊂is␈α∂not␈α⊂assumed␈α⊂unless␈α⊂it␈α∂is␈α⊂explicitly␈α⊂used.␈α∂ Spooling␈α⊂a␈α⊂≡le␈α⊂with␈α∂extension
␈↓.XGP implies a default of ␈↓α/NONUMBER␈↓ as well as ␈↓α/XGP␈↓.


␈↓------

␈↓∧Add␈αthe␈αfollowing␈αparagraphs␈αto␈αthe␈αQSPOOL␈αand␈αUNSPOOL␈αdescriptions␈α(page␈α69,␈αappendix
␈↓∧3):

␈↓The commands ␈↓αQSPOOL/LPT␈↓ and ␈↓αQSPOOL/XGP␈↓ will list spool requests only for the indicated device.

␈↓The␈α∂commands␈α⊂␈↓αUNSPOOL/LPT␈↓␈α∂and␈α∂␈↓αUNSPOOL/XGP␈↓␈α⊂will␈α∂list␈α⊂and␈α∂delete␈α∂spool␈α⊂requests␈α∂only␈α⊂for␈α∂the
␈↓indicated␈α⊂device.␈α⊂ Also,␈α⊂if␈α⊂you␈α⊂run␈α⊂UNSPOOL␈α⊂and␈α⊂give␈α⊂the␈α⊂monitor␈α⊂REENTER␈α⊂command,␈α∂it
␈↓allows you the extended capabilities described above for the SPL,SYS user.


␈↓------

␈↓∧On␈α⊃page␈α⊃70␈α∩(appendix␈α⊃4,␈α⊃MAIL),␈α∩insert␈α⊃the␈α⊃following␈α⊃after␈α∩the␈α⊃description␈α⊃of␈α∩the␈α⊃GRIPE
␈↓∧command.  Also, add PLAN to the subheading on that page.

␈↓A␈α≡nal␈αspecial-purpose␈αcommand␈αis␈αPLAN,␈αwhich␈αcreates␈αa␈α≡le␈αintended␈αto␈αdescribe␈αyour␈αprojected
␈↓whereabouts,␈α⊂travel␈α⊂plans,␈α∂etc.␈α⊂to␈α⊂other␈α∂users␈α⊂who␈α⊂may␈α∂look␈α⊂for␈α⊂you␈α∂while␈α⊂you␈α⊂are␈α⊂away.␈α∂ The
␈↓format is

␈↓αPLAN <message>

␈↓Unlike␈α∪the␈α∩other␈α∪MAIL␈α∩commands,␈α∪PLAN␈α∪creates␈α∩a␈α∪≡le␈α∩containing␈α∪only␈α∩the␈α∪message␈α∪in␈α∩the
␈↓command␈α
rather␈α
than␈α
adding␈α
the␈α
message␈α
to␈α
any␈α
previously␈α
created␈α
messages.␈α
 Also,␈α
if␈α
you␈α
use␈α
a
␈↓null␈αmessage,␈αyour␈αplan␈α≡le␈αis␈αdeleted.␈α The␈αplan␈α≡les␈αare␈αread␈αby␈αthe␈αFINGER␈αprogram␈α(see␈αpage
␈↓40).
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    14␈↓



␈↓------

␈↓∧On␈αpage␈α70␈α(appendix␈α4,␈αMAIL),␈αchange␈αthe␈α≡rst␈αsentence␈αof␈αthe␈αparagraph␈αstarting␈α``␈↓The␈αonly
␈↓switches alowed...␈↓∧'' to

␈↓The switches which can be used with MAIL, SEND, or REMIND are ␈↓α/D␈↓ and ␈↓α/U␈↓.

␈↓∧Also, add this paragraph before the last one beginning on that page:

␈↓The␈α
␈↓α/A␈↓␈α
(append)␈α
switch␈α
can␈α
be␈α
used␈α
with␈αthe␈α
MAIL␈α
command␈α
only.␈α
 It␈α
means␈α
that␈α
the␈αmessage␈α
you
␈↓enter␈αshould␈αbe␈αappended␈αto␈αthe␈αmost␈αrecent␈αearlier␈αmessage␈αfrom␈αyou␈α(i.e.,␈αfrom␈αa␈αuser␈α
with␈αyour
␈↓login␈α∂programmer␈α∂name)␈α∂to␈α∂each␈α∞recipient.␈α∂ If␈α∂there␈α∂is␈α∂no␈α∞such␈α∂message,␈α∂a␈α∂new␈α∂message␈α∂will␈α∞be
␈↓created as if ␈↓α/A␈↓ had not been used.


␈↓------

␈↓∧On␈α
page␈α
71␈α
(appendix␈α
4,␈α
MAIL),␈α
insert␈α
the␈α
following␈α
paragraphs␈α
before␈α
the␈α
one␈α
starting␈α``␈↓For
␈↓the SEND command, ...␈↓∧'':

␈↓The␈α∂MAIL␈α⊂command␈α∂also␈α∂allows␈α⊂the␈α∂use␈α∂of␈α⊂destinations␈α∂at␈α∂foreign␈α⊂ARPA␈α∂network␈α⊂sites.␈α∂ This
␈↓facility is described in detail later in this appendix.

␈↓If␈α
there␈α
is␈α
a␈α
≡le␈α
named␈α
OUTGO.MSG␈α
on␈α
your␈α
(ALIAS)␈α
disk␈α
area,␈α
MAIL␈α
will␈α
save␈α
your␈αmessage␈α
at
␈↓the␈αfront␈αof␈αthat␈α≡le␈αas␈αwell␈αas␈αmailing␈αit␈αto␈αthe␈αspeci≡ed␈αdestinations.␈α The␈αdistribution␈αlist␈αwill␈αbe
␈↓included in this ≡le whether or not you use the /D switch.

␈↓If␈α∞you␈α∞do␈α∞not␈α∞know␈α∞the␈α∞programmer␈α∞name␈α∞for␈α∞a␈α∞user,␈α∞you␈α∞can␈α∞use␈α∞his␈α∞human␈α∞being␈α∂type␈α∞name
␈↓instead␈α(≡rst␈αor␈αlast␈αname).␈α The␈αname␈αwill␈αbe␈αfound␈αin␈αthe␈α≡le␈αof␈αauthorized␈αusers,␈αif␈αit␈αis␈αpresent
␈↓there,␈α
and␈α
you␈α
will␈α
be␈α
told␈α
the␈α
programmer␈α
name␈α
for␈α
that␈α
user␈α
to␈α
encourage␈α
you␈α
to␈α
use␈α
it␈α
in␈α
the
␈↓future␈α∂(it's␈α⊂faster).␈α∂ If␈α⊂there␈α∂is␈α∂more␈α⊂than␈α∂one␈α⊂user␈α∂with␈α⊂the␈α∂name␈α∂you␈α⊂give,␈α∂it␈α⊂tells␈α∂you␈α⊂all␈α∂the
␈↓relevant programmer names and invites you to try again.

␈↓∧Also, replace the following paragraph with this one:

␈↓For␈αthe␈α
SEND␈αcommand,␈α
there␈αare␈α
several␈αspecial␈α
forms␈αof␈α
destination:␈αa␈α
job␈αnumber,␈α
the␈αdevice
␈↓name␈α
of␈α
a␈α
terminal␈α
followed␈α
optionally␈α
by␈α
a␈αcolon,␈α
␈↓α*␈↓␈α
(sends␈α
to␈α
all␈α
logged-in␈α
users),␈α
and␈α␈↓αARPA*␈↓␈α
(sends
␈↓to␈α
all␈αusers␈α
logged␈α
in␈αvia␈α
the␈α
ARPA␈αnetwork).␈α
 Any␈αof␈α
these␈α
special␈αforms,␈α
if␈α
used,␈αmust␈α
be␈αthe␈α
only
␈↓destination speci≡ed.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    15␈↓



␈↓------

␈↓∧On␈α⊂page␈α⊃72␈α⊂(appendix␈α⊃4,␈α⊂MAIL),␈α⊃replace␈α⊂the␈α⊃paragraph␈α⊂starting␈α⊃``␈↓The␈α⊂check␈α⊃for␈α⊂a␈α⊃≡le...␈↓∧''␈α⊂as
␈↓∧follows:

␈↓The␈α∂check␈α∂for␈α∂a␈α∞≡le␈α∂directory␈α∂for␈α∂the␈α∞speci≡ed␈α∂user(s)␈α∂is␈α∂made␈α∞before␈α∂the␈α∂program␈α∂asks␈α∂for␈α∞the
␈↓message␈α⊂if␈α⊂the␈α⊂multi-line␈α⊃option␈α⊂is␈α⊂used.␈α⊂ If␈α⊂there␈α⊃are␈α⊂no␈α⊂valid␈α⊂destinations,␈α⊂the␈α⊃program␈α⊂exits
␈↓without␈αdoing␈αanything␈αelse.␈α If␈αany␈αdestinations␈αare␈αvalid,␈αhowever,␈αthe␈αprogram␈αasks␈αif␈αyou␈αwish
␈↓to␈αcontinue,␈αand␈αif␈αso␈αit␈αcontinues␈αas␈αif␈αonly␈αthe␈αvalid␈αdestinations␈αwere␈αspeci≡ed.␈α (Exception:␈αThe
␈↓list␈α⊂provided␈α⊂by␈α⊂/D␈α⊂includes␈α∂all␈α⊂speci≡ed␈α⊂destinations,␈α⊂valid␈α⊂or␈α∂invalid.) ␈α⊂The␈α⊂special␈α⊂case␈α⊂of␈α∂a
␈↓command␈αlike␈α␈↓αSEND PRJ,PRG␈↓␈α
where␈αwhat␈αis␈αmeant␈α
is␈α␈↓αSEND [PRJ,PRG]␈↓␈αwill␈αbe␈α
caught␈αif␈α␈↓αPRJ␈↓␈αis␈α
not
␈↓the␈αname␈αof␈αa␈αprogrammer,␈αand␈αthe␈α(probable)␈αdesired␈αe≥ect␈αis␈αsimulated␈αwith␈αa␈αwarning␈αmessage
␈↓given.␈α
 Note:␈α
in␈α
the␈α
case␈α
of␈α
SEND,␈α
you␈α
will␈α
be␈α
warned␈α
if␈α
a␈α
destination␈α
user␈α
is␈α
not␈α
logged␈α
in.␈α
 Unlike
␈↓the␈αmessage␈αfor␈αan␈αinvalid␈αdestination,␈αthis␈αwarning␈αdoes␈αnot␈αrequire␈αyou␈αto␈αrecon≡rm␈αyour␈αdesire
␈↓to␈α∀continue.␈α∪After␈α∀you␈α∪≡nish␈α∀typing␈α∪in␈α∀the␈α∪message,␈α∀you␈α∪are␈α∀again␈α∪noti≡ed␈α∀of␈α∪not-logged-in
␈↓destinations as described earlier.


␈↓------

␈↓∧On page 74 (appendix 4, MAIL), add this to the paragraph after the table of time formats:

␈↓A␈αtime␈αwithout␈αa␈αdate␈αmay␈αbe␈αfollowed␈αby␈αan␈αasterisk␈α(␈↓α*␈↓),␈αin␈αwhich␈αcase␈αthe␈αreminder␈αwill␈αbe␈αsent
␈↓every day at the time speci≡ed.


␈↓------

␈↓∧On␈α
page␈α74␈α
(appendix␈α4,␈α
MAIL),␈αin␈α
the␈αparagraph␈α
starting␈α``␈↓The␈α
optional␈αcount␈α
≡eld...␈↓∧''␈αreplace
␈↓∧``␈↓#∞␈↓∧'' with ``␈↓#␈↓α∞␈↓∧''.


␈↓------

␈↓∧Add␈α∀the␈α∀following␈α∀paragraph␈α∀above␈α∀the␈α∪last␈α∀paragraph␈α∀on␈α∀page␈α∀74␈α∀(appendix␈α∀4,␈α∪MAIL,
␈↓∧description of REMIND command):

␈↓Since␈α
the␈αstructure␈α
of␈αthe␈α
reminder␈α
queue␈αis␈α
rather␈αsensitive␈α
to␈α
incorrect␈αdate␈α
and␈αtime␈α
information,
␈↓the␈α⊂current␈α∂date␈α⊂and␈α⊂time␈α∂according␈α⊂to␈α⊂the␈α∂monitor␈α⊂are␈α⊂checked␈α∂for␈α⊂reasonableness␈α⊂against␈α∂the
␈↓reminder␈α≡le.␈α
 If␈αthey␈αare␈α
considered␈αunreasonable,␈αno␈α
reminders␈αwill␈αbe␈α
accepted␈αor␈αdelivered␈α
until
␈↓the␈α
system␈αhas␈α
been␈αup␈α
for␈αat␈α
least␈α≡ve␈α
minutes.␈α
 (Hopefully␈αby␈α
then␈αan␈α
incorrect␈αdate␈α
or␈αtime␈α
entry
␈↓will have been noticed and corrected.)
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    16␈↓



␈↓------

␈↓∧Add␈α∩the␈α∪following␈α∩new␈α∪section␈α∩before␈α∪the␈α∩description␈α∩of␈α∪the␈α∩RCV␈α∪command␈α∩on␈α∪page␈α∩75
␈↓∧(appendix 4).

␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈ααMAIL to ARPA network hosts

␈↓The␈αMAIL␈αcommand␈αallows␈αmail␈α
to␈αbe␈αsent␈αto␈αusers␈αat␈α
other␈αARPA␈αnetwork␈αsites.␈α (This␈αservice␈α
is
␈↓not available to network guests, sorry.)

␈↓Since␈α⊃the␈α⊃``@''␈α⊃character␈α⊃was␈α⊃already␈α⊃used␈α⊃in␈α⊃MAIL␈α⊃to␈α⊃specify␈α⊃a␈α⊃≡le␈α⊃to␈α⊃be␈α⊃read␈α∩for␈α⊃command
␈↓arguments,␈α
the␈α
character␈α
``%''␈α
is␈α
used␈α
to␈αsignify␈α
ARPA␈α
site␈α
names,␈α
e.g.,␈α
␈↓αBH%SU-AI␈↓␈α
not␈α␈↓αBH@SU-AI␈↓.␈α
 Site
␈↓names␈α
can␈α
follow␈αa␈α
user␈α
name,␈αas␈α
above,␈α
or␈αcan␈α
be␈α
used␈αalone␈α
(followed␈α
by␈αa␈α
space)␈α
as␈α
a␈α``sticky''
␈↓site:

␈↓αMAIL %MIT-AI RG,TK,MINSKY,BH%SAIL,PAPERT

␈↓will␈αsend␈αthe␈αmessage␈αto␈αRG,␈αTK,␈αMINSKY,␈αand␈αPAPERT␈αat␈αMIT-AI,␈αand␈αto␈αBH␈αat␈αSAIL.␈α (Of
␈↓course, if SAIL is used as the site name the mail is not actually sent through the network!)

␈↓User␈α∞names␈α∞for␈α∞foreign␈α∞hosts␈α∞can␈α∞be␈α∞of␈α∂(essentially)␈α∞arbitrary␈α∞length.␈α∞ If␈α∞the␈α∞name␈α∞is␈α∞a␈α∂string␈α∞of
␈↓letters␈α∩and␈α∩digits␈α∩starting␈α∩with␈α∩a␈α∩letter,␈α∩it␈α⊃can␈α∩simply␈α∩be␈α∩typed␈α∩as␈α∩is:␈α∩␈↓αTEITELMAN␈α∩%␈α∩MAXC␈↓␈α⊃for
␈↓example.␈α (The␈αcase␈αof␈αletters␈αis␈αpreserved,␈αin␈αcase␈αit␈αmatters␈αto␈αthe␈αforeign␈αhost.)␈αIf␈αthe␈αuser␈αname
␈↓contains␈αcharacters␈αother␈αthan␈αletters␈αand␈αdigits,␈αor␈αstarts␈αwith␈αa␈αdigit,␈αenclose␈αit␈αin␈αquotes␈α(␈↓α"␈↓)␈αwith
␈↓two␈αquotes␈αused␈α
to␈αrepresent␈αa␈α
single␈αquote␈αif␈α
necessary.␈α The␈αhost␈α
name␈αcannot␈αcontain␈αany␈α
special
␈↓characters␈α∪except␈α∪hyphen.␈α∀ Partial␈α∪site␈α∪names␈α∀are␈α∪recognized␈α∪as␈α∀in␈α∪our␈α∪TELNET␈α∀and␈α∪FTP
␈↓programs.  Also, a decimal number may be used instead of a host name if necessary.

␈↓If␈α∞the␈α∞destination␈α∞list␈α∞in␈α∞a␈α∞MAIL␈α∂command␈α∞includes␈α∞PPNs␈α∞at␈α∞SAIL␈α∞(which␈α∞must␈α∞be␈α∂enclosed␈α∞in
␈↓square brackets), SAIL is assumed as the destination host and should not be speci≡ed explicitly, e.g.,

␈↓αMAIL %AI [1,BH],TK

␈↓mails to TK at MIT-AI and [1,BH] at SAIL.  To mail to a PPN somewhere else, you must say, e.g.:

␈↓αMAIL "[N900AR00]"%CMU

␈↓The␈α∞outcome␈α∞of␈α∞an␈α∞attempt␈α∞to␈α∞send␈α∞network␈α∞mail␈α∞is␈α∞reported␈α∞to␈α∞you,␈α∞in␈α∞a␈α∞format␈α∂somewhat␈α∞like
␈↓SNDMSG in TENEX.  The possible outcomes are

␈↓αUSER at SITE -- ok
␈↓αUSER at SITE -- refused
␈↓αUSER at SITE -- queued
␈↓αUSER at SITE -- failed

␈↓The␈α⊂≡rst␈α⊃case␈α⊂means␈α⊃that␈α⊂the␈α⊂mail␈α⊃was␈α⊂successfully␈α⊃sent.␈α⊂ The␈α⊂second␈α⊃means␈α⊂that␈α⊃the␈α⊂network
␈↓connection␈α
was␈α
made␈α
successfully␈α
but␈α
the␈α
MAIL␈α
command␈α
was␈α
rejected,␈α
possibly␈α
because␈α
there␈α
is␈α
no
␈↓such user at that host.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    17␈↓


␈↓Network␈α
mail␈α
will␈α
be␈α
queued␈αif␈α
it␈α
cannot␈α
be␈α
sent␈α
when␈αyou␈α
make␈α
the␈α
request␈α
(remote␈α
host␈αdown,
␈↓etc.)␈αThe␈αmail␈αis␈αqueued␈αvia␈αthe␈αREMIND␈αphantom.␈α The␈αstatus␈αreport␈αfrom␈αthe␈αMAIL␈αcommand
␈↓is␈α∀``queued''.␈α∀ The␈α∀mail␈α∪will␈α∀be␈α∀retried␈α∀at␈α∪three-hour␈α∀intervals␈α∀for␈α∀three␈α∪days.␈α∀ If␈α∀it␈α∀is␈α∪sent
␈↓successfully,␈αor␈αif␈αthe␈αthree␈αdays␈αrun␈αout␈αand␈αthe␈αrequest␈αis␈αdeleted,␈αyou␈αwill␈αreceive␈αa␈αstatus␈αreport
␈↓from the REMIND phantom, in the form of a reminder from yourself saying

␈↓αARPA network mail to USER at SITE -- ok

␈↓if successful, or

␈↓αARPA network mail to USER at SITE -- expired

␈↓if␈αnot.␈α The␈αdate␈αand␈αtime␈αin␈αthe␈αheader␈αof␈αthis␈αstatus␈αreport␈αwill␈αbe␈αthe␈αtime␈αwhen␈αthe␈αmessage␈αis
␈↓actually␈αsent␈αsuccessfully␈α(or␈αdeleted).␈α The␈αdate␈αand␈αtime␈αin␈αthe␈αheader␈αof␈αthe␈αmessage␈αsent␈αto␈αthe
␈↓remote site is the time when you originally tried to send the message.

␈↓It is also possible to get a status report saying

␈↓αARPA network mail to USER at SITE -- refused

␈↓if␈αthe␈αconnection␈αto␈αthe␈αremote␈αhost␈αis␈αmade␈αbut␈αthe␈αhost␈αrefuses␈αthe␈αmail.␈α This␈αstatus␈αreport␈αwill
␈↓also include any error message returned to us by the remote host.

␈↓If␈αa␈αmessage␈αwhich␈αwas␈αtyped␈αin␈α(i.e.,␈αnot␈αfrom␈αa␈α@FILE␈αconstruction)␈αreturns␈αeither␈αa␈αqueued␈αor␈αa
␈↓failed␈α
response,␈α
the␈α∞text␈α
of␈α
the␈α
message␈α∞is␈α
saved␈α
in␈α
a␈α∞≡le␈α
FAILED.TXT␈α
in␈α
your␈α∞(alias)␈α
directory.
␈↓This␈α⊃should␈α⊃not␈α⊃be␈α∩necessary␈α⊃for␈α⊃queued␈α⊃mail,␈α⊃which␈α∩will␈α⊃eventually␈α⊃be␈α⊃sent␈α∩automatically␈α⊃if
␈↓possible,␈α∞but␈α∞is␈α
necessary␈α∞for␈α∞failed␈α
and␈α∞reassuring␈α∞for␈α
queued.␈α∞ The␈α∞≡le␈α
contains␈α∞the␈α∞message␈α
as
␈↓typed,␈α
i.e.,␈α
no␈α
header␈α
of␈α
either␈α
internal␈α
or␈αexternal␈α
format,␈α
and␈α
no␈α
space␈α
added␈α
in␈α
front␈α
of␈αeach␈α
line.
␈↓If␈αthe␈α≡le␈αcannot␈αbe␈α
entered␈α(e.g.,␈αyou␈αare␈αaliased␈αto␈α
a␈αwrite␈αprotected␈αdirectory),␈αnothing␈α
special␈αis
␈↓done, but if the ≡le is written successfully you are so informed.

␈↓The␈α∞CANCEL␈α∞command␈α∞lists␈α∞ARPA␈α∞mail␈α∞which␈α∂you␈α∞have␈α∞queued␈α∞and␈α∞allows␈α∞you␈α∞to␈α∂abort␈α∞the
␈↓request.␈α
 The␈α
listing␈αby␈α
CANCEL␈α
contains␈α
the␈αtext␈α
of␈α
your␈α
message␈αand␈α
the␈α
name␈α
of␈αthe␈α
addressee,
␈↓but␈α∪lists␈α∩his␈α∪site␈α∩by␈α∪number␈α∩rather␈α∪than␈α∪by␈α∩name.␈α∪ It␈α∩also␈α∪speci≡es␈α∩the␈α∪number␈α∪of␈α∩attempts
␈↓remaining before the request will be deleted.

␈↓It␈α∂is␈α∂possible␈α∂to␈α∂get␈α⊂a␈α∂``failed''␈α∂status␈α∂report␈α∂from␈α∂a␈α⊂network␈α∂MAIL␈α∂command␈α∂if␈α∂the␈α⊂program␈α∂is
␈↓unable␈α∂to␈α∂enter␈α∂the␈α∂request␈α∂in␈α∂the␈α∂REMIND␈α∞queue,␈α∂for␈α∂instance␈α∂because␈α∂there␈α∂are␈α∂no␈α∂job␈α∞slots
␈↓available␈α
for␈α
the␈α
phantom.␈α
 In␈α
this␈α
case␈α
you␈α
must␈α
try␈α
again␈α
later␈α
yourself.␈α
 (You␈α
can␈α
save␈α
the␈α
text␈α
of
␈↓a␈α
long␈αmessage␈α
you␈α
have␈αtyped␈α
in␈αby␈α
giving␈α
the␈αmonitor␈α
REENTER␈αcommand␈α
after␈α
MAIL␈αexits
␈↓and redirecting the mail to yourself.)

␈↓Usually␈αif␈αthe␈α
mail␈αis␈αrefused,␈α
and␈αpossibly␈αotherwise,␈α
the␈αremote␈αhost␈α
will␈αsend␈αus␈α
error␈αmessages
␈↓intended␈αto␈αbe␈αhelpful␈αto␈αyou.␈α If␈αany␈αsuch␈αmessages␈αare␈αreceived␈αwhich␈αare␈αnot␈αpart␈αof␈αthe␈αnormal
␈↓MAIL␈α
sequence,␈α
they␈αare␈α
typed␈α
out␈α
along␈αwith␈α
the␈α
status␈α
report.␈α Thus␈α
you␈α
can␈α
hopefully␈α≡gure␈α
out
␈↓why the mail was refused.

␈↓Mail␈αto␈αforeign␈αhosts␈αis␈αpre≡xed␈αwith␈αa␈αTENEX-ish␈αheader␈αincluding␈αyour␈αreal␈αname,␈αif␈αknown␈αto
␈↓the␈αsystem,␈αand␈αyour␈αnet␈αaddress␈α(␈↓αPRG␈α@␈αSU-AI␈↓).␈α Thus␈αrecipients␈αshould␈αbe␈αable␈αto␈α≡gure␈αout␈αhow
␈↓to reply.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    18␈↓


␈↓Distribution␈αlist␈α≡les␈αas␈α
in␈α␈↓αMAIL␈α@FILE␈↓␈αcan,␈αnaturally,␈α
include␈αnetwork␈αdestinations.␈α The␈α/D␈α
switch,
␈↓which␈α
includes␈α
the␈α
list␈α
of␈α
addressees␈α
in␈α
the␈α
message,␈α
includes␈α
network␈α
addressees,␈α
as␈α
typed␈α
(e.g.,␈α
with
␈↓abbreviated␈α
site␈α
names␈αif␈α
that's␈α
what␈αyou␈α
typed).␈α
 The␈αmessage␈α
header␈α
as␈αsent␈α
to␈α
each␈αnet␈α
addressee
␈↓has his site name in full, with his user ID as you typed it.


␈↓------

␈↓∧Add to the discussion of RCV arguments at the end of page 75 (appendix 4):

␈↓Finally,␈αan␈αargument␈αof␈αthe␈αform␈α␈↓α?PRG␈↓␈αwill␈αtype␈αthe␈αplan␈α≡le␈αfor␈αuser␈αPRG,␈αif␈αthere␈αis␈αone.␈α In␈α
this
␈↓case, the ≡le is merely typed, not edited.


␈↓------

␈↓∧Add the following entries to the table of RCV options on page 76 (appendix 4):

␈↓β␈↓ ↓xA␈↓ βλAppends to it from your terminal
␈↓β␈↓ ↓xP␈↓ βλPostpones the decision for a long message (see below)

␈↓∧In the next paragraph, delete ``␈↓↓except for ␈↓? which activates itself.␈↓∧''

␈↓∧On␈α
the␈α∞same␈α
page,␈α∞in␈α
the␈α∞paragraph␈α
on␈α
the␈α∞Z␈α
option,␈α∞replace␈α
the␈α∞last␈α
two␈α∞sentences␈α
(starting
␈↓∧``␈↓The only way to add new lines...␈↓∧'') with

␈↓You␈α⊃can␈α⊃switch␈α⊂from␈α⊃Z␈α⊃editing␈α⊃mode␈α⊂to␈α⊃A␈α⊃(append)␈α⊂mode␈α⊃by␈α⊃typing␈α⊃<control><meta>A.␈α⊂ The
␈↓current␈α⊃line␈α⊃will␈α⊃be␈α⊂stored␈α⊃as␈α⊃it␈α⊃appeared␈α⊃on␈α⊂your␈α⊃screen␈α⊃before␈α⊃you␈α⊃typed␈α⊂<control><meta>A,
␈↓editing␈α
is␈α
ended␈α
as␈α
if␈α
you␈α
had␈α
typed␈α<control><cr>,␈α
and␈α
you␈α
are␈α
invited␈α
to␈α
type␈α
in␈α
additional␈αtext␈α
as
␈↓in␈αthe␈αA␈αoption.␈α The␈αZ␈α
option␈αeditor␈αis␈αslow␈αand␈αrather␈α
stupid;␈αif␈αyou␈αhave␈αany␈αsizable␈αchanges␈α
to
␈↓make␈α
to␈αthe␈α
message␈αyou␈α
will␈α
probably␈αbe␈α
better␈αo≥␈α
using␈α
the␈αT␈α
option␈αto␈α
move␈α
it␈αto␈α
a␈αseparate␈α
≡le,
␈↓editing it with E, and re-mailing it.

␈↓∧Also,␈α
add␈α
the␈α
following␈α
to␈αthe␈α
paragraph␈α
concerning␈α
long␈α
messages␈αon␈α
page␈α
77,␈α
starting␈α
``␈↓It␈αis
␈↓possible....␈↓∧''

␈↓If␈α
the␈α
option␈α
you␈αselect␈α
is␈α
␈↓αE␈↓␈α
or␈α
␈↓α!␈↓,␈αthen␈α
Quiet␈α
processing␈α
is␈α
always␈αassumed.␈α
If␈α
you␈α
wish,␈α
you␈αmay
␈↓postpone␈αthe␈αdecision␈αon␈αhow␈αto␈αprocess␈αthe␈αmessage␈αuntil␈αafter␈αseeing␈αthe␈αrest␈αof␈αit,␈αby␈αtyping␈α␈↓αP␈↓␈αto
␈↓the␈α
option␈α
request.␈α
 This␈αwill␈α
type␈α
the␈α
remainder␈αof␈α
the␈α
message␈α
and␈α
ask␈αagain␈α
for␈α
an␈α
option.␈α ␈↓αQP␈↓␈α
is
␈↓illegal, and ␈↓αP␈↓ is only legal when a message over∨ows.


␈↓------

␈↓∧In␈α
the␈α∞table␈α
of␈α∞DART␈α
monitor␈α
commands␈α∞on␈α
page␈α∞78␈α
(appendix␈α
5),␈α∞the␈α
entries␈α∞for␈α
LOCATE
␈↓∧and TLIST should be:

␈↓β␈↓ ↓xLOCATE␈↓ βλ{<dest>←}{<source>}
␈↓β␈↓ ↓xTLIST␈↓ βλ{<dest>←}{<source>}
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    19␈↓


␈↓------

␈↓∧Add the following after the second line on page 88 (appendix 8, ARPA):

␈↓The␈α⊂information␈α⊂which␈α⊂follows␈α⊂also␈α⊂applies␈α⊂to␈α⊂the␈α⊂DIAL␈α⊂program,␈α⊂a␈α⊂version␈α⊂of␈α⊂T␈α⊂which␈α∂uses
␈↓dial-up␈αtelephone␈αconnections␈αrather␈αthan␈αthe␈αARPA␈αnetwork.␈α The␈αformat␈αof␈αthe␈αDIAL␈αcommand
␈↓is␈α∂explained␈α⊂on␈α∂page␈α⊂41.␈α∂ Another␈α∂version␈α⊂of␈α∂T␈α⊂is␈α∂called␈α∂PTYJOB,␈α⊂for␈α∂communicating␈α⊂with␈α∂a
␈↓pseudo-Teletype; it is not run with its own monitor command, but by ␈↓αR PTYJOB␈↓.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    20␈↓



␈↓------

␈↓∧In␈α
the␈α
list␈α
of␈αtelnet␈α
control␈α
commands␈α
starting␈αon␈α
page␈α
88,␈α
change␈αthe␈α
entry␈α
for␈α
␈↓⊗H␈↓∧␈αto␈α
␈↓<arg>⊗S␈↓∧.
␈↓∧(The␈α
␈↓⊗H␈↓∧␈α
in␈α
the␈α
text␈α
of␈α
that␈α
entry␈α
must␈αalso␈α
be␈α
changed␈α
to␈α
␈↓⊗S␈↓∧.)␈α
The␈α
existing␈α
entry␈α
for␈α␈↓⊗S␈↓∧␈α
should
␈↓∧now say ``␈↓⊗S (no arg)␈↓∧''.  The following entries should also be modi≡ed as shown here:

␈↓βE␈↓ αhBegin␈α⊂local␈α⊃echoing.␈α⊂ Also␈α⊃attempts␈α⊂to␈α⊂turn␈α⊃o≥␈α⊂remote␈α⊃echoing.␈α⊂ Di≥erent␈α⊃sites␈α⊂have
␈↓␈↓ αhdi≥erent␈αechoing␈αconventions.␈α Some␈αsites␈αexpect␈αto␈αsend␈αback␈αechoing,␈αsome␈αdo␈αnot.␈α If
␈↓␈↓ αhyou␈α≡nd␈αthat␈αwhat␈αyou␈αtype␈αis␈αnot␈αbeing␈αechoed␈αin␈αa␈αreasonable␈αtime,␈αyou␈αmay␈αuse␈αthis
␈↓␈↓ αhcommand␈αto␈αlet␈αyou␈αsee␈αwhat␈αyou␈αare␈α
typing.␈α In␈αthe␈αDIAL␈αprgram,␈αthis␈αmakes␈αyou␈α
look
␈↓␈↓ αhlike a half duplex terminal, and does not change the state of remote echoing.

␈↓αβE␈↓ αhTerminate␈αlocal␈αechoing.␈α Also␈αattempts␈αto␈α
turn␈αon␈αremote␈αechoing.␈α One␈αdoes␈αthis␈α
when
␈↓␈↓ αheach␈α
key␈α∞one␈α
types␈α∞appears␈α
twice␈α∞on␈α
the␈α
console.␈α∞ Turning␈α
o≥␈α∞local␈α
echoing␈α∞will␈α
often
␈↓␈↓ αheliminate␈αone␈αcopy␈αof␈αthe␈αkey.␈α The␈α
DIAL␈αprogram␈αdoes␈αnot␈αattempt␈αto␈αchange␈αthe␈α
state
␈↓␈↓ αhof remote echoing.

␈↓∧Also add the following new control commands:

␈↓βO␈↓ αhTurn on console typeout.  See αβO.

␈↓αβO␈↓ αhTurn␈α
o≥␈α
console␈α
typeout.␈α
 Useful␈α
when␈α
output␈αis␈α
already␈α
going␈α
to␈α
a␈α
≡le␈α
and␈α
you␈αdon't
␈↓␈↓ αhwant to waste the time it takes to type out on your console as well.

␈↓⊗F␈↓ αhOpen␈αoutput␈α
≡le␈αlike␈αβD,␈α
but␈αappend␈αthe␈α
text␈αto␈αan␈α
existing␈α≡le␈αof␈α
the␈αsame␈αname.␈α
 You
␈↓␈↓ αhare␈αonly␈αasked␈αfor␈αa␈α≡le␈αname␈αif␈α
you␈αhave␈αnot␈αpreviously␈αopened␈αan␈αoutput␈α≡le␈αwith␈α
βD
␈↓␈↓ αhor␈α⊗F␈αduring␈αthis␈αsession;␈αif␈αyou␈αhave␈αalready␈αnamed␈αan␈αoutput␈α≡le,␈αthe␈αnew␈αoutput␈αwill
␈↓␈↓ αhbe appended to that one.

␈↓⊗C␈↓ αh(TELNET␈α
only)␈αSend␈α
interrupt.␈α This␈α
is␈αthe␈α
network␈αprotocol␈α
for␈α``return␈α
to␈αmonitor''␈α
or
␈↓␈↓ αhequivalent.

␈↓βC␈↓ αh(DIAL␈αonly)␈αTurn␈αon␈α
control␈αcharacter␈αmode.␈α In␈α
this␈αmode␈αall␈αcharacters␈αreceived␈α
from
␈↓␈↓ αhthe dataphone are typed on your console.

␈↓αβC␈↓ αh(DIAL␈αonly)␈αTurn␈α
o≥␈αcontrol␈αcharacter␈αmode.␈α
 In␈αthis␈αmode,␈α
octal␈αcodes␈α1-10,␈α16-37,␈α
and
␈↓␈↓ αh177 are not typed on your console when received from the dataphone.

␈↓βM␈↓ αh(PTYJOB␈α∃only)␈α∃Enters␈α∃a␈α∃mode␈α∃in␈α∃which␈α∃all␈α∃9-bit␈α∃characters␈α∃you␈α∃type␈α⊗are␈α∃sent
␈↓␈↓ αhunchanged␈α∩to␈α⊃the␈α∩PTY␈α∩except␈α⊃βM,␈α∩αβM,␈α⊃βZ,␈α∩and␈α∩αβZ.␈α⊃ (Of␈α∩course,␈α⊃if␈α∩you␈α∩are␈α⊃in
␈↓␈↓ αhline-at-a-time␈α∪mode␈α∪some␈α∪control␈α∪characters␈α∪are␈α∪still␈α∪interpreted␈α∪by␈α∪the␈α∪system␈α∪line
␈↓␈↓ αheditor.)

␈↓αβM␈↓ αh(PTYJOB␈α∪only)␈α∀Leaves␈α∪the␈α∀above␈α∪mode;␈α∪meta-characters␈α∀are␈α∪again␈α∀interpreted␈α∪as
␈↓␈↓ αhcommands to PTYJOB.

␈↓⊗Z␈↓ αh(PTYJOB␈α∂only)␈α∂Quotes␈α∂the␈α∂following␈α∂9-bit␈α∂character,␈α∂so␈α∂it␈α∂is␈α∂sent␈α∂to␈α∂the␈α∂PTY␈α∂as␈α∂is,
␈↓␈↓ αhregardless of the βM mode switch.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    21␈↓


␈↓------

␈↓∧On the third line of the FTP description on page 90, ``␈↓⊗FTP←␈↓∧'' should be ``␈↓FTP␈↓∧''.


␈↓------

␈↓∧In␈αthe␈αdescription␈αof␈αthe␈αXGP␈αon␈αpage␈α97␈α(appendix␈α9),␈αdelete␈αthe␈αreference␈αto␈αthe␈αVERTICAL
␈↓∧POSITION␈αknob.␈α This␈αknob␈αmay␈αbe␈αin␈αany␈αposition,␈αand␈αshould␈αnot␈αnormally␈αbe␈αchanged␈αby
␈↓∧users.


␈↓------

␈↓∧Replace the last paragraph on page 100 (appendix 9, ≡xing memory stops) as follows:

␈↓Once␈αthe␈αmemory␈αis␈αreset,␈α
the␈αcomputers␈αhave␈αto␈αbe␈α
convinced␈αthat␈αnothing␈αbad␈αhappened.␈α To␈α
do
␈↓this␈α
on␈α
the␈α
PDP-10,␈α
the␈αUSER␈α
MODE␈α
light␈α
on␈α
the␈αconsole␈α
must␈α
be␈α
o≥.␈α
 If␈αit␈α
is␈α
on,␈α
≡rst␈α
turn␈αon␈α
the
␈↓SINGLE␈α
INSTRUCTION␈α
switch␈α∞on␈α
the␈α
console,␈α
then␈α∞push␈α
CONTINUE.␈α
 This␈α
should␈α∞turn␈α
o≥
␈↓the␈αUSER␈αMODE␈α
light.␈α Then␈αturn␈α
o≥␈αthe␈αSINGLE␈α
INSTRUCTION␈αswitch.␈α When␈α
the␈αUSER
␈↓MODE␈αlight␈αis␈αo≥,␈αenter␈α
700200 010003␈αin␈αthe␈αdata␈αswitches␈α
and␈αpush␈αthe␈αEXECUTE␈αkey.␈α If␈α
the
␈↓MEMORY␈α∞STOP␈α∞light␈α∞on␈α
the␈α∞PDP-6␈α∞is␈α∞on,␈α
follow␈α∞the␈α∞same␈α∞procedure␈α
as␈α∞on␈α∞the␈α∞PDP-10␈α
with
␈↓these␈α
exceptions:␈α
Instead␈α
of␈α
a␈α
USER␈α
MODE␈αlight␈α
on␈α
the␈α
console,␈α
the␈α
PDP-6␈α
has␈α
an␈αEXEC␈α
MODE
␈↓light␈αat␈α
the␈αtop␈αof␈α
the␈αsecond␈α
bay␈αto␈αthe␈α
left␈αof␈αthe␈α
console;␈αthis␈α
light␈αmust␈αbe␈α
on␈αfor␈α
the␈αexecute.
␈↓Also,␈α≠there␈α≠is␈α≠no␈α≠SINGLE␈α≠INSTRUCTION␈α≠switch␈α≠on␈α≠the␈α≠PDP-6;␈α≠instead,␈α≠while␈α~the
␈↓INSTRUCTION␈αSTOP␈αswitch␈αis␈αdown,␈αpush␈αINSTRUCTION␈αCONTINUE␈αonce.␈α Finally,␈αpush
␈↓CONTINUE on both machines.


␈↓------

␈↓∧Replace the last paragraph on page 101 (appendix 10, reloading) with the following:

␈↓If␈αthis␈αprocedure␈αfails,␈αcheck␈αthat␈αthe␈αNXM␈αSTOP␈αswitch␈αon␈αthe␈αconsole␈αis␈αturned␈αon;␈αthen␈αcheck
␈↓the␈α∞following␈α∞switches,␈α∞located␈α∞inside␈α∞the␈α∞second␈α∞door␈α∞to␈α∞the␈α∞left␈α∞of␈α∞the␈α∞console:␈α∞JSYS␈α∞ENB␈α∞and
␈↓MAPAC ENB o≥, MA TRP OFFSET on.

␈↓If␈αthe␈α
system␈αloader␈α
tape␈αstill␈α
fails,␈α≡nd␈αthe␈α
DECtape␈αwith␈α
the␈αcurrent␈α
system.␈α The␈α
DECtape␈αwill
␈↓be␈α
labeled␈αwith␈α
the␈α
system␈αname␈α
and␈α
date.␈α Mount␈α
it␈α
on␈αsome␈α
DECtape␈α
drive.␈α Find␈α
the␈αpaper␈α
tape
␈↓labeled␈α⊃256K␈α⊃TENDMP␈α⊂or␈α⊃128K␈α⊃TENDMP,␈α⊃and␈α⊂load␈α⊃it␈α⊃into␈α⊃the␈α⊂paper␈α⊃tape␈α⊃reader␈α⊃(on␈α⊂the
␈↓PDP-10).␈α Stop␈αthe␈αPDP-6.␈α Press␈αRESET␈αand␈αREAD␈αIN␈αon␈αthe␈αPDP-10.␈α The␈αpaper␈αtape␈αwill␈αbe
␈↓read,␈αand␈αthe␈αCTY␈αwill␈αtype␈αcarriage␈αreturn␈αand␈αline␈αfeed.␈α Type␈α␈↓αn$␈↓␈αwhere␈α␈↓αn␈↓␈αis␈αthe␈αnumber␈αof␈αthe
␈↓DECtape␈αdrive␈αand␈α␈↓α$␈↓␈αis␈αan␈αalt␈αmode.␈α The␈αDECtape␈αshould␈αspin␈αfor␈αa␈αwhile,␈αthen␈αit␈αwill␈αstop␈αand
␈↓the␈α⊂CTY␈α⊂will␈α⊂type␈α⊂crlf␈α⊂again.␈α⊂ Type␈α⊂␈↓αL$S␈↓␈α⊂then␈α⊂carriage␈α⊂return.␈α⊂ The␈α⊂DECtape␈α⊂will␈α⊂spin␈α∂again,
␈↓followed␈αby␈αanother␈αcrlf.␈α Type␈α␈↓α206$␈↓␈αthen␈α␈↓αG$␈↓␈αto␈αstart␈αthe␈αsystem.␈α (If␈αthe␈αLibrascope␈αdisk␈αis␈αdown,
␈↓type ␈↓α200$G$␈↓ instead.)
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    22␈↓



␈↓------

␈↓∧The␈α
following␈α
monitor␈α
error␈α
messages␈α
should␈α
be␈α∞added␈α
to␈α
the␈α
list␈α
in␈α
appendix␈α
11,␈α∞starting␈α
on
␈↓∧page 102, in alphabetical sequence:

␈↓αALREADY IN USE, CAN'T CHANGE FORMAT.

␈↓␈↓ αxYou␈α∂gave␈α∂an␈α∂␈↓αASSIGN␈α∂PUBLIC␈↓␈α∂or␈α∂␈↓αASSIGN␈α∂PRIVATE␈↓␈α∂command␈α∂for␈α∂a␈α∂UDP␈α∂which␈α∞was
␈↓␈↓ αxalready␈α∞assigned␈α∂as␈α∞OLD,␈α∞or␈α∂vice␈α∞versa.␈α∞ The␈α∂UDP␈α∞will␈α∞be␈α∂assigned␈α∞to␈α∞your␈α∂job␈α∞as
␈↓␈↓ αxPUBLIC.

␈↓αALREADY IN USE, CAN'T MAKE PRIVATE.

␈↓␈↓ αxYou␈α∪gave␈α∩an␈α∪␈↓αASSIGN␈α∪PRIVATE␈↓␈α∩or␈α∪␈↓αASSIGN␈α∩OLD␈↓␈α∪command␈α∪for␈α∩a␈α∪UDP␈α∪which␈α∩was
␈↓␈↓ αxalready in use by another job.  The UDP will be assigned to your job as PUBLIC.

␈↓αCHANNEL IN USE.

␈↓␈↓ αxYou␈α
gave␈αthe␈α
privileged␈αDETACH␈α
command␈αwith␈α
a␈αData␈α
Disc␈αchannel␈α
as␈αargument,
␈↓␈↓ αxand the channel is in use.

␈↓αILLEGAL ADDRESS FOR ADC-DAC

␈↓␈↓ αxThe␈α∞PDP-6␈α∞has␈α∂detected␈α∞an␈α∞illegal␈α∂address␈α∞which␈α∞you␈α∞speci≡ed␈α∂to␈α∞be␈α∞used␈α∂for␈α∞some
␈↓␈↓ αxfunction␈α
connected␈α
with␈α
the␈α
ADC␈α
or␈α
DAC␈α
device.␈α
 This␈α
was␈α
not␈α
detected␈α∞when␈α
your
␈↓␈↓ αxprogram␈αexecuted␈αa␈αUUO,␈αbut␈αasynchronously,␈αin␈αthe␈αdevice␈αservice␈αprogram␈αrunning
␈↓␈↓ αxon the PDP-6.

␈↓αILLEGAL OLD-STYLE ACCESS TO NEW FORMAT UDP.  UUO AT USER <ADDRESS>

␈↓␈↓ αxYou␈αhave␈αgiven␈αan␈α␈↓αASSIGN␈αOLD␈↓␈αcommand␈αfor␈αa␈αUDP,␈αand␈αmounted␈αa␈αpack␈αwhich␈α
has
␈↓␈↓ αxbeen␈α∂formatted␈α∂for␈α∂≡le-structured␈α∂use,␈α∂and␈α∂your␈α∂program␈α∂tried␈α∂to␈α∂write␈α∂on␈α∂the␈α∂pack
␈↓␈↓ αx(gave an ENTER UUO).

␈↓αILLEGAL PROTECTION CODE!

␈↓␈↓ αxYou␈α∞gave␈α
a␈α∞SETUWP␈α
or␈α∞CLRUWP␈α∞command␈α
with␈α∞an␈α
argument␈α∞greater␈α∞than␈α
1000
␈↓␈↓ αxoctal.

␈↓αNO SUCH PRIVILEGE!

␈↓␈↓ αxThe privilege name speci≡ed in an ENABLE or DISABLE command does not exist.

␈↓αNO UPPER SEGMENT!

␈↓␈↓ αxYou␈αtyped␈αa␈αSETUWP␈αor␈αCLRUWP␈αcommand␈αand␈αyour␈αcore␈αimage␈αdoes␈αnot␈αinclude
␈↓␈↓ αxan upper segment.
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    23␈↓



␈↓αNOT A NEW FORMAT UDP

␈↓␈↓ αxYou␈α∂have␈α∂typed␈α∞an␈α∂␈↓αASSIGN␈α∂PUBLIC␈↓␈α∞or␈α∂␈↓αASSIGN␈α∂PRIVATE␈↓␈α∞command␈α∂for␈α∂a␈α∂UDP,␈α∞and
␈↓␈↓ αxmounted␈αa␈αpack␈αwhich␈αhas␈αnot␈αbeen␈αformatted␈αfor␈α≡le-structured␈αuse.␈α The␈αerror␈αis␈α
not
␈↓␈↓ αxdetected␈α
until␈α
your␈α
program␈αtries␈α
to␈α
perform␈α
some␈α
operation␈αon␈α
the␈α
UDP.␈α
 See␈αa␈α
system
␈↓␈↓ αxprogrammer about formatting your pack.

␈↓αNOT ONE OF YOUR JOBS.

␈↓␈↓ αxYou␈α
typed␈α∞a␈α
KILL␈α
command␈α∞with␈α
a␈α∞job␈α
number␈α
not␈α∞belonging␈α
to␈α∞your␈α
programmer
␈↓␈↓ αxname.

␈↓αSORRY, PROTECTION FAILURE!

␈↓␈↓ αxYou␈αtyped␈αa␈αSETUWP␈α
or␈αCLRUWP␈αcommand,␈αand␈α
are␈αnot␈αpermitted␈αto␈α
change␈αthe
␈↓␈↓ αxwrite protection of your core image's upper segment.

␈↓αSORRY, YOU CAN'T HAVE THAT PRIVILEGE!

␈↓␈↓ αxYou␈α∀typed␈α∀an␈α∪ENABLE␈α∀command␈α∀specifying␈α∀a␈α∪privilege␈α∀name,␈α∀and␈α∀neither␈α∪the
␈↓␈↓ αxprivilege␈αyou␈α
speci≡ed␈αnor␈α
the␈αPRI␈α
privilege␈αis␈α
in␈αthe␈α
list␈αassociated␈α
with␈αyour␈αPPN;␈α
or
␈↓␈↓ αxthe privilege is one which is not permitted to any user (XGP or SSL).

␈↓αUDP OFFLINE OR WRITE LOCKED

␈↓␈↓ αxYour␈α
program␈α
has␈α
tried␈α
to␈α
perform␈α
some␈α∞operation␈α
on␈α
a␈α
UDP,␈α
and␈α
there␈α
is␈α∞no␈α
pack
␈↓␈↓ αxmounted,␈αor␈αthe␈αdrive␈αis␈αnot␈αturned␈αon,␈αor␈αit␈αdoes␈αnot␈αhave␈αits␈αID␈αplug␈αinserted␈αin␈αthe
␈↓␈↓ αxfront panel, or it is switched to read-only and your program tried to write on it.

␈↓αUSE "KJOB" TO LOG YOURSELF OFF.

␈↓␈↓ αxYou typed a KILL command with your own job number as the argument.

␈↓∧Also,␈α⊂add␈α⊂``␈↓or␈α∂KILL␈↓∧''␈α⊂after␈α⊂``␈↓ATTACH␈↓∧''␈α∂in␈α⊂the␈α⊂description␈α∂of␈α⊂the␈α⊂␈↓αNO SUCH JOB␈↓∧␈α⊂message,␈α∂and
␈↓∧remove␈αthe␈αreference␈αto␈αthe␈αKILL␈αcommand␈αin␈αthe␈αdescription␈αof␈αthe␈α␈↓αOUT OF BOUNDS␈↓∧␈αmessage.
␈↓∧Remove␈αthe␈α␈↓αIMP IS DEAD␈↓∧␈α
message.␈α (This␈αcondition␈αis␈α
reported␈αto␈αthe␈α
user␈αprogram␈αby␈αan␈α
error
␈↓∧status bit.)
␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ "    24␈↓



␈↓------

␈↓∧Add the following to the monitor command summary, pages 118 and 119:

␈↓βNAME␈↓ αxDESCRIPTION␈↓ π_NAME␈↓ λ(PROGRAM␈↓ 	XARGUMENTS␈↓ (PAGE

␈↓βCLruwp␈↓ αxclear upper segment write protect␈↓ π_CLruwp␈↓ λ(␈↓ 	X{prot}␈↓ (24
␈↓βDIAl␈↓ αxtalk to computer by telephone␈↓ π_DIAl␈↓ λ(DIAL␈↓ 	Xdv | phone␈↓ (41
␈↓βDISable␈↓ αx⊂ disable privileges ⊃␈↓ π_DISable␈↓ λ(␈↓ 	X⊂ {priv} ⊃␈↓ (42
␈↓βENable␈↓ αx⊂ enable privileges ⊃␈↓ π_ENable␈↓ λ(␈↓ 	X⊂ {priv} ⊃␈↓ (42
␈↓βHOt␈↓ αxread A.P. news wire␈↓ π_HOt␈↓ λ(HOT␈↓ 	X-␈↓ (41
␈↓βNS␈↓ αxread A.P. stories␈↓ π_NS␈↓ λ(NS␈↓ 	X-␈↓ (41
␈↓βPLan␈↓ αxcreate plan file␈↓ π_PLan␈↓ λ(MAIL␈↓ 	X␈↓ (70
␈↓βREAD␈↓ αxedit with E in book mode␈↓ π_READ␈↓ λ(E␈↓ 	X{fn}␈↓ (44
␈↓βSETuwp␈↓ αxset upper segment write protect␈↓ π_SETuwp␈↓ λ(␈↓ 	X{prot}␈↓ (24
␈↓βUDpufd␈↓ αxcreate UDP file directory␈↓ π_UDpufd␈↓ λ(UDPUFD␈↓ 	Xprj,prg␈↓ (41


␈↓∧The␈α∞␈↓αUnspool␈↓∧␈α∞entry␈α∞should␈α∞now␈α∞be␈α
␈↓αUNspool␈↓∧␈α∞(changing␈α∞minimum␈α∞abbreviation).␈α∞ On␈α∞page␈α
119,
␈↓∧the␈α⊂SYSTAT␈α⊂command␈α∂now␈α⊂runs␈α⊂the␈α∂WHO␈α⊂program,␈α⊂not␈α∂SYSTAT.␈α⊂ Also,␈α⊂HELP␈α⊂now␈α∂runs
␈↓∧HELP, not COPY.

␈↓∧Also, the following should be added to the list of abbreviations on page 117:

␈↓αprot            octal protection code
␈↓αphone           telephone number, format {(ddd)}ddd{-}dddd
␈↓αpriv            privilege name


␈↓------

␈↓∧I␈α∞am␈α∞not␈α∞in␈α∞general␈α∞trying␈α∞to␈α∞maintain␈α∞the␈α∞index,␈α∞either␈α∞to␈α∞≡x␈α∞errors␈α∞or␈α∞to␈α∞add␈α∞new␈α
entries.
␈↓∧However, one particular omission has been mentioned to me several times by irate users:

␈↓LOADER switches   54