Resource construction set

Last updated

Resource construction set
ATARI-GEM-DR-RCS-V2.8.png
Developer(s) Digital Research
Type

The resource construction set (GEM RCS) is a GUI builder for GEM applications. It was written by Digital Research.

Contents

RCS was widely used on the Atari ST, Atari STe, Atari TT, Atari MEGA ST, Atari MEGA STE and Atari Falcon platforms. [1]

Example

Files of the Atari Development Kit

Resource file

runtime binary

0000: 000000E2 00E200E2 00E20000 002400E1 ...â.â.â.â...$.á 0010: 000002AA 00130003 00000000 00000000 ...ª............ 0020: 000002B6 20446573 6B200020 46696C65 ...¶ Desk . File 0030: 20002020 43726169 6773204D 656E7500  .  Craigs Menu. 0040: 2D2D2D2D 2D2D2D2D 2D2D2D2D 2D2D2D2D ---------------- 0050: 2D2D2D2D 00202044 65736B20 41636365 ----.  Desk Acce 0060: 73736F72 79203120 20002020 4465736B ssory 1  .  Desk 0070: 20416363 6573736F 72792032 20200020  Accessory 2  .  0080: 20446573 6B204163 63657373 6F727920  Desk Accessory  0090: 33202000 20204465 736B2041 63636573 3  .  Desk Acces 00A0: 736F7279 20342020 00202044 65736B20 sory 4  .  Desk  00B0: 41636365 73736F72 79203520 20002020 Accessory 5  .   00C0: 4465736B 20416363 6573736F 72792036 Desk Accessory 6 00D0: 20200020 20517569 74202020 20202020   .  Quit        00E0: 0000FFFF 00010005 00190000 00000000 ..ÿÿ............ 00F0: 00000000 00000050 00190005 00020002 .......P........ 0100: 00140000 00000000 11000000 00000050 ...............P 0110: 02010001 00030004 00190000 00000000 ................ 0120: 00000002 0000000C 03010004 FFFFFFFF ............ÿÿÿÿ 0130: 00200000 00000000 00240000 00000006 . .......$...... 0140: 03010002 FFFFFFFF 00200000 00000000 ....ÿÿÿÿ. ...... 0150: 002B0006 00000006 03010000 0006000F .+.............. 0160: 00190000 00000000 00000000 03010050 ...............P 0170: 0013000F 0007000E 00140000 000000FF ...............ÿ 0180: 11000002 00000014 00080008 FFFFFFFF ............ÿÿÿÿ 0190: 001C0000 00000000 00320000 00000014 .........2...... 01A0: 00010009 FFFFFFFF 001C0000 00080000 ....ÿÿÿÿ........ 01B0: 00400000 00010014 0001000A FFFFFFFF .@..........ÿÿÿÿ 01C0: 001C0000 00000000 00550000 00020014 .........U...... 01D0: 0001000B FFFFFFFF 001C0000 00000000 ....ÿÿÿÿ........ 01E0: 006A0000 00030014 0001000C FFFFFFFF .j..........ÿÿÿÿ 01F0: 001C0000 00000000 007F0000 00040014 ................ 0200: 0001000D FFFFFFFF 001C0000 00000000 ....ÿÿÿÿ........ 0210: 00940000 00050014 0001000E FFFFFFFF ............ÿÿÿÿ 0220: 001C0000 00000000 00A90000 00060014 .........©...... 0230: 00010006 FFFFFFFF 001C0000 00000000 ....ÿÿÿÿ........ 0240: 00BE0000 00070014 00010005 00100010 .¾.............. 0250: 00140000 000000FF 11000008 0000000D .......ÿ........ 0260: 0001000F FFFFFFFF 001C0020 00000000 ....ÿÿÿÿ... .... 0270: 00D30000 0000000D 0001FFFF FFFFFFFF .Ó........ÿÿÿÿÿÿ 0280: 00140020 00100002 11000000 00000046 ... ...........F 0290: 000FFFFF FFFFFFFF 00140020 00100002 ..ÿÿÿÿÿÿ... .... 02A0: 11000000 00000046 000F0000 00E20000 .......F.....â.. 02B0: 027A0000 0292                       .z.... 

C file

source

#define T0OBJ 0#define T1OBJ 17#define T2OBJ 18#define FREEBB 0#define FREEIMG 0#define FREESTR 11BYTE*rs_strings[]={" Desk "," File ","  Craigs Menu","--------------------","  Desk Accessory 1  ","  Desk Accessory 2  ","  Desk Accessory 3  ","  Desk Accessory 4  ","  Desk Accessory 5  ","  Desk Accessory 6  ","  Quit       "};LONGrs_frstr[]={0};BITBLKrs_bitblk[]={0};LONGrs_frimg[]={0};ICONBLKrs_iconblk[]={0};TEDINFOrs_tedinfo[]={0};OBJECTrs_object[]={-1,1,5,G_IBOX,NONE,NORMAL,0x0L,0,0,80,25,5,2,2,G_BOX,NONE,NORMAL,0x1100L,0,0,80,513,1,3,4,G_IBOX,NONE,NORMAL,0x0L,2,0,12,769,4,-1,-1,G_TITLE,NONE,NORMAL,0x0L,0,0,6,769,2,-1,-1,G_TITLE,NONE,NORMAL,0x1L,6,0,6,769,0,6,15,G_IBOX,NONE,NORMAL,0x0L,0,769,80,19,15,7,14,G_BOX,NONE,NORMAL,0xFF1100L,2,0,20,8,8,-1,-1,G_STRING,NONE,NORMAL,0x2L,0,0,20,1,9,-1,-1,G_STRING,NONE,DISABLED,0x3L,0,1,20,1,10,-1,-1,G_STRING,NONE,NORMAL,0x4L,0,2,20,1,11,-1,-1,G_STRING,NONE,NORMAL,0x5L,0,3,20,1,12,-1,-1,G_STRING,NONE,NORMAL,0x6L,0,4,20,1,13,-1,-1,G_STRING,NONE,NORMAL,0x7L,0,5,20,1,14,-1,-1,G_STRING,NONE,NORMAL,0x8L,0,6,20,1,6,-1,-1,G_STRING,NONE,NORMAL,0x9L,0,7,20,1,5,16,16,G_BOX,NONE,NORMAL,0xFF1100L,8,0,13,1,15,-1,-1,G_STRING,LASTOB,NORMAL,0xAL,0,0,13,1,-1,-1,-1,G_BOX,LASTOB,OUTLINED,0x21100L,0,0,70,15,-1,-1,-1,G_BOX,LASTOB,OUTLINED,0x21100L,0,0,70,15};LONGrs_trindex[]={0L,17L,18L};structfoobar{WORDdummy;WORD*image;}rs_imdope[]={0};#define NUM_STRINGS 11#define NUM_FRSTR 0#define NUM_IMAGES 0#define NUM_BB 0#define NUM_FRIMG 0#define NUM_IB 0#define NUM_TI 0#define NUM_OBS 19#define NUM_TREE 3BYTEpname[]="CRAIG.RSC";

Header file

source

#define TREE1 0   /* TREE */#define TREE2 1   /* TREE */#define TREE3 2   /* TREE */

Related Research Articles

ISO 8601Data elements and interchange formats – Information interchange – Representation of dates and times is an international standard covering the exchange of date- and time-related data. It is maintained by the Geneva-based International Organization for Standardization (ISO) and was first published in 1988 with updates in 1991, 2000, 2004 and 2019. The purpose of this standard is to provide an unambiguous and well-defined method of representing dates and times, so as to avoid misinterpretation of numeric representations of dates and times, particularly when data is transferred between countries with different conventions for writing numeric dates and times.

The Mersenne Twister is a pseudorandom number generator (PRNG). It is by far the most widely used general-purpose PRNG. Its name derives from the fact that its period length is chosen to be a Mersenne prime.

ANSI escape code Method using in-band signaling to control the formatting, color, and other output options on video text terminals

ANSI escape sequences are a standard for in-band signaling to control cursor location, color, font styling, and other options on video text terminals and terminal emulators. Certain sequences of bytes, most starting with an ASCII escape character and a bracket character, are embedded into text. The terminal interprets these sequences as commands, rather than text to display verbatim.

Classful network an early system for organizing the IPv4 address space

A classful network is a network addressing architecture used in the Internet from 1981 until the introduction of Classless Inter-Domain Routing in 1993. The method divides the IP address space for Internet Protocol version 4 (IPv4) into five address classes based on the leading four address bits. Classes A, B, and C provide unicast addresses for networks of three different network sizes. Class D is for multicast networking and the class E address range is reserved for future or experimental purposes.

In computing, a symbolic link is a term for any file that contains a reference to another file or directory in the form of an absolute or relative path and that affects pathname resolution.

In computer science, a mask or bitmask is data that is used for bitwise operations, particularly in a bit field. Using a mask, multiple bits in a byte, nibble, word etc. can be set either on, off or inverted from on to off in a single bitwise operation. An additional use and meaning of Masking involves predication in Vector processing, where the bitmask is used to select which element operations in the Vector are to be executed and which are not

Open Artwork System Interchange Standard (OASIS) is a language used by computers to represent and express an electronic pattern for an integrated circuit during its design and manufacture. The language defines the code required for geometric shapes such as rectangles, trapezoids, and polygons. It defines the type of properties each can have, how they can be organized into cells containing patterns made by these shapes and defines how each can be placed relative to each other.

Casio FX-850P

The Casio FX-850P is a scientific calculator introduced in 1987 and sold until 1999.

The Hamming weight of a string is the number of symbols that are different from the zero-symbol of the alphabet used. It is thus equivalent to the Hamming distance from the all-zero string of the same length. For the most typical case, a string of bits, this is the number of 1's in the string, or the digit sum of the binary representation of a given number and the ₁ norm of a bit vector. In this binary case, it is also called the population count, popcount, sideways sum, or bit summation.

The GOST hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined in the Russian national standard GOST R 34.11-94 Information Technology – Cryptographic Information Security – Hash Function. The equivalent standard used by other member-states of the CIS is GOST 34.311-95.

A disjunctive sequence is an infinite sequence in which every finite string appears as a substring. For instance, the binary Champernowne sequence

The syntax of the Python programming language is the set of rules that defines how a Python program will be written and interpreted. The Python language has many similarities to Perl, C, and Java. However, there are some definite differences between the languages.

In computer science, the double dabble algorithm is used to convert binary numbers into binary-coded decimal (BCD) notation. It is also known as the shift-and-add-3 algorithm, and can be implemented using a small number of gates in computer hardware, but at the expense of high latency.

Many Unicode control characters are used to control the interpretation or display of text, but these characters themselves have no visual or spatial representation. For example, the null character is used in C-programming application environments to indicate the end of a string of characters. In this way, these programs only require a single starting memory address for a string, since the string ends once the program reads the null character.

In algebra, the hyperdeterminant is a generalization of the determinant. Whereas a determinant is a scalar valued function defined on an n × n square matrix, a hyperdeterminant is defined on a multidimensional array of numbers or tensor. Like a determinant, the hyperdeterminant is a homogeneous polynomial with integer coefficients in the components of the tensor. Many other properties of determinants generalize in some way to hyperdeterminants, but unlike a determinant, the hyperdeterminant does not have a simple geometric interpretation in terms of volumes.

In computing, quadruple precision is a binary floating point–based computer number format that occupies 16 bytes with precision at least twice the 53-bit double precision.

Single-precision floating-point format is a computer number format, usually occupying 32 bits in computer memory; it represents a wide dynamic range of numeric values by using a floating radix point.

Barnsley fern

The Barnsley fern is a fractal named after the British mathematician Michael Barnsley who first described it in his book Fractals Everywhere. He made it to resemble the black spleenwort, Asplenium adiantum-nigrum.

In the C programming language, operations can be performed on a bit level using bitwise operators.

Bus encoding refers to converting/encoding a piece of data to another form before launching on the bus. While bus encoding can be used to serve various purposes like reducing the number of pins, compressing the data to be transmitted, reducing cross-talk between bit lines, etc., it is one of the popular techniques used in system design to reduce dynamic power consumed by the system bus. Bus encoding aims to reduce the Hamming distance between 2 consecutive values on the bus. Since the activity is directly proportional to the Hamming distance, bus encoding proves to be effective in reducing the overall activity factor thereby reducing the dynamic power consumption in the system.

References

  1. "Das Resource Construction Set" (in German). Retrieved 2017-11-18.