MLX (software)
   HOME
*





MLX (software)
MLX is a series of machine language entry utilities published by the magazines ''COMPUTE!'' and ''COMPUTE!'s Gazette'', as well as books from COMPUTE! Publications. These programs were designed to allow relatively easy entry of the type-in machine language listings that were often included in these publications. Versions were available for the Commodore 64, VIC-20, Atari 8-bit family, and Apple II. MLX listings were reserved for relatively long machine language programs such as SpeedScript, some high-performance utilities, and fast-paced games. First version MLX was introduced in the December 1983 issue of ''COMPUTE!'' for the Commodore 64 and Atari 8-bit family (necessary to input the Atari gamChopperoidson Pg 122), and simultaneously in the December 1983 issue of ''COMPUTE!'s Gazette'' to be used for the entry of two C-64 machine language games, the excellenSpike(Pg 74) and the competitivSpace Duel(Pg 80). This was followed by a version in the January 1984 issue of ''COMPU ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Machine Code
In computer programming, machine code is any low-level programming language, consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). Each instruction causes the CPU to perform a very specific task, such as a load, a store, a jump, or an arithmetic logic unit (ALU) operation on one or more units of data in the CPU's registers or memory. Early CPUs had specific machine code that might break backwards compatibility with each new CPU released. The notion of an instruction set architecture (ISA) defines and specifies the behavior and encoding in memory of the instruction set of the system, without specifying its exact implementation. This acts as an abstraction layer, enabling compatibility within the same family of CPUs, so that machine code written or generated according to the ISA for the family will run on all CPUs in the family, including future CPUs. In general, each architecture family (e.g. x86, ARM) has its own ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Decimal
The decimal numeral system (also called the base-ten positional numeral system and denary or decanary) is the standard system for denoting integer and non-integer numbers. It is the extension to non-integer numbers of the Hindu–Arabic numeral system. The way of denoting numbers in the decimal system is often referred to as ''decimal notation''. A ''decimal numeral'' (also often just ''decimal'' or, less correctly, ''decimal number''), refers generally to the notation of a number in the decimal numeral system. Decimals may sometimes be identified by a decimal separator (usually "." or "," as in or ). ''Decimal'' may also refer specifically to the digits after the decimal separator, such as in " is the approximation of to ''two decimals''". Zero-digits after a decimal separator serve the purpose of signifying the precision of a value. The numbers that may be represented in the decimal system are the decimal fractions. That is, fractions of the form , where is an integer, and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Atari 8-bit Family Software
Many pieces of software were available for the Atari 8-bit family of home computers (the 400/800, XL, and XE series). Software was sold both by Atari, Inc. (then Atari Corporation starting in mid-1984) and third parties. Atari also distributed software through the Atari Program Exchange from 1981 to 1984. After APX folded, many titles were picked up by Antic Software. Programming languages Assembly language Atari, Inc. published two assemblers. The Atari Assembler Editor cartridge is a friendlier, integrated development environment using line numbers for editing source code similar to Atari BASIC. The professionally targeted Atari Macro Assembler shipped at a higher price on a copy protected disk without editor or debugger. Third-party assemblers include SynAssembler from Synapse Software and MAE (Macro Assembler Editor) from Eastern House. Optimized Systems Software published an enhanced disk-based assembler mimicking the structure of Atari's Assembler Editor as EASMD (Edi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Apple II Software
An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, where its wild ancestor, ''Malus sieversii'', is still found today. Apples have been grown for thousands of years in Asia and Europe and were brought to North America by European colonists. Apples have religious and mythological significance in many cultures, including Norse, Greek, and European Christian tradition. Apples grown from seed tend to be very different from those of their parents, and the resultant fruit frequently lacks desired characteristics. Generally, apple cultivars are propagated by clonal grafting onto rootstocks. Apple trees grown without rootstocks tend to be larger and much slower to fruit after planting. Rootstocks are used to control the speed of growth and the size of the resulting tree, allowing for easier harvesting. There are more ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

BASIC
BASIC (Beginners' All-purpose Symbolic Instruction Code) is a family of general-purpose, high-level programming languages designed for ease of use. The original version was created by John G. Kemeny and Thomas E. Kurtz at Dartmouth College in 1963. They wanted to enable students in non-scientific fields to use computers. At the time, nearly all computers required writing custom software, which only scientists and mathematicians tended to learn. In addition to the program language, Kemeny and Kurtz developed the Dartmouth Time Sharing System (DTSS), which allowed multiple users to edit and run BASIC programs simultaneously on remote terminals. This general model became very popular on minicomputer systems like the PDP-11 and Data General Nova in the late 1960s and early 1970s. Hewlett-Packard produced an entire computer line for this method of operation, introducing the HP2000 series in the late 1960s and continuing sales into the 1980s. Many early video games trace their ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


The Automatic Proofreader
The Automatic Proofreader is a series of checksum utilities published by COMPUTE! Publications for its ''COMPUTE!'' and ''COMPUTE!'s Gazette'' magazines, and various books. These programs are designed to allow home computer users to easily detect errors on BASIC type-in programs, and work by displaying a hash value for each line entered that can be compared against the reference value printed in the magazine. Initially published for use with the Commodore 64 and VIC-20 in 1983, the Proofreader was later made available for the Atari 8-bit family, Apple II family, and IBM PC/PCjr as well. The line-by-line "real-time" feedback feature was something of a novelty at the time and represented a significant improvement over earlier checksum utilities, which were typically run only after a user program had been entered and, due to quite simplistic checksum algorithms, had trouble catching errors like transposed characters. Commodore versions The Automatic Proofreader was first introduced ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Commodore 128
The Commodore 128, also known as the C128, C-128, C= 128,The "C=" represents the graphical part of the logo. is the last 8-bit home computer that was commercially released by Commodore Business Machines (CBM). Introduced in January 1985 at the CES in Las Vegas, it appeared three years after its predecessor, the bestselling computer in the 80s Commodore 64. The C128 is a significantly expanded successor to the C64, with nearly full compatibility. The newer machine has 128  KB of RAM in two 64 KB banks, and an 80-column color video output. It has a redesigned case and keyboard. Also included is a Zilog Z80 CPU which allows the C128 to run CP/M, as an alternative to the usual Commodore BASIC environment. The presence of the Z80 and the huge CP/M software library it brings, coupled with the C64's software library, gave the C128 one of the broadest ranges of available software among its competitors. The primary hardware designer of the C128 was Bil Herd, who had worked ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Backport
Backporting is the action of taking parts from a newer version of a software system or software component and porting them to an older version of the same software. It forms part of the maintenance step in a software development process, and it is commonly used for fixing security issues in older versions of the software and also for providing new features to older versions. Overview The simplest and probably most common situation of backporting is a fixed security hole in a newer version of a piece of software. Consider this simplified example: * Software v2.0 had a security vulnerability that is fixed by changing the text 'is_unsecured' to 'is_secured'. * The same security hole exists in Software v1.0, from which the codebase for the newer version is derived, but there the text may read 'is_notsecure'. By taking the modification that fixes Software v2.0 and changing it so that it applies to Software v1.0, one has effectively backported the fix. In real-life situations, the mod ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hexadecimal
In mathematics and computing, the hexadecimal (also base-16 or simply hex) numeral system is a positional numeral system that represents numbers using a radix (base) of 16. Unlike the decimal system representing numbers using 10 symbols, hexadecimal uses 16 distinct symbols, most often the symbols "0"–"9" to represent values 0 to 9, and "A"–"F" (or alternatively "a"–"f") to represent values from 10 to 15. Software developers and system designers widely use hexadecimal numbers because they provide a human-friendly representation of binary-coded values. Each hexadecimal digit represents four bits (binary digits), also known as a nibble (or nybble). For example, an 8-bit byte can have values ranging from 00000000 to 11111111 in binary form, which can be conveniently represented as 00 to FF in hexadecimal. In mathematics, a subscript is typically used to specify the base. For example, the decimal value would be expressed in hexadecimal as . In programming, a number of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Checksum
A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity. The procedure which generates this checksum is called a checksum function or checksum algorithm. Depending on its design goals, a good checksum algorithm usually outputs a significantly different value, even for small changes made to the input. This is especially true of cryptographic hash functions, which may be used to detect many data corruption errors and verify overall data integrity; if the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted. Checksum functions are related to hash functions, fingerprints, randomization functions ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Numeric Keypad
A numeric keypad, number pad, numpad, or ten key, is the palm-sized, usually-17-key section of a standard computer keyboard, usually on the far right. It provides calculator-style efficiency for entering numbers. The idea of a 10-key number pad cluster was originally introduced by Tadao Kashio, the developer of Casio electronic calculators. The numpad's keys are digits to , (addition), (subtraction), (multiplication) and (division) symbols, (decimal point), , and keys.numeric keypad' at FOLDOC Laptop keyboards often do not have a numpad, but may provide numpad input by holding a modifier key (typically labelled ) and operating keys on the standard keyboard. Particularly large laptops (typically those with a 15.6 inch screen or larger) may have space for a real numpad, and many companies sell separate numpads which connect to the host laptop by a USB connection (many of these also add an additional spacebar off to the side of the zero where the thumb is locat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]