Thursday, December 24, 2020

Powerpoint Problem

 1) Can't open slide while connected to projector, need to press win key + p to see it on board

Solution: open from bottom slide show.

2) How to hide Presenter view

Solution: Right click on Next slide-->click on Hide Presenter View

3) How to insert hyperlink 

Solution: Insert...>hyperlink...>select the file. 

4) To extend HDMI Cable


 From Project to Splitter insert cable at output  and from splitter to laptop  insert cable at output.

Monday, December 21, 2020

.heic Problem

 .heic 

Install additional codec to work with this file. Download codec at Microsoft storage.

Solution: download photo-viewer.exe

Wednesday, December 16, 2020

ZOOM

 Unable to connect to video ON/OFF.

Solution: disable Firewall.

Tuesday, December 15, 2020

CCTV

 1) Offline or No config

Solution: Check UTP cable / Land Card blinking

Saturday, November 28, 2020

Router Configuration

1)Leased Line 

Convert NTC ADSL line to Leased Line

ISP connection type : Bridge Mode

Bridge Mode: VPI=0 , VCI=35

Connection type:1483 Bridge IP LLC

Proxy : 192.168.77.17  port : 80

Problem: gateway does not response

 solution:

2) Xiaomi Router 4C Configuration

Gateway:192.168.31.1

Use your WI-FI Password as your administrator password

WI-FI setting

SSID : Xiaomi_1COD

Encryption: Mixed (WPA/WPA2-Personal)

Password : enter any password you like

Network Setting

Connection: Static IP address

IP Address: 10.0.48.12

Subnet: 255.255.255.0

Gateway: 10.0.48.1

DNS: 192.168.0.2

3) ADSL Router configuration of NTC

 TP-LINK 150 Mbps Wireless N ADSL2+ Modem Router

Gateway: 192.168.1.1

username: admin

password: admin

Click on Quick Start...RUN WIZARD...Quick Start...NEXT...Time Zone...choose any time and click NEXT......

ISP Connection Type : select PPPoE/PPPoA and click NEXT

PPPoE/PPPoA 

Username: given by NTC

Password : As as username

VPI:8

VCI:81

Connection Type: PPPoE LLC

WLAN:

Access point: Activated

SSID: Give any Name you want

Broascast SSID : Yes

Authentication Type: WPA-PSK/WPA2-PSK

ENCRYPTION: TKIP/AES

Pre shared Key: type password then NEXT

Quick Start Complete..NEXT then Click on CLOSE. 

4)  NTC FTTH (Fiber to the Home)  (Huawei Router)
Gateway: 192.168.100.1
Account: root
Password: admin

To disable WLAN



         

 


Thursday, November 12, 2020

 Printer Problem

1) Blinking error light in Dell printer

Solution : Paper might be inside the printer.


2) While networking printer, while installing software in other computer, says " Cannot connect to the printer"

Solution: Problem may be due to different platform (Windows 7, Windows 10)

Solution: Check workgroup,

3)  Operation could not be completed (error 0x00000709). Double check the printer name and make sure that the printer is connected to the network.

4) Your Connection was Interrupted. A network change was detected. ERR_NETWORK_CHANGED.

(Using TP-Link Wireless N Router WR841N).

solution: Change the router.

5) Windows cannot connect to the printer. operation failed with error OXOOOOO11b (HP printer) 

solution:- 

6)  Operation could not be completed (error 0X0000005) Access denied ( Canon LBP2900)

Network  (client windows 10 pro and server windows 7) : 

solution:

7) operation could not be completed (error 0x00000709). Double check the printer name and make sure that the printer is connected to the network. (client Windows 10 and Server Windows 7)

Solution: Restore the windows.

solution: Install fresh Windows ( don't update Windows)

 8) Brother printer HL-1210W (red light blinking)

printer off

press power button ON and power cable on

Open the cover

bring cartridge out

put cartridge in

leave power button  

press power button 9 times

 1/2 times

close cover

both light on


For test print:

press power button 3


How to run Canon lb6030  with out run file

Copy the software into desktop

Right click on my computer.....>Computer Management...............>Device manager---other devices---Update Driver Software--Browse my computer for drivers...browse then select the driver from the location





HP 107 ....unable to print message

Solution: check power if no sound change Chip

Windows Cannot connect

solution: In search  type credential > Credential Manager> Windows Credentials> click on Add a Windows Credentials


 

Canon image class 3010MF

For scanner : insert scanner tool





Thursday, October 15, 2020

 How to add contract in google contract

Click on google apps then contacts.

click in contract..create a contract then fill Name, Last Name, company, Job title, Email then save it.

 

How to  create groups in gmail (labels)  

visit the site: https://contacts.google.com/

labels..then create labels..give name to labels save.

then tick the email you want to label (sign >)tick on the label name then apply


How to delete label name from email id

click on the email id you want to delete from group....then ... (triple dot) more action..remove the tick from the label.



 

Wednesday, October 14, 2020

Cyber Law_XII

 

Digital Divide: It is the gap of imbalance of the people, households, business and geographical area who use computer and internet and the people, households, business and geographical area who do not use computer and internet.

Many things such as differences in income, education, geographical location, development, infrastructure, policy of the government, comfort levels with technology are contributing factors to create digital divide by making the separation between those with access to technology resources and those without.

Digital divide is the problem that has been created due to unbalance economic status in the society and if the government does not take appropriate policy it will be widen day by day and may cause a huge problem in coming days.

 

Digital divide effects the modern society

1.      Economic imbalance

2.      Communication gap

3.      Physical barriers

4.      Lack of awareness about information and technology.

 

Computer Crime: It is the illegal use of a computer by an unauthorized individual, either for pleasure such as by a computer hacker or for profit as by thief. Thus it refers to any crime such as tampering, physical danger, unwanted disclosure of data that involves a computer and a computer network.

For example: a personal computer connected to the Internet without protection may be affected with malicious foteare within a minute

 

Cyber law: Cyber law is a term that encapsulates the legal issues related to use of communicative, transactional and distributive aspect of network information devices and technology. Hence it is related to the practice of law either in relation to or through the use of the Internet.

Cyber law deals with Internet hacking, pornography, cyber-stalking, cyber scams, online fraud, and software piracy and much more.

In many countries, Cyber law exists in the name of Information Technology Law (IT Law). It is a set of recent legal enactments, which governs the process and dissemination of information digitally.

 

Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. IT is considered a subset of information and communications technology (ICT).

 

It also encompasses other information distribution technologies such as television and telephones. Several industries are associated with information technology, including computer hardware, software, electronics, semiconductors, internet, telecom equipment, engineering, healthcare, e-commerce and computer services.

 

 Advantages of IT

·         Increases production and saves time: Business use technology to automate tasks.  A good example is a bakery which uses automated temperature sensors to detect any drop or increase in room temperature in a bakery. These censors will send information directly to the operator and report any temperature change. This saves the bakery time and it also results into quality products.

 

·         Improves communication through communication technology: With the help of communication technology tools like phones, video conferencing, electronic mail, databases just to mention but a few. Movement of information within an organization or business has become easy and first. Employees can easily move information across departments without having any interruptions. Tools like electronic mail, e-fax, mobile phones and text messaging enhance the movement of information among employees, customers and business partners or suppliers.

 

·         Improves data storage and file management: Businesses use cloud hosting services to store and backup business data. Also it saves on paper work and makes transfer and access of data remote. With services like ‘’Dropbox.com’’, business owners can access their data any time anywhere. Information and data are very important tools for a business, so it is very essential to store them safely and also access them at any time of need.

·         Improves financial management: Accounting software like Quick Books, Bookkeeper, Sage 50, and Account Edge can be used in performing various accounting tasks in a business. Business owners can easily balance their books with less experience in accounting because this software’s are well equipped with every tool needed in accounting and they also have a help section which can be referred to in case a user is stuck.

·         Cuts costs of operation and increases on RIO – Communication technology and social technology have made business promotion and product launch affordable. Many small businesses have found ways to use social technology to increase on their brand awareness and get more clients at a minimal cost. In business, factors like cost of operation play a big role in the development and growth of that business. So when businesses use information technology to cut down on costs of operation, then their ROI will increase which will result into business growth.

·         Improves business to consumer relationship – Businesses have embraced the social technology to interact with their consumers and fans. This creates a strong business to consumer relationship and it results into business growth and expansion. Information technology can be used to improve customer service in so many ways. For example, businesses can use internet to inform their customers about great deals and discounts, this makes customers feel special and it can drive their desire to buy. A good customer service can be used as a great tool by any small business to gain competitive advantage.

·         Improves on business competitive advantage: Companies have used technology to gain competitive advantage over their competitors.  A business will improve on its technology and improve on its services and products which will make its customers happy, this will turn these happy customers loyal to that business and also invite more friends to use that service or product.

 

Disadvantages

·         Implementation Expenses:  Small businesses fail to afford this expensive technology so they end up losing their clients to a business which has improved its technology and provides a better service or product.

·         Job Elimination: Technology has replaced most positions which humans used to occupy. Accounting is now being done by software, so accountants run out of opportunities.

·         Security Breaches:  Since businesses store their data on remote cloud servers which can be accessed with a user name and password, they risk losing that data to wrong minded knowledge works, hackers or viruses, which can harm the business.

 

·         Internet security issues:  For the merchant to process an order online, a consumer has to provide their financial details. Experienced hackers can use this lop hole to channel this information and use it for their own needs.

·         Faulty products and duplication: In most cases auction websites have products that are not real. So a user can bid on a shoe thinking it is original, upon delivery, they discover that the shoe is fake and it does not resemble the picture on auction.

·         Privacy – ecommerce websites collect personal data using cookies to know more about us and suggest products basing on that information. This data is collected without any notice, but with selfish intent.

·         Over dependence on information technology makes students less active and innovative. Students no longer take time to solve equation and tasks, all they do is query that task in a search engine and a solution will be provided.

·         Poor publications online: This exposes student’s t wrong information which results into failure of exams. Many online publishers post content for monetary purposes, so you find that most the content published online is not well detailed to help students and researchers.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Advantages in using information technologies:

• students using computers do not feel that they are being watched or judged;

• a computer can analyze the specific mistakes the student has made and can react in a different way from the usual teacher- this leads the student not only to self correction, but also to understanding the principles behind the correct solution;

• a computer gives individual attention to the learner and replies immediately to questions or commands;

• the another innovation involving self assessment consists of giving the learner the option of working mentally;

• a video can be used at every level, both as supplementary material for language reinforcement and skills practice;

• a video sequence used in class makes students more ready to communicate in the target language and a classroom more interactive;

• when using modern technologies during foreign language classes, authentic language situations are introduced;

• multimedia helps to make use of and stimulate one of the most important aspects of teaching – curiosity;

• using the video camera stimulates students because it is thought-provoking, demanding, dynamic, close to real life, creative, requires whole-body involvement ant gives responsibility to students;

Disadvantages in using information technologies:

• the disadvantages associated with using computer programs in teaching language are the cost and time consumed to prepare sufficiently calibrated item banks”.

• using ITs takes too much time;

• there are equipment failures while using ITs;

• there are no enough equipment at schools;

• teachers don’t know how to work with ITs ;

We might say that the use of Information Technologies also helps students to develop the skills they need for their lives. Given that there are many sources from which a class can be taught, the teacher can select the ones that fit better to the students’ needs according to their age, level, and abilities

 

 

What is cyber-crime? Explain its effects rise in this contemporary society

What do you mean by IT? Explain the advantages and disadvantages of IT

 

What is cyber-crime? Explain its effects rise in this contemporary society

What do you mean by IT? Explain the advantages and disadvantages of IT

 

Fiber to the Home (FTTH)


NTC FTTH  (Huawei Router)
Gateway: 192.168.100.1
Account: root
Password: admin

To disable WLAN



Wednesday, July 8, 2020

System Programming



Loading and Linking -1  
Introduction
To execute an object program, we need to:
Relocate: modify the object program so that it can be loaded at a different address. Link Control sections: combine separate object programs and resolve references between them
Allocate and load: allocate required memory and read in the object program into this memory.
Run: transfer control to the first instruction.

Over view
Basic Loader Functions
• Absolute Loaders
• Bootstrap Loaders
Machine Dependent Loader Features
Relocation
• Program Linking
Tables and Logic for a Linking Loader
Machine Independent Loader Features
▪ Automatic Library Search
• Loader Commands
Loader Design Options
• Linkage Editors
Dynamic Linking
Bootstrap Loaders

Design of at Absolute Loader
§  Absolute Loaders
Single Pass
Accepts Object File such as that produced by an Assembler or Compiler
Loads program into memory
All address references are Absolute — No relocation is necessary 



Algorithm for an absolute loader  

Begin

read Header record

verify program name and length

read first Text record

while record type is not 'E' do

begin

{if object code is in character form, convert into internal representation}

move object code to specified location in memory read next object program record end
jump to address specified in End record
end

A Simple Bootstrap Loader
Executed when computer is turned on or reset
Loads a predetermined program
Usually (part of) the operating system
• Loads from a specific device.
Loads into predetermined memory locations
When load is complete, jumps to predefined address
Program
The bootstrap itself begins at address 0
It loads the OS starting from address 0x80
No header record or other control information
Object code is consecutive bytes of memory

SIC Bootstrap Loader Logic
Begin
X=0x80 (the address of the next memory location to be loaded
Loop
A←GETC (and convert it from the ASCII character, code to the value of the hexadecimal digit) save the value in the high-order 4 bits of S.
A←GETC combine the value to form one byte A← (A+S)
store the value (in A) to the address in register X
X←X+1
End
ASCII codes
0~9 : 30~39
 A~F : 41~46
GETC
A←read one character
 if A=0x04 then jump to 0x80
if A<48 then GETC
A ←A-48 (0x30)
if A<10 then return A ←A-7
return
Relocating Loaders
Determine load address at load time, not assembly time.
Motivation
Increase efficiency on machine with larger memory by having several independent programs loaded at the same time in memory.
• support the use of subroutine libraries.
Object File
• All addresses are zero-based
• As if the program were to be loaded at address 0
Actual load point is an input to the loader
Comes from the Operating System
Load Point address is added to all
addresses indicated on Text records, before loading

• All absolute address references in the code are now incorrect! 



Modification Records


• Modification Record


• Each absolute address reference may be fixed by a Modification Record in the Object File


Indicates relative address within the program of data to be modified
Indicates (symbolic) value to be added to (or subtracted from) the contents of memory at that relative address
Modification record
col 1:M
col 2-7: relocation address
col 8-9: length (halfbyte)
col 10: flag(+/-)
col 11-17: segment name
M00000705+COPY
Also called RLD specification
Relocation and Linkage Directory
Modification Records - Algorithm
Algorithm
Pass 1: Process all H, D and R records in the object file, computing the addresses of all External Symbols
Pass 2: Process all T and M records
• Relocate data in T records
• Compute M record values
Jump to the Starting Address given in the End record

Relocation Bit — Alternative
. For SIC type machines
• Relocation bit
0: no modification is necessary
1: modification is needed
each instruction is associated with one relocation bit
relocation bits in a Text record are gathered into a bit mask
• Twelve-bit mask is used in each Text record
Each text record contains less than 12 words
• unused words are set to 0

any value that is to be modified during relocation must coincide with one of these 3-byte segments 



Program Linking


Goal

• Resolve the problems with EXTREF and EXTDEF from different control sections Example

Use modification records for both relocation and linking 




Program Linking Example


Load address for control sections

PROGA 004000 63

PROGB 004063 7F
PROGC 0040E2 51
Load address for symbols.
LISTA: PROGA+0040=4040
LISTB: PROGB+0060=40C3
LISTC: PROGC+0030=4112
REF4 in PROGA
ENDA-LISTA+LISTC=14+4112=4126 . T0000540F000014FFFFF600003F000014FFFFC0
M00005406+LISTC

Program- Logic and Data Structure
▪ Two Pass Logic
 Pass 1: assign addresses to all external symbols
Pass 2: perform the actual loading, relocation, and linking
ESTAB (external symbol table)

Control Section
Symbol
Address
Length
PROGA

4000
63

LISTA 
ENDA
      
4040
4054

PROGB

4063
7F

LISTB
ENDB
40C3
40D3

PROGC

40E2
51

LISTC
ENDC
4112
4124


Pass 1 Program Logic
Pass 1:
• assign addresses to all external symbols
• Variables & Data structures
• PROGADDR (program load address) from OS
• CSADDR (control section address)
• CSLTH (control section length)
·        ESTAB
 Process Define Record
Pass 2 Program Logic
▪Pass 2:
Perform the actual loading, relocation, and linking
Modification record
• lookup the symbol in ESTAB
End record for a main program
transfer address
Process Text record and Modification record 


Improve Efficiency

• Use local searching instead of multiple searches of ESTAB for the same symbol

• assign a reference number to each external symbol

• the reference number is used in Modification records

Implementation
• 01: control section name
 • other: external reference symbols 


Improve Efficiency

• Use local searching instead of multiple searches of ESTAB for the same symbol

• assign a reference number to each external symbol

• the reference number is used in Modification records
Implementation
• 01: control section name
 • other: external reference symbols
Example: PROGA

Ref No.
Symbol
Address
1
PROGA
4000
2
LISTB
40C3
3
ENDB
40D3
4
LISTC
4112
5
ENDC
4124
PROGB
Ref No.
Symbol
Address
1
PROGB
4063
2
LISTA
4040
3
ENDA
4054
4
LISTC
4112
5
ENDC
4124
PROGC
Ref No.
Symbol
Address
1
PROGB
4063
2
LISTA
4040
3
ENDA
4054
4
LISTC
40C3
5
ENDC
40D3
 
Automatic Library Search
Subprogram Libraries
• Standard Libraries -- known to loader
• Other libraries -- specified by control statements to the loader
CSECTs from Library
• External references in Source Program
• Automatically retrieved from Library and linked (automatic library call, or library search)
SOEN 229
Searching Algorithms
For all symbols from REFER records
• Enter into ESTAB (if not already there)
• Mark them as "undefined" initially
For all symbols from DEFINE records or HEADER records
• Enter into ESTAB (if not already there)
• Mark as "defined"
At the end of Pass 1
• Symbols in ESTAB still marked are unresolved external references
• Search Program Libraries for these symbols
• When found, link in the defining CSECT
Repeat above steps for all REFER, DEFINE and HEADER records in Library CSECTs
If any entries in ESTAB still undefined— then report error


Overriding Library Search

If symbols with the same name appear in both the loader input and in the library, the loader input takes precedence
Thus it is possible to override automatic library search by including a CSECT in the loader input that defines some of the same external symbols as ones in the library For example, you could write your own I/O routines and override the ones normally retrieved from the library.
Searching the Library
Library contents = object programs
Linear search for symbols is inefficient;
Solution: Directory containing pairs:
- Name of symbol defined in DEFINE or header record
- Location in the file of CSECT containing the definition
Aliases - duplicate names
- All names are stored in the directory
- Aliases point to the same CSECT

Loader Commands
• Mechanisms
- Command file
- Job Control Language
- Incorporate in Object File
• INCLUDE <ProgName>(<LibraryName>)
 - Read program from Library and treat it as part of the input stream
• DELETE <CSECT-Name>
- Delete a CSECT from the set of programs in the loader input
• CHANGE <Namel> <Name2>
- Change the name of an external symbol every time it appears in object programs • LIBRARY <LibraryName>
- Search indicated library before searching the automatic library
Loader Commands (cont.)
NOCALL <NameList>
- Don't resolve external references to the names in <NameList>
 - Avoids linking in CSECTs you know you won't be needing for the current run
- May result in an error if statements containing references to the names in <NameList> are executed
- Useful during program development
MAP
- Generate a load map
- Possible information in a load map:
o Control Section names & addresses
o Other external symbol names and addresses
o Cross reference showing where references to symbols appear 



Loader Command - Example

A square root function, SQRT, is called from several places the object program being presented to the loader.
SQRT is in the loader input file
Another version of square root, SQROOT, is available in a brary called ALTLIB
We wish to replace calls to SQRT by calls to SQROOT without recompiling the source
We pass the following sequence of commands to the loader:
INCLUDE SQROOT (ALTLIB)
DELETE SQRT
CHANGE SQRT, SQROOT
Loader Design Option
Linkage Editors
Dynamic Linking
Bootstrap Loaders
Linkage Editors
Same function as linking loader except the linked program is written to a file rather than loaded into memory and executed
File is called a load module or executable image
Usually relocatable
A Relocating Loader is then needed to load and execute the load module
Advantages and Disadvantages of Linkage Editors
Advantages
• Low overhead if the program is to be executed frequently (without change)
• Even greater savings if the load address is known at link-edit time -- an absolute load module can be generated and no relocation needs to be done at load time Disadvantages
• Load modules take up space
• Extra steps required can be inconvenient if the program is recompiled frequently (e.g., during testing) 


Building Subroutine Packages
Use the Linkage Editor to link a collection of routines that normally appear together, into a subroutine package
The Subroutine Package is linked with a using program with a linking loader when the using program is loaded
Saves the cost of linking routines in the package every time they are needed in a using program
Dynamic Linking
Run time linking -- occurs when a call is made to a CSECT that is currently not in memory
Overhead of linking is not incurred unless the CSECT is actually called — savings for infrequently called CSECTs
Useful also for interactive programs in which the decision to call a CSECT depends on the input
Usually done with an Operating System Service Request
In high level languages, dynamic linking may require the use of a Runtime Environment that is language sensitive.
For example, Parameter passing (call by address, call by value, etc.)
Type checking of parameters
Dynamic Linking Example
Through
(a ) Pass symbolic name of routine to be called to the Operating System  
(b) O.S. does a table lookup in the Library and loads (links) the routine into the program
(c ) O.S. passes control to the routine
(d) Routine executes and returns control back to the operating system.
This is so the O.S. can know that the memory is again available
• O.S. then returns back to the calling program
(e)If there are no intervening dynamic loads, another call to the routine does not require another load and link
Bootstrap Loaders
On initial power up (or reset) a very small absolute loader is available (e.g., on ROM) This loader loads additional code
This, in turn, loads additional loader or operating system code
Eventually the entire operating system is loaded and executing
The name comes from the expression "pulling yourself up by your bootstraps"
Thus, when starting an operating system, we say that we are "booting" the system
 
 
 
 
   
Macro Processors
Introduction
• Concept
A macro instruction is a notational convenience for the programmer.
It allows the programmer to write shorthand version of a program.
The macro processor replaces each macro invocation with the corresponding sequence of statements (a process known as macro expansion)
Macro Processor Tasks
• Recognize macro definitions
• Save the macro definition
• Recognize macro calls
• Expand macro calls
Macro Definition
• Simple string substitution
• parameter substitution
conditional macro expansion
• macro instruction defining macros 
 Macro vs. Subroutine
Macro
• the expansion is done in place each time the macro is invoked; so source statements repeat
Subroutine
• the source statements in a subroutine appear in only one place.
 One Pass Macro Processor
Prerequisite
Every macro must be defined before it is called
Sub-procedures
macro definition: DEFINE
macro invocation: EXPAND 


begin {macro processor}
EXPANDING := FALSE
while OPCODE = 'END' do
begin GETLINE
PROCESSLINE
end {while}
end (macro processor)
procedure PROCESSLINE
begin
search NAMTAB for OPCODE
if found then
 EXPAND
else if OPCODE = 'MACRO' then
DEFINE
else write source line to expanded file
end {PROCESSLINE}

Nested Macros Definition
• Macro definition within macros
process macro definition during expansion time 


Allowing Nested Macro Definition

• Sub-procedures

Macro definition: DEFINE

 Macro invocation: EXPAND

• EXPAND may invoke DEFINE when it encounters a macro definition

procedure DEFINE

begin

enter macro name into NAMTAB

 enter macro prototype into DEFTAB

LEVEL: - 1

while LEVEL > 0 do

begin

GETLINE
 if this is not a comment line then
begin
substitute positional notation for perameters
enter line into DEFTAB
if OPCODE ='MACRO' than
LEVEL := LEVEL + 1
else if OPCODE: - 'MEND' then
LEVEL:= LEVEL - 1
end (l not comment)
and (while)
store in NAMTAD pointers to beginning and end of definition end (DEFINE)
procedure EXPAND
begin
EXPAND:- TRUE
get first Line  of macro definition [prototype) from DEFTAB
set up arguments from macro invocation in ARGTAB
while macro invocation to expanded file as a comment
while no: end of macro definition do
begin GETLINE
PROCESSLINE
end (while)
EXPANDING:= FALSE
end (EXPAND)
procedure GETLNE
begin
if EXPANDING then
begin
 get next line of macro definition from DEFTAB
 substitute arguments from ARGTAB for positional notation
and {if)
 else
read next line from input  file
end (GETLINE)


Conditional Macro Expansion
• Macro-time conditional statements
• IF-ELSE-ENDIF
 Macro-time variables
• any symbol that begins with the character & and that is not a macro parameter
• macro-time variables are initialized to 0
·         macro-time variables can be changed with their values using SET
&EORCK SET 1