CD3WD Project

Back to Home Page of CD3WD Project or Back to list of CD3WD Publications


Home - English - French - German - Italian - Portuguese - Spanish
                        MICROCOMPUTERS FOR INFORMATION
                             RESOURCES MANAGEMENT
 
                          A GUIDE TO THE VITA SYSTEM
 
 
                                     by
                            Gary L. Garriott, Ph.D.
                               Brij Mathur, B.A.
                               Helen Picard, M.A.
                                     and
                            Richard S. Muffley, M.S.
 
 
                                 published by
 
                       Volunteers In Technical Assistance
                        1600 Wilson Boulevard, Suite 500
                            Arlington, VA 22209, USA
 
                                 September 1983
 
                               Revised August 1984
 
 
                       Volunteers In Technical Assistance
                        1600 Wilson Boulevard, Suite 500
                            Arlington, VA 22209, USA
                                  
                                [C] September 1983
 
 
                                TABLE OF CONTENTS
 
I.  Introduction
 
           Background
           Program Design
           Goals of the Training
 
II.  System Overview
 
           Some Definitions
           Booting Up
           Program Languages
           Operating System
 
III.  Basic Operations
 
           Turning On the Computer
           The Keyboard
           Creating and Storing Files (Information)
           D.O.S. Commands
           Menus
           Password Protection
           Floppy Diskettes
           Editing Files and Programs
           Variables
           Data Bases
 
IV.  Using the Microcomputer
 
           Data Entry
           Procedures for Data Entry
             Getting Started
             Logging On
             Entering the Data
             The Cursor, Data Fields, and
               Key Operations
             Updating Records
             Printing Data
           Data Base Searching
             Bibliographic Files
             Procedures for Bibliographic Data Base
               Searching
             VITA Volunteer Files
             Sample Volunteer File Search
           Commercial Data Bases:  DEVELOP (CDC)
             Key Word Searching
             Truncation
             Using "AND," "OR," and "AND NOT"
             The Report Following the Search
             Reading the Result File
           Computer Software:  Other Applications
             Financial Records
             Graphics
             Long Distance Computer Links
             Games
             Educational Tools
 
V.  Automating an Information Service
 
        Considerations for Computerization:
          Myths and Realities
        Questions for Potential Users
        Questions to Ask Computer Salespeople
        Technical Considerations for Field Use
          of Microcomputers
 
Appendixes
 
  A.    "In Other Words"--a glossary of computer terms
  B.     VITA Bibliographic Data Base format
  C.     VITA Volunteer File format
  D.     DEVELOP Literature Unit
  E.     DEVELOP Technology Unit
  F.     DEVELOP Who's Who Unit
  G.     Text Writing Program:   Input
  H.     Text Writing Program:   Final Output
  I.     Apple Plot graph
 
I. INTRODUCTION
 
Background
 
Microcomputers are becoming increasingly important for
the management of a wide variety of information resources.
VITA has made a major institutional commitment
to incorporating microcomputers into those aspects of
our work that will result in greater efficiency and
productivity, and, therefore, greater effectiveness.   We
view microcomputers as extremely useful tools for technology
development and transfer.  In addition, we are
now using microcomputer systems to enhance one of our
major activities--the transfer of technical information
overseas.  As it became apparent that computers could
improve our own operations, we sought ways to ensure
that institutions in developing countries could benefit
from our experience.  Our choices of hardware and
software were specifically guided by this concern.
 
Our Information Resources Management training reflects
this emphasis on computer applications.   It also
reflects our experience that extensive computer programming
expertise is not usually required to adapt
existing software, particularly file and data base
managers.  Our experience suggests that many organizations
will find that they can introduce, use, and maintain
successful microcomputer applications.
 
This text is an aid to understanding basic microcomputer
operations, using VITA's bibliographic and skills
bank systems as practical examples of functional applications.
While our system is built around Apple computers,
a similar logical approach applies to all
microcomputer systems.
 
Program Design
 
The microcomputer training module emphasizes operations
and applications.  It does not require prior computer or
programming experience.  The course combines written
information with lectures, demonstrations, and practical
experience.  Each trainee will also receive individual
diskettes to maximize the opportunity for practice
on the computers.  Additional instruction will be
available for those who wish to gain more expertise in
the logical processes involved in the design of microcomputer
applications.
 
Goals of the Training
 
VITA's microcomputer training module is designed to
provide each participant with the information, reference
materials, opportunities for group and individual
discussion, and practical experience that is necessary
for a basic foundation in computer applications and
operations.  More specifically, the course provides
trainees with:
 
  *   an introduction to basic terms and concepts common
     to all computer systems;
 
  *   knowledge of basic computer operations, including
     such peripheral equipment as disk drives and
     printers;
 
  *   practical experience with a computerized skills
     bank and bibliographic data base, including carrying
     out such tasks as data preparation, data entry
     and updating, and data base searching;
 
  *   a presentation of the factors necessary for the
     analysis and appraisal of the potential for the
     successful introduction and operation of a microcomputer-based
     system in an organization; and
 
  *   guidelines helpful in assessing which microcomputer
     system and software package(s) are most suitable
     for the given problem and environment.
 
VITA is committed to assisting all trainees and their
sponsoring organization wishing to establish specialized
microcomputer systems and applications.   As a
result of our own experience in developing a complex
microcomputer-based system, VITA can offer valuable
assistance to anyone getting started with computers.
 
II.  SYSTEM OVERVIEW
 
Some Definitions
 
In general, all computer systems consist of hardware
and software.  Hardware includes the keyboard and screen
of the computer itself, its peripherals (components
such as printer, disk drive, modem, hard disk, etc.),
and all other physical equipment making up the computer
and its total system.
 
Software is what makes this equipment work.   Software
consists of a program (or programs) written in any one
of several computer "languages" that makes the computer
perform the task(s) required by the user.   Specialists
skilled in computer programming write such programs in
the language(s) suitable to the particular computer,
and physically place them on a disk or diskette.
Separate programs are generally required for each task
the computer will perform.
 
A disk is a storage medium similar to a phonograph
record.  Disks are used to store the instructions needed
to make the computer operate (the program), and to
store the data the computer will manipulate for the
user.
 
Information is stored in two areas in a microcomputer.
One area is in the computer itself and is referred to
as memory.  The other area is on a magnetic disk or
diskette.  The computer's memory is temporary, and
information stored in it is lost when the machine is
turned off.  Information stored on the diskettes, on the
other hand, is permanent.  It is not lost when the
machine is turned off.  It is easy to transfer information
from one storage area to the other (see LOAD and
SAVE in Section III).
 
Microcomputers use flexible, or "floppy" diskettes that
are 5-1/4" or 8" in diameter, depending upon the type
of microcomputer used.  One floppy diskette can store
120,000-130,000 characters.  When it is necessary to
store more data than this and to have a variety of
programs readily available, a hard disk can be used to
expand the storage capacity, or memory.   A hard disk can
store up to 80 million characters.   All of these computer
terms, and others, are defined further in Appendix
A, "In Other Words."
 
Booting Up
 
To function properly, the computer must "understand"
the commands or instructions the computer operator will
use.  Thus, the first task of the operator is to program
the computer with the specific instructions for the job
at hand.  The operator selects the diskette containing
the proper program, or set of instructions, for the
language and the operating system that will be used.
When the machine is turned on, the information is
transferred from the diskette to the computer's memory.
This process is called "booting up."
 
The Apple computers used in this course read the program
language information from the diskette placed in
Disk Drive 1.  Good practice requires that the program
diskette be inserted into Disk Drive 1 before the
machine is turned on.
 
Program Languages
 
The Apple computer understands a variety of specialized
program languages, including FORTRAN, COBOL, PASCAL,
BASIC, and many others.  Only one language is used at a
time.  If no language information is specified, the
Apple computer assumes that the operator is using a
special form of BASIC that has been developed by the
Apple Corporation for its computers.
 
Operating System
 
The computer also uses special commands for carrying
out file and diskette operations.   The commands that are
required depend on the particular type of operating
system the computer has.  In this course, the machines
will be using either Apple D.O.S.   (Disk Operating
System) or CP/M (Control Program for Microcomputers).
During the "booting up" process the operating commands
are added to the language commands given to the computer.
Though you will be using CP/M later during this
course, it will not be necessary to learn the operating
commands at this time.  However, you will need to learn
the operating commands for Apple D.O.S., which are
given later in this manual.
III.  BASIC OPERATIONS
 
Turning On the Computer
 
The red switch on the left of the computer turns on the
system.  This switch causes several things to happen.
The most noticeable is that Disk Drive 1 begins
whirring and a red light appears as the diskette is
being read.  After a few seconds, the whirring will
stop, indicating that the program instructions are now
complete, or "resident" in the computer's memory.
 
The screen will display a "prompt," which is a bracket
(]).  At this moment, the prompt indicates that the
computer is ready to receive instructions from you.
Next to the prompt there is a flashing block called the
"cursor" that marks the point at which you will type
the next character.
 
The Keyboard
 
The computer keyboard is very similar to a typewriter,
but there are differences:
 
1.  The information you type on the computer keyboard
    appears on the screen, but it does not enter the
    computer memory until you press the RETURN key.  It
    is the RETURN key that actually sends your typed
    command to the computer.
 
2.  All the letters appear on the screen in upper case,
    so the "shift" key has a somewhat different function
    from the typewriter's "shift" key.  Use the
    "shift" key on the computer to type the top characters
    on all keys displaying two characters.
 
3.  You can type a character repeatedly by simultaneously
    pressing the REPT (repeat) key and the key
    you wish to repeat.
 
4.  There are two arrows on the right side of the keyboard.
    The left arrow moves the cursor backward and
    erases the characters it moves over.  The right
    arrow causes the cursor to move forward but does
    not erase the characters it passes over.
 
5.  The CTRL (control) key is on the left side of the
    keyboard.   When you press this key and certain other
    keys at the same time, special commands are sent to
    the computer.  For example, if you type C while you
    press CTRL, the computer stops what it is doing and
    allows you to enter new commands.  This operation is
    called Control-C and is written CTRL-C.  The key
    labelled BELL (the top character on the G key) also
    is operated by simultaneously pressing the CTRL
    key.   This operation is referred to as CTRL-G.  When
    you get to a keyboard, type CTRL-G, CTRL-J, CTRL-M,
    and others to see their special effects.
 
 
6.  Pressing the ESC (escape) key has different effects
    depending on the state of operation of the Apple.
    If a program is running, typing ESC may interrupt
    the program in the same manner as CTRL-C.  This will
    put the computer in a mode ready for a new operating
    command.   However, if the screen shows a prompt
    and a flashing cursor, pressing ESC one time will
    put the computer in an editing mode.
 
7.  Using the RESET key is a drastic operation.  This
    key will usually cause loss of the computer memory
    and other internal changes (nothing serious will
    happen to the hardware).  If a program is written
    poorly or is not completely compatible with the
    hardware being used, running it may cause the computer
    to "hang-up" or "hang."  This means that the
    computer is stuck and will not respond to any key
    or sequence of keys from the keyboard.  To get it
    unstuck, press the RESET key.  The effect this will
    have on the software loaded into the computer is
    uncertain, so use RESET only as a last effort.
 
Creating and Storing Files (Information)
 
When you need to save information for future recall,
you place it in a file that is stored on a diskette.
 
Just as you might use a typewriter to record information
on paper, you can use the computer keyboard to
type information into the computer's memory, and from
there transfer it to a floppy diskette for permanent
storage.  The floppy diskette is like the piece of
paper; both contain images of information.   A file can
be a program or a collection of data.   The data might be
a year's worth of wind speed measurements, a list of
addresses, or the chapter of a book you are writing.
Because more than one file can often be stored on each
diskette, each file must be identified by a name that
is special to that file, to distinguish it from other
files.  The file name is used for any future reference
to the information in the file.   The file name should be
short (three to eight characters) and it should refer
to the file contents.  For example, a file containing
information on wind velocities might be called WIND.
 
D.O.S. Commands
 
The computer expects to receive certain commands from
you.  If you send commands that the computer does not
expect, it will not operate.   Some of the most commonly
used Apple D.O.S. commands and their functions are
listed below.  To send these commands to the computer,
type them on the keyboard and then press the RETURN
key.
 
Command              Comment
 
CATALOG    This command causes the computer to print the
           names of all of the files on the diskette.
 
LOAD       This command puts the information from a
           particular diskette file into the computer's
           memory.
 
LIST       LIST displays the contents of the computer's
           memory on the screen.  This allows the user to
           read through the contents of a file that has
           been loaded.
 
RUN        Once a program has been written, it is of no
           use unless it can be made to operate.  RUN
           causes the execution of a program.
 
DELETE     This serious command permanently removes
           information (a file) from the diskette.  Once
           the file is deleted from the diskette, it is
           gone.   Be certain that you really do wish to
           erase something before using this command.
 
NEW        This command causes a program that has been
           loaded into the computer's memory to be
           deleted.
 
SAVE       When the computer is turned off, all information
           in its memory is lost.  However, information
           stored on the diskettes is not lost.  Use
           SAVE to transfer information from the computer's
           memory to the diskette.
 
RENAME     This command allows you to change the name of
           an existing file.
 
LOCK       This command protects an existing file from
           being accidentally or deliberately "written
           over" (revised) or deleted.  A locked file can
           be unlocked with the command UNLOCK.
 
HOME       This command clears all of the writing displayed
           on the screen.
 
Commands that act on a file (LOAD, RUN, DELETE, and
LOCK) require you to type the file name after the
command and before you press the RETURN key.   For example,
if you ask the computer to carry out the command
DELETE you must also tell it which file to delete.   If
the file name is "BAS13.DAT," then
 
                    DELETE BAS13.DAT
 
will delete the file.  Try typing DELETE without a file
name.
 
RENAME also acts on a file.  You must include the old
name and the new name being given to the file:
 
                RENAME OLDFILE, NEWFILE
 
With practice you will know that CATALOG and LIST--and
sometimes RUN--do not require file names to be entered
as part of the command line.
 
Menus
 
Computer software instructions are too complex and
cumbersome for most operaters.   For this reason, people
who write computer software often code the instructions
in a table similar to the one given below.
 
    1   SQUARE A SERIES OF NUMBERS
 
    2   READ A FILE ON THE DISKETTE
 
    3   AFRICAN COUNTRIES
 
    4   SILLY KINGDOM
 
    5   QUIT
 
To use the software, simply select the number corresponding
to the operation that the computer is to be
instructed to do.  All of the complex instructions that
have been written into the software are initiated by
typing this number.  The table is referred to as a
menu.  Like the menu used in a cafe, this menu gives you
a choice of operations.
 
Password Protection
 
Sometimes it is desirable to limit the use of certain
programs or systems to specific people.   To ensure that
only authorized people, and no one else, can use the
program, a secret code is given to the authorized user.
 
This code is called a password.   The computer program
will at some time require you to type the password on
the keyboard.  The program is expecting the password and
if it is entered correctly, the program will continue.
If the expected  password is not entered, the program
will stop.
 
Use the password to protect your files.   Keep the password
a complete secret.  It is no one else's business
and should not be written or told to anyone.   Even the
computer protects the secrecy of passwords:   they are
not displayed on the screen when they are typed on the
keyboard.
 
Floppy Diskettes
 
Diskettes are either 5-1/4 inches or 8 inches in diameter
(Apple uses 5-1/4 inch diskettes), plastic, and
coated with a substance similar to the magnetic coating
on recording tape.  The diskette is contained in a permanently
sealed black cover inside which it turns
freely.  This unit is flexible--it will bend--and so is
referred to as a floppy diskette; other storage disks
exist that are not flexible.   Only floppy diskettes can
be used in the disk drives used in this course.   In
another section of the course you will see and use hard
disks.
 
Though floppy diskettes are durable and made to be
handled, the following guidelines will help you prevent
damage to them.
 
1.  Though the diskettes are flexible, they should not
    be bent.
 
2.  Do not touch the exposed portion of the diskette.
    Scratches and fingerprints can delete information
    or prevent accurate recording of new information.
 
3.  Always keep labels on the outside of the plastic
    cover.   The label should clearly describe the information
    stored on the diskette.  When preparing the
    label, do not write on it with a hard point, such
    as a ball point pen or a pencil.  Instead, use a
    soft, felt-tipped pen.  It is best to write the
    information on the label before sticking the label
    on the diskette.
 
4.  High temperatures (125 [degrees] F or 52 [degrees] C) can cause the
    plastic cover to warp or bend.
 
5.  Keep the diskettes away from electrical items and
    magnets.   The information on the diskette will be
    lost if it enters a magnetic or electrical field.
    When a telephone rings, for example, it produces a
    significant electrical field, so do not store
    diskettes near telephones.
 
6.  When purchased, each floppy diskette comes in a
    small open-ended envelope for protection.  When not
    in the disk drive, the diskette should be replaced
    in the envelope.
 
NOTE:  Never remove a diskette from the disk drive
       when the red "in use" light is on, as this may
       cause the information on the diskette to be
       lost.
 
Diskettes have a natural life-span of approximately 40
running hours.  Considering that a diskette runs for
only a few seconds in each use, 40 hours is a long
time.  Even so, diskettes will eventually wear out, and
they can be damaged.  It is essential to keep at least
one set of duplicates of important diskettes.   There are
special computer programs that will make duplicates of
diskettes.  Copies of important diskettes are often
referred to as "back-up copies" and the information is
said to be "backed up."   Usually the original diskettes
are put safely away and the back-up copies are used
with the computer.  When the back-up copies wear out, or
are lost or destroyed, the originals are used to make
new back-up copies and then put safely away again.
 
Editing Files and Programs
 
No matter how well a program or other file may be
written, it is certain that you will want to make
changes in it at some time.  To do this, you can retype
the entire file or other pieces of information into the
machine with changes made, but this would take much
more time and effort than is necessary.   There is an
easier way.  You can make changes in a file by using an
"editor" program.  Editors can work in several ways, but
the results are the same--a small portion of a file is
changed without rewriting the entire file.   An editor
program is exactly what its name implies.   It will edit
a file or program.  Whenever a computer operator revises
or changes computer files, the operator is using
editing software.
 
Editing software is an essential part of a computer
system and should be purchased as part of an initial
system.  Many different editing packages are available,
and it is not uncommon to have more than one.   Editors
are often built into the design for a particular software
package.  It is possible, however, to purchase
editors as individual pieces of software.
 
Variables
 
Often it is useful to program the computer to carry out
a sequence of tasks without using the specific information
required for the desired results.
 
If, for example, your computer is programmed with the
specific instruction to add 5 and 7, it would give the
only answer that could logically be expected:   12.  But
what if you wish to add 3 and 8, then add 4 and 1, and
later add 271 and 862?  For each of these cases a  new
program would need to be prepared.   There is a better
way.  The computer can be programmed to carry out the
following sequence:
 
It can then be told to ask you to type the numbers to
be added on the keyboard, then press the RETURN key.
The computer will respond by printing the answer, A,
which will be the numerical sum of the numbers typed on
the keyboard, which are represented by B + C in the
computer program.
 
In this way, the computer has been programmed one time
with the sequence to be performed (A = B + C).   It
carries out the sequence whenever you wish to do it,
and no reprogramming or editing is needed.   In such a
computer program, the numerical value of A, B, and C is
constantly changing, therefore A, B, and C are known as
variables.
 
Variables are letters in a computerized sequence that
represent specific values.  However, the specific values
change according to the wishes of the operator.
 
Data Bases
 
Computers have made the storage and retrieval of information
fast and easy.  As a result, large amounts of
related information can be put together to meet
specific needs, in collections called data bases.   For
example, the telephone company assembles a large data
base consisting of all the names, addresses, and telephone
numbers of its customers.  The supermarket keeps a
computerized data base of the quantity and price of
each grocery item it has on the shelves.   The Library of
Congress stores bibliographic information on all of its
literature holdings on a computerized data base.
 
There are many ways to search for information in a
large data base because the computer program is so
versatile that it allows the user to find almost any
information desired.  In VITA's bibliographic data base,
you might, for example, ask the computer to display a
listing of all documents written by a specific author,
or all those on the subject "plastics."   Or you could
find out how many documents VITA has on "wind power,"
how many new documents were added to the collection
after September 1, 1983, and so on.
 
One important way to find information in a data base is
by using key words.  Key words are terms that refer to
specific concepts or types of information.   For  example,
if you wish to find information on energy from the sun,
you might direct the computer to look for SOLAR
ENERGY.  In another data base, the key word might be SUN
POWER.  The important thing to remember is that the same
key word always applies to the same type of information.
 
In VITA's bibliographic data base, each record includes
a list of key words that apply specifically to the
information in that record.  You can instruct the computer
to search through all the records in the data
base, looking through the lists of key words for the
specific words that you have chosen.   When a key word in
a record matches the word you have directed the computer
to look for, the computer displays the entire
record for you.  To use the SOLAR ENERGY example again,
each time a record containing the key word SOLAR ENERGY
is found, that record will be identified for you.
IV.  USING THE MICROCOMPUTER
 
 
Thus far we have discussed the basics of microcomputer
operations and functions.  Gaining skill and confidence
comes through actual practice with the computer itself.
This section of the text will guide you through
more important procedures used to maintain and operate
VITA'S bibliographic data base and its skills bank of
VITA Volunteers.  Following the text closely will assist
you in operating the computer so it will perform the
tasks described.  An instructor is also available to
answer questions and assist with problems.
 
Data Entry
 
Entering data accurately into the computer is a critical
step in building an efficient, trustworthy computerized
information system.  Data entry is, obviously,
a manual operation and can be, as in all manual systems,
subject to error.  The computer cannot compensate
for operator errors in the data entered.   For example,
if a key word for a document is "wind power," that word
must be entered accurately and exactly.   If the operator
makes a typing error so that the word is entered as
"wind power," for example, that document will never be
found when the operator is searching for "wind power"
documents.  Likewise, use of a similar word such as
"wind generating" instead of the established key word,
"wind power," will prevent the computer from finding
the document.
 
Consistency and accuracy, then, are essential to data
entry.  Just as in manual bibliographic cataloging or
skill coding for the skills bank roster, an authority
file or thesaurus of controlled terms must be kept and
used to ensure consistency in titles, etc.   Similarly,
an authority file must also be kept for such things as
abbreviations, acronyms, publisher addresses, etc.
 
After each data unit is typed, it must be carefully
checked for accuracy.  Any error must be corrected by
editing the entry.  Only when the unit is correct should
it be entered into the system.
 
Procedures for Data Entry
 
The procedures that follow apply to both VITA's bibliographic
data base and its VITA Volunteer skills
bank.  Some of the procedures will vary (see notes in
the steps outlined) depending upon which data base is
being used and whether the computer in use is a stand
alone system or is connected to the hard disk.
 
Getting Started.  If you are using the hard disk system,
simply press the switches that turn on the computer and
screen, and proceed to Logging On.   If you are using a
stand alone computer, insert the "program" diskette
(see the label) in Disk Drive 1 and the "data" diskette
in Disk Drive 2.  Close the drive gates.  Press the
switches that turn on the computer and the screen
monitor.  When the whirring of the disk drive stops and
the red light goes out, you are ready to log on.
 
Logging On.  Follow the sequence of operations outlined
below.  If using the hard disk system, start with item
a.  If using a stand alone computer, begin with item b.
 
Screen Displays                         User Types
 
a.  PLEASE ENTER YOUR NAME             DOC (bibliographic data
                                       base)
                                       or
                                       SKIL (skills bank)
                                       Press RETURN
 
b.  A>                                  B:   (don't forget colon)
 
c.  B>                                  DBMS (Data Base
                                       Management Software)
                                       Press RETURN
 
d.  ENTER LICENSE NUMBER:              335116
                                       Press RETURN
 
e.  ENTER TODAY'S DATE                 6/19/84 (for example)
                                       (use numbers and
                                       slashes as shown for
                                       month/day/year)
                                       Press RETURN
 
f.  B>>
 
Entering the Data.  For data entry, you may use either
VITA's bibliographic data base or the VITA skills bank.
The process is similar for both data bases, although
the specific data fields, their names, lengths, and the
information to be entered into each field differ for
each data base.
 
Study the VOLUNTEER FILE format and the BIBLIOGRAPHIC
DATABASE format in Appendixes B and C, along with the
accompanying descriptions of the field names and space
allocations for each of the two data base formats.
 
Select the data base you will use, collect the data you
will enter into the computer, and follow the steps
below:
 
Screen Displays                         User Types
 
a.  B>>                                 ENTER VOL (skills bank)
                                       or
                                       ENTER FULLREC
                                       (bibliographic data base)
                                       Press RETURN
 
b.  VOLUNTEER FILE format              Type in data
    or
    VITA BIBLIOGRAPHIC
    DATABASE format
 
The Cursor, Data Fields, and Key Operations.   Note that
the cursor blinks at the beginning of the first data
field of the form on the screen ([ACCNO] or [NO.]).
Type the number of the document or the Volunteer in the
field and advance to the beginning of the next field by
pressing the RETURN key.  If all spaces in a field are
filled, the cursor will automatically advance to the
next field without the RETURN key.   If the RETURN key is
used in this instance, it will skip a field, requiring
the user to move the cursor back to the beginning of
the field that was skipped.  Move the cursor by using
the left arrow key, which will move the cursor backward.
 
Some fields in the form are programmed with a "default
value."  The computer has been programmed so that unless
the data entered are different from the answers or
values assigned to those fields, the computer will
automatically enter the answer into the field when the
RETURN key is pressed.
 
There are a few fields that continue for more than one
line (e.g., SKL1 and SKL2 in the VOLUNTEER FILE or
ABSTRACT in the VITA BIBLIOGRAPHIC DATABASE).   In the
VOLUNTEER FILE, care must be taken to complete the word
at the end of the line.  Hyphens may not be used, nor
can words be split between two lines.   However, in the
BIBLIOGRAPHIC DATABASE, continue entering data when the
right margin of the screen is reached in the ABSTRACT
field.  The word being typed will "wrap" to the next
line.  Though a word may appear broken, since part of it
is on one line and part on the line below, the computer
will put the word back together when the record is
printed.  Again, do not use hyphens.
 
ABSTRACT consists of two fields.   The cursor will automatically
skip to the second ABSTRACT field when the
first has been filled.  In this case, when the first
field is filled, continue typing even though a word may
be split between the first and second ABSTRACT fields.
If there are too many data for both fields, simply
shorten the data with a slash (/) at the end of the
second field.
 
When data entry has been completed for a record, press
the RETURN key (or CTRL-E) until the option line
appears at the bottom of the screen:
 
OPTION:  ABORT (A), CONTINUE (C), DELETE (D), END (E),
PRINT (P), REVISE (R)?
 
For data entry, only A, C, E, or R are used.
 
Abort (A) might be used if you discover that you are
duplicating a record you already entered into the computer.
Typing A will display on the screen:   CONFIRMATION
REQUIRED TO ABORT CURRENT RECORD (Y/N)?   Typing Y
(yes) will abort only the record displayed on the
screen and it will not be entered into the computer.
 
Type C to continue to the next record to be entered.   A
blank form will appear on the screen and a new record
can be typed.
 
When data entry is completed, type E to end the record
and press the RETURN key.  The record will be entered
into the system, and the computer may be turned off or
used for a different task.
 
If errors have been made in typing the record, corrections
can be made by choosing the Revise (R) option.
Type R and the cursor will go to the first field.   Press
the RETURN key to move the cursor to the field(s) needing
correction.  Then type CTRL-L until the cursor
reaches the character(s) to be changed.   Should you, by
mistake, go past the point needing correction, move the
cursor back to the proper place by typing CTRL-H.   Type
in the corrections.  If any unwanted characters remain
in the field, remove them by pressing the space bar.
When all corrections have been made, press the RETURN
key until the OPTION line reappears.   Press C to continue
or E to end.
 
Updating Records.  Records stored in the computer will
sometimes need correcting or updating.   For instance,
VITA Volunteers acquire new skills, change employment,
move to a new address; documents are revised or data
entry mistakes are noticed and need correction.
 
To update or correct a record already in storage, use
the following procedure:
 
Log on (see p. 20).
 
Screen Displays                         User Types
 
B>>                                    UPDATE VOL WHERE NO. IS
                                       (type number(s)--if more
                                       than one, separate the
                                       numbers with commas)
                                       Press RETURN
 
RECORD REQUESTED
 
OPTION:  REVISE(R),                    R,D,N, or E (as
DELETE(D), NO CHANGE(N),                appropriate)
END(E)
 
Pressing R allows you to make revisions in the record
as described earlier.  To delete the record, type D and
the screen will display:  CONFIRMATION REQUIRED TO
DELETE (Y/N).  Type Y (yes) or N (no) as appropriate.  If
you find that the record needs no change, press N and
the next record to be updated will appear on the
screen.  When the last record has been updated, the
screen will show:
 
ENTER SEARCH CONDITION                  WHERE NO. IS (type
OR END (C/R)                            number(s))
                                       or
                                       Press RETURN
 
If all records have been updated, press E.   This will
store the last record entered, and the screen will
again display ENTER SEARCH CONDITION OR END (C/R).   To
end the process, press RETURN and turn off the computer
or proceed to the next task as appropriate.
 
Printing Data.  Although records can be viewed easily on
the screen, it is often convenient to have a paper, or
"hard" copy of desired records.   The computer can be
attached to a printer that will produce a paper copy of
the information displayed on the screen.
 
To operate the printer, turn the black knob on the back
of the printer.  A red light will go on.  Then turn the
black switch on top of the printer to the right, toward
"On Line."  A second red light will go on.  To activate
the printer, type P (print), which will appear on the
Option line at the bottom of the screen.
 
In addition to printing records, the printer can also
be programmed to produce charts, graphs, or illustrations
stored in the computer, and these can be printed
in either black or color.  The printer can operate at
fairly high speeds, between 110 and 200 characters per
second, depending upon the setting used for the function
switches.
 
Data Base Searching
 
Bibliographic Files.  To assist in searching the "VITA
Bibliographic Data Base," certain computer functions
have been streamlined so that the process is easier to
understand.  VITA's practice makes use of this simpler,
automated procedure.  Special instructions will be provided
for those who wish to carry out searches not
handled by the automated procedures or who wish to
understand more about the logical processes involved.
We recommend these instruments for those of you who
would like to implement a system similar to VITA'S (we
can assist you with hardware/software selections and
development, allowing you to create your own customized
system).
 
It is worth noting that the smaller size data bases
with which you are working do not require the
complexity of the larger VITA system.   In order to
accommodate certain limits, as well as facilitate
speedy searching, the VITA system operates on
"subsidiary" files.   These are files that have parts of
the total record in them.  For example, in our large
system, the file FULLREC into which you entered
information, is actually broken up into four smaller
data bases to facilitate searching speed and file
limitations.  You will be doing all of your work on a
single file.  Your instructor can provide further
illustrations on this point.
 
Procedures for Bibliographic Data Base Searching.   Go
through the log-on procedure until you have the
"B>>" prompt on your screen.   Now type HELP DOC1 (C/R).
At the top of your screen the words VITA BIBLIOGRAPHIC
SYSTEM will appear, followed by:   THIS MENU ALLOWS
`STAND-ALONE' OR `ANDING' OF COMMON SEARCH CRITERIA.
The menu of search options shown below will also appear
on your screen.  Note:  you may choose to include key
word searching within each selected option.
 
Screen Displays
 
1.  Microcategory ("MICNAME") field
 
2.  Author ("AUTHOR") field
 
3.  Microcategory ("MICNAME") and author ("AUTHOR")
    fields
 
4.  Title ("TITLE") field
 
5.  Microcategory ("MICNAME") and title ("TITLE")
    fields
 
6.  Full data base key word searching
 
7.  Save search results for later printing/displaying
 
8.  Print/display results
 
9.  Quit
 
Normally, searches are performed by choosing from
options 1 through 6.  At VITA, most searching is first
performed on 1 through 5, and the system has been set
up to respond to these options in the fastest way
possible.  You may choose any option you wish and your
instructors will be happy to show you other searching
techniques not included in the menu.   "ANDING" means
that you are looking for records that satisfy two or
more conditions simultaneously (such as options 3 and
5).
 
Make your selection now by entering the number (without
the period, ".") and pressing RETURN.   You will then
enter the appropriate information.   If the information
you wish to enter is more than 15 characters long
(including spaces), you may enter only the first 14
numbers or letters followed by an asterisk ("*").  The
computer will then find everything that matches the
first 14 characters.  If the entered information
contains a space, the 14 characters entered must be
enclosed in quotes (").   The characters you do enter
must contain exactly the same punctuation and spacing
as on the record(s) you hope to find.
 
 
You will then be asked if you will want to combine the
results of this search with key word searching before
printing or displaying.  There are a couple of reasons
for searching on key words last.   First, the selection
of search option "winnows down" (reduces) the size of
the data base so that key word searching is done on a
smaller set of data than the entire data base.   This is
important because key word searching is done by
"strings"; that is, the computer looks for the exact
combination of letters or words you have entered and
this type of search takes longer to complete.   Also, you
may choose to "AND" or "OR" the key words searched;
that is, you may require either that the records
selected contain all of the key words chosen (AND) or
that they include at least one of them (OR).
 
To indicate that you wish to continue the search with
the use of the key words, enter "Y" for "yes."  Follow
the directions given you on the screen (type "SEARCH"
to bring up the string search software).   This section
also asks various questions.   First, it wants the name
of the data base.  Just press RETURN.  Next you will be
asked if you want a hard ("printed") copy of the
results of the search.  Reply "N" (no) by pressing
 
RETURN.  You will be shown a display of all the field
names (abbreviations mostly).   Then you are asked to
select the fields upon which to perform string searching.
Since we are concerned only with key words, enter
the line number corresponding to this field.
 
You are then asked to select fields ("elements") to be
displayed.  Select the default value "ALL" by pressing
RETURN.  The next question is whether you want a result
data base.  Since you will want either to print or
display your results, answer "Y" (yes) by pressing
RETURN.
 
Finally, you are asked to enter your first search
string.  Enter it exactly the way it appears on your key
word list.  You will then have the opportunity to enter
a second key word.  If you do not wish to enter a second
key word, press RETURN at this point and the search
will begin.  Otherwise, enter the second key word.  You
will then have the choice of either "ANDing" or "ORing"
the chosen key words (default is "OR") and then adding
up to a total of 10 key words.
 
You are asked if you wish to display the selected
records.  If you reply "Y" (yes) you will see all the
information comprising the particular record, although
not in the same form in which you entered it.   If this
is not of interest to you, press RETURN for "N" (no).
You can later print or display selected records by
choosing 8 on the menu.  After replying "yes" or "no,"
the program begins executing.   If you choose "Y" (yes),
the program will pause after the first record selected
and displayed; it will ask if you wish to stop the
search, find the next word, or continue without
stopping.  After selecting and displaying all the
appropriate records, you will see a count of how many
records were in fact selected.   If you choose "N" (no)
for this question, you will see nothing but a count of
the records selected.
 
To display, print, or save the data, you must re-enter
the CONDOR software.  Follow the same procedures as
before (type "DBMS," followed by the license number
"335116," today's date, "B:"--if necessary--and "HELP
DOC1."  You may perform other menu functions at this
point, or choose option 9 ("Quit") to exit the program.
 
VITA Volunteer Files.  To search the VITA skills bank,
called "Volunteer File," certain computer functions
have been automated to make the process easier to
understand.  The course will make use of this simpler,
automated process.  Special instruction will be provided
for those who wish to carry out searches not handled by
the automated procedures, or who wish to understand
more about the logical processes involved.   This is
recommended for those of you who would like to implement
a system similar to VITA'S (we can assist you with
hardware/software selections and development, allowing
you to create your own customized system).
 
Go through the log-on procedure (see p. 20) until you
have the "B>>" prompt on your screen.   Now type HELP
VOL1.  At the top of your screen the words "VITA Volunteer
Skillsbank" will appear followed by "This menu
allows "ANding" of search criteria."   You are then given
the choice of selecting various search options:
 
1.  Language ("LA") field
 
2.  Geographical experience ("GE") field
 
3.  Country ("CNTY") field
 
4.  Country ("CNTY") and geographical experience ("GE")
    fields
 
5.  Language ("LA") and geographical experience ("GE")
    fields
 
6.  Country ("CNTY") and language ("LA") and geographical
    experience ("GE") fields
 
7.  Save search results for later printing/displaying
 
8.  Print/display results
 
9.  QUIT
 
Normally, skills bank searches at VITA are done by
choosing from options 1 throuqh 6.   "ANding" means that
you are looking for volunteers that satisfy both conditions
simultaneously (in the case of 6, all three
conditions simultaneously).  The letters "CNTY, LA, GE"
are the initials used for "country, language, and
geographical experience" fields on the form.   You will
be telling the computer to search for combinations of
these fields when you choose 4, 5, or 6.
 
Make a selection by entering the number only (without
the period, ".") and pressing RETURN.   You will then be
asked to enter the code for the values in the fields
you have selected to search.   Enter these codes by
consulting your code directory.
 
You will then be asked if you will combine the results
of this search with searches on the skills fields
(SKL1, SKL2, SKL3, SKL4) before printing or displaying.
(Since the availability of the printer is limited
during the training course, you will usually display
results of your search on the screen, rather than print
them.)  There are several reasons for searching on the
skills fields last.  First, the process of choosing the
search options on the menu "winnows down" (reduces) the
size of the data base so that skills searching is done
on a smaller set of data rather than the entire data
base.  This is important because the skills searching is
done by "strings"; that is, the computer actually looks
for the exact combination of letters or words you have
entered and this type of search takes longer to complete.
Also, you will have your choice if you want to
"AND" or "OR" the skills selection; that is, you may
require either that the volunteer records selected
contain all the skills you have chosen (AND) or that
they indicate at least one of them (OR).   At VITA,
skills searches are usually "ORed" so that the widest
variety is provided within the previously-selected
language, geographical experiences, country criteria.
 
To indicate that you wish to continue the search using
the skills fields, simply enter "Y" for "yes."
 
When the proqram has finished with the "GE," "LA"
and/or "CNTY" searches (options 1-6), it will take you
into the skills searching part of the program.   Follow
the directions displayed on the screen.
 
This section also asks you various questions.   First, it
wants the name of the data base.   Since you have not
"saved" (made the computer remember) your search
results under any special name, the computer
automatically places them into a file called "RESULT."
Since RESULT is the default value given in brackets
when you are asked for the data base name, simply press
RETURN.  Next you will be asked if you want a hard
("printed") copy of the results of the search.  Reply
"N" (no) by pressing RETURN.   You will be shown a
display of all the field names (abbreviations mostly).
Then you are asked to select the fields ("elements")
upon which to perform string searching.   Since we are
concerned only with SKL1, SKL2, SKL3, and SKL4, enter
the numbers corresponding to these fields, separated by
commas (no comma after the last number).   They do not
have to be entered in numerical order.   However, they
will be searched in numerical order.
 
You are then asked to select fields ("elements") to be
displayed.  Select the default value "ALL" by pressing
RETURN.  The next question is whether you want a result
data base.  Since you will want to either print or display
your results, answer "Y" (yes) by pressing RETURN.
 
Finally, you are asked to enter your first search
string.  Enter it exactly the way it appears in your
skills code list.  You will then have the opportunity to
enter a second code.  If you do not wish to enter a
second skill code, press RETURN at this point and the
search will begin.  Otherwise, enter the second code.
 
You will then have the choice of either "ANding" or
"ORing the chosen skills (default is "OR") and then
adding up to a total of ten skills codes.
 
You are asked if you wish to display the selected
records.  If you reply "Y" (yes) you will see all the
information characterizing the particular record, although
not in the same form in which you entered it.   If
this is not of interest to you, press RETURN for "N"
(no).  You can later print or display selected records
by choosing 8 on the menu.  After replying "yes" or
"no," the program begins executing.   If you choose "Y"
(yes), the program will pause after the first record
selected and displayed; it will ask if you wish to stop
the search, find the next word, or continue without
stopping.  After selecting and displaying all the appropriate
records, you will see a count of how many
records were in fact selected.   If you choose "N" (no)
for this question, you will see nothing but a count of
the records selected.
 
To display, print, or save the data, you must re-enter
the CONDOR software.  Follow the same procedures as
before (type "DBMS," followed by the license number
"335116," today's date, "B:"--if necessary--and "HELP
VOL1."  You may perform other menu functions at this
point, or choose option 9 ("Quit") to exit the program.
 
Sample Volunteer File Search.   An example of a search to
locate specific volunteers follows.   Suppose you want to
find people who have had experience living in Costa
Rica, who speak Spanish, and who have expertise in solar
energy.  The following procedures would be observed:
 
Screen Displays                              User Types
 
B>>                                          HELP VOL1
MENU                                         5
ENTER LANGUAGE ("LA") CODE:                  SPA
ENTER GEOGRAPHICAL EXPERIENCE
  ("GE") CODE:                              COS
COMBINE WITH SKILLS FIELDS SEARCHING?        Y
(Computer works, then "B>>" appears
  by itself)                                 SYS
B>                                           SEARCH
 
ENTER NAME OF THE DATA BASE               Press RETURN
DO YOU WANT A HARD COPY OF FIELD NAME?    Press RETURN
SELECT ELEMENTS TO SEARCH IN FOR
  THE STRING?                             22,23,24,25
SELECT ELEMENTS TO DISPLAY WHEN
  STRING IS FOUND                        Press RETURN
DO YOU WANT A RESULT DATA BASE?           Press RETURN
ENTER SEARCH STRING 1?                       SOLARENER
ENTER SEARCH STRING 2?                    Press RETURN
DISPLAY SELECTED RECORDS?                 Press RETURN
B>                                           DBMS
ENTER LICENSE NO.                            335116
ENTER TODAY'S DATE                            6/19/84
                                             (e.g.)
B>>                                          HELP VOL 1
ENTER NUMBER                                 8
DID YOU SAVE YOUR SEARCH RESULT              N
TAKE NOTE OF RECORD NUMBERS
ENTER "P" OR  "D" FOR "PRINTING"
  OR "DISPLAYING"                            D
 
Records are displayed on the screen.
 
Commercial Data Bases:  DEVELOP (CDC)
 
There are many hundreds of computerized data bases in
the United States, covering thousands of different subject
areas.  Their file sizes vary greatly, from a few
thousand records to several million.   The number of data
bases available grows at an astonishing rate every year
as publishers prepare new computerized files of information.
The data bases themselves are changing as more
and more producers prepare full text information (e.g.
LEXIS, NEXIS, NEW YORK TIMES) rather than the more
common bibliographic/annotated citations.
 
Data bases are available to information seekers through
companies referred to as vendors.   The names of some of
the better known vendors whose main frame computers
contain many different data bases are DIALOG, ORBIT,
CDC, BRS, and SDC.  Anyone who has a computer with telecommunications
equipment, and who has access to a telephone,
can search the data bases provided by these (or
other) vendors.
 
Searching a data base, however, can be quite expensive.
Vendors' charges are based on the particular data
base the user is searching and on the length of time
the user is connected to the vendor's computer.   Charges
can range from $50 per hour to over $100 per hour.   On
top of this, the user must pay a fee for a personal
password that will allow access to the vendor's computer
as well as the cost of telecommunications while
searching a data base.  This can be quite expensive if a
long distance call is required to gain access to the
vendor's computer.  If the user has access to a telecommunications
"net," such as Telenet or Tymnet,
however, the communications costs will be lower.
 
Utilizing the wealth of information available on these
computerized data bases requires some skill and experience.
Those making best use of this type of resource
need to know something about the content of the various
data bases in order to select those most likely to
yield the required information.   Further, to minimize
the costs involved in searching these commercial data
bases, it is very important to understand the techniques
and commands used by a specific vendor's computer
system and to plan a careful search strategy
before accessing the data base.
 
Before entering a data base, a user should prepare the
search procedure, i.e. the search strategy.   The search
strategy consists of the search commands and the sequence
in which they will be sent to the computer for
action (the commands used in preparing a search strategy
are discussed below).  The importance of having the
search strategy firmly in mind prior to entering the
data base cannot be overemphasized.   It is not uncommon
for well prepared searches to require half an hour or
more of on-line time connected to the data base computer.
 
Preparing for such a search can reasonably be expected
to use more than an hour.  The planning time required
will vary with the experience of the data base user,
but irrespective of the amount of planning time required,
if the preparation is done while connected to
the computer, unnecessary on-line charges will occur.
It makes good sense to do as much prior planning as
possible.
 
In planning a data base search, it is, as mentioned
above, important to know what the vendor's software and
the data base to be searched require of the user.
Because there are many different systems, it is necessary
to study the literature about a data base before
trying to use it.  Most large data base companies have a
search service, where a user describes in words to a
data base expert what it is that he or she is trying to
find.  These experts convert the request into the appropriate
computer commands.  A search service is convenient
for users who are located far from the data base
(such as overseas).  For users in the same country, it
is usually easier and less expensive to gain access to
the data base from a computer terminal equipped with a
modem and communications software in the user's own
office or home.
 
In this course we will learn basic search techniques
for a data base called DEVELOP, which is owned and
operated by Control Data Corporation (CDC) in Minneapolis,
Minnesota.  DEVELOP is a data base containing
information on appropriate technology that can be
applied to needs in developing regions.   The course
includes a demonstration of the use of DEVELOP with the
Apple equipped with a communications software package
called AE:Pro, which has been developed by Southwestern
Data Systems in San Diego, California.
 
Key Word Searching.  A list of identifying key words is
appended to each information unit in the DEVELOP data
base.  These key words are confined to those appearing
in the DEVELOP Thesaurus, and are selected in accord
with how well each describes the content of the information
unit.  We have already noted the importance of
key words to a search; an effective searcher must have
a good knowledge of these words.   The searcher should
always check the Thesaurus when preparing a search to
ensure that only key words appropriate to the information
sought are used.
 
The simplest technique for searching on DEVELOP is to
use the format:  S:KEYWORD where S is the command for
SEARCH and KEYWORD represents any key word the user
chooses.  The CDC computer searches through the key
words of each record.  When it finds the same word that
the user has requested, the computer puts the entire
record of information in a special file called a Result
File.  It then continues searching the data base for
other matching key words.  Each time it finds a match,
the entire record is added to the Result File.   When the
search is completed, all of the information units in
the Result File contain the key word the searcher used
in the key word lists.  The user can then read the
information in the Result File by using the LIST
command, which is described below.
 
Truncation.  If the DEVELOP searcher uses the command
S:AGRICULTURE, all of the records with the key word
agriculture will be written in the Result File.
 
However, records using such key words as AGRICULTURAL
DEVELOPMENT, AGRICULTURAL EQUIPMENT, and AGRIBUSINESS
will not be selected.
 
To broaden a search, one can use the first four letters
of AGRICULTURE, which allows the computer to choose all
keywords that begin AGRI regardless of the letters that
follow.  Then all the records with the key words noted
above will be selected and moved to the Result File.
The command for this technique is S:AGRI/.
 
The slash character at the end instructs the computer
to accept any characters after the first four, but the
first four must be AGRI.  If the slash is not used, then
the computer will search for the exact keyword, AGRI,
but since there is no such word, no records will be
written to the Result File.
 
When the slash is used, the keyword is said to be truncated.
 
Using "AND," "OR," and "AND NOT."  If a DEVELOP searcher
wishes to find information on intercropping marigolds
and tomatoes, the use of only one keyword would not be
very efficient.  The user is not interested in all the
records that pertain to marigolds, nor all those
pertaining to tomatoes.  The user wants only the records
that pertain to both marigolds and tomatoes.
 
The DEVELOP software does permit the use of several key
words in one search command.   To do so, the key words
must be connected by certain operational words.   The
three permissable operational words and their representative
symbols (indicated in parentheses) are:
 
AND(*)        If two (or more) search terms are joined
              by AND, only records having both (or all)
              terms in their key word lists will be put
              into the Result File.  Records having only
              one of the key words will not be selected.
 
OR(+)         If two (or more) terms are joined by OR,
              records having any one of the key words
              will be selected.
 
AND NOT(*-)   If two key words are joined by AND NOT,
              information records having the first term
              and not the second will be put into the
              Result File.
 
The proper way to search for information on intercropping
marigolds and tomatoes in the example mentioned
above is to use the command:   S:MARIGOLD/*TOMATO/, which
uses the operational word AND(*).
 
If we wanted to find information on pears or apples or
peaches, the command:  S:PEAR/+APPLE/+PEACH/ would
locate all information having one, two, or three of the
key words used and place the units in the Result File.
 
The command:  S:APPLE/*-FOOD PROCESS/ will select all
the records about apples that do not involve food
processing (processors or other endings).
 
Translate the following command into your own words:
 
      S:   ((APPLE/+PEAR/)*-FOOD PROCESS/)*BOTSWANA
 
Note that parentheses are used to separate unlike
instructions.
 
Data base software that handles commands using AND, OR,
and AND NOT is said to use Boolean logic.   This is an
important and powerful feature for data base searching.
It allows the searcher to design sophisticated and
efficient strategies for quickly locating the information
most suited to the user's needs.
 
The Report Following the Search.   A search does not
begin until the RETURN is pressed following the command.
At that time, the computer begins searching the
records.  When it has finished creating the Result File,
it reports to the user with information in the following
format:
 
 A    E   I   L    P   Q    R   T   W     X   =     SET NAME
 0    0   0   4    0   0    0  17   1     0   22    S8
 
The letters across the top of the report refer to the
type of information contained in a record of information.
When the record was entered into the data base by
the data base owner, it was assigned to one of the
categories.  The most frequently assigned types of
information (represented by the letters at the top of
the search report line) are:
 
Literature (L)   References to published literature or
                 abstracts of articles, papers, and
                 reports, with bibliographic citations.
                 Literature units may also be bibliographies.
 
Technology (T)   Descriptions of technology, know-how,
                 processes, methodologies, or research
                 in progress.  Technology also includes
                 discussions of research projects, case
                 studies, and demonstration projects in
                 which a problem was addressed and
                 results were obtained.  Technologies
                 range from methods for setting up manufacturing
                 industries to instructions
                 for building small solar food dryers.
 
Who's Who (W)    Descriptions of individuals and organizations
                 active in the fields covered by
                 the data base.  These organizations are
                 usually government related, nonprofit,
                 or public service and they do not sell
                 their expertise or services.  They are
                 research institutes, information centers,
                 and development organizations.
 
Examples of each of these types of information are
given in Appendixes D, E, and F.
 
For an explanation of the other assigned types of information,
see the DEVELOP Search Service User Handbook.
 
The numbers in the second line tell the data base
searcher how many records of information of each type
are contained in the Result File.   In this case there
are four Literature records, 17 Technical records, and
one Who's Who record.  The next number is the total
number of records in the Result File and the last entry
on the second line is the name of the Result File for
the particular search.  In this case it is S8, which
means that this is the eighth search carried out since
entering the data base.
 
Reading the Result File.  Each record of information in
the data base contains four parts:   1) the list of key
words, 2) a one- or two-line brief describing, in very
general terms, the contents of the record, 3) the full
abstract of the information, and 4) the name and
address of a contact from whom more details can be
obtained (see Appendix E).  The computer will give the
Result File a particular name for each search; for
DEVELOP the name is the letter S followed by a number.
The first search produces a Result File named S1, the
second search creates S2, and so on.   To read the information
that has been placed in the Result File, the
computer must be sent the command to LIST, which is L,
the contents of S1.
 
The computer must also know which of the four sections
of each record of information the user would like to
have listed.  The four sections of the information units
(noted above) have identifying symbols:
 
                     KEYWORDS        S
                     BRIEF           B
                     ABSTRACT TEXT   T
                     CONTACT          C
 
These symbols are incorporated into the command to LIST
in the following manner:  LSBTC:S1.  This command will
produce a display of the full record for each unit of
information.  However, it is not necessary to list each
of the four parts of all the records.   If the user
wishes to get only a general idea of the content of the
records in the Result File, the briefs alone need be
listed (LB:S1), or perhaps the briefs and the contacts
(LBC:S1) are needed.  Usually there is no reason to list
the keywords.
 
Using AE:Pro, the information read from the Result File
is stored on a diskette.  From there it can be called
back to the computer memory and then printed on the
printer, which is more efficient and cost effective
than printing the information while on-line, i.e. connected
to the CDC computer.
 
Computer Software:  Other Applications
 
As explained earlier, software is the term used to
refer to the programs that make a computer perform the
desired tasks.  Programs are usually stored on disks,
such as a hard disk permanently attached to the
computer, or on floppy diskettes that are inserted into
the computer's disk drive as needed.   All programs or
software packages come with instruction manuals or
other documentation that give the detailed information
necessary to operate and manipulate the programs.
 
In the United States, the writing and production of
computer software is a burgeoning industry, and there
are programs available for countless numbers of uses.
The sheer volume and array of available software can be
a problem for users anxious to select the best package
for their particular needs.  But talking with people who
have used a software package for the same purpose, as
well as reading computer journals and talking with
knowledgeable software distributors can help in choosing
a satisfactory package.
 
Several of the many types of software available are
extremely popular because of their utility, flexibility,
and power to simplify tiresome or complex tasks.
For example, there are text writing programs that allow
the user to type long streams of information into the
computer without checking margins, spacing, or headings.
These programs include editors that allow the
user to change, rearrange, update, and correct information,
and automatically produce an accurate, correctly
arranged, and neatly printed document.   Examples of a
page of input into a text writing program and the same
information as the program finally organized it are
given in Appendixes G and H.   The program used is
prepared for the Apple microcomputer and is called
APPLEWRITER.
 
Financial Records.  Keeping track of expenditures,
credits, debits, and all the other checks and balances
required by a business has traditionally been done
using oversized paper, ledgers, and calculators.   Such
accounting records can be handled by financial bookkeeping
software, sometimes referred to as an electronic
spreadsheet.  VITA uses a very popular one,
VISICALC.  VISICALC not only lets the user keep track of
business financial records, but also permits exploration
of the outcome of various financial alternatives.
Because VISICALC responds quickly to produce and display
requested totals, hypothetical values can be
entered.  This permits the user to see the financial
outcome of options being considered, i.e. it permits
the user to ask questions like "What if. . . ?"
 
Graphics.  Technical and business operations are often
supported by graphic presentations of information.
Software has been developed that will read data from a
file and produce a graph with related statistical
information.  VITA uses a graphics software package
called APPLE PLOT.  (See Appendix I).
 
Long Distance Computer Links.   Several of the data bases
that VITA uses are held in computers in other cities.
To use these data bases it is necessary to connect the
distant computer with one of VITA's Apples.   The connection
is easily made using a modem, which connects the
computer to existing telephone lines through which
information can be transferred.   Once the two computers
are connected, communication software separates operating
commands that are meant for the Apple from operating
commands meant for the host computer.   The software
permits commands and information to be sent to the
host.  It also processes information sent from the host
by instructing the Apple how to receive and store it.
The communication software also permits the host computer
to interrupt its operation and then to resume at
the point where it had been interrupted.
 
Sometimes other computer operators may wish to connect
with VITA'S computers.  A useful feature of the software
VITA uses is that it allows other computers to telephone
the Apple and send operating commands to it.   For
example, someone in California can use a computer and
communication software to call VITA'S system.   The
California user could then search our data bases, send
us a file, or do a number of other things, all from
California.  VITA'S software answers the call when it
"rings" and responds to the commands sent from the communication
software of the distant computer.
 
The communication software for these procedures is also
AE:Pro.
 
Games.  A large number of sophisticated electronic games
has been developed in response to a big demand for
games that challenge the user's mind and reflexes.   VITA
has some simple games that may be demonstrated in this
course.  The more popular ones are SINK THE SHIP (the
player drops bombs from moving airplanes onto moving
ships), NIGHTMARE #6 (the player tries to figure out
the object of the game by making entries on the keyboard),
and HAMARABI (the player rules a kingdom and
must purchase or sell grain and land in order to feed a
growing population).  Try these games and others when
time permits.
 
Educational Tools.  Many people view the computer as an
excellent device for educating children, and many
educational software packages have been produced.   VITA
has one of the more popular packages, called LOGO.   This
package permits the child to use several geometric
concepts to draw pictures on the monitor screen.   The
emphasis of this package is creativity (drawing pictures
on the screen) and mathematics, but other packages
emphasize spelling, writing, and grammar.
 
With the appropriate software, computers can be used
for many, many more things than have been presented
here.  There is software to use for drawing up a will,
for betting on an upcoming football match, for monitoring
the operations in your automobile (if you leave the
keys in the ignition and open the door, a computer
activated voice will tell you "The keys are in the
ignition," or if you are about to run out of gasoline,
another voice will inform you).   When attached to a
video scanner, the computer, with the correct software,
can monitor movements in a room.   In this way computers
have been incorporated into security systems for the
protection of property.
 
 
The uses to which a computer can be put are limited
only by the imagination of the people who use and
understand them, and to date there is no indication
that human imagination is failing or slowing down.
During the past 10 years, there has been exponential
growth in the number of companies that prepare software.
Many companies are composed of one or two individuals.
It is estimated that in the last five years
there has been an increase of more than 1000 percent in
the sources of software, and though the competition
between these companies has become keen, there are more
new companies established each month than companies
that fail.
 
V.  AUTOMATING AN  
Considerations For Computerization:   Myths and Realities
 
The microcomputer revolution is taking the world by
storm.  Whether or not it holds net benefits for developing
countries is constantly being debated.   There is
no doubt, however, that all countries will be changed
in some way and that all societies are making efforts
to understand and apply the new technologies.
 
This gives rise to those who are proclaiming that computers
will "save" developing countries and the organizations
within them.  As costs fall and the technology
increases in power and sophistication, there is hope
that decentralization of access to information and
therefore decision-making will allow developing countries
to become less dependent on the industrialized
nations.  At the same time it is important to understand
that computers are not panaceas for all the problems of
development and will not always nor instantly cause
improved efficiency or profitability in a given
activity or organization.  Computers can be very useful
tools when appropriately applied to certain problems or
activities.  But they should not be viewed as a universal
"technological fix."
 
During this part of the training course, we will discuss
some of the myths behind computers and their
applications so that those of you who are interested in
or will in fact be installing computers can carry back
realistic ideas about what is and is not possible,
within a particular timetable and cost restraints.   VITA
is going through an intensive process of applying
microcomputers to various organizational functions, and
we feel that our experience may be valuable to share
with others.  Finally, we will suggest questions that
small organizations in developing countries should ask
themselves and their dealers about buying and installing
computer equipment.  We will emphasize likely
situations to be encountered specifically when
installing and operating computers in developing
countries.
 
The "myths" and "realities" to be discussed in greater
detail in the course work are outlined briefly below.
 
1.  Myth:   Computers will bring order to management
    systems where chaos has previously existed.
 
    Reality:   Besides applications in communications
    such as teleconferencing, computers are good at two
    basic kinds of activities:  computation ("number
    crunching") and performing repetitive, boring
    tasks.   They still depend very much on data entry
    being done by human beings.  The most successful
    computerized operations replace successful manual
    operations that have grown so large that the costs
    in personnel and processing delays exceed the costs
    of computerization.
 
2.  Myth:   Computerized systems can be "up" and
    "running" in a short period of time.
 
    Reality:   Time varies in getting computer systems
    to function properly.   Assuming the hardware has
    been correctly installed, a good commercial word
    processing software package can be operating successfully
    by its user within a few hours.  On the
    other hand, a data base management system (for
    example, for a library bibliographic system or
    general ledger/accounting system) can take many
    months to function adequately.  This is especially
    true if you are developing system software from the
    "ground up."  "Turn-key" systems (those where the
    development work has already been done) should not
    take as much time.  Even so, adaptations still have
    to be made and users have to learn all system
    features, sometimes by trial-and-error, which is a
    time-consuming process.  In general, it is advisable
    to consider installation of a "turn-key" system
    unless there are people readily available with the
    sophisticated expertise required for computer
    system/software development.
 
    Hardware malfunctions and breakdowns are not
    unusual, especially in the equipment "peripheral"
    to the microcomputer (printers, floppy disk drives,
    hard disk drives, interface cards).  There is often
    no one to blame for these occurrences; they just
    happen.   (In the United States, we talk of "Murphy's
    Law," which means that something will go wrong when
    you least like or expect it.)
 
3.  Myth:   Computers save money.
 
    Reality:   Some organizations have reported spending
    as much as twice the original budgeted amount for
    hardware and software before the system is truly
    functional.   If you are dependent on outside consultants
    to make software changes as system needs
    change, costs can mount further.
 
    While in the long run computers can save personnel
    costs because of fewer staff requirements, this
    doesn't happen quickly because it takes time to
    install a system and finally attain flawless functioning,
    and people are still needed to run and
    maintain the computer(s).  Some small organizations
    in the United States report cost increases, not
    reductions, for as long as two years during and
    following computerization of their office systems.
 
4.  Myth:   An organization wanting to computerize some
    or all of its operations should invest considerable
    resources in choosing the one best hardware-software
    combination for its needs.
   
    Reality:   In the United States there is a maddening
    array of hardware and software from which to
    choose.   While this will be less true in other
    countries, it is still probably not worth the time
    and effort to track down every possible combination
    before making a decision.  Also, technological
    progress in microelectronics is highly dynamic.  It
    is simply impossible to keep track of all the new
    products that are constantly appearing.  Better to
    do the best analysis you can and jump in.  Besides,
    "old" microcomputers and software don't become
    obsolete in the usual way.  If new equipment is
    required for more sophisticated applications, uses
    will always be found for existing equipment.
 
    The nature of computerized operations is such that
    when microcomputers are acquired for a single
    obvious application, it usually isn't long before
    many other applications are conceived.  Indeed,
    there have even been examples in which, in preparation
    for computerization, U.S. companies have
    revamped their work flow and physical environment
    such that computers no longer seemed necessary and
    were never installed, at least not for the original
    purpose.   Microcomputers can perform many different
    kinds of tasks and should be thought of as highly
    versatile, "workhorse" tools.  But it is always
    necessary to analyze carefully the problem to be
    solved to ensure that computerization will produce
    such economic benefits as reductions in cost,
    increased production, time savings, a better
    quality product that realizes a higher revenue, or
    the like.
 
5.  Myth:   Your computer dealer knows what he is
    talking about.
 
    Reality:   Even in the United States, computer
    dealers have a notorious reputation for not being
    reliably knowledgeable about what they're trying to
    sell (there are exceptions, of course).  If you
    really want to know how a particular computer or
    software performs, it is best to talk to someone
    who is already experienced with the equipment and
    has used it for the same or similar application.  In
    most countries these individuals are readily
    identified through "user groups" that meet
    regularly about just such kinds of issues.
 
6.  Myth:   Everyone will be excited about participating
    in the "computer revolution."
    Reality:   This is perhaps obvious, but bears mentioning.
    It would be reasonable to think that
    people are attracted to a computer if it helps them
    do their job more efficiently and therefore represents
    a plus for the organization overall; or
    conversely, that people are repelled by it if the
    difficulties of getting the computer to work
    properly outweigh the advantages.  The decisions on
    whether to use or not to use computers is not
    always so rational, however.  Some people may feel
    their positions are threatened because they will be
    required to learn a new technology and/or procedures
    they feel ill equipped to handle.  Others may
    push to become literate in computer applications as
    a means to concentrate their own power and authority,
    while not making the same knowledge available
    to others.
 
    Managers may be more concerned with the image-building
    effects of using computers from an organizational
    point of view than with their actual
    utility or lack of utility.  Still others may harbor
    real fears that they may somehow damage the equipment
    or the data in some terrible, irretrievable
    way (while possible, this almost never happens when
    following standard operating/installation procedures
    outlined in the accompanying documentation).
    There is also the possibility of deliberately
    "sabotaging" the records/data bases of a computer
    system for personal gain and/or to do havoc to the
    organization or persons within it.  In short, there
    are many reasons for using or not using computers
    within an organization beyond rational considerations
    alone.   These very real human reactions only
    underline the necessity of careful analysis when
    considering computerization.  If the benefits are
    clear, the human problems will be solved over time.
 
7.  Myth:   Following operating and installation manuals
    carefully is all that's required to get computer
    systems functioning in developing countries.
 
    Reality:   Remember that most equipment will be
    imported from the industrialized countries, particularly
    the United States.  Accompanying manuals
    reflect the operating conditions to be found in
    advanced countries, e.g., clean and stable electrical
    power, air-conditioned office environments
    with low-humidity, dust-free air, etc.  Specific
    analyses need to be made concerning the nature of
    electrical power supplies, the condition and
    ambient temperature of the surrounding air, whether
    the computer will be physically moved frequently,
    etc.   Appropriate solutions must be found to counter
    any condition not in accord with that assumed as
    standard by the original manufacturer (see attached
    "Technical Considerations for Field Use of Microcomputers").
    Having access to a ready supply of
    spare parts is a must.  with special care, microcomputer
    use in developing countries can approach the
    reliability already demonstrated in industrialized
    nations.
 
Questions for Potential Users
 
In order to assist organizations in determining whether
computers can be useful, difficult questions--such as
those given below--should be answered.   Again, the point
is to accomplish a realistic appraisal of the organization's
need and readiness for a small computer.
 
1.  Who on the staff will have the primary responsibility
    of caring for the computer and making it function
    for the needs of the organization?
 
2.  Will this person be required to learn all obvious
    applications himself/herself (word processing,
    financial spread-sheets, data base management, programming
    in technical languages--BASIC or FORTRAN,
    etc.) before teaching them to others or will each
    user be encouraged to teach himself/herself?
 
3.  To whom does this person report?  How will he/she
    keep superiors informed?  If superiors are not computer
    literate, how does the responsible person
    translate and communicate difficulties in implementation?
 
4.  Will the organization make the investment for one
    or more people on its staff to learn how to use a
    good data base manager (programmable software at a
    level higher than that of BASIC or FORTRAN) that
    can be adapted to many different applications?  Or
    does it prefer to buy specialized software packages
    that come closest to each specific need?  Or a combination
    of both?
 
5.  Where will the computer be placed?  Is there an
    environment in which the temperature is controlled,
    there is little dust or smoking, and the relative
    humidity can be adjusted?  If printers are operated,
    will they impair concentration/performance of
    nearby staff?
 
6.  Is power supply protection adequate?  Will data loss
    during unprotected partial or complete power
    failure be catastrophic?  What kind of back-up data
    system(s) will be used?
 
7.  Does the organization have one year to get adjusted
    to the machine and two years before real savings
    are expected?
 
8.  If the computer doesn't work out, is there a way to
     bow out gracefully after six months or a year?
 
9.  What is the future of the computer-related project?
    Where will it/the organization be in five
    years?
 
10.  Who will conduct an economic cost/benefit analysis
     to ensure that computerization will be the appropriate
     solution to the problems?
 
11.  Who in the organization's city/country is also
     working on the same ideas?  Are they succeeding?   If
     not, why not?
 
12.  What is the worst-case scenario for having a computer?
     Can the organization afford it?
 
13.  Can the organization get along for another year
     without a computer?
 
14.  Are there other means to accomplish the same goals?
 
Questions to Ask Computer Salespeople
 
Computer sales are highly competitive, and emphasis is
always given to the positive features of a particular
piece of hardware or software.   This often "down-plays"
or omits entirely any drawbacks or trade-offs that
could be critical to a given application.   Questions
such as those below should assist potential buyers in
dealing with computer salespeople.
 
 1.   What is wrong with this machine?
 
 2.   What are the names of three current customers who
     are using the same machine for the same thing I
     will with whom I can talk?
 
 3.   What kinds of arrangements are there for maintenance?
     What about a maintenance contract?
 
 4.   Who fixes your machines?   Where are they fixed?
 
 5.   How did you come to sell computers?   Is it just a
     "line of merchandise" (as in many outlets in developing
     countries) or is there an institutional commitment
     to supporting the product once it leaves
     the store?
 
 6.   Do you have any experience setting up the specific
     kind of programs I need?
 
 
 7.   Who is available to talk to on weekends and evenings
     about the machine?  Will you take questions on
     technical problems by phone or in person during
     work hours?   If I have to write, how soon, and by
     what means can you get the answer to me?  Is there
     any charge for the information?
 
 8.   Are books, literature, classes available through
     your establishment?
 
 9.   Is there a local users' group for this machine?
 
10.  What is the average turnover for this model?
 
11.  How well does it interface with other equipment?
     Can I add a modem or printer (or other peripheral
     equipment) later if I choose?  Which ones?   Do you
     sell them?
 
12.  Can I trade up?  Can I trade in?
 
13.  Will you help me sell my machine if I want to get
     rid of it later?
 
14.  Who can help me adapt software?  How much will it
     cost?
 
15.  If some software does not do what you say it does
     (or what I thought you said it does), can I return
     or exchange it for something else?
 
16.  Is   "loaner" hardware/software available in case of
     a catastrophic failure?
 
Technical Considerations for Field Use of Microcomputers
 
Most microcomputer equipment available in developing
countries is produced in industrial nations, reflecting
the operating conditions and natural environments of
those nations.  The following points should be considered
when operating computer equipment in environments
other than those for which it was originally intended.
Please note that these are very technical points concerning
machine operation, power supply, etc.   They
require the attention of a skilled technician.
 
 1.   When you first buy equipment, also buy the tools,
     spare parts, test equipment, and hardware manuals
     (with schematics).
 
 2.   Reserve a single electric line to your equipment,
      one that is power conditioned.   This is called a
     "dedicated line."
 
 3.   Stock all fuses (of proper amperage) for all equipment.
 
 4.   Stock spare circuit boards, and/or have necessary
     back-up equipment.
 
 5.   Stock all needed supplies, including diskettes,
     ribbons, cables, print heads, paper, transformers,
     etc.
 
 6.   Protect equipment from food, drink, tobacco smoke,
     dust, and any other foreign matter (including
     spiders and mice!).
 
 7.   Keep diskettes in their jackets and keep back-up
     copies.
 
 8.   Inform yourself about computer maintenance by reading
     articles, equipment manuals, etc., and learn to
     diagnose problems.
 
 9.   If you use an air-conditioned room, seal all windows
     shut, have a back-up air-conditioner available,
     have a spring on the door to keep it closed,
     use a wet bulb humidity measure and, if necessary,
     a dehumidifier in the room or inside the computer
     itself.
 
10.  Keep the computer away from the air-conditioner
     (moisture and static electricity).
 
11.  Provide a common "earth" ground between all system
     components.
 
12.  Provide adequate ventilation, e.g. a fan on the
     computer or in the room.  However, assure yourself
     that dust is not being sucked into the machine.
 
13.  Consider the use of power supply regulators in
     light of budget and power needs (condition your
     power aid appropriately).
 
14.  Consider switchable battery back-up power sources,
     so as not to lose data if power fails.
 
15.  Power on/off switches can fail.  Consider unplugging
     instead of using the switch.  This could be important,
     especially in lightning or thunderstorms that
     can send large voltage pulses down the line into
     the machine.  However, it is also important to keep
     the computer connected to a solid earth ground to
     prevent static build-up that can damage the chips.
     This is usually accomplished by keeping the computer
     plugged in since the third wire (now standard
     in the United States) is a ground.   In situations
     where there is only a two-wire connection, the
     computer could be safely disconnected if there is
     an independent ground connection made between the
     computer and the earth (only a qualified person
     should perform this).
 
16.  Acquire information on each piece of hardware's
     dependency on frequency (e.g., between 50 and 60Hz,
     or 60hz [plus or minus] 5 percent).
 
17.  Know the different tolerance levels (concerning
     power requirements) for each piece of hardware.
 
                     APPENDIXES
 
                                             APPENDIX A
 
                       IN OTHER WORDS(*)
 
acoustic coupler:  A mechanical device that allows a
telephone handset to be connected to a modem (see
modem).  The term is sometimes used to refer to the
entire modem.
 
address:  A way of identifying any location in the
memory of a computer.
 
application program:  Software designed for a specific
purpose (such as accounts payable or receivable, payroll,
inventory, etc.).
 
artificial intelligence:  A specialized field of research
in computer science.  The term refers to the
ability of a computer to perform functions normally
carried out by the human brain (such as reasoning and
learning).
 
ASCII:  The American Standard Code for Information
Interchange.  The most generally used format for representing
and exchanging textual information among
computers.  Under the code, each of 96 characters
(letters, numbers, and symbols) is given a unique
binary number code (1s and 0s).
 
assembly language:  A means of communicating with a
computer at a low level.  Assembly language lies between
high-level languages (such as BASIC and Pascal) and
machine language (the 1s and 0s the computer understands
at its most basic level).  Programmers use
assembly language to make efficient use of memory space
and to create a program that runs quickly.
 
backup:  An extra copy of software, normally kept on
file in case the original program is damaged or lost,.
 
BASIC:  Beginner's All-purpose Symbolic Instruction
Code.  The most used high-level language for small computers.
 
baud:  A measure of the speed at which data travels
(normally between a computer and a peripheral or
between two computers).
 
binary:  A numbering system that uses only 1s and 0s.  It
is an efficient way of storing information in a computer
since the hundreds of thousands of microscopic
switches in the computer can only be on (1) or off (0).
 
bit:  A binary digit (1 or 0).
 
bootstrap:  A piece of software, usually stored permanently
in memory, that activates other pieces of software
in order to bring the computer from "off" into
readiness for use.
 
bps:  Bits per second.  A measure of data-transmission
speed showing the number of bits of information that
pass a given point in one second.   In small computers,
the most common bps used is 300.
 
break:  An interruption of a transmission.  Most small
computer keyboards have a Break key that tells the
computer to stop what it's doing and wait for further
instructions.
 
bubble memory:  A new method of storing information for
a computer using microscopic magnetic bubbles.   Although
the technology was developed almost a decade ago, it is
still expensive and not yet generally available for
small computers.
 
buffer:  An area in the computer's memory used to temporarily
store information.  When using a printer, a
buffer is needed because the printer operates much more
slowly than the computer.
byte:  A sequence of bits that represents a single
character.  In most small computers, a byte is eight
bits.
 
CAD/CAM:  Computer-Aided Design/Computer-Aided Manufacturing.
CAD/CAM is normally done on large computers
because large amounts of memory and processing power
are required.
 
CAI:  Computer-Aided Instruction.  Computers used to
teach normally involve a two-way "conversation" between
the student and the computer; the computer informs the
student of  mistakes as he makes them, and is able to
respond to  the student's demonstrated lack of knowledge.
 
channel:  A path for the transmission of information
between two points.
 
character:  A single letter, number, or other symbol.  In
a small computer, a character is normally represented
by eight bits (one byte).
 
chip:  A generic term for an integrated circuit (IC), a
single package holding hundreds or thousands of microscopic
electronic components.  The term comes from the
slices (chips) of silicon of which they are composed.
 
clock:  In a small computer, a repeating signal (usually
in the range of millions of cycles per second) that
controls the microprocessor "brain."   Each time the
clock sends a pulse, the computer performs a single
task.
 
command:  A word or character that causes a computer to
do something.
 
compiler:  A piece of software that takes a series of
commands written in a high-level language and translates
them into a lower-level language more efficient
for the computer to use.
 
computer network:  Two or more connected computers that
have the ability to exchange information.
 
computer program:  A series of commands, instructions,
or statements put together in a way that tells a computer
to do a specific thing or series of things.
 
core memory:  An outdated term for the main memory of a
computer.  Although core memory has been replaced by
semiconductor memory, the term is often used to represent
main memory.
 
CP/M:  Control Program for Microprocessors.  One of the
oldest and most popular operating systems for small
computers.  An operating system is a group of programs
that is often compared to a traffic cop because it
actually controls what the computer is doing by acting
as an intermediary between the hardware and   the software.
Any piece of applications software must be
written for a specific operating system.   CP/M was
introduced in 1975 and has become one of the most
popular operating systems; an estimated 250,000 small
computers use it.  Thousands of specialized application
programs have been written to be used with CP/M.
 
CPU:  Central processing unit.  The heart of a computer
that controls all operations of all parts of the computer
and does the actual calculations.
 
CRT:  Cathode-ray tube.  A TV-like display used with most
small computers to show the information the computer
has output.
 
cursor:  A position indicator on a CRT.  It's normally a
flashing or nonflashing square or rectangle.
 
data:  A general term meaning any and all information,
facts, numbers, letters, symbols, etc., which can be
acted on or produced by a computer.
 
data base:  A collection of related data that can be
retrieved by a computer (such as a mailing list or list
of accounts).
 
debug:  To go through a program to remove mistakes.
 
diagnostic:  A specialized program that checks the computer
for problems and tries to isolate any problems
that it finds.
 
disk:  A round piece of magnetic-coated material used to
store data with greater density, speed, and reliability
than is available on cassettes (see floppy disk).
 
diskette:  See disk.
 
display:  A method of representing information in visible
form.  The most common displays used with popular
computers are CRTs and printed paper.
 
documentation:  (1) The instruction manual for a piece
of hardware or software.  (2) The process of gathering
information while writing a computer program so that
others using the program are able to see what was done.
 
downtime:  Any period of time when the computer is not
available or not working.
 
dump:  To copy all information available from one form
of storage to another.
 
edit:  To modify or add data to an existing document or
program.
 
emulation:  A process by which some computers can run
programs not specifically written for them.
 
execute:  To carry out an instruction or series of
instructions.
 
firmware:  A term referring to software that has been
permanently placed in memory--usually into a ROM (read-only
memory).
 
floppy disk:  A disk storage device made from a thin,
circular piece of magnetic material.   The usual disk
sizes used with small computers are 5-1/4 inch and 8
inch.
 
flowchart:  A common method of graphically planning what
a piece of software should do before the actual writing
process begins, or for describing what it does after it
is written.
 
FORTRAN:  FORmula TRANslation.  A high-level computer
language used primarily for mathematical computations.
Although FORTRAN is available for some small computers,
it is mainly used with large commercial systems.
 
garbage:  Meaningless information.
 
graphics:  Pictorial information in two dimensions.
 
hard copy:  A printout of information produced by the
computer.
 
hardware:  The physical part of the computer (such as
the CRT, CPU, memory, etc.), as opposed to software.
 
hexadecimal:  A number system with the base of 16.  It is
commonly used by programmers to indicate locations and
contents of a computer's memory.
 
high-level language:  A method of programming that
allows a person to give instructions to a computer in a
form using letters, symbols, or English-like text,
rather than in the 1s and 0s code which the computer
understands.
 
impact printer:  A printer that produces hard copy by
physically striking a ribbon and paper.
 
input:  The transfer of data into the computer.
 
input/output:  Called I/O for short, this is a general
term for the equipment (such as modem or printer) connected
to a computer and the two-way exchange of information
that goes on between the computer and the
peripheral.
 
instruction:  A command to the computer telling it to do
one specific thing.
 
integrated circuit:  Also known as a chip, this is a
group of interrelated circuits in a single package.
 
interactive:  Describes a computer system where a two-way
conversation goes on between the user and the
computer.
 
interface:  A piece of hardware or software used to
connect two devices (computers and peripherals) that
cannot be directly hooked together.
 
interpreter:  A computer program which translates a
single line of a high-level language at a time for the
computer.  Interpreters are more convenient but less
efficient than compilers.
 
iteration:  A series of steps in a program that is
repeated until a condition is satisfied.   (Also called a
loop.)
 
line printer:  A type of high-speed computer printer
that prints an entire line at a time (instead of a
character at a time).
 
load:  To put data and/or programs into a computer.
 
location:  A single specific place within computer
memory where a piece of data is stored.   A location is
usually identified by a number (known as an address).
 
LSI:  Large-scale integration.  A single integrated
circuit which has more than 100,000 circuits in it.
 
machine language:  The "native language" of a computer;
those fundamental instructions the machine is capable
of recognizing and executing.   The instructions are
represented by binary code (1s and 0s).
 
memory:  Circuitry and devices that hold the binary 1s
and 0s the computer can access.   Examples are main
memory (integrated circuits), floppy disks, cassette
tape, etc.
 
microprocessor:  The central processing unit of a computer
(usually in a single integrated circuit) that
holds all the elements for manipulating data and performing
arithmetic calculations.
 
MIS:  Management information system.  The use of a computer
for providing information useful to managers
(such as inventories, sales, accounts payable and
receivable, etc.).
 
modem:  Short for MOdulator/DEModulator.  An electronic
device that allows computer equipment to send and
receive information through telephone lines.   There are
two major types:  direct-connect modems and acoustic
couplers.  Direct-connect modems usually plug directly
into a telephone wall jack; acoustic couplers use the
telephone handset for sending and receiving information.
 
network:  An interconnected system of computers and/or
terminals.  The components do not have to be physically
close to one another and are often connected by telephone
lines.
 
node:  A station on a network.  A node can be a computer
or terminal.
 
operating system:  "Traffic cop" software that oversees
the overall operation of a computer system.
 
Pascal:  A high-level programming language named after
the seventeenth-century French mathematician Blaise
Pascal.
 
peripherals:  Equipment (usually hardware) that is external
to the computer itself.  The most common peripherals
used with popular computers are disk drives,
printers, and cassette-tape recorders.
 
printer:  An output device that produces hard copy.
 
printout:  Hard copy produced by a printer.
 
program:  (1) A set of instructions that tell a computer
to do something.  (n.); (2) To prepare the set of
instructions.  (v.)
 
RAM:  Random-access memory.  The main type of memory used
in a small computer.  The time required for the computer
to find one piece of information in RAM is essentially
the same no matter where the information is stored.
Also known as read/write memory because data in RAM can
be easily changed.
 
ROM:  Read-only memory.  Memory where information is
permanently stored and cannot be altered.   This form of
memory is also random-access.
 
RS-232C:  A technical specification published by the
Electronic Industries Association which specifies one
way in which a computer communicates with a peripheral
(such as a modem or terminal).
 
service contract:  A repair contract.  Computer failure
insurance.
 
software:  Programs or segments of programs.  The term
was coined to contrast with hardware--the actual
mechanics and circuitry of a computer.
 
software house:  A company that writes programs or
customizes programs specifically to the needs of an
individual customer.
 
system:  An organized collection of hardware and software
that works together.
 
system software:  General-purpose programs that allow
programmers to write or modify applications programs.
BASIC may be considered part of the system software; so
is the computer's operating system.
 
telecommunication:  Transmission of data between a computer
and another computer or terminal in a different
location.  It can be done with phone lines, satellites,
radio waves, optical fibers, or other means.
 
terminal:  A piece of equipment with a keyboard for
input and an output device such as a CRT or printer.   A
terminal is used to communicate with the computer.
 
timesharing:  A process whereby the facilities of a
single (usually large) computer are shared by a number
of users.  Timesharing requires large amounts of memory
and special software to make it appear that each user
has the whole computer to himself.
 
track:  A section of a disk or tape.
 
turnkey system:  A computer system in which all the
hardware and software has been installed.   Theoretically,
all you have to do is turn it on.
 
volatile memory:  Hardware which requires continuous
electrical power to keep from losing information.   Most
RAM is volatile; ROM is not.
 
word:  A group of characters or data that occupies one
location in the computer's memory.
 
word processing:  The entry, manipulation, editing, and
storage of text using a computer.
 
(*) Reprinted by permission from Popular Computing,
    December 1981.
 
                                                             APPENDIX B
                        
                        VITA BIBLIOGRAPHIC DATABASE
                        ---------------------------
 
[ACCNO] ___________
[MICNAME] __________________________________________________________
[MACRO] ______  [MICRO] __________  [PKT] ___  [LA] _______   [AUT] ______
 
[TITLE] _______________________________________________________________________
[AUTHOR] _______________________________________________________
[PUB] ___________________________________________________________________
[PUBADR] ___________________________________________________________________   
[SOURCE] _____________________________________________   [PP] ______
[PUBDATE] __________  [PGS] _______  [ILLUS?] ___   [REFS?] ___
 
[ABSTRACT?] __  [ENTRYDATE] __________
[FICHENO] ______
 
[ABSTRACT] ____________________________________________________________________
__________________________________________[#]__________________________________
_______________________________________________________________________________
 
[KEYWORDS] ____________________________________________________________________
___________________________________________
              
                         VITA BIBLIOGRAPHIC DATA BASE
                       Field Names and Space Allocations
 
ACCNO        =    accession number assigned to a document
                 (seven spaces).
 
MICNAME      =    micro category name under which a document
                 has been classified (50 spaces).
 
MACRO        =    Arabic or Roman numeral that identifies
                 the macro category under which a document
                 has been classified (six spaces).
 
MICRO        =    alpha numeric characters that identify the
                 micro category under which a document has
                 been classified (seven spaces).
 
PKT(*)       =    packet number in which a particular document
                 has been filed (two spaces).
 
LA(*)        =    language in which the document is written
                 (three spaces).
 
AUT          =    first three letters of the author's last
                 name--used only in the classification of
                 books (three spaces).
 
TITLE        =    title of the document (71 spaces).
 
AUTHOR       =    author/s of the document (43 spaces).
 
PUB          =    publisher of the document (64 spaces).
 
PUBADR       =    address of the publisher (64 spaces).
 
SOURCE       =    title of the periodical in which the
                 article was published, or the series
                 number of the document (40 spaces).
 
PP           =    page range of an article or a chapter from
                 a periodical or a book (seven spaces).
 
PUBDATE      =    date the document was published (10
                 spaces).
 
PGS          =    number of pages in the document (four
                 spaces).
 
ILLUS?       =    if there are illustrations in the document
                 --Yes or No (one space).
 
REFS?        =    if there are references cited in the document
                 --Yes or No (one space).
 
ABSTRACT?    =    if there is an abstract written for the
                 document--Yes or No (one space).
 
ENTRYDATE(*) =   date on which data is being entered (eight
                 spaces).
 
FICHENO      =    microfiche number on which the document
                 has been filmed (six spaces).
 
ABSTRACT     =    abstract written for the document.   This
                 has two fields (108 spaces, 117 spaces).
 
KEYWORDS     =    keywords assigned to the document (108
                 spaces).
 
(*) These fields are programmed with the default values
    noted:
 
    Field                     Default Value
 
    PKT                       P1
    LA                        ENG (English)
    ILLUS?                    Y (yes)
    REFS?                     N (no)
    ABSTRACT?                 N (no)
    ENTRYDATE                 Today's date, e.g., 10/5/83
 
                                                             APPENDIX C
 
 
+++++++++++++++++++++++++++++ VOLUNTEER FILE ++++++++++++++++++++++++++++++++
[NO.] ______ [ENTRY DATE] ___________ [UPDATE] ________ [CO] _____
[APL] ____ [FN] ______________ [I] ______ [LN] ____________________ [BYR] ___ [SX] ___
 
[ADR1] _____________________________________ [ADR2] __________________________________
[CITY] ____________________ [STE] ______________ [ZIP] _________ [CNTY] _______________
[PHONE] ____________________________________ [OCCP] _________________________
[MC] ___ [DEG] ______________________________ [FLD] ____________________
*******************************************************************************
[SKL1] ________________________________________________________________________
[SKL2] ________________________________________________________________________
[SKL3] ________________________________________________________________________
[SKL4] ________________________________________________________________________
*******************************************************************************
[LA] ______________________ [GE] _______________________________________________
[STC-D] ___ [STC-I] ___ [LTC-I] ___ [SI] _______________________________
[PS] ________________________________________________________________________ [CR] ___
 
[CMT1] ________________________________________________________________________
[CMT2] ________________________________________________________________________
 
                        
                           VITA VOLUNTEER FILE
                     Field Names and Space Allocations
 
 
NO.          =   Identification number given to each
                volunteer (six spaces).
 
ENTRYDATE(*) =  Date on which record is first entered on
                the computer (eight spaces).
 
UPDATE       =   Most recent date on which record is
                updated (eight spaces).
 
CO           =   Country of birth of Volunteer (three
                spaces).
APL          =   Volunteer's title - Ms., Mr., or Dr. (four
                spaces).
 
FN           =   Volunteer's first or given name (12
                spaces).
 
I            =   Initial of volunteer's middle name (three
                spaces).
 
LN           =   Volunteer's last or family name (20
                spaces).
 
BYR          =   Year of birth--last two numbers only (two
                spaces).
 
SX           =   Male or Female--M or F (one space).
 
ADR1         =  First line of address (32 spaces).
 
ADR2         =   Second line of address, if applicable (32
                spaces).
 
CITY         =   City (18 spaces).
 
STE          =   State (11 spaces).
 
ZIP          =   Zip or alpha-numeric locator code (nine
                spaces).
 
CNTY         =   Country (13 spaces).
 
PHONE        =   Business and home phone numbers, so indicated
                by B or H (31 spaces).
 
OCCP         =   Volunteer's present work (30 spaces).
 
MC           =   Macro category (using VITA Thesaurus
                codes) or major area of expertise (three
                spaces).
 
DEG          =   Highest academic degrees (limit two) (23
                spaces).
 
FLD          =   Specific area(s) of education or training
                (23 spaces).
 
SKL1         =   Volunteer's principal skills (using VITA
                Thesaurus codes) (72 spaces).
 
SKL2         =   Continuation of above (72 spaces).
 
SKL3         =   Continuation of above (72 spaces).
 
SKL4         =   Continuation of above (72 spaces).
 
LA           =   Three-letter codes of languages spoken by
                Volunteer (20 spaces).
 
GE           =   Three-letter codes of countries and areas
                where Volunteer has worked (limit to five
                countries) (49 spaces).
 
STC-D        =   Short-term consulting in home country (one
                space).
 
STC-I(*)     =   Short-term consulting outside home country
                (one space).
 
LTC-I        =   Long-term consulting outside home country
                (one space).
 
SI           =   Special interest, entered by code number
                (32 spaces).
 
PS           =   Professional affiliations (67 spaces).
 
CR           =   Does the Volunteer have access to a computer
                or a computer terminal? (one space).
 
CMT1         =   Special comments (72 spaces).
 
(*) These fields are programmed with the default values
    noted:
 
      Field                   Default Value
 
      ENTRYDATE               Today's date, e.g., 9/10/84
      STC-I                   Y (yes)
 
                                                APPENDIX D
 
                  DEVELOP LITERATURE UNIT
 
L565402    UNIT LISTING.  83/09/18.   83/03/28.  83/03/28.
 
AGROWASTE
BRIQUETTING
DATE-1981
DEPARTMENT OF ENERGY
FROM-VITA
FUELS FROM BIOMASS
MEDIUM-SCALE TECHNOLOGY
PELLETIZING
VITA-36956
ZL NORTH AMERICA
ZL USA VA
 
BIOMASS CAN BE COMPACTED AND PELLETIZED FOR USE AS A FUEL AND AS
ANIMAL FEED.
 
REED T. AND B. BRYANT. 1978.   DENSIFIED BIOMASS:  A NEW
    FORM OF SOLID FUEL.  A U.S. DEPARTMENT OF ENERGY CONTRACT
    (NO. EG-77-C-01-4042).  PUBLICATION PREPARED BY SOLAR ENERGY
    RESEARCH INSTITUTE, GOLDEN, COLORADO (SERI-35).  30 PAGES PLUS
    APPENDICES.
 
BIOMASS IS AN ECONOMICALLY AND ENVIRONMENTALLY ATTRACTIVE FUEL,
BUT IT IS OFTEN DIFFICULT TO COLLECT, STORE, SHIP, AND USE.  DENSIFYING
BIOMASS TO A SPECIFIC GRAVITY OF 1.0 ELIMINATES MOST OF THESE
FUNDAMENTAL PROBLEMS AND PRODUCES A UNIFORM, CLEAN, STABLE FUEL:
"DENSIFIED BIOMASS FUEL" OR DBF.
 
BEFORE CONVERSION TO DBF, RAW BIOMASS RESIDUES GENERALLY REQUIRE
PREPARATION:  THE SEPARATION OF NONCOMBUSTIBLES FROM COMBUSTIBLES,
ESPECIALLY FOR SOLID MUNICIPAL WASTE; MILLING; AND DRYING.  ABOUT
5% OF THE ENERGY CONTENT IN RAW BIOMASS CAN BE EXPENDED IN PREPARATION
AND 1% TO 3% IN DENSIFICATION.   IN ITS DENSIFIED FORM, BIOMASS
CAN BE BURNED IN STANDARD EQUIPMENT WITH REDUCED EMISSIONS AND
INCREASED HEAT RELEASE AND THERMAL EFFICIENCY.   TESTS HAVE SHOWN
THAT DBF IS AN ACCEPTABLE SUBSTITUTE OR DILUENT IN EXISTING COAL-FIRED
SYSTEMS.  IN ADDITION, DBF MAY BE USED IN HOME HEATING,
PYROLYSIS, GASIFICATION, AND POWER GENERATION.
 
BASED ON COMPONENT EQUIPMENT COSTS AND THE INSTALLED COST OF EXISTING
PLANTS, THE ESTIMATED BREAK-EVEN SELLING PRICE OF WOODEX PELLETS IS
$1.20 TO $3.40/MBTU OR $19.20 TO $54.40/TON (1981), DEPENDING ON FEEDSTOCK
COST.  WITHIN THAT COST RANGE, DBF APPEARS TO BE ECONOMICALLY
COMPETITIVE WITH COAL IN SOME MARKETS, PARTICULARLY WHEN TAKING INTO
ACCOUNT ENVIRONMENTAL ADVANTAGES OF LOW SULFUR CONTENT.   EVEN WHEN
FOREST AND FARM RESIDUES ARE AVAILABLE FOR FUEL PURPOSES, IT MAY
BE PREFERABLE TO PELLET THE RESIDUES, RATHER THAN COMBUST THEM
DIRECTLY, BECAUSE OF TRANSPORTATION, STORAGE, AND CAPITAL INVESTMENT
SAVINGS.
 
Volunteers In Technical Assistance
1600 Wilson Boulevard, Suite 500
Arlington, VA 22209, USA
 
PHONE:  (703) 276-1800
CABLE:  VITAINC
TELEX:  440192 VITAUI
 
                                                APPENDIX E
 
                  DEVELOP TECHNOLOGY UNIT
 
T565293    UNIT LISTING.  83/09/18. 83/04/06.   83/06/03.  15.31.31.
 
DATE-1977
FOOD GRAIN PROCESSING
FOOD PROCESSING EQUIPMENT
FROM-VITA
GRAIN
GRINDING MILL
MEDIUM-SCALE TECHNOLOGY
STONE CUTTING
STONE MILL
UPPER VOLTA
VITA-28743
WEST AFRICA
ZL NORTH AMERICA
ZL USA VA
 
SPECIFIC INSTRUCTIONS FOR THE CONSTRUCTION OF GROOVES IN STONE MILL
BURRS ARE GIVEN.
 
IN THE CONSTRUCTION OF A GRIST MILL IT IS NECESSARY TO PLACE GROOVES
ON THE COMMON FACES OF THE GRINDING STONES SUCH THAT THEY DIRECT
MEAL TO THE EDGE OF THE STONES.   A REQUESTOR IN UPPER VOLTA SOUGHT
ASSISTANCE IN UNDERSTANDING THE PRINCIPLES FOR PLACEMENT OF THE
GROOVES AND IN THE TECHNIQUES FOR MAKING THE GROOVES.
 
VITA VOLUNTEER EXPERTS PROVIDED THE FOLLOWING ADVICE:
 
1.  DIAGRAMS WERE PROVIDED WHICH SHOWED SOME OF THE DESIGNS OF
    GROOVING, OR FLUTING, WHICH CAN BE USED.
2.  THE UPPER AND LOWER STONE BURRS SHOULD BE FLUTED EXACTLY THE
    SAME.   WHEN THE UPPER BURR IS TURNED OVER AND PLACED ON TOP OF
    THE LOWER BURR, THE GROOVES WILL BE IN THE CORRECT ANTAGONISTIC
    RELATIONSHIP.
3.  THE GROOVES SHOULD BE ANGLED SO THAT ON THE TOP (ROTATING) BURR
    THE POSITION OF THE GROOVE AT THE RIM LAGS BEHIND THE POSITION
    OF THE GROOVE AT THE CENTER.
4.  FOR A BURR 48 INCHES IN DIAMETER THE GRINDING GROOVES SHOULD BE
    ABOUT 1.5 INCHES ACROSS AND ALL SHOULD BE THE SAME SIZE.
5.  THE SHAPE OF THE GROOVE IN CROSS-SECTION IS HALF OF A "V" IN
    SHAPE.   THE LEADING EDGE (DURING ROTATION) OF THE GROOVE IS CUT
    PERPENDICULAR INTO THE STONE.  THE CUT IS THEN SLOPED GRADUALLY
     TO THE SURFACE AT THE TRAILING EDGE OF THE GROOVE.
6.  FOR A 48 INCH BURR THE LEADING EDGE OF THE FLUTE NEAR THE CENTER
    OF THE STONE SHOULD BE CUT ABOUT 5/16 INCH DEEP, ABOUT 3/16 INCH
    HALFWAY BETWEEN THE CENTER AND THE RIM, AND 1/32 INCH AT THE
    RIM.   THIS CAUSES THE GROOVE TO BE DEEP WHERE THE GRAIN ENTERS
    THE MILL AND TO BECOME SHALLOWER AS THE GRAIN IS CONVERTED TO
    MEAL AND MOVED TOWARD THE EDGE OF THE STONES.  FOR FINER MEAL,
    THE DEPTH OF THE GROOVE CAN BE MADE SHALLOWER.
7.  DRAW THE OUTLINES OF THE GROOVES ON THE STONES AND WITH A COLD
    CHISEL AND HAMMER CHIP AWAY THE STONE TO FORM THE GROOVES.  THE
    RATE OF FLOW OF MEAL BETWEEN THE BURRS IS REGULATED BY THE RATE
    AT WHICH GRAIN IS INTRODUCED TO THE SYSTEM AND BY THE CONSTRUCTION
    OF THE GROOVES.
8.  THE BURRS SHOULD NOT BE ALLOWED TO TOUCH.  THAT IS, ALWAYS
    INTRODUCE GRAIN TO THE SYSTEM IF INSUFFICIENT GRAIN AND MEAL
    IS PRESENT BETWEEN THE STONES, THE OPERATOR CAN HEAR THE GRATING
    OF THE BURRS.
 
IS NOT
AVAILABLE.
 
(INQUIRY FROM UPPER VOLTA ANSWERED IN 1977)
 
Volunteers In Technical Assistance
1600 Wilson Boulevard, Suite 500
Arlington, VA 22209, USA
 
PHONE:  (703) 276-1800
CABLE:  VITAINC
TELEX.  440192 VITAUI
 
                                                APPENDIX F
 
                   DEVELOP WHO'S WHO UNIT
 
W565283    UNIT LISTING.  83/09/18. 82/12/13.   83/02/03.  17.17.15.
 
CLIMATE
CONSERVATION
DATE-1977
ENVIRONMENT
FORESTRY
FORESTS
FROM-VITA
GHANA
IVORY COAST
NATURAL RESOURCES
RESEARCH AND DEVELOPMENT
RESEARCH INSTITUTE
SOIL
TROPICAL
VEGETATION
VITA-28849
WEST AFRICA
WILDLIFE
ZL NORTH AMERICA
ZL USA VA
 
THREE INSTITUTIONS WHICH CAN ASSIST VEGETATION STUDIES IN TROPICAL
WEST AFRICA ARE IDENTIFIED.
 
THE FOLLOWING INSTITUTION CAN ASSIST WITH VEGETATION WORK IN
WEST AFRICA.
 
1.  CENTRE SUISSE DE RECHERCHE SCIENTIFIQUE EN COTE D'IVOIRE.
    THIS SMALL LABORATORY FOUNDED IN 1952 ON SWISS INITIATIVE IS
    CONCERNED WITH PROMOTING STUDIES ON THE FAUNA AND FLORA OF THE
    REGION.   IT IS SITUATED AT ADIOPODOUME NEAR ABIDJAN.
 
2.  BOTANY DEPARTMENT, UNIVERSITY OF GHANA, LEGON, GHANA.
    SINCE ITS INCEPTION MANY QUALIFIED BOTANISTS HAVE UNDERTAKEN
    RESEARCH IN THIS DEPARTMENT INTO A WIDE VARIETY OF PROBLEMS.
    AS WITH OTHER INSTITUTIONS IN WEST AFRICA, A GREAT DEAL OF THE
    WORK IN THESE EARLY DAYS HAS BEEN CONCERNED WITH THE COLLECTION,
    NAMING AND PRESERVING OF PLANT SPECIMENS AND THE HERBARIUM
    ATTACHED TO THE DEPARTMENT NOW CONTAINS OVER 50,000 SPECIMENS,
    ONE OF THE LARGEST COLLECTIONS IN WEST AFRICA.
 
3.  DEPARTMENT OF BOTANY, KWAME NKRUMAH UNIVERSITY OF SCIENCE AND
    TECHNOLOGY, KUMASI, GHANA.
    RESEARCH HAS BEEN INITIATED ESPECIALLY INTO PROBLEMS OF FOREST
    ECOLOGY AND POLLEN ANALYSIS.
 
(INQUIRY FROM GHANA ANSWERED IN 1977)
 
Volunteers In Technical Assistance
1600 Wilson Boulevard, Suite 500
Arlington, VA 22209, USA
 
PHONE:  (703) 276-1800
CABLE:  VITAINC
TELEX:  440192 VITAUI
                                                APPENDIX G
TEXT WRITING PROGRAM:  INPUT
 
  ! lm10
  ! rm78
  ! sp1
  ! cj
  OILS AND WAXES
  ! Ij
  Composition and Use of "Eucalyptus" Oil
 
     "Eucalyptus" oil is composed of six primary
  essential oils.  These are listed
   below according to Jacobs (1979) and each
  is given with a brief description of
  its use.
  ! lm18
  ! sp0
 
  Cineole:   used in pharmaceuticals and stain
            removers.
 
  Phellandrene:   used in industry as a solvent
  and
                 floatation compound for separating
                 metals.  Its presence in
  essences
                 intended for pharmaceuticals
  is
                 prescribed by pharmacopoeias.
 
  Terpineol:   used in perfumery.
 
  Eudesmol:   used as a perfume fixative.
 
   Eudesmyl acetate:   used as a substitute
  for bergamot
                     essence.  It mixes we
  II with
                     lavender essence.
 
  Piperitone:   used as a raw material for
  synthetic
               thymol and menthol production.
 
  ! lm10
  ! sp1
      The specific composition of, "Eucalypt
  us" oil varies among the many species, therefore,
  it is impossible to analyze a
  `representative' species.  The results of
  two laboratory studies on "E. globulus"
  are given here as an indication of the
   types and complexity of the compounds which
  combine to form eucalypt oil.
 
     "Eucalyptus globulus" has been qualitatively
  analyzed with a computerized gas
   chromatography-mass spectrometry analyzer
  to identify the oils present (Nashimura
  and Calvin, 1979).  The oils revealed
   were 1,8-cineol; alpha, beta, and gamma
  -terpinene; beta-pinene; terpinen-4-ol;
  linalool oxide; alpha-gurjuene; aromadendrene;
  alloaromadendrene; globulol (10-hydroxyaromadendrane);
  and others.  A quantitative
  analysis of this species, again
  using chromatography, selectively identified
  seven compounds in the following
  proportions (Verma et al., 1978).
 
                                                 APPENDIX H
 
             TEXT WRITING PROGRAM:  FINAL OUTPUT
 
                          OILS AND WAXES
 
Composition and Use of "Eucalyptus" Oil
 
    "Eucalyptus" oil is composed of six primary essential oils.
These are listed below according to Jacobs (1979) and each is given
with a brief description of its use.
 
        Cineole:   used in pharmaceuticals and stain
                  removers
 
        Phellandrene:  used in industry as a solvent and
                       floatation compound for separating
                       metals.  Its presence in essences
                       intended for pharmaceuticals is
                       prescribed by pharmacopoeias.
 
        Terpineol:  used in perfumery.
 
        Eudesmol:  used as a perfume fixative.
 
        Eudesmyl acetate:  used as a substitute for bergamot
                           essence.  It mixes well with
                           lavender essence.
 
        Piperitone:  used as a raw material for synthetic
                     thymol and menthol production.
 
   The specific composition of "Eucalyptus" oil varies among the
many species, therefore, it is impossible to analyze a
`representative' species.  The results of two laboratory studies on
"E. globulus" are given here as an indication of the types and
complexity of the compounds which combine to form eucalypt oil.
 
   "Eucalyptus globulus" has been qualitatively analyzed with a
computerized gas chromatography-mass spectrometry analyzer to
identify the oils present (Nashimura and Calvin, 1979).   The oils
revealed were 1,8-cineol; alpha, beta, and gamma-terpinene;
beta-pinene; terpinen-4-ol; linalool oxide; alpha-gurjuene;
aromadendrene; alloaromadendrene; globulol
(10-hydroxyaromadendrane); and others.   A quantitative analysis of
this species, again using chromatography, selectively identified
seven compounds in the following proportions (Verma et al., 1978).
 
                                                APPENDIX I
 
                          APPLE PLOT GRAPH
 
     DAILY OUTPUT (U.S. GALS) FROM A 14 FT WINDMILL AT 17 M HEAD
 
<FIGURE>

11p10.gif (600x600)


 
========================================
========================================