You are on page 1of 178

Summer Institute '93: Academic Information Resources at Kenyon College CAUSE INFORMATION RESOURCES LIBRARY The attached document

is provided through the CAUSE Information Resources Library. As part of the CAUSE Information Resources Program, the Library provides CAUSE members access to a collection of information related to the development, use, management, and evaluation of information resources- technology, services, and information- in higher education. Most of the documents have not been formally published and thus are not in general distribution. Statements of fact or opinion in the attached document are made on the responsibility of the author(s) alone and do not imply an opinion on the part of the CAUSE Board of Directors, officers, staff, or membership. This document was contributed by the named organization to the CAUSE Information Resources Library. It is the intellectual property of the author(s). Permission to copy or disseminate all or part of this material is granted provided that the copies are not made or distributed for commercial advantage, that the title and organization that submitted the document appear, and that notice is given that this document was obtained from the CAUSE Information Resources Library. To copy or disseminate otherwise, or to republish in any form, requires written permission from the contributing organization. For further information: CAUSE, 4840 Pearl East Circle, Suite 302E, Boulder, CO 80301; 303449-4430; e-mail info@cause.colorado.edu. To order a hard copy of this document contact CAUSE or send e-mail to orders@cause.colorado.edu.

Table of Contents

Introduction 1 Internet Discussion Groups 5 How Internet Discussion Groups Work 5 Fictitious Examples 6 Exercise 8 Creating and Managing Internet Discussion Groups at Kenyon 9 Creating a new discussion group 9 Managing a discussion group 10 Archives 11 Example 11

Usenet NEWS 13 Major Categories of Newsgroups 13 Alternative Newsgroups 14 Subgroups 14 To Start Usenet NEWS 14 To Read a Message 15 Responses to a message 16 To Stop Usenet NEWS 17 Reducing the Number of Newsgroups and Starting Your Own Directory 17 Netnews Exercise 18 Kermit Instructions 20 To START your VAX Session Using a Microcomputer 20 To Transfer Files 20 To STOP Your VAX Session Using a Microcomputer 21 Internet Mail 22 What is the Internet? 22 Internet Mail 22 Shortcuts 23 Finding Someone's Internet Address 24 Exercise 24 How Netfind Searches Work 26 How WHOIS Servers Work 27 How Finger Works 28 The Postmaster Option 29 User's Guide to Mail 30 What is Mail? 30 To Use The Mail Directory 31 To Send and Receive Mail 32 To Manage Mail Messages 36 To Use Folders To Organize Mail Messages 42 The Net User Guidelines and Netiquette 45 Electronic Mail and Files User Responsibility 46 Anonymous FTP - File Transfer Protocol 47 Electronic Communications 48 Listserv and Mailing List Discussion Groups 49 The Ten Commandments for Computer Ethics from the Computer Ethics Institute 50 VAXNotes 51 Telnet 59 What is Telnet? 59 How to Use Telnet 59 To Telnet to Kenyon College 60 TELNET Exercise 61 FTP (File Transfer Protocol) 64 What is FTP? 64 How to Use FTP 64 FTP Commands 67 File Transfer Protocol Exercises 70 Gopher 82 What is Gopher 82 Who Can Use Gopher 82

How to Get to Gopher 82 Using Gopher 83 VERONICA 86 Gopher Commands 89 Gopher Exercise 91 KCInfo 92 Wide Area Information Server (WAIS) 93 How to Access WAIS at Kenyon 93 What is WAIS? 93 The Origins of WAIS 94 What Can I Find with WAIS? 94 Important WAIS Concepts 95 How to Access World-Wide Web at Kenyon 97 What is World-Wide Web 97 Who Can Use World-Wide Web 98 How to Get to World-Wide Web 98 Using World-Wide Web 99 How To Access Archie At Kenyon102 What is Archie102 Who Can Use Archie102 How To Get To Archie103 Using Archie103 Using a local client103 Archie Client Command and Parameters104 Learning More About Archie105 Microsoft Windows 3.1106 Why use Windows?106 Basics of Windows106 The metaphor of the "desktop"106 Icons107 The future of networked microcomputers running Windows107 Online Public Access Catalog: Searching With the MARC Record in Mind108 MARC Record Examples110 Online Public Access Catalog: Limiting by Date, Media, or Language112 Types of Limits112 How to Limit a Search112 Online Public Access Catalog: Searching For Video Recordings114 Library Services Menu115 Functions of the Library Services Menu as of June 7, 1993115 Directory of Selected, Electronic Information Resources (IR Menu)116 Accessing the IR Menu116 Resources Available on the IR Menu116 Some Currently Available Electronic Texts as of June 1, 1993119 To Retrieve the Documents119 List of Electronic Texts119 Directory of Electronic Journals and Newsletters125

Journals and Newsletters127 Electronic Newsletters128 How To Retrieve This Directory From Networked Sources130 Electronic Journal Exercise131 Multimedia132 Courseware136 Boolean Searching140 Search Strategies141 HELPHELPHELPHELPHELPHELPHELPHELP142 CARL UnCover Database and Services145 More about the CARL UnCover Database145 CARL UnCover2 Document Delivery Service145 Arranging to Use CARL UnCover145 EPIC/FirstSearch Databases and Services147 Frequently Used Databases OCLC Union Catalog147 Arranging to Use FirstSearch147 Searches in EPIC148 Database Documentation List149 Knowledge Index Databases and Services150 Databases150 Arranging to Use Knowledge Index150 Training150 Knowledge-Index Sections and Databases152 LEXIS/NEXIS Databases and Services154 Databases154 Arranging to Use LEXIS/NEXIS154 Services and Libraries155 The LEXIS Service155 The NEXIS Service156 STN International Databases and Services157 Frequently Used Databases157 Arranging to use STN International158 Other Collections within the Kenyon Libraries159 Slide Collection159 Videotape Collection160 Laser Disc Collection160 16mm Film Collection161 Filmstrip Collection161 Sound Recordings Collection161 Spoken-Word LP Record Collection162 Numbered Microfilm/Microfiche162 Microfilm Collections Housed in the Reference Section164 CoreFiche Collections165 Additional Microfilm Collections in OPAC166 Other Resources166 Government Publication Resources167 Government Publications in Electronic Format169

Census Bureau169 Other Census Bureau CD-ROM titles available at Kenyon170 Other CD-ROM titles available at Kenyon170 Diskette Titles Available at Kenyon171 Appendix A - Glossary173 Appendix B - Bibliography189 Appendix C - List of Participants198 Appendix D - Faculty groups199 Appendix E - Reserve Room Reading List200 Appendix F - Issues201 Appendix G - Pre-Institute Assignment202 Index205 Introduction

Acknowledgements

We would like to thank the contributors to this workbook who are: Greg Carter, Mike Fox, Patricia Geschwent, Jami Peelle, Bill Quimby, Jo Rice, Jennifer Ross David Shea, Scott Siddall, Bev Actis, Andrea Peakovic, and Carmen King. Without their work, there would be no workbook. We would like to acknowledge the industrious and reliable work of Margaret Main, the Production Assistant. We gave credit to all contributors of materials taken from the Internet and thank them for making this workbook complete. The contributors from Internet are: Arlene H. Rinaldi, Florida Atlantic University; the EARN (European Academic Research Network); Lynn Ward, University of Illinois; Oregon State University; and Michael Strangelove, University of Ottawa. We used only materials for which there was permission to copy. This publication is not being produced or distributed for commercial purposes. Permission to copy portions of this book is given, provided the Director is notified in advance and credit to the source is given. Scott Siddall, Director Jo Rice, Format Designer and Pro duction Editor

SIDDALL@KENYON.EDU RICE@KENYON.EDU Internet Discussion Groups{1}

Our Internet connection provides access to an incredible volume of information. While some of this information may change little across the course of a week, ac tive discussion groups discuss hours-old developments as they occur. Discussion grou ps, also called mailing lists, are based on electronic mail and circulate topical information to subscribers of each group.

How Internet Discussion Groups Work Thousands of e-mail discussion groups exist, from circles of leading scholars engaged in a moderated discussion, to large, unmoderated popular-culture groups. Discussion groups provide dialogues in humanities and fine arts, on political issues and the latest scientific findings, news on events, funding, employment, and channels for questions and answers. Internet discussion groups are useful in research and creative work, and can be particularly worthwhile in teaching. Essentially, your name is placed on a list and you receive information contributed to that list. In some instances, formal discussions are moderated by someone who maintains a focus on the topic by eliminating irrelevant mail. In other cases, a computer program merely echoes contributions to everyone on the list. Types of Addresses Discussion groups usually have both an administrative and a forwarding address. In order to add your name to the list, have it removed, or ask questions about the list, write to the administrative address. The forwarding address will take whatever you send it and echo that message to the entire discussion group. Types of Discussion Groups There are two major types of discussion groups. The first, known as LISTSERVs, are based on the BITNET and have a standard set of procedures and commands. Internet-based discussion groups are usually referred to as LIST-REQUESTS and a number of popular programs exist to handle the groups. Discussion groups that are run at Kenyon use the listrequest syntax.

Fictitious Examples Following are examples of the syntax for using listrequest and listserv discussion groups. List-Request Log into the VAX Type MAIL at the $ prompt; press <ENTER> At the TO: prompt, type MX%"list-request@system.college.edu" Then press <ENTER> At the subject prompt, press <ENTER> At the next blank screen, type the one-line message SUBSCRIBE and press <ENTER> Press the CTRL key and Z at the same time; your message is sent. Listserv Discussion Groups Log into the VAX Type MAIL at the $ prompt; press <ENTER> At the TO: prompt, type MX%"listserv@system.BITNET" Then press <ENTER> At the subject prompt, press <ENTER> At the next blank screen, type the one-line message SUBSCRIBE list your-real-name and press <ENTER> Press the CTRL key and Z at the same time; your message is sent.

What Happens Next At this point, the administrative program running on a computer called SYSTEM at a fictitious institution called COLLEGE will receive notice that the person

named your_real_name wishes to subscribe to a discussion group named LIST. You will begin to receive mail from the discussion group shortly thereafter. If you make an error, usually the administrative program will notify you. If you send e-mail directly to the forwarding address of the discussion group, your mail will be echoed to all the subscribers. If you reply to someone's posting to the list, your reply will go only to that person. To Unsubscribe from a Group Some discussion groups send out one or two pieces of e-mail each week, or even less; others circulate much more. If you receive intractable volumes of such mail, or find a discussion not to your liking, you can send the appropriate message which "unsubscribes" you from the service. Once you subscribe, you should always keep on file the instructions you need to unsubscribe to each service.

Exercise Subscribe to the discussion group set up for the planning phase of this Summer I nstitute. This group is running here at Kenyon. At the MAIL TO: prompt, type MX%"PEWGROUP-REQUEST@KENYON.EDU" You may leave the SUBJ line blank; simply press <ENTER> At the next blank screen, type the one-line message SUBSCRIBE Press CTRL and Z at the same time to send the message. In a few minutes, you will receive e-mail from the mailing list "server" here at Kenyon. Read this mail which is a welcoming message, with instructions on how to sign off this list. File this message in a mail folder named LISTS. After reading the welcoming mess age and at the MAIL> prompt, type FILE LISTS If a folder named LISTS doesn't exist in your mail files, answer Y (for yes) to create that folder. After everyone in the session has subscribed, send a message to the list. At th e MAIL TO: prompt, type MX%"PEWGROUP@KENYON.EDU" Note that this is the forwarding address, not the administrative address (which is MX%"PEWGROUP-REQUEST@KENYON.EDU").

Everyone in the session will begin to receive mail from other "discussants" in t his list; active mailing lists can generate large volumes of e-mail! Re-read the welcoming message that you filed in the LISTS folder, then try some of the other options for managing your participation in this list. Try sending the SET NOMAIL or REVIEW commands to the administrative address. Before you leave this session, please send to the administrative address the one -line command SIGNOFF so you are removed from this demonstration discussion gro up. Creating and Managing Internet Discussion Groups at Kenyon{2} Kenyon College has the software to support discussion groups managed by Kenyon f aculty and staff on behalf of all Internet users. This document explains the ba sic commands used to manage Internet discussion groups, and assumes familiarity with the introductory document, Internet Discussion Groups.

Creating a new discussion group Develop Name and Title Develop a name and short title for your discussion group. For example, for the fictitious discussion group named "POLIART", the descriptive title might be "Political expressions in the fine arts." Write Welcoming Statement Using the example provided in the example below, develop a welcoming statement which will be sent to each new subscriber automatically by the mailing list server. Set Up Kenyon Mailing List Server Contact ICS at PBX 5700 and request that the staff set up the Kenyon mailing list server to run your discussion group. You will be asked to provide the name, title and text of the welcoming message (preferably in electronic form as a plain text document). Configuration Options You will be asked to select from several options for configuring the discussion group, including: Subscribers can be added to the list automatically, or you can intercept the subscriptions and decide if they are qualified. The list can be set up so that only those who have subscribed can send messages to the list subscribers.

Managing a discussion group Responsibilities The manager of a discussion can have several responsibilities, largely depending on how much control one wishes to have over the discussion. The discussion manager can require that all postings go through him or her before they are sent out to the subscribers. Clearly this level of control can require a great deal of effort on the manager's part. Normally, the manager simply announces the existence of the list to colleagues then freely allows subscriptions and postings. If the discussion moves beyond the boundaries of the manager's intentions, the manager can post messages to facilitate the redirection of the discussion. In addition to the usual set of commands for participation in a discussion group, as listed below in the example, the manager has two other commands for adding and removing subscribers from the list. Only list managers have access to these two commands. To Add Members to the List To add members to the list, the manager sends a oneline message to the administrative address (the "listname-request" address) with the following syntax: ADD/option address [,another address, another address,...] There are several options for adding members to the list, the most important of which is the /NOCASE option. The /NOCASE option signifies that that mailing list is to ignore the case of the subscriber's address. Many systems on the Internet are case sensitive. If the manager adds an address in ignorance of the specific case requirements of the subscriber's home system, the subscriber may not receive mail nor will the subscriber be able to signoff of the list. Ordinarily, any subscriptions that the manager adds to the list should be added with the /NOCASE option. For example, ADD/NOCASE smith@college.edu To Remove Members To remove members from the list, the manager should send a one-line message to the administrative address (the "listname-request" address) with the following syntax: REMOVE address [,another address,another address,...]

Archives Discussion groups can be configured by the VAX system manager so that all messages posted to the list are archived, normally by month, so they can be retrieved at a later date by any subscriber. Subscribers send messages via e-mail to the archive to retrieve archived materials. For example, for a discussion whose materials are archived by month, the archive files are named: LISTNAME.yyyy-mm For example, POLIART.1993-05 for all discussion materials sent out in May, 1993. To Retrieve Archives To retrieve archives for a particular month, send a message to LISTNAME-ARCHIVES@ADDRESS with the command SENDME LISTNAME.yyyy-mm To retrieve all months, send a message to LISTNAMEARCHIVES@ADDRESS with the command SENDME LISTNAME

Example An example of a detailed welcoming message, taken from a discussion group named SHELLFISH. Electronic copies of this message are available for editing; contact ICS for more information. Your subscription to the Internet discussion list "SHELLFISH" has been accepted. This is a forum for the discussion of: shellfish research in all scientific disciplines, shellfish industry worldwide, funding opportunities related to shellfish, employment in shellfish research and industry, meetings and conferences at all levels,

as well as any other topics that you, the participants in this discussion, deem suitable. The discussion will be as good as you make it! There are only two restrictions: the basic theme of the discussion is shellfish, and only active members of the National Shellfisheries Association can read or contribute to the discussion (all subscription requests are checked against the roster of active members).

You can participate in the discussion by sending electronic mail to the list itself. The Internet address for the discussion is SHELLFISH@KENYON.EDU When you send mail to this address, your mail is automatically sent out to all participants (subscribers) of the SHELLFISH list. If you see something in the discussion of interest, and you simply REPLY to the sender (rather than SEND mail to the list itself), your reply will go only to the sender of the original message. Some exceptions noted, but generally the discussions are far more interesting and self-sustaining if the participants send their contributions to the discussion list rather than to individuals. In this manner, all subscribers can follow the many threads of the discussion. You can manage your own subscription to this discussion list by sending one-line electronic mail messages to the "listserver." The Internet address for the listserver is SHELLFISH-REQUEST@KENYON.EDU The body of the text in each request message should consist of one or more of the following commands, one per line. Send your requests to the SHELLFISH-REQUEST address, not to the discussion itself (SHELLFISH). I strongly recommend that you retain a copy of this information so you are able to signoff (unsubscribe) from the list should you want to do so. The following commands can be handled automatically by SHELLFISH-REQUEST: SIGNOFF - to remove yourself from the list REVIEW - to get a list of subscribers QUERY - to get the status of your entry on the list SET NOMAIL - to remain on the list but not receive mail SET MAIL - to reverse the NOMAIL setting SET CONCEAL - to conceal yourself from REVIEW listings SET NOCONCEAL - to reverse the CONCEAL setting SET NOREPRO - to prevent the list from sending you your own postings SET REPRO - to reverse the NOREPRO setting LIST - to get a list of mailing lists available on this host HELP - to receive a help file Please send complaints, questions and comments about the list to the list moderator .......(name and address here) Usenet NEWS{3}

Usenet NEWS is a means of communications for people with common interests. The structure of Usenet NEWS is hierarchical. There are layers of newsgroups and me ssages. The top layer is the general directory of all newsgroups. Major Categories of Newsgroups There are several major categories of newsgroups: bit The bit groups are actually newsgroup links from existing Bitnet mailing lists. Many of the popular mailing lists such as the WordPerfect list are available. This provides an alternative to subscribing to a mailing list. comp Topics of interest to both computer professionals and hobbyists, including topics in computer science, software sources, and information on hardware and software systems. ieee The ieee groups are related to IEEE, the Institute of Electrical and Electronics Engineers. Most groups are technical although some discuss the activities of IEEE itself. fr The fr groups address French topics, in french. Kenyon This group concerns Kenyon College issues. The contents of this newsgroup does not circulate offcampus. misc Group addressing themes not easily classified into any of the other headings or which incorporate themes from multiple categories. subjects include fitness, jobhunting, law, and investments. sci Discussions marked by special knowledge relating to research in or application of the established sciences. soc Groups primarily addressing social issues and socializing. Included are discussions related to many different world cultures. talk Groups largely debate-oriented and tending to feature long discussions without resolution and without appreciable amounts of generally useful information.

news Groups concerned with the Usenet NEWS network, group maintenance, and software. rec Groups oriented towards hobbies and recreational activities. vmsnet Groups discussing VMS operating system issues and concerns.

Alternative Newsgroups There are two alternative hierarchies. Alternative newsgroups are not "officially" part of Usenet News and as such may be created by anyone. alt True anarchy: anything and everything can and does appear; subjects include sex, the Simpsons, and privacy. gnu Groups concentrating on interests and software with the GNU Project of the Free Software Foundation.

Subgroups Under the major topic groups, there are subgroups; for instance, under the topic of "rec", is the subtopic, "sports", and under that sub-subtopic are volley ball, baseball, football, etc. Under these sub-subtopics are the actual messages. To Start Usenet NEWS To access Usenet NEWS on the VAX at the $ prompt, type $ NETNEWS A list of the newsgroups and subgroups will appear on the screen. Moving around in the Newsgroups There are several ways to move up or down among the Newsgroups. Arrow Keys Use the arrow keys to move one line at a time.

Word Commands Type UP or DOWN to move the cursor one line at a time. Type TOP to get to the top of the list. Type BOTTOM to get to the bottom of the list. Type a Newsgroup number or a message number to jump down or up several groups or messages. Type SELECT groupname to jump to a selected group. For instance to go to the "comp.sys.ibm.pc" newsgroup, at the News> prompt, type News> SELECT comp.sys.ibm.pc Press the <Prev Screen> or <Next Screen> keys to move one screen at a time. To temporarily restrict the list of newsgroups to those in a selected hierarchy, at the News> prompt, type set class xxx.xxx.xxx where xxx.xxx.xxx is the name of the newsgroup, including the period (.). For example, News> SET CLASS SOC. restricts the view to all SOC. newsgroups. News> SET CLASS COMP.SYS. restricts the view to all comp.sys newsgroups. To restore your view to all newsgroups, at the News> prompt, type SET CLASS ALL

To Read a Message To read a message, press <RETURN> at the Newsgroup of your choice until you are reading a message. Responses to a message The responses you can make after reading a message are: Close or Dir If you type CLOSE, you will return to the list of groups in the same category. If you type CLOSE again, you will move up to the group above this category. Reply If you type REPLY, you will be in an editor and can reply to the person who sent the message.

Followup If you type FOLLOWUP, you will be in the editor and will reply to the whole group of people who read this thread of messages. A copy of the message to which you are responding will appear; you can edit or delete it. Post POST allows you to send a message not directly related to the message you have just read. Mail (or Forward) If you type MAIL, you can send the message to another person or to yourself, if you want to keep the message. After you have typed your message, press <CTRL Z> to send your message. Print Printing messages works the same as printing messages in MAIL. After you read a message, type PRINT/QUEUE=queuename to print a message. You can print selective messages by typing the numbers; for instance, PRINT/QUEUE=queuename 437-450 will print messages 437 to 450. They will not start to print until you exit Usenet NEWS. Help At the NEWS> prompt type HELP. The help provided is cryptic but may be useful. Extract EXTRACT places the message in a file created by the system, in a separate directory. The current file will be placed at the end of all previous extracts. Extract <filename> Extracts the whole text to a specified file in your current default directory; works the same as Mail EXTRACT. Menu To use the Usenet NEWS Menu, type MENU at the NEWS> prompt. Use the right arrow key to highlight each selection, and an explanation of what that selection is printed below the Menu line. To Stop Usenet NEWS To stop or exit Usenet NEWS, at the NEWS> prompt, type News> EXIT and the $ prompt will appear on the screen. Reducing the Number of Newsgroups and Starting Your Own Directory

You can select newsgroups so you don't have to sort through all 2,000 or more groups during subsequent Usenet sessions. In effect, you start a directory of "registered" groups and you can add to or delete from these "registered" groups at any time. When you start Usenet NEWS, a file called NEWSRC.;1 is created in your root directory. At the News> prompt, type DIR/ALL so that you will be at the directory of all newsgroups. Move your cursor keys up or down until you find a group you want to register. Type REGISTER and press return. To see the listing of groups you have registered, at the News> prompt, type DIR/REG (or press 6 on the keypad). To return to the overall listing, at the News> prompt type DIR/ALL . TO "unregister" a group, so it no displays in your directory of registered groups, type DEREGISTER . Netnews Exercise Exercise Log into the VAX and at the $ prompt, type NETNEWS Once the Netnews screen is displayed, at the NEWS> prompt, type SET CLASS ALT. (Don't forget to type the period) Using the arrow keys or the page up/page down keys, scroll through the ALT newsg roups. When you locate, the newsgroup KENYON.TEST, press <ENTER> to go into t hat newsgroup. Again scroll through the list of messages until you locate the message given to you by the session instructor. Note that you can type a specific message number at the NEWS> prompt and go dire ctly to that message, but that the numbers assigned each message change frequent ly. The title of the news item should indicate that it is a multipart item (for exam ple, 1/4 indicates part one of a four part message). With the proper news item highlighted, press <ENTER> once more to read that me ssage. The message is composed mostly of what appears to be scrambled text. This gibbe rish represents a graphic image (or part of one) that has been encoded so it can be passed over the Internet as a plain text file. You will now put this file, and any other files which represent parts of this image, into your home director y on the VAX.

At the NEWS> prompt, type EXTRACT GRAPHIC.TXT and press <ENTER>. In this ex ample, you extracted the Netnews item into a file named GRAPHIC.TXT You will no w transfer this file, which is still a plain text file, to the microcomputer at which you are working. This transfer will be done using Kermit. - Continued on next page At the VAX $ prompt, type KERMIT At the Kermit-32> prompt, type SET FILE TYPE ASCII and press <Enter> At the Kermit-32> prompt, type SERVER and press <Enter> Press and hold down the ALT key, then tap the C key; you should now have the MS-Kermit> prompt. At the MS-Kermit> prompt, type SET FILE TYPE TEXT and press <Enter> At the MS-Kermit> prompt, type SET DEFAULT C:\ and press <Enter> At the MS-Kermit> prompt, type GET GRAPHIC.TXT and press <Enter> The file will be transferred from the VAX to the microcomputer you are using. Once the transfer has completed, type FINISH and press <Enter> at the MS-Ker mit> prompt, then type CONNECT and press <Enter> at the MS-Kermit> prompt. At this point, you are reconnected to the VAX session. At the KERMIT-32> prompt, type EXIT and press <Enter>. You may log off the V AX normally at this time. Make certain you log off at the LOCAL> prompt as well as at the $ prompt. You will now decode the plain text file which you brought from Netnews to the VA X and then to your microcomputer. At the DOS C:\ prompt, type UUDECODE C:\GRAP HICS.TXT and press <Enter> The file C:\GRAPHICS.TXT will be decoded into the original graphics file. This converted file will be named according to its original name which was encoded i nto the file you downloaded. Once again, at the DOS C:\ prompt, type HOME and press <Enter> At the DOS C:\ prompt, type GIFPRT and press <Enter> to run the program whic h will allow you to view this graphic image. Kermit Instructions{4} To START your VAX Session Using a Microcomputer Start Kermit Turn on your microcomputer Type KERMIT and press <ENTER> Log onto VAX Type your USERNAME and press <ENTER>

Type C KCVAX1 (for students), or C KCVAX3(for staff and faculty), or C KCVAX2 (for Library use) and press <ENTER> Type your USERNAME and press <ENTER> Type your PASSWORD and press <ENTER> Wait for the VAX $ prompt. At the $ prompt, you may start MAIL or WordPerfect or other VAX programs OR transfer files.

To Transfer Files Move to Directory Where Your Files Are Type SET DEFAULT [.directoryname] For example, SET DEFAULT [.WP] Start Kermit on the VAX At the $ prompt type KERMIT Switch Back to the Micro Press <ALT> C Set Micro Default Drive At the MS-Kermit> prompt type SET DEF A: OR SET DEF B: or SET DEF C:\directoryname as the case may be. "Get" or "SEND" your Files Type GET filename if you are getting a file FROM the VAX. Type SEND filename if you are sending a file TO the VAX.

When you are finished At the MS-Kermit> prompt type FINISH Connect back to VAX Type Connect or C To STOP Your VAX Session Using a Microcomputer Log off VAX At the $ prompt type

LO

and press <ENTER>

Log off server At the LOCAL> prompt type LO and press <ENTER> Connect back to microcomputer Press ALT C End Kermit session At the MS-KERMIT> prompt type EXIT and press

<ENTER>

Internet Mail{5} The global computer network, Internet, can be used by anyone with a computer acc ount at Kenyon. This document explains some Internet basics and the use of elec tronicInternet mail. What is the Internet? Internet The Internet is a global computer communications network which serves to interconnect many other networks, essentially as one. The students, faculty, and staff of Kenyon College have access to a wealth of resources through Kenyon's Internet connection. It is easy to communicate with any other Internet site from Kenyon. Access to hundreds of libraries, large repositories of free software, and ongoing e-mail discussions are just a few of the available resources. BITNET Another network, BITNET, and the Internet are not directly connected. It is important to note that Kenyon is NOT a BITNET site, but that it is possible to send e-mail to BITNET sites. This is done through a computer that is connected to both networks, an InterBit site. In correspondence with a BITNET site, you should indicate that your return address follows the Internet format. Internet Mail Internet Address Usually, Internet addresses are composed of a host name (for instance, KCVAX1, KCVAX2, OR KCVAX3) and a domain name (here, KENYON.EDU). At Kenyon, your Internet address is simplified; your username and the Kenyon domain make up your Internet mail address in the following format: username@KENYON.EDU If your username is Johnsona, your Internet mail address will be Johnsona@KENYON.EDU Sending Mail As with any mail, electronic or otherwise, you will need to know the address of the person you wish to contact. If you don't know a colleague's address, it is best to call or write that person and ask them. Once you know an address, you need to use the Internet mailer as a prefix to the Internet mail address. At the MAIL> prompt, type the SEND command (as you normally would) and respond to the TO: prompt with: MX%"username@host.domain"

where USERNAME is the username of the individual to whom you are sending mail, HOST is the name of the computer system which receives mail for that person, and DOMAIN is the specification for the Internet "location" of that system. For example, to send Internet mail to a user named SMITH on the Ohio State IBM machine, type the following at the TO: prompt: MX%"SMITH@OHIO-STATE.EDU" Privacy Internet mail is not private; it passes over the network much like a postcard travels through the mail. At times human intervention is required to move the mail along. In this and other cases the contents of your mail may be seen by someone other than the addressee. BITNET Mail Although Kenyon is NOT a BITNET site, our mailer is able to distinguish BITNET addresses as such and route them appropriately: MX%"username@node.BITNET" where USERNAME is the username of the individual to whom you are sending mail and NODE is the name of the BITNET node on which that person reads mail. Shortcuts You may simplify the task of typing in frequently used Internet addresses by setting up "logicals" in your LOGIN.COM file. If you are not familiar with the LOGIN.COM file or how to edit it, please refer to the ICS documentation on LOGIN.COM files (available in the Olin and Crawford computing centers). To assign the logical name BOB to an Internet address and JAN to a BITNET address, add the following lines to your LOGIN.COM file: $ DEFINE BOB "MX%""smith@ccmail.cunysb.EDU""" $ DEFINE JAN "MX%""smith@cyp.BITNET""" Finding Someone's Internet Address{6}

There are a number of ways to find a person's Internet address. In addition to a sking them, four of the most common ways are Netfind, WHOIS servers, "Finger"in g their account and sending e-mail to the institution's postmaster. Detailed de scriptions follow the exercise. Exercise Using Netfind, find an Internet address for ALTON SANDERS at MIAMI UNIVERSITY i n Ohio. The Telnet/log command will (1) allow you to log into a remote site and (2) pla

ce everything that appears on your screen in a file called TELNET.LOG, in your directory. Use lower case when you are using Telnet. At the $ prompt, type: telnet/log <type SITE here, pick any one of the following> <SITE> archie.au ia) bruno.cs.colorado.edu lincoln.technet.sg malloco.ing.puc.cl monolith.cc.ic.ac.uk mudhoney.micro.umn.edu netfind.oc.com redmont.cis.uab.edu rs.internic.net nic.uakom.cs At the Login: prompt, type netfind - Continued on Next Page Assume your terminal can display 24 lines. Since you don't know the Internet nam e(domain name) for Miami University in Ohio, you'll probably want to find that f irst. Netfind maintains a listing of institutions in a startup database. You'll find it by choosing 3. Seed database lookup The next menu is entitled "Seed database choices". You're still not certain of t he Internet address, so search for it in 2. Seed database search At the "Keys (blank to exit):" prompt, type MIAMI A large number of addresses (domains) containing the word MIAMI will flash on t he screen. You'll notice that MUOHIO is cited in several addresses for Miami Uni versity in Ohio, so we'll use this as a keyword in a search for Alton Sanders. Type 4 to return to the top level menu in Netfind. Choose option 2 (Search) from the T op level choice menu by typing <ACTUAL LOCATION> (AARNet, Melbourne, Austral (University of Colorado, Boulder) (Technet Unit, Singapore) (Catholic University of Chile, Santiago) (Imperial College, London, England) (University of Minnesota, Minneapolis) (OpenConnect Systems, Dallas, Texas) (University of Alabama, Birmingham) (Network Solutions, Inc., Herndon,Virginia) (Academy of Sciences, Slovakia)

2 The prompt questions you. "Enter person and keys (blank to exit) -->" Type sanders muohio The next menu will list all the systems at Muohio, and ask you to select 3 doma ins to search. Since Dr. Sanders is Chairman of the Systems Analysis Department , option 2 seems reasonable. Option 0, as the most general domain, also might y ield something. Choose these two domains by typing 0 2 The server will bring up whatever information it finds, then ask if you want to continue the search. Please continue it until nothing else is found (the "Enter person and keys" prompt returns). Make a note of the most promising address. Th ere may be several. Press <RETURN> to get back to the main menu, then choose option 5 to quit the se rver. View the entire session; at the $ prompt type KEDT TELNET.LOG and scroll through it. You can exit at any time by pressing CONTROL and Z at the same time. Delete this file once you have verified the address. At the $ prompt, type DELETE TELNET.LOG;* How Netfind Searches Work{7} Given the name of a person on the Internet and a description of where the person works, Netfind attempts to locate information about the person. To start your search, at the $ prompt, type telnet or telnet/log, followed by one of the following sites. telnet allows you remote access. telnet/log allows you the same access, and places everything that appears on the screen in a file in your directory for later use. telnet/log <type SITE here, pick any one of the following> <SITE> <ACTUAL LOCATION> archie.au (AARNet, Melbourne, Australia) bruno.cs.colorado.edu (University of Colorado, Boulder) lincoln.techne t.sg (Technet Unit, Singapore) malloco.ing.puc.cl (Catholic Uni versity of Chile, Santiago) monolith.cc.ic.ac.uk (Imperial College,London, England) mudhoney.micro.umn.edu (University of Minnesota, Minneapolis) netfind.oc.com Systems, Dallas, Texas redmont.cis.uab.edu (University of Alabama, Birmingham) rs.internic.net (Network Solutions,Inc., Herndon, Virginia)

nic.uakom.cs At the Login: prompt, type netfind You can search general domain when prompted, keywords, such

(Academy of Sciences,Slovakia)

the seed database first to get a name. Return to the main menu, then, enter a name followed by a set of as

schwartz boulder colorado university The name can be a first, last, or login name, but only one name can be specified. The keys describe where the person works, by the name of the institution and/or the city/state/country. If you know the institution's domain name (e.g., "cs.colorado.edu", where there are host names like "brazil.cs.colorado.edu") you can specify it as keys without the dots (e.g., "cs colorado edu"). The host parts of domain names ("brazil") cannot be used as keywords. Keys are case insensitive and may be specified in any order, although using a very common key (like "university") first will cause internal buffers to overflow and some domains to be missed. Using more than one key implies the logical AND of the keys. Specifying too many keys may cause searches to fail. If this happens, try specifying fewer keys, e.g., schwartz boulder Searches proceed in two phases. In phase 1, Netfind performs a directed search into each selected domain, to try to uncover mail forwarding information, and "finger" the person being sought at hosts determined during this phase (see the algorithm description in the list of Frequently Asked Questions for more details). Phase 2 involves finger searches into other hosts, primarily those listed in the seed database. While you can interrupt Netfind at any time (with ^C), you should let it complete a pass through phase 2 if no mail forwarding information was found in phase 1, so that it can try to trace back through most recent/last login information for the person being sought. After each search phase (or when interrupted by ^C), Netfind summarizes the search results. If more than one person is located by a search, the summary does not include information about email targets and most recent/current logins (since only the user can decide which person was the correct one.) Use the information you get about the correct person to be more specific in your next search.

How WHOIS Servers Work{8} Not every Internet site supports whois servers, but they are worth checking out. There are two procedures for accessing the whois servers; the first looks for a general name, and may help you with the second, finding a specific person. To try the first, at the $ prompt, type whois <last_name_of_person> e.g., whois siddall You'll get a list of Siddalls on whois servers. The second method is more geared towards specifics. whois -h <server_name> <person's name> e.g., whois -h smith@magee.Edu

Usage The most common access approach involves separately querying each server of interest. However, there are currently a number of active projects concerned with improved interfaces to these servers, either by more intelligent client software, or by standardization of the server behavior. Server names There are currently three popular naming conventions for whois servers. The most common practice is to put whois service on a host as far up as possible in the organization's domain hierarchy. For example, the highest-level domain name associated with M.I.T. is MIT.EDU, and M.I.T.'s whois service is operated on the host named mit.edu. Another common practice is to choose 'whois' or 'wp' as the first part of the domain name ('wp' stands for "White Pages"). This would be the case if M.I.T.'s whois service were on a host named whois.mit.edu or wp.mit.edu. In these cases, the listed name is often an alias, not the host's canonical name. In selecting the name to be listed, I've given preference to aliases starting with whois or wp. Access Restrictions In general, these servers should only be used for isolated queries about specific individuals of interest. Typically, it is not acceptable to make an extended series of queries in an attempt to obtain large sections, or the entirety, of the directory. Such a strategy is objectionable both because of excessive consumption of server resources, and because the directory itself is usually considered proprietary. In particular, deriving lists of persons

for distribution of commercial advertisements or solicitations is expressly prohibited by site policies in many cases, and could easily cause sites to curtail the current open access to their whois servers. How Finger Works{9} Finger is a user information lookup program that lists the login name, full name, office location and phone number (if known), login time, idle time, time mail was last read, and the contents of the .plan and .project files from the home directory of some users. The information listed varies from site to site, and not all sites allow remote fingering. To use finger, call finger as follows finger <username>@<domain> replacing <domain> with the name of the appropriate institution, and <username> with the name of the person or the person's login ID. For example, finger main@kenyon.Edu Fingering using last names or full names may work, depending on the site: finger margaret.Main@kenyon.Edu finger main@kenyon.Edu Some sites use an underscore (_) instead of a period (.) in the full name (e.g., Margaret_Main), or require an extra period to specify middle initials (Margaret.A.Main).

The Postmaster Option If all else fails, and you can't reach the person by telephone to ask their Internet address, you can send mail to the postmaster at the same institution. TO: RE: MX%"postmaster@person's_domain" Seeking user-id for <person's name here>

In the actual mail text, give any other information you know about the person--their department, etc. Some postmasters reserve the right not to reply to user-id inquiries, but many will respond with your answer. User's Guide to Mail{10} The purpose of this document is to provide a campus-wide guide for using the VAX Mail system. This manual covers the essential Mail commands with which you shou ld be familiar to use the Mail Utility.

What is Mail? Description of Mail The VAX/VMS Personal Mail Utility (Mail) is an electronic mail system that allows you to send messages to other users on the VAX system. You can also read, file, forward, delete, print, and reply to messages that other users send to you. Messages that you receive are stored in files called mail files, which have an extension of ".MAI". Your default mail file, called MAIL.MAI, is created in your main directory the first time you receive a mail message. Mail files (MAIL.MAI, for example) are protected so that only the owner can read them, and they may not be deleted accidentally. Mail Folders Mail allows you to organize your messages by storing them in "folders". By default, Mail provides three folders in your MAIL.MAI file in which messages are stored: MAIL, NEWMAIL, and WASTEBASKET. The MAIL folder always exists. It is created when you receive your first mail message. The NEWMAIL folder holds only the new mail messages before you read them. After you read a message, it is automatically moved from the NEWMAIL folder to the MAIL folder, and after you read the last new mail message, the NEWMAIL folder disappears. The WASTEBASKET folder is used to hold messages that you have deleted. The deleted messages remain in WASTEBASKET until you EXIT from Mail, at which time they are emptied from WASTEBASKET, and the WASTEBASKET folder disappears. The WASTEBASKET folder gives you a second chance to retrieve a message after it has been deleted from your MAIL folder, but once you EXIT Mail, any deleted messages are gone forever. Mail also allows you to create your own folders to organize your mail messages. For more detailed information on using user-created folders to organize mail messages, please refer to DEC's Mail Utility Reference Manual at the Olin ICS office. Following is a description of each Mail command.

To Start Mail To access Mail, type MAIL after the "$" prompt. Once you are in Mail, you will see displayed the "MAIL>" prompt which means the system is ready to receive a Mail command. The MAIL> prompt will reappear after each Mail command is executed, reminding you that you are still in Mail and that it is ready for the next Mail command. The MAIL> prompt disappears after you EXIT the Mail Utility. You may use the various Mail commands to move around within Mail.

To Stop Mail When you are ready to exit the Mail utility, at the MAIL> prompt type the word EXIT and press <RETURN> When you EXIT Mail, any messages which are marked for deletion will disappear, and any messages to be printed will enter the print queue. The EXIT command returns your process to the DCL level (the $ prompt). To Get Help To receive detailed information about Mail, type the word HELP at the MAIL> prompt. A list of Mail commands will be displayed. You can use this list to select a command about which you would like more information. To obtain information about all of the Mail commands, type HELP after the MAIL> prompt. If you already know the command name about which you want information, simply type HELP command name after the MAIL> prompt, as in: Mail> HELP REPLY This will give you a short description of the command and will offer an example to show how it is used. When you are ready to leave the HELP facility and return to the MAIL> prompt, just press <RETURN> To Use The Mail Directory Select If you wish to see a list of all new and old Mail messages in your MAIL folder in order to see a message on the screen again, first SELECT the MAIL folder and then get a DIRECTORY listing of the messages in the MAIL folder. Each message is given a number when it is received by MAIL; the messages are numbered in chronological order in the MAIL folder directory. Following is an example of how to access the MAIL folder directory and recall onto the screen an old mail message in that folder. Mail> SELECT MAIL Mail> DIRECTORY # From 1 STUDENT 2 STAFF 3 TEACHER Mail> READ 2 (selects the MAIL folder) (asks for a directory listing of MAIL folder) Date 1-JUN-1986 Subject How to Write a Memo

2-JUL-1986 Using the Printer 3-JUL-1986 Math Class Instructions

(displays message #2 on the screen)

Just as you can select the MAIL folder and get a directory listing of the messages in that folder (see above example), you can also select the NEWMAIL and

WASTEBASKET folders by first using SELECT NEWMAIL or SELECT WASTEBASKET and then getting a listing of their directories ( DIRECTORY command). If the NEWMAIL or WASTEBASKET folders have recently been emptied automatically, (after reading new mail messages or after exiting MAIL), these folders disappear. If you try to get a directory of messages in those folders at that time, a message will appear on your screen, telling you that they do not exist. Directory To get a directory listing of all the folders in your MAIL.MAI file, use the DIR/FOLDER command. This will list the default folders (MAIL and possibly NEWMAIL and WASTEBASKET) in your MAIL.MAI file, as well as any you have created yourself. If the NEWMAIL and/or WASTEBASKET folders are not listed when you use the DIR/FOLDER command, it means that they are empty and do not "exist".

To Send and Receive Mail The first part of this manual explained how to start and stop MAIL and how to get help in MAIL. It also discussed the organization of the default folders in the MAIL.MAI file and how to access messages in those folders. You are now ready to learn how to send mail messages and how to read messages that you receive from other users. To Send Mail The SEND command allows you to send a message to anyone on the system by typing their username at the "To:" prompt. The following example shows how to send a message to a user named SMITHC. MAIL> SEND To: SMITHC Subj: Class instructions After you respond to the header prompts above, you will see [EOB] at the top of the screen and you may type in your message. "EOB" is an abbreviation for End of Buffer meaning the temporary buffer in which your typing remains until you send the file. When you finish typing your message, press <PF1> E to send it. On a microcomputer, press <CTRL> Z . Your message will be sent immediately to the person whose username you entered. If that person is logged into the system, a message will appear on his/her screen that he/she has received new mail. If that person is not logged in, a similar message will appear at his/her next login. If you change your mind about sending the message, you can type <PF1> Q which will abort it. On a microcomputer, press <CTRL> Y . The message will not be sent and you will be

returned to the MAIL> prompt. To Send a Text File There may be an occasion when you will want to send a complete file located in your main directory to another user. The command for this is just a bit different; adding the file name at the end of the command, as in the following example: Mail> SEND CLASSNOTES.TXT You can edit this file or add on a note to the receiver at the beginning of it before you send it. Again, <PF1> E will send it, while <PF1> Q will abort it. To Send a WordPerfect File Mail messages are transferred in "text" format. If you want to send a file which has a "non-text" format such as WordPerfect format, use a different command. For instance, to send a WordPerfect file to another person, use the following command: Mail> SEND/FOREIGN/NOEDIT filename The person who receives this message will have to use the EXTRACT command to extract the file for editing or viewing in WordPerfect. This command works only on the Kenyon computers; it is not intended for Internet use. To Read Mail If another user on the system sends you a Mail message, a message will appear on your screen if you are logged into the system at the time. If you are not logged in, a message notifying you that you have new mail will appear at your next login. To be able to read that message, start Mail and at the MAIL> prompt, enter READ . If you are in the Mail utility when you are notified about a message, use the READ/NEW command to read the new Mail message. After a message is read the first time, it is transferred out of the NEWMAIL folder and stored in the MAIL folder. To display it on the screen so that you can read it again, use the READ command followed by its message number. If you don't know the number of your message, remember that you can get a listing of all your messages and their numbers in the MAIL folder directory DIRECTORY . The messages are numbered in chronological order (See Mail Directory section above). Mail> READ 3 (This brings mail message #3 back onto the screen for reading.) In addition to using message numbers to display

particular messages, you can use the following forms of the READ command to read the first, last, previous, next, or current message over again: MAIL> FIRST MAIL> LAST MAIL> NEXT MAIL> BACK the screen) (reads the first message in current folder) (reads last message in current folder) (reads the message after the one that is currently on the screen) (reads the message before the one that is currently on

MAIL> CURRENT (brings you back to beginning of a long mail message in order to read it again) To Reply to Sender When you receive a message and want to reply to the original sender, use the REPLY command. REPLY allows you to send a message to the sender of the message you are currently reading (the one displayed on the screen). You may REPLY to a message only if the message is currently displayed on the screen with the READ command. Mail will display the header of your REPLY message as follows: Mail> REPLY To: JONES (username of the original sender) Subj. Re: Class instructions (This reflects the subject in the header of the original sender's message) After the header appears, type in your message. When you are finished, press <PF1> E or <CTRL> Z to send the message. If you change your mind about replying to the message after you have already entered the REPLY command, type <PF1> Q or <CTRL> Y to abort the message. The MAIL> prompt will reappear on the screen. If you would like to include a copy of the original message in your reply, use the command: REPLY/EXTRACT To Forward a Message You may send a copy of the message you are currently reading or have just read to a user or users. Again, you can FORWARD a message only if that message is currently displayed on the screen with the READ command. Mail will prompt you (1) for the name of the user(s) to whom you want to FORWARD the message and (2) for a subject. For example: Mail> Read 3 (Displays message #3 on screen) Mail> FORWARD/NOHEADER To: SMITHC

Subj: <Subject of message> You can use the /NOHEADER qualifier after FORWARD to eliminate the header information from the forwarded message. If you change your mind about forwarding a message after you have already typed the FORWARD command, press <PF1> Q or <CTRL> Y to abort the message. The MAIL> prompt will be displayed again. To Send Messages to A Group Of People If you frequently send mail to the same group of people, you will find it helpful to use a "distribution list". A distribution list is a file containing the names of users to whom you want to send messages. To set up a distribution list, use the Kenyon text editor KEDT to create a distribution list file with the file type ".DIS". Please note that the filename MUST have a .DIS extension. KEDT is the same text editor that you use when writing a MAIL message. Type one username per line in this file. A distribution list can also include the names of other distribution lists. You can include comments by entering lines whose first character is an exclamation point (!). The following example shows how to create a distribution list: $ KEDT STUDENT.DIS (Then type into your newly created file, one username per line) Jones Smith French Cory ! NESTED DISTRIBUTION LIST: MATH21.DIS Separate usernames can be combined with another distribution list (MATH21.DIS) as long as the distribution list is the last entry, as in the example above. MATH21.DIS could contain another distribution list. Now that you have a distribution list file created, you can send your message to all the users in that list by first issuing the SEND command. In response to the "To:" prompt, type in the name of the distribution list file you have just created (STUDENT.DIS), preceded by the @ symbol. Mail> SEND To: @STUDENT Mail will deliver one copy of your mail message to each user in your distribution list. Typing in the .DIS is not necessary. The computer assumes you used the .DIS extension in your filename.

To Manage Mail Messages Now that you have learned about various ways to send and receive mail messages, you are ready to learn other ways in which those messages can be managed. Some of the things that will be discussed are extracting a message (moving it to a file in your VAX directory) and printing it in order to have a hard copy of it. A section is also included on "cleaning up" your Mail files by deleting messages no longer useful and then compressing the file. You will also learn how to search through your messages for a specific topic and how to include your personal name in any mail messages that you send to others. The last section discusses the COPY and MOVE commands that allow you to create additional folders and mail files other than the default ones, so that you may move messages into them to organize your mail messages. To Move Messages To Another Directory If you want to move a mail message from MAIL to a file in another directory, use the EXTRACT command. After the MAIL> prompt, while the message you wish to EXTRACT is displayed on the screen, use the EXTRACT command. When you exit from MAIL, that file will be listed in the directory you chose when you named the file. An example: Mail> READ 4 (Displays message #4 on the screen)

Mail> EXTRACT/NOHEADER BIODATA.TXT %MAIL-I-CREATED, B:[SMITH]BIODATA.TXT;1 created (Saves message #4 as BIODATA.TXT) Mail> EXIT $ DIRECTORY Directory B:[SMITH] BIODATA.TXT;1 26 4-NOV-1992 14:40 [SMITH] (RWED,RWED,,) The EXTRACT command can be used only when the message you wish to EXTRACT is currently displayed on the screen. You can use the /NOHEADER qualifier after the EXTRACT command to eliminate the address header information from the extracted message. The EXTRACT command allows you to store the message in your chosen directory so that it can be manipulated (copied, printed, renamed, deleted, or edited) like any other file. To print a file that was extracted from Mail and placed in your current directory, you can use the

PRINT command, as in: $ PRINT/QUEUE=OLN1L210 BIODATA.TXT where OLN1L210 is the queuename and BIODATA.TXT is the filename. To Extract WordPerfect and other Non-text Files If you try to read a mail message and see a message which says you cannot read this foreign format message, use the EXTRACT filename command to copy the file to a directory. You may use any filename you wish. For example, Mail> EXTRACT ANYFILENAME To Print Mail While you are using Mail, you can make a hardcopy of a mail message you are currently reading or have just read by using the PRINT/QUEUE=queuename command. You can PRINT a message in Mail only if it is currently displayed on the screen. At the $ prompt, before starting Mail, type SHOW QUEUE to find out the name of the queue nearest your location. The file(s) created by the PRINT command are not actually released to the print queue until you exit Mail. If you issue multiple PRINT commands while in Mail, the messages you want to print will be combined into one print job and will be printed off as one file. The example below illustrates how the PRINT command takes effect only after you exit Mail. Notice that there is only one "job" or file being printed, the two messages having been combined into one print request. Each message uses at least one full sheet of paper; print only what is absolutely necessary. MAIL> READ 5 (Mail message #5 is displayed on screen)

MAIL> PRINT/QUEUE=queuename MAIL> READ 6 MAIL> PRINT/QUEUE=queuename MAIL> EXIT Job MAIL (queue OLIN$PRINT, entry 210) started on OLN1L210 $

To Delete Mail Messages You may remove any message that is no longer useful to you by using the DELETE command while in MAIL. If the message you want to delete is currently displayed on the screen, use the DELETE command alone, as in:

MAIL> DELETE To delete a message that is not displayed on the screen, find out its message number (use the SELECT and DIRECTORY commands), and then type the DELETE command followed by the message number. For example, to remove message #2 in the MAIL folder, type: MAIL> SELECT MAIL MAIL> DELETE 2 MAIL> DELETE 3-8,11

(deletes messages 3 through 8, and 11)

If you enter the DIRECTORY command immediately after you have deleted a message (or messages), you will see the message(s) marked as deleted, as the following example shows: MAIL> DIRECTORY # From 1 JONES 2 (Deleted) 3 SMITH 4 (Deleted) Date Subject 1-JUN-1986 How to Write a Memo 4-JUN-1986 Class Instructions

As messages are deleted from your MAIL folder, they are automatically moved to your WASTEBASKET folder, as mentioned earlier. This gives you another chance to retrieve a message if you delete it by mistake. However, as soon as you EXIT from Mail, those messages in your WASTEBASKET folder will disappear forever! If for some reason you do not wish to have the deleted messages in WASTEBASKET disappear when you leave MAIL, you can type QUIT instead of EXIT at the MAIL> prompt. This will allow you to leave Mail but will keep the WASTEBASKET messages intact. To Retrieve a Message from the Wastebasket You may retrieve a message from WASTEBASKET and move it back to your MAIL folder by doing the following. First, find out its message number in the WASTEBASKET folder and call up that message onto the screen. For example, MAIL> SELECT WASTEBASKET MAIL> DIRECTORY(displays message list so that you can look for the message number) MAIL> READ 3(displays message #3 on screen) Then: MAIL> MOVE MAIL(Moves the message to your MAIL folder) You may use the SELECT MAIL and DIRECTORY commands to check that the message now resides in the MAIL folder. Your mail file (with the .MAI file extension in your directory) is protected so that only you can read it, and you may not delete it even if you try. You may only delete mail MESSAGES from your MAIL folder while

you are in Mail. To Compress the MAIL file The COMPRESS command is used to make the MAIL file smaller. Even though you may periodically "clean out" your MAIL folder(s) by deleting messages that are no longer useful to you, the size of your MAIL file is not decreased simply by deleting those messages. This is because the area where they were stored is left intact, although you cannot access those deleted messages anymore. The VAX System Manager compresses your mail files once a week; however, you may want to compress your file during the week. You may keep track of how large the MAIL file is becoming by watching the block size of the MAIL.MAI file in your directory. When the block size of the MAIL.MAI file approaches 50, it is time to delete unneeded messages and compress the file. If you do not, you will run into problems exceeding your disk quota because of it. If that should happen, call the ICS HelpLine at 5700 for assistance. When you compress a file, the following four steps occur: A temporary file named MAILnnnnCOMPRESS.TMP is created. (where nnnn is the number of the temporary file) The contents (of the MAIL.MAI file to be compressed) are copied to the temporary file and compressed. The original MAIL.MAI (uncompressed) file is renamed with a file type of OLD. The newly compressed file is renamed from MAILnnnnCOMPRESS.TMP back to its original name (MAIL.MAI). The following example shows what appears on the screen when your MAIL file is compressed: $ MAIL Mail> COMPRESS %MAIL-S-CREATED,B:[SMITH]MAIL_08C8_COMPRESS.TMP;1 created %MAIL-S-COPIED, B:[25_777]MAIL.MAI;1 copied to B:[25_777]MAIL_08C8_COMPRESS.TMP;1 (2 records) %MAIL-S-RENAMED, B:[25_777]MAIL.MAI;1 renamed to B:[25_777] MAIL.OLD;2 %MAIL-S-RENAMED, B:[25_777]MAIL_08C8_COMPRESS.TMP;1 renamed to B:[25_777]MAIL.MAI;1 To Delete MAIL.OLD File This leaves you with a new MAIL.MAI file that contains all your remaining messages that have not been deleted; the useless storage spaces have been removed

from this file. After you have compressed your MAIL file, make sure you are working in your main directory. Type DIRECTORY to make sure your MAIL.OLD file is there. It contains the original uncompressed Mail message file. Since the MAIL.MAI file is the newly compressed version that will receive any new MAIL messages sent to you, MAIL.OLD should not be kept. To delete the MAIL.OLD file, use the DELETE command at the "$" prompt. For example, $ DELETE MAIL.OLD;1 The MAIL.OLD file will be removed from your main directory. The COMPRESS command can be used on ANY mail files that you may create, in addition to the default MAIL.MAI file. If your Mail files are kept in a subdirectory of your main directory, type: $ DELETE [.MAIL]MAIL.OLD;* To Search Your Mail Messages To find the message(s) in your MAIL folder which contain(s) a specific word or phrase, use the SEARCH command to find it. Type SEARCH after the MAIL> prompt, followed by the word or phrase (text string) you want to find. The SEARCH text string command starts to search at the beginning of the messages in your current folder. It will stop at the message containing the FIRST occurrence of that text string. If there is another message in that folder that contains that same text string, find it by typing SEARCH (no text string after it) after the MAIL> prompt. This is essentially a "search again" command, since it searches for the previously specified text string, starting with the message FOLLOWING the one currently on the screen. It is possible to continue with the SEARCH command until the last of your messages is reached. For example, Mail> SELECT MAIL (selects the MAIL folder)

Mail> SEARCH budget expenditures (The first message containing the phrase "budget expenditures" appears on the screen). Mail> SEARCH (searches for the next messagecontaining the specified text string. This SEARCH begins with the message following the current one.) (The second message containing the phrase "budget expenditures" appears on the screen). The SEARCH command enables you to find certain topics discussed in your mail messages without having to read through each message. Long mail messages

When you receive a mail message that is larger than 3 blocks, it is written to a new Mail (.MAI) file, different from the MAIL.MAI file previously discussed. This large Mail file will be listed in your mail directory as follows: MAIL$nnnnnnnnnnnnnnnnnnn.MAI where nnnnnnnnnnnnn is a number the computer gives the filename. MAIL deletes these large .MAI files from your mail directory when you delete these messages from within MAIL. You cannot delete these files outside of Mail without changing the protection code; however, if you do delete these files outside of MAIL (with the DELETE command), and then try to read the associated messages inside of Mail, you will get an error message followed by a display of the From:, To:, and Subject: fields. Therefore, delete these large messages only from within Mail, not the MAIL$nnnnnnnnnnn.MAI file itself. To Get Personal The SET PERSONAL_NAME command enables you to append personal information to the end of the "From:" field of mail messages you send. You can fill this field with your full name or other information. Thus, the receiver of your messages can more easily identify you, instead of having to remember your username (JONES, for example). MAIL> SET PERSONAL_NAME "Buddy Jones" or MAIL> SET PERSONAL_NAME "Jim Stephens, pbx 5317" The text string must begin with either a letter or digit; the length of the text string cannot exceed 127 characters. If you do not enclose the text string in quotation marks, it prints out in all uppercase letters. To "Carbon Copy" a message to another User You can send a carbon copy of a message to another user by setting your mail system to prompt you for the username of the person to whom you wish to send the copy. MAIL> SET CC_PROMPT When you send a message, the following will be displayed: MAIL> SEND To: SMITH CC: JONES

Subj: SEMINAR ON FRIDAY To disable the CC_PROMPT, at the MAIL> prompt, type SET NOCC_PROMPT

To Use Folders To Organize Mail Messages You can create folders in mail in which to store your messages. Your default MAIL.MAI file already contains the NEWMAIL, MAIL, and WASTEBASKET folders. You can create new folders in your MAIL.MAI file or you can create other mail files besides MAIL.MAI, as well as other folders in those Mail files. COPY and MOVE The commands COPY and MOVE will transfer Mail messages to another folder in your current file or to another folder in another Mail file. If the folder or Mail file you specify to transfer the message to does not yet exist, you will be asked whether you want to create it; if you respond with Y , the specified folder is created by the COPY or MOVE command as it transfers the message. (The difference between the COPY command and the MOVE command is that the MOVE command deletes the message from the original folder, while the COPY command leaves a copy there. To COPY or MOVE a message to another folder in your CURRENT mail file, do the following: Mail> READ 2 the screen) Mail> COPY (or MOVE) (displays message from current folder on

_Folder: class_instructions(this transfers message to the specifiedfolder; if it does not exist, you be asked if you want to create it;

will answer Y) file

_File: <RETURN>(If you omit a filename and simply press <RETURN> the message will be copied to a folder in your current mail ) Once the message has been COPYed or MOVEd, you should check the folder to which it has been transferred to make sure it is there: Mail> SELECT foldername(folder to which you transferred your message) Mail> DIRECTORY(message you just transferred should be listed in this folder directory) To COPY or MOVE a message to another folder in a mail file other than your current one, do the following: Mail> READ 3 Mail> COPY (or MOVE) _Folder: SOCCER(specify the folder to which you want your message will be transferred; if it does not exist, you will be asked (displays message you want to transfer)

if you

wish to create it, as above answer Y ) _File: SPORTS (specify the Mail file, other than the current one, to which you want your message transferred; if it does no t exist, you will be asked if you wish to create one; answe r Y , as above)

To Access A Mail File other than MAIL.MAI Once the message has been COPYed or MOVEd, check the file and folder to which it has been transferred to make sure it is actually there. To do this, use the SET FILE command, which transfers you to a Mail file other than your current one. Once you are in the Mail file, SELECT the folder in that file to which the message was copied or moved, and then get a DIRECTORY listing of the folder's contents to check that the message is listed there. For example, MAIL> SET FILE SPORTS(Transfers you to the specified Mail file (SPORTS.MAI) where your message was sent) MAIL> DIR/FOLDER (Lists the folders in the SPORTS.MAI file, where you now are; the SOCCER folder should be there.) MAIL> SELECT SOCCER(Selects the SOCCER folder in the SPORTS.MAI file) MAIL> DIR(Lists messages in the SOCCER folder; your newly transferred message should be there) Mail> SET FILE MAIL(transfers you back to your default MAIL.MAI file) Folder names or Mail file names can be from 1 to 39 characters in length. Valid characters for folder names are all alphanumeric characters, the dollar sign ($), and the underscore (__). If you enter the COPY or MOVE command, supply a foldername at the prompt, and then decide (before pressing <RETURN> again) that you do not want to copy the message, press the <CTRL> C key combination. <CTRL> C will abort the operation and maintain the MAIL> prompt. Additional Information After reading through this manual, you should be familiar enough with the various Mail commands so that you can now send, receive, organize, and maintain your mail messages efficiently. For more information on any of the topics included in this manual, please refer to DEC's Mail Utility section in the DEC VMS General User Manual, located in ICS main computing sites, or call the ICS HelpLine (5700). The Net User Guidelines and Netiquette{11}

Preface The formulation of this guide was motivated by a need to develop

guidelines for all Internet protocols to ensure that users at Florida Atlantic University realize the Internet capabilities as a resource available, with the provision that they are responsible in how they access or transmit information through the Internet (The Net). It is assumed that the reader has some familiarization with the terms and protocols that are referenced in this document. Permission to duplicate or distribute this document is granted with the provision that the document remains intact. For additions, comments, suggestions and requests for revisions, please send E-mail to RINALDI@ACC.FAU.EDU. Acknowledgements Much of this guide was developed from comments and suggestions from NETTRAIN@UBVM (formally NET-TRAIN) LISTSERV subscribers and from several sources available on The Net: A special acknowledgment to Wes Morgan, University of Kentucky Engineering Computing Center, for his advice and recommendations. Paul F. Lambert, Bentley College; Philip M. Howard, Saint Mary's University; Gordon Swan, Florida Atlantic University; Pauline Kartrude, Florida Atlantic University; Beth Taney, Penn State; Debbie Shaffer, Penn State and USDA-CIT; Henry DeVries, Cornell; Jim Milles, SLU Law Library; Martin Raish, State University of New York at Binghamton; Steve Cisler, Apple Corporation; Tom Zillner, Wisconsin Interlibrary Services; Tom Goodrich, Stanford University; Jim Gerland, State University of NY at Buffalo; Ros Leibensperger, Cornell; Paul White, Northern Michigan University; Marilyn S. Welb, Penn State, Judith Hopkins, State University of NY at Buffalo, Ros McCarthy.

Introduction It is essential for each user on the network to recognize his/her responsibility in having access to vast services, sites, systems and people. The user is ultimately responsible for his/her actions in accessing network services. The "Internet" or "The Net", is not a single network; rather, it is a group of thousands of individual networks which have chosen to allow traffic to pass among them. The traffic sent out to the Internet may actually traverse several different networks before it reaches its destination. Therefore, users involved in this internetworking must be aware of the load placed on other participating networks. As a user of the network, you may be allowed to access other networks (and/or the computer systems attached to those networks). Each network or system has its own set of policies and procedures. Actions which are routinely allowed on one network/system may be controlled, or even forbidden, on other networks. It is the users responsibility to abide by the policies and procedures of these other networks/systems. Remember, the fact that a user can perform a particular action does not imply that they should take that action.

The use of the network is a privilege, not a right, which may temporarily be revoked at any time for abusive conduct. Such conduct would include, the placing of unlawful information on a system, the use of abusive or otherwise objectionable language in either public or private messages, the sending of messages that are likely to result in the loss of recipients' work or systems, the sending of "Chain letters," or "broadcast" messages to lists or individuals, and any other types of use which would cause congestion of the networks or otherwise interfere with the work of others.. Permanent revocations can result from disciplinary actions taken by a panel judiciary board called upon to investigate network abuses. Electronic Mail and Files User Responsibility E-Mail The content and maintenance of a user's electronic mailbox is the users responsibility: Check E-mail daily and remain within your limited disk quota. Delete unwanted messages immediately since they take up disk storage. Keep messages remaining in your electronic mailbox to a minimum. Mail messages can be downloaded or extracted to files then to disks for future reference. Never assume that your E-mail can be read by no one except yourself; others may be able to read or access your mail. Never send or keep anything that you would not mind seeing on the evening news.

Disk Storage The content and maintenance of a user's disk storage area is the users responsibility: Keep files to a minimum. Files should be downloaded to your personal computer's hard drive or to disks. Routinely and frequently virus scan your system, especially when receiving or downloading files from other systems to prevent the spread of a virus. Your files may be accessible by persons with system privileges, so do not maintain anything private in your disk storage area. Telnet Protocol Many telnetable services have documentation files available online (or via ftp). Download and review instructions locally as opposed to tying up ports trying to figure out the system. Be courteous to other users wishing to seek information or

the institution might revoke Telnet access; remain only on the system long enough to get your information, then exit off of the system. Screen captured data or information should be downloaded to your personal computer's hard disk or to disks. Anonymous FTP - File Transfer Protocol Users should respond to the PASSWORD prompt with their E-mail address, so if that site chooses, it can track the level of FTP usage. If your E-mail address causes an error, enter GUEST for the next PASSWORD prompt. When possible limit downloads, especially large downloads (1 Meg+), for after normal business hours locally and for the remote ftp host; preferably late in the evening. Adhere to time restrictions as requested by archive sites. Think in terms of the current time at the site that's being visited, not of local time. Copy downloaded files to your personal computer hard drive or disks to remain within disk quota. When possible, inquiries to Archie should be in mail form. It's the user's responsibility when downloading programs, to check for copyright or licensing agreements. If the program is beneficial to your use, pay any authors registration fee. If there is any doubt, don't copy it; there have been many occasions on which copyrighted software has found its way into ftp archives. Support for any downloaded programs should be requested from the originator of the application. Remove unwanted programs from your systems. Electronic Communications (E-mail, LISTSERV groups, Mailing lists, and Usenet) Keep paragraphs and messages short and to the point. Focus on one subject per message. Be professional and careful what you say about others. E-mail is easily forwarded. Cite all quotes, references and sources. Limit line length and avoid control characters. Follow chain of command procedures for corresponding with superiors. For example, don't send a complaint via E-mail directly to the "top" just because you can. Don't use the academic networks for commercial or proprietary work. Include your signature at the bottom of E-mail messages. Your

signature footer should include your name, position, affiliation and Internet and/or BITNET addresses and should not exceed more than 4 lines. Optional information could include your address and phone number. Capitalize words only to highlight an important point or to distinguish a title or heading. *Asterisks* surrounding a word also can be used to make a stronger point. Use discretion when forwarding mail to group addresses or distribution lists. It's preferable to reference the source of a document and provide instructions on how to obtain a copy. It is considered extremely rude to forward personal email to mailing lists or Usenet without the original author's permission. Be careful when using sarcasm and humor. Without face to face communications your joke may be viewed as criticism. Respect copyright and license agreements. When quoting another person, edit out whatever isn't directly applicable to your reply. Including the entire article will annoy those reading it. Abbreviate when possible: Examples: IMHO FYI BTW Flame :-) = = = = = in my humble/honest opinion for your information by the way antagonistic criticism happy face for humor

Listserv and Mailing List Discussion Groups Some mailing lists have low rates of traffic, others can flood your mailbox with several hundred mail messages per day. Numerous incoming messages from various listservers or mailing lists by multiple users, requires extensive system processing which can tie up valuable resources. Subscription to Interest Groups or Discussion Lists should be kept to a minimum and should not exceed what your disk quota can handle, or you for that matter. Keep your questions and comments relevant to the focus of the discussion group. Resist the temptation to "flame" others on the list. Remember that these discussions are "public" and meant for constructive exchanges. Treat the others on the list as you would want them to treat you. When posting a question to the discussion group, request that responses be directed to you personally. Post a summary or answer to your question to the group. When replying to a message posted to a discussion group, check the address to be certain it's going to the intended

location (person or group). When signing up for a group, save your subscription confirmation letter for reference. When going away for more than a week, unsubscribe or suspend mail from any mailing lists or LISTSERV services. If you can respond to someone else's question, do so through email. Twenty people answering the same question on a large list can fill your mailbox (and those of everyone else on the list) quickly. Use your own personal E-mail account, don't subscribe using a shared office account. Occasionally subscribers to the list who are not familiar with proper netiquette will submit requests to SUBSCRIBE or UNSUBSCRIBE directly to the list itself. Be tolerant of this activity, and possibly provide some useful advice as opposed to being critical. Other people on the list are not interested in your desire to be added or deleted. Any requests regarding administrative tasks such as being added or removed from a list should be made to the appropriate area, not the list itself. Mail for these types of requests should be sent to the following respectively: LISTSERV GROUPS MAILING LISTS - LISTSERV@host listname-REQUEST@host or listname-OWNER@host

For either Mailing Lists or LISTSERV groups, to subscribe or unsubscribe, in the body of the message include: SUBSCRIBE listname yourfirstname yourlastname or UNSUBSCRIBE listname The Ten Commandments for Computer Ethics from the Computer Ethics Institute 1. 2. 3. 4. 5. 6. Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write.

10. Thou shalt use a computer in ways that show consideration and respect. VAXNotes{12}

VAXNotes is a program available to all users that manages electronic discussions called "conferences." Conferences, are subdivided into "topics." In each topic there are "messages" and "replies" to the messages. When you use VAXNotes, you access a public forum in which discussions on particular subjects can be held. To Start VAXNotes Create Notebook File To start VAXNotes, at the $ prompt type $ NOTES This creates in your directory a "notebook" file called NOTES$NOTEBOOK.NOTE which contains a list of all the conferences you wish to access. The VAXNotes prompt is Notes>. Set Editor The first time you use VAXNotes, set your Editor type to KEDT (You only have to do this once). Notes> SET PROFILE/EDITOR=(@KCUT:NOTESKEDT.COM,SPAWN) List of Conferences The command DIRECTORY/CONFERENCES KENYON:: will show what public conferences are on the system. You must be invited to participate in a private conference by the conference moderator. Add a Conference Entry To read the notes in a conference, its name must be added to your notebook. The command Notes> ADD ENTRY KENYON::conferencename will add a selected conference to your notebook. Add a specific conference name only once. Delete Conference Entry To delete a conference from your notebook, type Notes> DELETE ENTRY conferencename Note: If you are unable to open a conference, possibly it needs to be added again. You must delete the conference before you can add it again. Open Conference Once the conference has been added to your notebook, access the

conference by typing Notes> OPEN conferencename Help Remember that help menus program. When you press microcomputer, press the access the VAXNotes Help

are available from anywhere within the the <HELP> key or <PF2> (on a F2 key) the KEDT Help menu will appear; to menu directly, type HELP

To Read Notes Reading conference notes is much like reading mail; you can use commands such as First, Last, Next when you are reading topics in VAXNotes. List of Topics To read a note, first display a list of the topics after you have opened the conference. At the Notes> prompt, type DIRECTORY . Topics are listed numerically. To see a list of the topics AND the replies, type DIR *.* . So topic 2, for example, might have replies 2.1 and 2.2 . To Read a Note Typing the number of a particular topic will display it so that you can read it. Replies are listed under their topics, and can be displayed in the same way. For example, to read the third reply to the fourth topic, type 4.3 . To Write Notes Remember that anything added to a VAXNotes conference is readable by any other user. Every one who uses VAXNotes is responsible for ensuring that the notes stored remain relevant to their subjects and keep proper system etiquette. If there are any questions, consult the help menus or the ICS staff. Add New Topic In VAXNotes it is possible to add new topics to existing conferences, OR write replies to existing topics. To add a new topic to a conference, use the command Notes> WRITE You are now using KEDT and the key definitions are those of KEDT. After you have written your note, VAXNotes will ask for a title for the topic. The topic should be short and descriptive. The body of the topic itself can be as long as you wish. The same is true for replies. Reply to a Topic To write a reply to a topic or a reply that already exists, that particular note must be on the screen. To reply, use the command Notes> REPLY

You can reply to the main topic note or you can reply to replies. They are treated the same. To Include a Text File in a Note or Reply To include a text file (for instance, a mail file which has been extracted) in a note or reply, press <PF1> I and type in the name of the file.

To Delete a Note You can only delete notes which you have written. To delete a note, type DIR *.* and determine its exact number. To delete note 4.2, for example, type Notes> DELETE NOTE 4.2

To Print And Save Notes To Print Note(s) VAXNotes allows notes to be sent to printers. To print the note that is on the screen, type Notes> PRINT/QUEUE=queuename For example, the quename of the dot-matrix printers in Olin are called OLN1L210 and OLN2L210. The printing will not start until you exit VAXNotes, at which point all the notes selected will be queued for printing. Print Multiple Messages To print several messages, type the number of the messages after the print command. For instance, to print notes 1 to 5, type Notes> PRINT/QUEUE=queuename 1-5 Save a note to a file Notes in public conferences are stored outside of your account, not in the notebook file in your account. To copy a note into your current default directory as a text file called "filename", use the command Notes> SAVE filename Both the save and print commands can be amended so that many notes can be specified at once. The EXTRACT command works the same as the SAVE command. Substitute the word EXTRACT for the word SAVE. It is possible, for example, to print all the notes from a certain time period, or save all the notes from a certain person. For more information on how to do this, type Notes> HELP SPECIFYING_NOTES Here are some examples of specifying messages:

Notes> EXTRACT BUDGET 10.*(Saves topic number 10 and all the replies to it in a file called BUDGET.TXT) Notes> SAVE /KEYWORD=Dartmouth Colleges.info *.* (Saves all notes in the conference that have the keyword DARTMOUTH and stores the notes in a file called COLLEGES.INFO) Notes> EXTRACT/AUTHOR=Jones/KEYWORD=Meetings Jones.sch 3-25 (Extracts topics from topic 3 through 25 that were written by user Jones and refer to meetings. The notes are stored in a file called JONES.SCH) Remember, the EXTRACT and SAVE commands do the same thing. To Stop VAXNotes Close Conference To exit VAXNotes, first close the conference you are reading and then exit VAXNotes. Notes> CLOSE conferencename Exit VAXNotes and then exit VAXNotes. Notes> Exit

To Create a VAXNotes Conference Following are instructions about how you may create a conference yourself. Moderator Every conference has a moderator. The moderator creates a conference, manages the notes in a conference, and manages who can read and/or write to a conference. The moderator will be in charge of encouraging people to participate in the conference and guiding the flow of the discussion. Moderator Commands For more information about moderating a conference, at the Notes> prompt, type HELP MODERATOR and then HELP command phrase, for example, HELP add member . When a Conference is Created... Notes are stored on the system as they are created by participants in the conference. When you first create a conference, the conference notes will be stored in the root directory of your VAX account. To get your conference to show on the KENYON:: list, create your conference, then contact ICS at PBX 5700 and request that notes for your conference be relocated to public disk space. Please allow two or three days for the relocation of the conference file. If you wish to leave the conference file in your root directory, you

must have extensive knowledge about file protection and allowing others to access files in your root directory. ICS reserves the right to refuse public disk space to conferences whose nature violates College policies (e.g., harassment). The Create Command All conferences are first created in the moderator's private account by typing Notes> CREATE CONFERENCE SYS$LOGIN:conferencename SYS$LOGIN is an alias for your default directory and conferencename is the name of the conference you wish to create. When a conference is first created, it is accessible to all users, i.e., it is a "public" conference. At any time in the process, you can make the conference " private" by restricting it to a specific set of users. It is the responsibility of the conference owner to manage the list of users to whom access is granted. The program will ask for a title for the conference which should be a short description of its intended scope and a longer description which will be shown to anybody opening the conference later. To Create a Restricted Conference Create a conference and ask to have it placed in public space as instructed above. Open your conference and then do the following: Put yourself in "moderator mode". Notes> SET MODERATOR Set the conference to "restricted". Notes> SET CONFERENCE/RESTRICT=MEMBER Add each member into the conference. Notes> ADD MEMBER username username is the username of a future member of the conference. Do this for each member. To see a list of the members in your conference, Notes> SHOW MEMBERS To delete a member username. Notes> DELETE MEMBER username

Contact the ICS HelpLine (PBX 5700) to move your conference to public disk space so that other users may access it easily. Command Summary for Mail, News and Notes

VMS Mail To Enter Prompt: $ mail MAIL>

USENET News $ netnews NEWS> NEWS> dir/all (showsall groups) NEWS> dir/reg (shows those you've

VAXNotes $ notes NOTES> NOTES>dir

To See a Directory: MAIL> dir

registeredfor)

To Read Messages You See in the Directory:

MAIL> 10 NEWS> 640 (or highlight and (or highlight and press <RETURN>; press <RETURN>; <RETURN> to read <RETURN> to read next message) next message)

NOTES> 1.10 (press<RETURN> to read next message)

To Extract Current Message:

MAIL> extract <filename>

NEWS> extract <filename>

NOTES> extract <filename> OR NOTES> extract <filename> 1.* (places topic and replies into filename)

To Start a New Subject:

MAIL> send

NEWS> post NOTES> write (while in newsgroup) (while in conference)

To Delete a Message MAIL> delete (or Messages): (current message) MAIL> delete 1-20 (deletes 1-20)

NEWS> n/a

NOTES> delete note 1.2(you can only delete notes you've written)

To Reply to the Sender of the Current Message on the Screen:

MAIL? reply (replies to writer of current msg)

NEWS? reply (replies to writer of current msg)

NOTES? reply (to a topic or reply;places your reply in the conference) VAXNotes

VMS Mail

USENET News

To Send a Copy of the Current Message to One Person: To Send a Copy of the Current Message to Multiple People:

MAIL> forward TO:> <user-id>

NEWS> forward TO:> <user-id>

NOTES> forward TO:> <user-id>

MAIL> forward TO:> <user-ids> or <.dislist>

NEWS> forward TO: <user-ids>

NOTES> forward TO: <user-ids> or <.dislist>

To Send a Text File MAIL> send NEWS> post You're Already [.subdir]<filename> [.subdir]<filename> Created: TO: <user-id(s)> (while in newsgroup) NOTES> <PF1> I [.subdir]<filename> (while in conference) OR NOTES> write [.subdir]<filename> OR NOTES> reply [.subdir]<filename> To Print a Message: MAIL> set queue <queuename> (do once to set default, then) MAIL> print (prints current message on exit) NEWS> print/que=<queuename> (prints current message on exit) NOTES> print/que=<queuename> (prints current message on exit)

To Print Multiple Messages: MAIL> print 1-10 NEWS> print/que=<queuename> 110 NOTES> print 1.5-1.10 OR NOTES> print 1.*

(prints topic and all replies) To Register for a Group: n/a NEWS> dir/all (now highlight group you want) NEWS> register NOTES> ADD ENTRY KENYON:: conferencename To Delete a Group from Your Register: n/a NEWS> dir/reg (now highlight group you want) NEWS> deregister NOTES> DELETE ENTRY conferencename

To Exit: MAIL> exit NEWS> exit NOTES> close NOTES> exit Telnet{13}

These instructions will be useful to anyone who needs to log into another comput er system on the Internet. What is Telnet? Telnet is a program on any Kenyon VAX which allows you to connect to another computer system interactively. In order to use or log into another computer system, you must have access to that system either through a specific account there or a public access account name. The speed of interaction with the other system will vary according to how much traffic there is on the network. Telnet is used to access many different kinds of public services, including databases, freenets, and netfind. Login instructions are usually included with public access addresses. How to Use Telnet How to Start Telnet The simplest way to use TELNET is to follow it directly with the full address to which you want to connect, at the $ prompt:

$ TELNET host.domain For example, to establish an Interactive session on the VAX at the Stony Brook campus of CUNY, at the $ prompt type: $ TELNET CCMAIL.CUNYSB.EDU You can also start Telnet from the $ prompt without a hostname: $ TELNET In this case, you will be presented with the TELNET> prompt. For a brief listing of Telnet commands, press the question mark <?> key. To establish an interactive session from the TELNET> prompt, type: TELNET> OPEN host.domain For example, TELNET> OPEN CCMAIL.CUNYSB.EDU If you wish to keep or refer to a file of the session, you can try: $ telnet/log Telnet/Log will put a file of your session in your directory, but not all sites will support the log function. Unless you have an account on a remote system on the Internet and know the complete address of that system, you are advised NOT to explore the Telnet program. Unauthorized attempts to log into other systems may be seen with suspicion and may cause trouble for yourself and others. Use of the Internet is available to the College as a privilege. To Exit Telnet To exit Telnet from the TELNET> prompt, simply enter: TELNET> EXIT To Telnet to Kenyon College If you are away from the College and (1) have an account at another Internet site or (2) are offered Internet access without having your own account (e.g., at a conference), you can Telnet to Kenyon and log in, just as you would if you were on campus. $TELNET KCVAX1.KENYON.EDU or $TELNET KCVAX5.KENYON.EDU will allow you to log onto the academic VAX. Substitute KCVAX2 to Telnet to the Library system, or KCVAX3 to get the administrative system. TELNET Exercise{14}

Telnet gives you access to remote computers; although telnetting to private syst ems is discouraged, there are many public access facilities. These sites were chosen as a general sample, avoi ding libraries. Please try telnet again now (you've used it once already--in Netfind). Some of these sites support telnet/log, and some don't. If you are asked for a "terminal" or "term", use VT100. Go through the sites in any order you wish.

Exercise FEDERAL INFORMATION EXCHANGE (pg. 296 in Krol) This site is interesting because it demands information from you, and allows you to open an account. Its on-line instructions are easy to follow. Fedix is an information liaison between government agencies and the higher educa tion community. Information topics include Federal education and research programs, fellowships, funding opportunities, opportunities for Minorities and Women, Minority College and University Capabili ty Information, general information, and file locations to ftp. FEDIX provides daily information updates on: - Federal EDUCATION and RESEARCH PROGRAMS (including descriptions, eligibility, funding, deadlines). - SCHOLARSHIPS, FELLOWSHIPS, and GRANTS - Available used government RESEARCH EQUIPMENT - New funding for specific research and education activities from the COMMERCE BUSINESS DAILY, FEDERAL REGISTER, and other sources. - MINORITY research and education programs - NEWS & CURRENT EVENTS within participating agencies - GENERAL INFORMATION such as agency history, budget, organizational structure, mission statement, etc. To access: Login: TELNET FEDIX.FIE.COM new (unless you have a previous account)

Whatever menu choice you make, as a new user you will have to answer their questions (about 10) before you get access. If you make a typographical error, you can change it after you answer all questions. Questions include your name, institution, internet address (user-id@kenyon.edu), mail address and phone number. - Continued on Next Page FREENETS (Krol, pp. 299-300) Most of these locations offer traditional "visitor" or "guest" access. These freenets illustrate grassroots efforts to provide community information. The Cleveland Free-Net is often busy, and access may be denied because the maximum number of users has bee

n reached. These all allow guest access. Cleveland Free-Net (try any one or all of the following in turn) To access: TELNET FREENET-IN-A.CWRU.EDU To access: TELNET FREENET-IN-B.CWRU.EDU To access: TELNET FREENET-IN-C.CWRU.EDU Heartland Freenet (centered in Peoria, Illinois) To access: TELNET HEARTLAND.BRADLEY.EDU Login: BBGUEST Lorain County Freenet (cantered in Elyria, Ohio) To access: TELNET FREENET.LORAIN.OBERLIN.EDU Login: GUEST Tri-State Online (centered around the Cincinnati, Ohio area) To access: TELNET 129.137.100.1 Login: VISITOR Youngstown Freenet (centered in Youngstown, Ohio) To access: TELNET YFN.YSU.EDU Login: VISITOR

- Continued on Next Page -

AMERICAN PHILOSOPHICAL ASSOCIATION BULLETIN BOARD (Krol, p. 305) This is an example of an access site centering on a profession. News of the American Philosophical Association, information about conferences, s ervices to help find members, bibliographics, grants, fellowships, jobs. To access: Login: TELNET ATL.CALSTATE.EDU APA

CONCISE OXFORD DICTIONARY, 8th EDITION (Krol, p. 323, 324) This site offers reference services, including the dictionary, the Oxford Dictio nary of Familiar Quotations, the Oxford Thesaurus, the Bible, and the CIA World Factbook. You can search for word s in the dictionary and thesaurus, and you'll receive entries. In some cases, you can even put in a miss pelled word and receive a correction. The Oxford Dictionary of Familiar Quotations returns referenced quot es. To access: Select: TELNET INFO.RUTGERS.EDU Library

Select:

Reference

KNOWBOT INFORMATION SERVICE (Krol, p. 330) These sites will not request a login or accountname, but place you immediately i n the service. Knowbots are among the newest and most sophisticated services available on the I nternet. They will perform a "white pages" service, allowing you to look up other users. They're similar to Netfind, but do contain other names. There is an information document describing their use, available by anonymous ft p. For now, telnet to either of the following sites, and try a few names. Please note that from Kenyon's syst em, one adds a / and = with the port designation. Also, there is a misprint in Krol: the second site is NRI.RESTON, not NRI.WESTON. To access: TELNET SOL.BUCKNELL.EDU/PORT=185 OR TELNET NRI.RESTON.VA.US/PORT=185 OR TELNET REGULUS.CS.BUCKNELL.EDU/PORT=185

? gives you help once you're in. To find a name, type QUERY PUT_NAME_HERE

FTP (File Transfer Protocol){15}

The FTP program enables people to move files easily across the Internet. This d ocument outlines how to do this at Kenyon. What is FTP? FTP is a program designed to move files (especially large ones) from one place to another via the Internet. One can down- or up- load a file using various FTP commands. This utility is perhaps the most difficult use of the Internet to understand. In addition to an address to or from which you wish to transfer files, a detailed understanding of the network, the operating system at the foreign site, and a number of FTP commands, you will almost always need the proper username and passwords.

How to Use FTP To Start FTP The simplest way to connect to a foreign host to transfer files is to

type FTP at the $ prompt and specify a host: $ FTP host.domain A connection will be made and you will be asked for your username. After you provide it, you may be asked for a password. FTP can also be started without a hostname; at the $ prompt type: $ FTP Once inside the utility, you can connect to a foreign host by providing the appropriate IP address or host name after the OPEN command, like this at the FTP> prompt: FTP> OPEN 999.99.99.9 or FTP> OPEN host.domain For instance, if you want to FTP to Kenyon's academic VAX (usually a pointless but possible proposition) you could type at the FTP prompt: FTP> OPEN 138.28.1.2 or FTP> OPEN KCVAX1.KENYON.EDU Should you fail to properly provide your username or password, you may try again by using the USER and PASS commands. For instance, after supplying an incorrect password you might see: <Login incorrect. The connection is still open, as reflected by the new prompt, KCVAX1.KENYON.EDU> At this prompt, to supply a different username, type: KCVAX1.KENYON.EDU> USER If you have only typed your password incorrectly, you may use the PASS command. "Anonymous" Some Internet hosts will not require you to have an account but will instead ask you to specify the name of the service you wish to access, so that you might log in as "anonymous". When you log in with a username of anonymous, it is customary to type your internet address when asked for a password. When dealing with different computers, you may run into another operating system (a way of organizing information and commands). Knowing the directory structure of a new (or familiar) operating system is important for finding what you need. To Change Subdirectories

To change what directory you are accessing, use the change directory command, as below for a VMS system like Kenyon's, at the KCVAX1.KENYON.EDU> prompt: KCVAX1.KENYON.EDU> CD [directory.subdir] or as follows for a UNIX system: CD /directory/subdir Beware of Playing Around Experimenting with these functions is a rather tedious process, and should not be done. Other systems may decide that you are a threat to security there and disconnect you.

To Download A File Once you have located the file you wish to download, use the GET command: GET filename.txt Various messages appear during the transfer process, and these can be understood (if you are interested) with a little effort. To Upload A File If, on the other hand, you wish to upload a file to the foreign host, make sure that you are in the proper directory, and type: PUT filename.txt File Types: ASCII or Binary The FTP program can transfer files in either binary or ASCII mode. If you are about to transfer a file labeled .TXT or one you know is in an ASCII format, type at the host.domain> prompt: ASCII Other files will be of a binary type. For these, type: BINARY Please be sure that you know what you are transferring and that it is of a reasonable size. Transferring large files is often time-consuming and you should be careful not to use more space than you have been allotted on the Kenyon computers. To Close a FTP Connection When you are ready to close a connection to a foreign host, at the FTP prompt, type: CLOSE or BYE You can now OPEN another connection.

To Stop Using FTP When you are done with your FTP session, to leave the program type: EXIT The EXIT command will CLOSE any open connections before exiting FTP. FTP Commands The following commands are recognized by most, if not all, ftp clients and servers. ASCII Sets file transfer to ASCII mode for transferring only ASCII text files. BINARY Sets file transfer to BINARY mode for transferring binary files. Example of binary files would be programs, graphics, wordperfect documents, etc. CD directory Change working directory on the remote system to the named directory. CD /PUB/MSDOSChanges working directory to /PUB/MSDOS CLOSE Ends FTP session and return to FTP command mode. You can OPEN another connection or QUIT. DELETE file Deletes the named file on the remote system. DELETE OLDFILE.TXT DIR Displays directory listing of files in current working directory on remote system. HELP command (or ?) Displays brief information about the named command. HELP DIR Type ? alone will display a list of all available FTP commands but without any instructions on use. LCD directory Changes the default working directory on the LOCAL system. LCD C:\FILESChanges working directory to C:\FILES on local computer system.

LS Equivalent to the DIR command but displays a short listing. LS /PUB/MSDOS MGET file-list Gets multiple files from remote system to local system. The list of files can be filenames each separated by a space or specified by using wildcard characters. The wildcard character "*" means any file and a "?" means any character at this position. MGET *.*Gets all files. MGET *.TXT Gets all files with extension TXT MGET *.BK?Gets all files with first two. characters of extension containing BK and third character being. anything. MPUT file-list Puts multiple files onto remote system from local system. The list of files can be filenames each separated by a space or specified using wildcard characters (see MGET). OPEN hostname.domain or OPEN IP-address Connects to named remote system. A system's hostname.domain format is similar to KCVAX3.KENYON.EDU or MAGNUS.ACS.OHIO-STATE.EDU. A system's IP address is similar to 138.28.2.6 OPEN KCVAX3.KENYON.EDU OPEN 138.28.2.6 PWD Prints the current working directory on the remote system. QUIT Closes any remaining FTP connections and exits FTP. SEND See PUT RECEIVE See GET USER Causes remote system to prompt for username and password. This is helpful if you enter an incorrect username or password and need the FTP server to prompt you again for your username and password. File Transfer Protocol Exercises{16}

Begin by making sure you are logged into your KENYON VAX account. At the $ prompt type FTP and press the ENTER key. This will start the FTP clien t program. Your account on the VAX is considered the LOCAL system. Exercise 1 GOAL: FTP to KCVAX3.KENYON.EDU and get ASCII text file named X1CUBA.BKG from C:[PEW.FILES] STEP 1) Type:FTP Response:

kcvax3.kenyon.edu MultiNet FTP server user process 3.2(106) FTP> Meaning: The FTP client program is running with the FTP client prompt (FT P>) waiting for a command STEP2) Type: OPEN KCVAX3.KENYON.EDU Response: Connection opened (Assuming 8-bit connections) <kcvax3.kenyon.edu MultiNet FTP Server Process 3.2(14) Username: Meaning:FTP client is connected to the specified host and FTP server is promptin g you to enter your username STEP 3) Type: Your-Username Response: Password: Meaning: FTP server is prompting you to enter your password. STEP 4) Type: Your-Password Response:<User YOURUSERNAME logged into DISK:[USERNAME] at Sun 30-May-93 11:27, job 22001052. KCVAX3.KENYON.EDU> Meaning:You are successfully logged into the FTP server and the FTP server promp t is displayed (KCVAX3.KENYON.EDU>) indicating it is waiting for an FTP command. STEP 5) Type: CD C:[PEW.FILES] Response:<Connected to C:[PEW.FILES]. KCVAX3.KENYON.EDU> Meaning: You have successfully moved into the directory C:[PEW.FILES] - Continued on next page Exercise 1 (Continued) STEP 6) Type: DIR Response: <List started.

C:[PEW.FILES] X1CUBA.BKG;16 1-JUN-1993 13:56 PEW (RWED,RWED,RE,) X2JFK.DOC;1101-JUN-1993 13:57 PEW (RWED,RWED,RE,) X3JFK.GIF;11041-JUN-1993 13:57 PEW (RWED,RWED,RE,) Total of 120 blocks in 3 files. <Transfer complete. KCVAX3.KENYON.EDU> Meaning:This is a display of all the files in the current working directory. Ma ke note that the file X1CUBA.BKG exists in this list. STEP 7) Type: ASCII Response:

Type Ascii (non-print), Structure: File, Mode: Stream KCVAX3.KENYON.EDU> Meaning: The file transfer mode has been changed to ASCII mode for transf erring ASCII text files. STEP 8) Type: GET X1CUBA.BKG Response: To local file: Meaning: FTP Client is prompting for the name to store the file on the lo cal system. STEP 9) Type: <ENTER> (NOTE: Pressing ENTER alone keeps the original name.) Response: <VMS retrieve of C:[PEW.FILES]X1CUBA.BKG;1 started. <Transfer completed. 2706 (8) bytes transferred. KCVAX3.KENYON.EDU> Meaning:The transfer of file X1CUBA.BKG has been completed and included a total of 2706 bytes (8 bits/byte) transferred.

Exercise 2 GOAL:Transfer the ASCII text file X1CUBA.BKG to C:[PEW.FILES] at KCVAX3.KENYON.E DU. NOTE:If you are not already connected to KCVAX3.KENYON.EDU and/or your current w orking directory is not set for C:[PEW.FILES] then follow steps 1-5 in Exercise #1 abov e. STEP 1) Type: ASCII STEP 2) Type: PUT X1CUBA.BKG Response:To remote file: Meaning:The FTP Client is prompting for a filename to store the file on the fore ign/remote host. STEP 3) Type: <ENTER>(NOTE: Pressing <ENTER> alone will keep the original name.) Response:<VMS Store of C:[PEW.FILES]X1CUBA.BKG;2 started. <Transfer completed. 2706 (8) bytes transferred.

KCVAX3.KENYON.EDU> Meaning:The transfer of file X1CUBA.BKG has been completed and included a total of 2706 bytes (8 bits/byte) transferred. Exercise 3 GOAL:FTP to KCVAX3.KENYON.EDU and GET the BINARY file X3JFK.GIF from C:[PEW.FILE S]. NOTE:If you are not already connected to KCVAX3.KENYON.EDU and/or your current w orking directory is not set for C:[PEW.FILES] then follow steps 1-5 in Exercise #1 abov e. STEP 6) Type: BINARY Response:Type: Image, Structure: VMS, Mode: Stream KCVAX3.KENYON.EDU> Meaning:The file transfer mode has been changed to BINARY mode for transferring BINARY text files. STEP 7) Type: GET X3JFK.GIF STEP 8) Type: <ENTER> Exercise 4 GOAL:Transfer the ASCII text and BINARY files X1CUBA.BKG, X2JFK.DOC, X3JFK.GIF f rom C:[PEW.FILES] at KCVAX3.KENYON.EDU. NOTE:If you are not already connected to KCVAX3.KENYON.EDU and/or your current w orking directory is not set for C:[PEW.FILES] then follow steps 1-5 in Exercise #1 abov e. STEP 1) Type: BINARY NOTE:This command can be entered more than once. It is helpful to repeat this c ommand (or BINARY if necessary) if you are not sure in which transfer mode you are. When t ransferring multiple files of which there is a mixture of ASCII and BINARY files, your best bet for file transfer mode is BINARY. STEP 2) Type: MGET X*.* Response: <List started. <Transfer completed. <VMS retrieve of C:[PEW.FILES]X1CUBA.BKG;1 started. <Transfer completed. 2706 (8) bytes transferred. <VMS retrieve of C:[PEW.FILES]X2JFK.DOC;1 started. <Transfer completed. 4952 (8) bytes transferred. <VMS retrieve of C:[PEW.FILES]X3JFK.GIF;1 started.

<Transfer completed. 53216 (8) bytes transferred. KCVAX3.KENYON.EDU> Meaning:Multiple-Get command was executed to transfer more than one file using t he specified wildcard string. In this example MGET transferred all files. On the Kenyon VAX, FTP wil l get the most recent version of the named file. If you wish to transfer an earlier version yo u must specify the version number in the filename (i.e. FILE.TXT;3). Exercise 5 GOAL:Transfer the ASCII text and BINARY files X1CUBA.BKG, X2JFK.DOC, X3JFK.GIF t o C:[PEW.FILES] at KCVAX3.KENYON.EDU. NOTE:If you are not already connected to KCVAX3.KENYON.EDU and/or your current w orking directory is not set for C:[PEW.FILES] then follow steps 1-5 in Exercise #1 abov e. STEP 1) Type: BINARY STEP 2) Type: MPUT X*.* Response:<VMS Store of C:[PEW.FILES]X1CUBA.BKG;2 started. <Transfer completed. 2706 (8) bytes transferred. <VMS Store of C:[PEW.FILES]X2JFK.DOC;2 started. <Transfer completed. 4952 (8) bytes transferred. <VMS Store of C:[PEW.FILES]X3JFK.GIF;2 started. <Transfer completed. 53216 (8) bytes transferred. KCVAX3.KENYON.EDU> Meaning:Multiple-Put command was executed to transfer more than one file using t he specified wildcard string. In this example MPUT transferred all files. NOTE:In the case of MPUT you are not prompted for what name you want the files s tored on the foreign/remote host. FTP will automatically use the original name. STEP 3) Type: CLOSE STEP 4) Type: QUIT STEP 5)Transfer the three files from the VAX to your Microcomputer using KERMIT. This should take approximately 2 1/2 minutes for the three files to be transferred. Type: KERMIT STEP 6) Type: SERVER STEP 7) Type: Alt-C STEP 8) Type: SET DEFAULT C:\

STEP 9) Type: GET X*.* STEP 10) Type: FINISH STEP 11) Type: C - Continued on next page Exercise 5 (Continued) STEP 12) Type: QUIT STEP 13) Type: LOGOUT STEP 14) Type: LOGOUT STEP 15) Type: Alt-C STEP 16) Type: EXIT STEP 17) Type: BROWSE X1CUBA.BKG STEP 18) Type: BROWSE X2JFK.DOC STEP 19) Type: GIFPRT X3JFK.GIF Exercise 6 GOAL:FTP to the Anonymous FTP Server at SUNSITE.UNC.EDU and GET CIVIL.TXT (Clinton/Gore position speech on civil rights). STEP 1) From VAX $ prompt. Type: FTP SUNSITE.UNC.EDU NOTE:Typing FTP along with a host.domain name from the VAX $ prompt allows you t o get FTP started and connected in one command. Response:Connection opened (Assuming 8-bit connections) <SunSITE is from UNC & Sun.Read DISCLAIMER.readme for our legal disclaimer Username: Meaning:Connected to Anonymous FTP server called SUNSITE at UNC (University of N orth Carolina). Waiting for username to be entered. STEP 2) Type: anonymous STEP 3) Type: your-email-address NOTE:By providing your e-mail address you are simply aiding the person who manag es the FTP server. The manager is mostly interested in knowing where people are connecting

from. Response:<Guest login ok, access restrictions apply. SUNSITE.UNC.EDU> Meaning:You are successfully logged in and the FTP Server is waiting for an FTP command. - Continued on next page Exercise 6 (Continued) STEP 4) Type: CD /pub/academic/political-science/speeches/clinton-positions STEP 5) Type: DIR STEP 6) Type: ASCII STEP 7) Type: GET CIVIL.TXT STEP 8) Type: <ENTER> STEP 9) Type: CLOSE Exercise 7 GOAL:FTP to VMD.CSO.UIUC.EDU and GET most recent weather satellite image. STEP 1) Type:FTP VMD.CSO.UIUC.EDU STEP 2) Type: anonymous STEP 3) Type:your-email-address STEP 4) Type: BINARY STEP 5) Type:CD /WX STEP 6) Type: DIR CV*.GIF NOTE:You will see a long listing of files in the format CVmmddhh.GIF (where mm = Month, dd = Day, and hh = Hour file created). The last file in the list is the most recent file. Make a note of the file name of this last file. STEP 7) Type: GET CVmmddhh.GIF NOTE: Specify the file you saw as the last one in the list. - Continued on next page Exercise 7 (Continued)

STEP 8) Type: <ENTER> STEP 9) Type: CLOSE STEP 10) Type: QUIT STEP 11) Type: KERMIT STEP 12) Type: SERVER STEP 13) Type: <Alt-C> STEP 14) Type: SET DEFAULT C:\ STEP 15) Type: GET CVmmddhh.GIF STEP 16) Type: FINISH STEP 17) Type: C STEP 18) Type: QUIT STEP 19) Type: LOGOUT STEP 20) Type: LOGOUT STEP 21) Type: <Alt-C> STEP 22) Type: EXIT Exercise 8 GOAL:FTP to RA.MSSTATE.EDU and GET ASCII text file DIARY.IRAQI from /pub/docs/history/USA/GulfWar STEP 1) Type: FTP RA.MSSTATE.EDU STEP 2) Type: anonymous STEP 3) Type: your-email-address

STEP 4) Type: CD /pub/docs/history/USA/GulfWar STEP 5) Type: DIR STEP 6) Type: ASCII STEP 7) Type: GET diary.iraqi STEP 8) Type: <ENTER> STEP 9) Type: CLOSE STEP 10) Type: QUIT STEP 11) Type: MORE DIARY.IRAQI

Exercise 9 GOAL:FTP to FTP.CWRU.EDU and GET the U.S. Supreme Court decision document file 8 9-5011.O.filt STEP 1) Type: FTP FTP.CWRU.EDU STEP 2) Type: anonymous STEP 3) Type: your-email-address STEP 4) Type: CD /hermes/ascii STEP 5) Type: ASCII STEP 6) Type: GET 89-5011.O.filt STEP 7) Type: 89-5011.O NOTE:VAX file names will be garbled if you get a file with more than one "." cha racter in the name. In this case try to shorten the name or leave out any extra "." characters. STEP 8) Type: CLOSE

STEP 9) Type: QUIT STEP 10) Type: MORE 89-5011.O

Exercise 10 GOAL:FTP to FTP.EFF.ORG and GET the ACLU Briefing document freedom-of-expression .aclu STEP 1) Type: FTP FTP.EFF.ORG STEP 2) Type: anonymous STEP 3) Type: your-email-address STEP 4) Type: CD /pub/academic/civil-liberty STEP 5) Type: ASCII STEP 6) Type: GET freedom-of-expression.aclu STEP 7) Type: freedom.aclu NOTE:Remember to shorten the file name so it won't be garbled when stored on the VAX STEP 8) Type: CLOSE STEP 9) Type: QUIT STEP 10) Type: MORE freedom.aclu Gopher{17}

The Internet Gopher, or simply Gopher, is a distributed document delivery servic e. It allows users to explore, search and retrieve information residing on different locations in a seamless fa shion. What is Gopher When browsing it, the information appears to the user as a series of nested menus. This kind of menu structure resembles the organization

of a directory with many subdirectories and files. The subdirectories and the files may be located either on the local server site or on remote sites served by other Gopher servers. From the user point of view, all information items presented on the menus appear to come from the same place. The information can be a text or binary file, directory information (loosely called phone book), image or sound. In addition, Gopher offers gateways to other information systems (World-Wide Web, WAIS, archie, WHOIS) and network services (Telnet, FTP). Gopher is often a more convenient way to navigate in a FTP directory and to download files. A Gopher server holds the information and handles the users' queries. In addition, links to other Gopher servers create a network wide cooperation to form the global Gopher web (Gopherspace). Who Can Use Gopher Gopher uses the client-server model to provide access to the Gopher web. You must be on the international TCP/IP network (the Internet) in order to use a client on your computer to access Gopher. How to Get to Gopher Users explore the Gopher menus using various local clients or accessing a remote client via an interactive Telnet session.

Local Clients Public domain clients for accessing a Gopher server are available for: Macintosh, MS/DOS, OS/2, VM/CMS, VMS, NeXT, Unix, X-Window. The clients are available for anonymous FTP from many FTP sites (e.g. boombox.micro.umn.edu in the directory /pub/gopher).

Remote Clients Some sites allow public access via Telnet to a client. To access such a remote client, telnet to one of these sites: info.anu.edu.au tolten.puc.cl ecnet.ec gopher.chalmers.se consultant.micro.umn.edu gopher.uiuc.edu panda.uiowa.edu Australia (login: info) Columbia Ecuador Sweden USA USA USA (login: panda)

At the login prompt type gopher (unless specified otherwise) and the toplevel Gopher menu for that site will be displayed. Users are requested to use the site closest to them.

Using Gopher The implementations of the Gopher clients on various platforms are slightly different to take advantage of the platforms' capabilities (mouse, graphic functions, XWindow server) and to offer the popular look and feel. Even with different implementations, the same set of functions and commands is available. When issuing the gopher command, you will be connected automatically to the default Gopher server specified at the installation. The format of the command is: gopher <hostname>

where hostname is an optional alternative Gopher server to which you want to talk. When connected to a Gopher server, it is still possible to access another server by exploring the Other Gopher servers in the rest of the world branch. To locate them more easily, the Gopher servers are distributed in geographical regions: * * * * * * Africa Europe Middle East North America Pacific South America

and then by countries. Access to a Gopher server is identical whether using a local or a remote client: a simple menu driven interface which doesn't require any special training or knowledge from the user. Here is a sample menu: Internet Gopher Information Client v1.1 Information About Gopher 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. About Gopher. Search Gopher News <?> Gopher News Archive/ comp.infosystems.gopher (USENET newsgroup)/ Gopher Software Distribution/ Gopher Protocol Information/ University of Minnesota Gopher software licensing policy. Frequently Asked Questions about Gopher. gopher93/ Gopher| example server/ How to get your information into Gopher. New Stuff in Gopher. Reporting Problems or Feedback. big Ann Arbor gopher conference picture.gif <Picture>

>

Press ? for Help, q to Quit, u to go up a menu In the example above, any item can be selected by typing its line

number or by moving the cursor (>) next to it. An item could be: a subdirectory a text File a binary File a sound file an image file a phone book (directory information) an indexsearch a Telnet session

Items are displayed with an identifying symbol next to them. In the example above, "<?>" means a full text index search, "/" means a subdirectory, "<Picture>" means an image file and no symbol means a text file. Some Gopher clients are not able to handle certain file types (e.g., sound files). Some clients display only files of types they can handle or files in which they suppose you are interested. Others display all types of files. Most Gopher clients allow you to create, view and select bookmarks. A bookmark keeps track of the exact location of a Gopher item, regardless of where it resides. It is useful when you often need to reach a file or a service located far from the top level directory. A collection of bookmarks is like a customized Gopher menu. Some capabilities of a local Gopher client are bound to the capabilities of your own computer. In fact, for sound files, image files and Telnet sessions, the Gopher client looks for the appropriate software on your computer and passes control to it to perform the requested task. When the task is completed, control is returned to the Gopher client. At any time, it is possible to terminate the session (quit command), to cancel the current processing or to get the online help (help command). An item is processed according to its type: a subdirectory its contents are displayed. To go up one level, use the up command. a text file the file is displayed. Then you can browse it, search for a particular string, print it on a local printer or copy (save) it onto your local disk space in a userspecified file (the last 2 functions may not be available to you). a binary file the remote file is simply copied onto your local disk space in a userspecified file. Binary files are binhexed Macintosh files, archives (.zip, .tar,...), compressed files, programs, etc. a sound file the remote file is played through your local audio device if it exists, as well as the appropriate utility. Only one sound file can be active at a time; you will be warned if you try to play a sound before a previous one is done.

an image file the remote file is displayed on your computer screen if an image viewer exists on your computer. a phone book you are prompted for a search string to look up people information through the selected phone book. Since different institutions have different directory services, the queries are not performed in the same fashion. an indexsearch you are prompted for a search string which may be one or more words, plus the special operators and, or, and not. The search is case insensitive. Usually, an index is created to help users locate the information in a set of documents quickly. e.g.: terminal and setting or tset will find all documents which contain both the words terminal and setting, or the word tset. or is nonexclusive so the documents may contain all of the words. The result of the index search looks like any Gopher menu, but each menu item is a file that contains the specified search string. a Telnet session Telnet sessions are normally textbased information services, for example, access to library catalogs. VERONICA Veronica was designed as a solution to the problem of resource discovery in the rapidly expanding Gopher web, providing a key word search of more than 500 Gopher menus. Veronica helps you find Gopher based information without doing a menu-by-menu, site-by-site search. It is to the Gopher information space, what archie is to the FTP archives. Veronica is accessible from most toplevel Gopher menus or from the Other Gopher servers... branch. There is no need for opening another connection or another application. There are two search methods: the simple Boolean search method and the partial Boolean search method. When you choose either search method, you will be prompted for a search string. The searches are carried out on an index of Gopher menu titles. They are NOT full-text searches of data at Gopher sites. Veronica queries are case insensitive. Simple Boolean search method The search string may contain keywords optionally separated by and and or. And is assumed between 2 words. Or takes precedence over and. e.g.: eudora

will give you a list of menu titles that contain eudora: Electronic Mail: Eudora on Macintosh, Micro-08 Modem Setting Eudora Slip. A UNIXbased Eudora reader for those that ... Eudora: Popmail for the Macintosh. Eudora. while eudora and macintosh will give you a list of menu titles that contain both eudora and macintosh: Eudora: Popmail for the Macintosh. v4.1 EUDORA: EMAIL FOR THE MACINTOSH. Micro News: Eudora A Mailer for the Macintosh. Eudora: Electronic Mail on Your Macintosh. ACS News Eudora Mail Reader for Macintosh. etc. Partial Boolean search method: BOOLEANS The search string contain keywords optionally separated and, or and not. The evaluation is done from left to right. not clauses are evaluated after all the other clauses are evaluated. e.g.: red and blue or yellow but not green and orange or black but not white will be interpreted as: (((((red and blue) or yellow) and orange) or black) not green) not white) PARTIALWORD '*' is the wildcard character, which can replace any other character. It causes a partial search on the substring it follows. e.g.: desk* will give you a list of menu titles, including: The Help Desk. Keene State College Press Release COMPUTER ON EVERY DESK.DESKQview/X... An alternative to Windows???. Ethernet at Your Desktop/ LITERAL A string surrounded with a pair of quotes (') or doublequotes (") causes a exact match search (caseinsensitive). and, not, and '*' may occur in the literal string, they have no special meaning. The first part of a literal string must be a word, rather than a delimiter symbol, to get a successful search. e.g.: "desk"

will give you a list of menu titles, including: Mac on Your Desk. Information Desk. Available at the Help Desk .... The result of both search methods is a Gopher menu composed of items (with an identifying symbol) whose titles match the search string. Like any Gopher items, you can process them: open subdirectories, display text files, etc. LEARNING MORE ABOUT GOPHER The Internet Gopher is developed by the Computer and Information Services Department of the University of Minnesota. Bug reports, comments, suggestions, etc. should be mailed to the Gopher development team at: gopher@boombox.micro.umn.edu. Mailing list: gophernews@boombox.micro.umn.edu To subscribe send a mail to: gophernewsrequest@boombox.micro.umn.edu Usenet newsgroup: comp.infosystems.gopher A comprehensive description of veronica search methods is available from the veronica menus. Veronica is being developed by Steve Foster and Fred Barrie at the University of Nevada. Bug reports, comments, suggestions, etc. should be addressed to: gophadm@futique.scs.unr.edu

We would like to express our gratitude to the authors and developers of these tools for making their work available to the networking community. We have consulted their documentation, and the documentation of others, in preparing this guide, and for this we are also grateful. We have used their descriptions and explanations when suitable, but any errors or inaccuracies are the sole responsibility of the EARN staff. Consult the sources listed at the end of each section for specific queries and original detailed information. This document is available from: LISTSERV@EARNCC.BITNET

Send the command: GET filename where the filename is either: GOPHER PS (Postscript) GOPHER MEMO (plain text) Gopher Commands{18}

LOOK Gopher displays all of the information you see using a special display program called LOOK. LOOK allows you to scroll through the file, search for key words, etc. It has a menu of commands at the bottom

of the screen for easy access. Only the Capitalized letter in the command word must be typed in order to execute the command; the letter can be in either upper or lower case. An explanation of each LOOK command is listed below: helP Exit Quit u Home End scrRight scrLeft Find findNext Edit Go ion Spawn document chWid e Txt/hex - displays document in "text" mode or hexadecimal The following cursor movement keys also work in LOOK, although they are not listed on the menu: Page Up Page Down Capturing Gopher Data Exit the document in the LOOK program by typing "x" . Gopher will ask if you wish to print the information, save the information in a file, mail the information to someone (such as yourself), or just continue back to the current menu. Press <RETURN> to continue back to the current menu Type "m" to send this file as a mail message to yourself or to someone else's username that you can specify. Type "s" to save a copy of this file to a filename that you can specify. Simply delete the default filename that appears and put in your own. The file can also be saved to a directory other than the one you are in by specifying its name, along with the filename. Type "p" to print a copy of the file to your default printer that you can specify in your LOGIN.COM file. If no printer is specified, the copy will not print; so don't use the print option until you have entered the default printer command in your LOGIN.COM file! To do so edit your login com (use a VAX system editor, not Word Perfect) and add the following. (Substitute the name of the print queue you prefer for the phrase Default_Printque_Name.) $ DEFINE GOPHERQUE DEFAULT_PRINTQUE_NAME - moves cursor back one screen - moves cursor forward one screen - jumps out of Gopher temporarily to "$" prompt; type "LO" at "$" prompt to return to - changes screen width: 132 or 80 characters/lin moves cursor to beginning of file moves cursor to end of file moves cursor to right end of screen moves cursor to left end of screen searches for specified word or phrase searches for next occurrence of that word enables you to edit the temporary file - enables you to move to specified locat - accesses the help file for the "Look" facility - exits file and returns you to current menu - aborts the file and returns you to current men

for example ... $ DEFINE GOPHERQUE CHA1HP

After trying out these options, you can press <RETURN> to get back to the menu where you were browsing when you accessed the document. To quit Gopher, type "q" .

Getting Gopher Help There are several types of help available in Gopher. All Gopher menus contain a "?" Help option, where you can get help in learning to use Gopher. The LOOK program's Help is reached by entering P (from the helP listed among the choices at the bottom of the screen.)

Gopher Exercise{19}

Each participant will "Gopher" to one of these sites and, if there is time, repo rt back to the class on interesting discoveries. At the $ prompt type, GOPHER <hostname> Exercise 1. Ucsbuxa.Ucsb.Edu 2. 3. 4. 5. 6. 7. 8. 9. Ds.Internic.Net Mirage.Acs.Ohio-State.Edu Infoslug.Ucsc.Edu Fedix.Fie.Com Gopher.Uiuc.Edu Dewey.Lib.Ncsu.Edu Envirolink.Hss.Cmu.Edu Orion.Lib.Virginia.Edu

10. Una.Hh.Lib.Umich.Edu 11. Joeboy.Micro.Umn.Edu 12. Mentor.Lanl.Gov

13. Info.Rutgers.Edu 14. Sunsite.Unc.Edu 15. Gopher.Unt.Edu 16. Info.Umd.Edu 17. Gopher.Virginia.Edu 18. Gopher.Denet.Dk 19. Gopher.Th-Darmstadt.De 20. Gopher.Isnet.Is 21. Gopher.Chalmers.Se 22. Chronicle.Merit.Edu KCInfo

KCInfo is Kenyon College's Campus Wide Information System, or CWIS (pronounced " kwiss"). KCInfo is based on the Gopher program. There is a Gopher "server" running here at Kenyon, and when you type KCInfo at the VAX $ prompt, you are running a Gopher "client" which connects to the local Gopher server. Through a series of menu screens, KCInfo p rovides easy on-line access to a variety of services and information for students, faculty, a nd staff at Kenyon. Many department and campus organizations provide information and services throug h KCInfo. Each information provider (or "IP") works with a liaison from ICS to plan a KCIn fo service and put their specific information into the appropriate format for delivery to you t hrough KCInfo. If you or your department wishes to make any information in your purview accessible through KCInfo, please call ICS at PBX 5696 to discuss the process involved. To access KCInfo, at the VAX $ prompt, type KCINFO and press <Enter> Select an item either by using the arrow keys on your computer then pressing <En ter> -orby typing in the number of the item of interest then pressing <Enter> The options available to you at each step are displayed at the bottom of the scr een. For instance, type U to move up to the previous menu, or type Q to quit. As with other Go

pher programs, you can print any item you read, or even mail it to someone else (or yourself). At this time, entries in the KCInfo structure are present but most are empty. D uring the summer of 1993, information providers will be formatting materials and placing them int o the KCInfo system. When you return in the fall, please take a closer look at KCInfo. Wide Area Information Server (WAIS){20}

How to Access WAIS at Kenyon From the Library Menu (C LIBRARY) choose option E, then option B. From the Main Menu of the LIBS program choose 5, Wide-area Information Services. You will see WAIS as choice 4 of the next screen. At the login prompt enter wais (this must be in small letters). At the request to identify yourself enter your Internet email name. At the VT100 prompt press the <Enter> key. You will be presented with a screen-based version of WAIS (swais). You may also access WAIS via Gopher servers, or by going directly to THINK.COM (at the $ prompt enter TELNET QUAKE.THINK.COM ). What is WAIS? WAIS is a distributed database system based on the client-server model. WAIS servers are computers on the network that contain one or more databases and special software that takes care of the indexing and retrieval of the documents in the database(s). One of WAIS's special strengths is its ability to accommodate a wide variety of data types. Although most WAIS databases today consist of plain text, WAIS servers can store and index image files (such as files in GIF, TIFF, and PICT formats), sound files, formatted text files, and many other file formats. As far as the server is concerned, the format of the data is not significant, because the client does not query the database directly, but rather queries an index that contains information about the database. The key to getting at WAIS data is the client application. The client is the software interface that allows end-users to ask questions about what is contained in one or more WAIS databases and read or download documents of interest. WAIS clients have been developed for many different computer platforms including the Macintosh, DOS, VMS, RS6000, generic Unix, X Windows, MS Windows, GNU Emacs, SunView, NeXTstep, and Motif. Communication between the WAIS client and server is based on a standard protocol called Z39.50. This protocol, which was originally developed as a tool for searching library catalog systems, has been expanded by the developers of WAIS to provide for future flexibility as WAIS evolves. But enough on the

technical side of WAIS. Let's take a look at how the WAIS project got started, what kind of information it offers, and how you can use it to retrieve information.

The Origins of WAIS WAIS was the brainchild of Brewster Kahle, project leader at Thinking Machines Corporation. (Thinking Machines is the manufacturer of massively parallel computers called Connection Machines.) In 1989, Kahle (and Thinking Machines) invited three corporate giants, Apple Computer, Dow Jones and Co., and KPMG Peat Marmick (a world-wide accounting and tax consulting company) to jointly develop a text-based information system for corporate executives that would permit users (in Kahle's words) "to retrieve personal, corporate, and wide-area information through one easy-to-use interface." Ideally this information retrieval system was to be platform independent so that the user could obtain information residing on many different machines located in many different places. Another goal of the project was to design an interface that would not require any specialized knowledge of computers or database query languages. Specifically, the user interface was to be as natural and user-friendly as possible. The fruits of this collaboration are the set of products that we now refer to collectively as WAIS.

What Can I Find with WAIS? With over 300 databases from which to choose, there is hardly a topic that isn't at least touched upon in WAIS. The sidebar called "Information Available through WAIS: A Sampler" on this page will give you an idea of the tremendous diversity of the WAIS databases. Unfortunately, most WAIS clients do not offer the option of browsing the list of WAIS databases to see what's available. There are, however, two ways of viewing the entire list of WAIS databases. First, the Gopher application offers a gateway to WAIS-based information. You'll typically find it in the sub-menu "Other Gopher and Information Servers/WAIS Based Information/Everything." If you go to this menu, you can see a list of all of the publicly available WAIS servers. The Gopher interface is not especially effective for searching WAIS archives, but does provide an easy way to see a complete list of WAIS databases. Another method for browsing WAIS data is to telnet to a computer at Thinking Machines Corporation that runs the Unix WAIS client called SWAIS. To do so, open a telnet session with the host "quake.think.com" and log in as "wais" . When asked for a password, enter your e-mail address (e.g., ward@ux1.cso.uiuc.edu ). A welcome banner will appear that describes a little bit about the SWAIS interface. Then you will see a list of WAIS databases (called "sources") as shown in Figure 1 on page 2. You can scroll through the list with your arrow keys and view a description of any source by highlighting it and typing "v" for view. To exit the description, type "q" for quit and then press any key. The SWAIS client can also be used for conducting WAIS searches. The interface is fairly intuitive, and if you need

help, you can simply type a question mark ( "?" ). However, as WAIS clients go, SWAIS is not among the best. To get a feeling for the true power of WAIS, use a client specifically designed for your desktop computer or workstation. Important WAIS Concepts Regardless of what WAIS client you use, the procedure for searching WAIS databases is more or less the same. Before getting into specifics, however, it's important to understand at least three pieces of WAIS jargon: "The Directory of Servers" This is a master list of WAIS databases that is maintained by Thinking Machines Corporation (TMC). When a new WAIS database is created, the maintainer sends information about how to reach the database and what it contains to TMC. This information is then added to the Directory of Servers. To put it succinctly, the Directory of Servers is a WAIS database containing descriptive information about all other publicly accessible WAIS databases. "Source" In WAIS lingo, the word "source" actually has two meanings. In a general sense, source is a synonym for the word database. More specifically, a source is a text file used by the WAIS client application that contains information about a specific WAIS database, including how to reach the database (e.g., its domain name, IP address, and TCP port) and a description of what it contains. The content of a source file is generally identical to the entry for that source in the so-called Directory of Servers. If you acquire and install a WAIS client, the software may only include a source file for the Directory of Servers itself. When you connect to the Directory of Servers, you can search for other sources and save them as source files with your client program. "Question" A question is a WAIS query or lookup. The definition seems rather obvious, but WAIS questions have special characteristics. In addition to containing your search expression, the question contains the list of sources (databases) you want to search, and any refinements that you might have made to your query including relevance feedback, a concept we'll talk about in a few moments. Questions, like sources, can be saved as files. Some WAIS clients allow you to automatically run saved questions at specific time intervals to see if any new information is available on your topic. Questions can also be modified. You can add new keywords, new sources, etc., and these modifications also can be saved. So, a question is not just a one-time lookup, but a collection of information that allows you to do the same lookup many times or modify and refine your lookup as you get a better feel for how to search WAIS resources.

How to Access World-Wide Web at Kenyon{21}

From the Library Menu (C LIBRARY) choose option E, then option B. From the Main Menu of the LIBS program choose 5, Wide-area Information Services. You will see WORLDWIDEWEB as c hoice 5 of the next screen. You will be automatically accepted. You may also access WWWS via Gopher servers, or by going directly to CERN (at th e $ prompt enter TELNET INFO.CERN.CH). What is World-Wide Web World-Wide Web (also called WWW or W3) is an information system based on hypertext, which offers a means of moving from document to document (usually called to navigate) within a network of information. Hypertext documents are linked to each other through a selected set of words. For example, when a new word, or a new concept, is introduced in a text, hypertext makes it possible to point to another document which gives more details about it. The reader can open the second document by selecting the unknown word or concept and the relevant section is displayed. The second document may also contain links to further details. The reader need not know where the referenced document is, and there is no need to type a command to display it, or to browse it to find the right paragraph. Crossreferences may be defined in the same document. A collection of documents is a database. If you were reading this document on a hypertext system, instead of this all too short explanation about hypertext, you would have a selectable pointer to a complete hypertext information web with examples and more pointers to other definitions. For instance, in the first document you might read: The WorldWideWeb (W3) is a wide-area "hypermedia" information retrieval initiative aiming to give universal access to a large universe of documents. Selecting hypermedia will display the following explanation for you: WHAT IS HYPERTEXT Hypertext is text without the constraint of linearity. Hypertext is text which contains "links" to other texts. The term was coined by Ted Nelson around 1965. Hypermedia is a term used for hypertext which is not constrained to be text.

Then you can learn more about links and Nelson. Also, special documents (indexes) in the WWW information space can be search for given keyword(s). The result is a document which contains links to the documents found. World-Wide Web uses hypertext over the network: the linked documents may be located at various sites. WWW can handle different text formats and various information organizations. WWW also provides access to many of the other tools described in this guide.

Who Can Use World-Wide Web WWW uses the client-server model to provide access to the information universe. You must be on the international TCP/IP network (the Internet) in order to use a client on your computer to access WWW. How to Get to World-Wide Web Users access the World-Wide Web facilities via a client called a browser. This interface provides transparent access to the WWW servers. If a local WWW client is not available on your computer, you may use a client at a remote site. Thus, an easy way to start with WWW is to access a remote client. Local Clients Usage of a local client is encouraged since it provides better performance and better response time than a remote client. Public domain clients for accessing WWW servers are available for: Macintosh, MS/DOS, VMS, VM/CMS, MVS, NeXT, Unix, X-Window. The clients are available for anonymous FTP from info.cern.ch in the directory pub/www. All these platforms support a simple line mode browser. In addition, graphical clients are available for: Macintosh, Windows, X-Window, NeXT and Unix. Remote clients To access a remote WWW client, telnet to one of the server sites. At the login:prompt enter www, no password is needed. There are many WWW servers already available throughout the network, and the number is growing, so it is not possible to include a comprehensive list here. A server may provide databases on specific topics. The following servers act as demonstration sites: info.funet.fi vms.huji.ac.il info.cern.ch eies2.njit.edu Finland Israel Switzerland USA

CERN is the entry point to find information about WWW itself and to have an overview of the Web with a catalogue of the databases sorted by subject. Using World-Wide Web When using a graphical interface, you access the WWW functions by pressing mouse buttons. In particular, references are highlighted or underlined words. To follow a link, double-click on the associated reference. The line mode browser is a more simple user-interface: references are numbers in square brackets next to words. Type the number and hit the RETURN key to follow a reference. For example, here is the beginning of the Subject Catalogue you get on the CERN server: The World-Wide Web Virtual Library: Subject Catalogue INFORMATION BY SUBJECT See also arrangements by organization[1] or by service type[2]. Mail www-request@info.cern.ch if you know of online information not in these lists.... Aeronautics ex[3] . Astronomy and Astrophysics Astrophysics Bio Sciences[6] Computing[7] Geography ook[8] , iscellaneous information[9] Thai-Yun nan: Davis collection[10] Law [11]. Libraries[12] es etc. Literature & Art[13] Mathematics ). US Copyright law Lists of online catalogu separate list. CIRM library[14] (french Mailing list archive ind Abstract Indexes[4] (unavailable). work at FNAL[5] . separate list . separate list. CIA World Fact B India: M

The International Journal of Analytical and Experimental Modal 1-30 Back, <RETURN> for more, Quit, or Help: The following commands are available within WWW. Some are disabled

when not applicable (eg, FIND is enabled only when the current document is an index). Angle brackets (<>) indicate an optional parameter. Helpgives a list of available commands depending on the context, and the hypertext address of the current document. Manual displays the on-line manual. Quit Up, Down exits www. scrolls up or down one page in the current document.

Top, Bottom goes to the top or the bottom of the current document. Back goes back to the document you were reading before. Home goes back to the first document you were reading. Next, Previous goes to the next or previous document in the list of pointers from the document that led to the current one. Listgives a numbered list of the links from the current document. To follow a link, type in the number. Recall <number> if number is omitted, gives a numbered list of the documents you have visited. To display one specific document, re-issue the command with number. <Find> keyword queries the current index with the supplied keyword(s). A list of matching entries is displayed with possibly links to further details. Find can be omitted if the first keyword does not conflict with another WWW command. Multiple keywords are separated by blanks. Go address goes to the document represented by the given hypertext address, which is interpreted relatively to the current document. World-Wide Web is being developed at CERN (European Particle Physics Laboratory) by the World-Wide Web team leaded by Tim Berners-Lee. Bug reports, comments, suggestions, etc. should be mailed to: www-bug@info.cern.ch On-line documentation is available from info.cern.ch, for anonymous FTP or using the remote WWW client. Mailing lists: www-talk@info.cern.ch To subscribe send a mail to www-talk-request@info.cern.ch Usenet newsgroup: comp.infosystems.www

We would like to express our gratitude to the authors and developers of this tool for making their work available to the networking community. We have consulted their documentation, and the documentation of others, in preparing this guide, and for this we are also grateful. We have used their descriptions and explanations when suitable, but any errors or inaccuracies are the sole responsibility of the EARN staff. Consult the sources listed at the end of the document for specific queries and original detailed information. This document is available from: Send the command: where the filename is either: (plain text) How To Access Archie At Kenyon{22} WWW PS LISTSERV@EARNCC.BITNET GET filename (Postscript) WWW MEMO

From the Library Menu (C LIBRARY) choose option E, then option B. From the Main Menu of the LIBS program choose 5, Wide-area Information Services. You will see ARCHIE as choice 1 of the next screen. At the login prompt type archie (this must be in small letters). You will be aut omatically entered. You may also access ARCHIE via Gopher servers, or by going directly to an ARCHIE site (for example, at the $ prompt enter the following command: TELNET ARCHIE.SURA.NET )

What is Archie Archie is an information system. It offers an electronic directory service for locating information in the Internet network. The best known use of archie is for scanning a database of the contents of more than 1000 anonymous FTP sites around the world. Currently, this database contains more than 2,100,000 file names from anonymous FTP sites. This database is known as the archie database. The files made available at anonymous FTP sites are software packages for various systems (Windows, MSDOS, Macintoshes, Unix, etc.), utilities, information or documentation files, mailing list or usenet group discussion archives. At most FTP sites, the resources are organized hierarchically in directories and subdirectories. The database tracks both the directory path and the file names. The archie database is automatically updated, thereby ensuring that the information is accurate. Using this database, users can easily find the

location of files they need without logging onto several machines. Who Can Use Archie Users on any network can access the archie database by electronic mail. Other means of access are available to users on the Internet (see the section Using ARCHIE below for details). You are requested to respect a few basic rules when you request information from an archie server: avoid connecting during working hours; most of the archie servers are not dedicated machines, they have local functions as well. make your queries as specific as possible; the response will be quicker and shorter. user interfaces installed on your computer contribute to reduce the load on the server sites, please use them. use the archie server closest to you and, in particular, don't overload the transatlantic lines. How To Get To Archie The archie database is maintained in 15 different locations.

archie.au archie.funet.fi archie.th-darmstadt.de archie.doc.ic.ac.uk archie.cs.huji.ac.il archie.wide.ad.jp archie.kuis.kyoto-u.ac.jp archie.sogang.ac.kr archie.nz archie.luth.se archie.ncu.edu.tw archie.ans.net archie.rutgers.edu archie.sura.net archie.unl.net

Australia Finland Germany Great Britain Israel Japan Japan Korea New Zealand Sweden Taiwan USA USA USA USA

There are three ways to access the archie database: via a local client, interactive Telnet session or electronic mail. Each type of access is described below in the Using ARCHIE section. Using Archie The format of the parameters is given at the end of this section. Angle brackets (<>) indicate an optional parameter; a vertical bar (|) indicates a choice of parameters. Using a local client Usage of these clients is encouraged since they provide quick and easy non-interactive access to the archie servers, and thus, better performance of the servers and better response time for the user.

Public domain clients for accessing archie servers are available for: Macintosh, MS/DOS, OS/2, VMS, NeXT, Unix and X-Window. The clients are available for anonymous FTP from the archie sites in the directory archie/clients.

Archie Client Command and Parameters The archie client is a command with parameters that you enter on your local machine. With most versions of the archie client, if you type archie with no parameters, you will get a list of the possible parameters and a short description of each. The format of the command is: archie <-options> string | pattern where the options are: ospecifies an output file name to store the results (not available with all clients). llists the result one match per line. This form is suitable for parsing by programs. tsorts the result inverted by date m#specifies maximum number of matches to return (# within the range 0 to 1000). The default value is 95. harchie_server specifies an archie server to send the query to; if this parameter is not given, then the query will be sent to the default archie server, if one is defined. Llists known servers and current default The following group of options determines the kind of search performed on the database. They are mutually exclusive. sa match occurs if the file/directory name contains string. The search is case insensitive. cas above, but the search is case sensitive. estring must EXACTLY match (including case) the file/directory name in the database. This is the DEFAULT search method. rsearches the database using pattern. It contains special characters which must be interpreted before performing the search. There may be some slight differences in the options available with different clients on different platforms. The result is a list of FTP site addresses with entries matching the argument, the size of the resource, its last modification date and its directory. By default, the list is sorted by host address. See the

Examples section below for an example of archie output. Learning More About Archie However you communicate with the archie server, on-line help is available. If you have any questions about archie write to the Archie Group, Bunyip Information Systems Inc. at info@bunyip.com. Mailing list: archie-people@bunyip.com To subscribe send a mail to: archie-people-request@bunyip.com Archie was developed by Alan Emtage, Peter Deutsch, and Bill Heelan from the McGill University Computing Center, Canada. -----------------------------------------------------------------------This document has been compiled and produced by the EARN Association. Permission to copy all or part of this document without fee is granted provided the copies are not used for commercial advantage and that the EARN Association is cited as the source of the document. We would like to express our gratitude to the authors and developers of this tool for making their work available to the networking community. We have consulted their documentation, and the documentation of others, in preparing this guide, and for this we are also grateful. We have used their descriptions and explanations when suitable, but any errors or inaccuracies are the sole responsibility of the EARN staff. Consult the sources listed at the end of the document for specific queries and original detailed information. -----------------------------------------------------------------------This document is available from: LISTSERV@EARNCC.BITNET Send the command: GET filename where the filename is either: ARCHIE PS (Postscript) ARCHIE MEMO (plain text) Microsoft Windows 3.1{23}

Windows is a "graphical user interface" - a more intuitive and consistent means to interact with a computer. Why use Windows? Ease of use Increased productivity Run several applications at a time Transfer information between applications

Basics of Windows Using the mouse point single-click and double-click selecting/activating programs vs. choosing/opening files

The metaphor of the "desktop" Parts of a window: Control-menu box, Title bar, Menu bar, minimize and maximize boxes, borders, scroll bars (or sliders) opening and closing, maximizing, minimizing, iconizing, and moving windows activating (bringing forward) windows menus: click once to activate, again to choose item Icons what they do (take the place of a DOS command) how they do it (properties) Starting/opening/closing an existing application The future of networked microcomputers running Windows High-speed network connections File servers Application servers Networked databases Microcomputers as Internet nodes Online Public Access Catalog: Searching With the MARC Record in Mind{24}

The following will complement the discussion of searching the online catalog by providing a list of definitions and examples.

ADDED ENTRY * An entry, additional to the main entry by which an item is represented in a catalog. ANALYTICAL ENTRY * An entry for a part of an item for which a comprehensive entry is also made. IN PROCESS A term identifying that a book has arrived at the library, but has not yet been catalogued. To determine if the "not barcoded" catalog record is indeed In Process, press F for the full bibliographic record. A record similar to the one below will give you the In Process Date. If you wish to have the book, please fill out an In Process form available at the Circulation Desk. Call Number: IN PROCESS TS5-20-91 Author: Buddhaghosa. Title: Path of Purification MAIN ENTRY * Complete catalog record of an item, presented in the form by which the entity is to be uniformly identified and cited. MARC RECORD (Machine-Readable Cataloging) A standardized communications format for interchanging bibliographic data on magnetic tape. NOT BARCODED A catalog record barcoded. Please represent a work (SEE: ANALYTICAL

containing the statement "This work has not been ask a librarian for information on its availability.," can that is In Process or an Analytical Entry. ENTRY; IN PROCESS)

ON ORDER The catalog will inform you if a particular title is ON ORDER. The date field seen in the record below is the date that the order was placed. Location Copies ACQ On Order 05/03/1993 1 Status Date

UNIFORM TITLE * 1.The particular title by which a work is to be identified for cataloguing purposes. 2.The particular title used to distinguish the heading for a work from the heading for a different work. 3. A conventional collective title used to collocate publications of an author, composer, or corporate body containing several works or extracts, etc., form several works.

* Definitions borrowed from Anglo-American Cataloguing Rules...2nd ed. 1988. Chicago : American Library Association, 1988.

EXAMPLES 1. A=EINSTEIN|T=BRIEF 2. A=BLACK|T=EXCHANGE MARC Record Examples{25}

Example 1 AUTHOR: UNIF. TTL: TITLE: PUBLISHER:

Einstein, Albert, 1879-1955. [Briefwechsel 1916-1955. English] The Born-Einstein letters; correspondence between Albert Einstein and Max and Hedwig Born from 1916 to 1955. Walker [1971]

AAB-0459

Entered 06/02/1990

Last Modified: 06/02/1990

Type: a Bib l: m Enc l: Desc: Ctry: nyu Lang: eng Mod: Srce: Ill: c Audience: Form: Cont: b Gvt: 1 Fst: 0 Ind: 1 MEB: 1 Fic: 0 Bio: c Dat tp: s Dates: 1971 010; 020; 035; 041; 049; 050; 082; 092; 100; 240; 245; rt ; ; ; ; ; ; ; ; ; ; ; a a a a a a a a a a a 76126107 $ o 00150466 $ 0802703267 $ (CaOTULAS)153334325 $ engger $ KENN $ QC16.E5 $ b A4513 $ 530/.08 $ 530.1 $ b Ei6b $ Einstein, Albert, $ d 1879-1955. $ Briefwechsel 1916-1955. $ l English $ The Born-Einstein letters; $ b correspondence between Albe

1 0 10 00 14

Einstein and Max and Hedwig Born from 1916 to 1955. $ c With commentaries by Max Born. Translated by Irene Born. $ 260; 0 ; a New York, $ b Walker $ c [1971] $ 300; ; a x, 240 p. $ b ports. $ c 24 cm. $ 500; ; a Translation of Briefwechsel 1916-1955. $ 504; ; a Bibliography: p. 235-236. $ 650; 0 ; a Physicists $ x Correspondence, reminiscences,etc. $ 700; 10 ; a Born, Hedwig. $ d 1882-1970. $

Example 2 AUTHOR: TITLE: d of PUBLISHER: Black, Stanley W. Exchange policies for less developed countries in a worl floating rates International Finance Section, Dept. of Economics, Princeton University, c1976. SUBJECTS: Foreign exchange problem--Developing countries. . . . SERIES: Essays in international finance ; no. 119 0071-124X . . . SERIES ADDED ENTRY: Essays in international finance ; no. 119.

AAD-1431

Entered 06/02/1990

Last Modified: 05/25/1992

Type: a Bib l: m Enc l: Desc: i Ctry: nju Lang: eng Mod: Srce: Ill: a Audience: Form: Cont: b Gvt: Fst: 0 Ind: 0 MEB: Fic: 0 Bio: Dat tp: s Dates: 1976 005; 010; 040; 043; 050; 082; 049; 100; 245; 260; of 300; 490; 504; 650; 830; 1 0 0 ; a 19920417095713.0 $ ; a 76028257 //r852 $ o 02388223 $ ; a DLC $ c DLC $ d m.c. $ ; a d------ $)153334325 $ ; a HG136 $ b .P7 no. 119 $ a HG3890 $ ; a 332 s $ a 332.4/5/091724 $ ; a KENN $ ; a Black, Stanley W. $ w cn $ ; a Exchange policies of less developed countries in a world of floating rates / $ c Stanley W. Black. $ ; a Princeton, N.J. : $ b International Finance Section, Dept. Economics, Princeton University, $ c c1976. $ ; a 48 p. : $ b ill. ; $ c 23 cm. $ ; a Essays in international finance ; no. 119 $ x 0071-124X $ ; a Bibliography: p. 42-43. $ ; a Foreign exchange problem $ z Developing countries. $ ; a Essays in international finance ; $ v no. 119. $

0 1 10

Online Public Access Catalog: Limiting by Date, Media, or Language{26}

The following describes how to limit an author, title, or subject search by dat e, media, or language and also

provide some examples. Types of Limits When an online catalog search retrieves an overwhelming number of responses, the search may be limited by the following: Date ...... enter a specific year (range is not available) Media ...... books, serials, musical scores, audiovisual materials, prose recordings, or music recordings Language ... for example Chinese, English, French, German, Greek, Italian, Japanese, Latin, Middle English, Spanish

How to Limit a Search To limit a search, at the >> prompt type LIMIT and press the <Enter> key; instructions on how to enter limits will follow. (Please note that this limit capability cannot be used with the Keyword Search option.) A limit may also be placed along with the initial search. Separate the initial search and limit terms with a vertical bar (|). A=CAMUS|LA=FRE For Date, enter For Language, enter For Media, enter |LA= |D= A=CAMUS|D=1990 A=CAMUS|LA=FRE |M= A=CAMUS|M=AM

Limits may be combined. A=CAMUS|D=1990|LA=FRE|M=AM

Codes for Limiting by Media and Language By Media The codes for limiting by media type are: AM AS GM JM IM CM for monographs for serials (periodicals) for audiovisual media (videotapes, films) for musical recordings (records, cd's) for spoken-word recordings (poetry, plays) for musical scores

By Language The codes for limiting by language are usually the first three letters of the language, with the following exceptions: GRC (Greek, Classical to 1453)

JPN (Japanese) ANG (Old English, 600-1100) ENM (Middle English, 1100-1500) FRO (Old French, 842-1400) Online Public Access Catalog: Searching For Video Recordings{27}

The following explains how to limit an online catalog search for video recording s.

When searching the online catalog for video recordings, it is recommended that the key-word search option be used. Key-word searching will find those videos addressing a particular subject, but lacking a subject heading. Access the Key-word Search screen by typing K at the >> prompt. To retrieve all video recordings, type FI VIDEO? at the >> prompt. A key-word, author, title, or subject search may be used to limit the search. FI VIDEO? AND TI MIDSUMMER NIGHT'S DREAM FI VIDEO? AND (TI AIDS OR SU AIDS DISEASE)

Please note, a video recording search will find commercially-made videos, Kenyon-made videos, and laser discs. Library Services Menu{28}

Functions of the Library Services Menu as of June 7, 1993 From the Main A B C D E Menu The Kenyon College Public Access Catalog Public Access Catalog Tutorial Library Floor Plan About the Library Internet Access to Other Library Catalogs and Information Services F - Place Inter-Library Loan Requests G - Send Questions to Library Staff via Electronic Mail H - Edit Personal Registration Information

From Choice B of the Main Menu A - Take the Whole Tutorial

B C D E F G H I

How to Search for an Author How to Search for a Title How to Search for a Subject How to Limit a Search by Date, Media, or Language How to Find Related Items The Full Bibliographic Record How to do a Keyword Search What's NOT in the Catalog? of the Main Menu Library Hours Library Fines and Fees Schedule Library Floor Plan Professional and Administrative Staff The Library of Congress Classification List About the Library of Congress Conversion Project

From Choice D A B C D E F -

From Choice E of the Main Menu A - Search the Directory of Selected Electronic Information Resources B - Search Other Library Catalogs and Information Services C - Display the List of Internet Discussion Groups D - Search the Ohio State University Catalog (Includes the State Library of Ohio) E - Search the Denison University Library Catalog F - Search the OHIOLINK Combined Catalog G - Search the Cleveland Public Library Catalog (Includes the Cleveland Freenet) Directory of Selected, Electronic Information Resources (IR Menu){29}

This Directory is intended to point the user to selected information sources in electronic format some available in the Olin & Chalmers Libraries, others via connections over the Internet. The sources are arranged by academic discipline and some entries may be included und er more than one discipline. Accessing the IR Menu To access the IR Menu, choose option A under "Internet Access to Other Library C atalogs and Information Services" found on the Library User Services Main Menu. Please read any instructions that are given for each service. Please use the mai l option in the Main IR Directory to place comments or questions. Resources Available on the IR Menu Reference Concise Oxford English Dictionary, 8th Edition. (1991). [NET] Oxford Thesaurus. [NET]

CIA World Fact Book, 1992 Edition [NET] Library Reference Plus on CD-ROM [INFOLAB] Books in Print on CD-ROM [INFOLAB] ERIC (Educational Resources Information Clearinghouse) [NET] Directory of Scholarly Electronic Conferences [MENU] Journal Graphics (television and radio transcripts) [NET] Dialog Information Services [DIALOG] Newsletters/Journals/Books ACADEME THIS WEEK (The Chronicle of Higher Education) [NET] EDUPAGE (EDUCOM) [FILE] Electronic Journals [NET] Electronic Books [NET] United States Government Documents Government Printing Office Publications Catalogue on CD-ROM [INFOLAB] NESE: National, Economic, Social, and Environmental Data Bank [INFOLAB] 1990 Census of Population and Housing, U.S. Summary [INFOLAB]

American Studies America: History & Life on CD-ROM [INFOLAB] Arts: Art and Art History/Performing Arts Music Library on CD-ROM [INFOLAB] Dance Collection Catalog (New York Public Library) [NET] Plays Index [NET] Asian Studies Hawaii Pacific Index [NET] Biology EnviroGopher [NET]

Chemistry Periodic Table of Elements [NET] Classics Thesaurus Linguae Graecae & Latin Text on CD-ROM [INFOLAB] Bryn Mawr Classical Review [NET] Economics EconLit on CD-ROM [INFOLAB] Statistical Master File on CD-ROM [INFOLAB] NESE: National, Economic, Social, and Environmental Data Bank [INFOLAB] 1990 Census of Population and Housing, U.S. Summary [INFOLAB] Economic Bulletin Board (Economic and Trade Information) [NET] English Modern Language Association Int'l Bibliography on CD-ROM. [INFOLAB] The Complete Works of Shakespeare. [NET] Shakespeare Plays/Sonnets (Dartmouth). [NET] Plays Index. [NET] History America: History & Life on CD-ROM [INFOLAB] Historical Abstracts on CD-ROM [INFOLAB] Historical Documents (Full text of selected documents) [NET] HNServer (The Central Information Server for Historians) [NET] International Studies CIA World Fact Book, 1992 Edition. [NET] PAIS (Public Affairs Information Service) International [KI] Pakistan News [NET] Muslim News [NET] ABSEES (Amer. Bibliography of Slavic & East European Studies) [NET]

Hawaii Pacific Index [NET] Mathematics e=MATH [NET] Modern Languages and Literature Modern Language Association Int'l. Bibliography on CD-ROM [INFOLAB] Dartmouth Dante Database [NET] Philosophy American Philosophical Association Bulletin Board [NET] Philosopher's Index [KI] Physics Physics Preprints [NET] Los Alamos Physics Information Services [NET] Political Science CIA World Fact Book, 1992 Edition. [NET] PAIS (Public Affairs Information Service) International [KI] White House Press Release Service [NET] White House Electronic Documents [NET] Psychology PsycLit on CD-ROM [INFOLAB] Religion Religion Index [KI] Muslim News [NET] Contents (Religious Studies Journal) [NET] Sociology Sociological Abstracts [KI] PAIS (Public Affairs Information Service) International [KI]

Women's and Gender Studies Women's Studies Files [NET] Weather University of Michigan Weather Underground [NET] Some Currently Available Electronic Texts as of June 1, 1993{30}

Following is a list of electronic texts which are currently available on OES.ORS T.EDU. Most of the texts are available in plain text format, but can be converted to other formats. Many of the texts are courtesy of Project Gutenberg, an organization whose goal is to develop a library of 10,000 public domain electronic texts by the year 2000. To Retrieve the Documents To retrieve these documents, send the following request to almanac@OES.ORST.EDU: > send etext <topic> <file>

Where <topic> is the optional sub-topic and <file> is the file name. If you wish to ftp these documents, they are available on OES.ORST.EDU in `/pub/data/etext'. Since Almanac can format documents dynamically, you may not find the desired format in /pub/data/etext. If it is requestable through Almanac (i.e. it is listed below) and you would like to retrieve it via ftp, put the following line before other requests in your e-mail to almanac: > mode spool

This will format all requested documents and spool them in `/pub/spool'.

List of Electronic Texts Topic: Title: File: Title: Topic: doyle The Complete Sherlock Holmes Mysteries koran The Holy Koran mansfield

Title: The Works of Katherine Mansfield Abstract: These texts are the works of Katherine Mansfield. All works are in plain text format. File: moby.tar Title: Moby Dick Author: Herman Melville Topic: shakespeare Title:The Unabridged Works of Shakespeare Abstract:These texts are The Unabridged Shakespeare, provided courtesy of Moby Lexical Tools. All works are in plain text format. Topic:yeats Title:The Works of William Butler Yeats Abstract:These texts are the works of William Butler Yeats. All works are in plain text format. File:aesop Title:Aesop's Fables Author:Aesop (tr. by George Fyler Townsend) Version:1.0 File:aesopa Title:Aesop's Fables Author:Aesop Version:1.0 File:alice Title: Alice's Adventures in Wonderland Author:Lewis Carroll Version:2.9 File: bible Title: The Holy Bible Version:1.0 File:break Title: Hymn Of Breaking Strain Author: Rudyard Kipling File:civil Title:Civil Disobedience Author:Henry David Thoreau File: crisis Title: "Producing the Proper Crisis" speech Author: Philip Agee File: crowd Title:Far From the Madding Crowd Author:Thomas Hardy Version:1.3 File:declar Title:United States Declaration of Independence

File:desert

Title: Address to the Nation, Jan 16, 1991 Author:George Bush File: dict Title: Dictionary File: douglass Title: The Narrative of the Life of Frederick Douglass, An American Slave Author: Frederick Douglass Version: 1.0 File: Title: Author: File: Title: Version: File: Title: Author: File: Title: Author: File: Title: Author: File: Title: Author: File: Title: Author: File: Title: Author: Version: File: Title: Version: File: Title: Author: dream "I Have a Dream" speech Martin Luther King, Jr. feder The Federalist Papers 1.2 flatland Flatland Edwin A. Abbott fox-in-socks Fox in Socks Dr. Seuss green-eggs Green Eggs and Ham Dr. Suess grimm Grimm's Fairy Tales The Brothers Grimm heart Heart of Darkness Joseph Conrad hisong The Song of Hiawatha Henry W. Longfellow 1.2 jargon The Jargon File 296 kama-sutra The Love Teachings of Kama Sutra Vatasyayana (tr. by Indra Sinha)

File: Title: Author: Version:

lglass Through the Looking Glass Lewis Carroll 1.6

File: Title: File: Title: Author: File: Title: Author: File: Title: Version: File: Title: Author: Version: File: Title: Author: Version: File: Title: Author: File: Title: File: Title: Author: Version: File: Title: Author: File: Title: Author: Version: File: Title: Author: Version: File: Title: Author: File: Title: Author: File:

magna The Magna Carta mandrew M'Andrew's Hymn Rudyard Kipling martha The Sons of Martha Rudyard Kipling mormon The Book of Mormon 1.3 oedipus The Oedipus Trilogy Sophocles 1.0 opion O Pioneers! Willa Cather 1.1 paradise-lost Paradise Lost John Milton peru-const Peru Constitution peter Peter Pan James M. Barrie 1.4a pilgrim A Pilgrim's Way Rudyard Kipling plboss Paradise Lost John Milton 1.1 (transcribed by Judy Boss) plrabn Paradise Lost John Milton 1.1 (transcribed by Joseph Raben) pride Pride and Prejudice Jane Austen problem LSD: My Problem Child Albert Hofmann rights

Title: File: Title: Version: File: Title: Author: Version: File: Title: Author: File: Title: File: Title: Author: File: Title: Author: File: Title: Author: File: Title: Author: File: Title: Author: File: Title: Author: File: Title: File: Title: Version: File: Title: Author: Version: File: Title: Author:

United States Bill of Rights roget Roget's Thesaurus (1911) 1.3 snark The Hunting of the Snark Lewis Carroll 1.2 starwars Star Wars IV: A New Hope George Lucas taiwan-const Taiwan Constitution terance Terance, This Is Stupid Stuff A. E. Houseman thinketh As A Man Thinketh James Allen treason No Treason: The Constitution of No Authority Lysander Spooner trek-anim Star Trek Episode Guide (animated series) Saul Jaffe trek-orig Star Trek Episode Guide (original series) Saul Jaffe trek-tng Star Trek: The Next Generation Episode Guide Saul Jaffe us-const United States Constitution uscen90 United States Census, 1990 1.1 world90 The World Fact Book (1990) Central Intelligence Agency 1.2 world91a The World Fact Book (1990) Central Intelligence Agency

File: Title: Author: File: Title: Author:

wuther Wuthering Heights Emily Bronte xmas The Night Before Christmas Clement Clarke Moore

For more information about the Almanac information server, send: > send guide

Directory of Electronic Journals and Newsletters{31}

************************************************************* *** *** *** Directory of Electronic Journals and Newsletters *** *** *** *** EDITION 2.1 - July 1992 *** *** *** *** Compiled by: *** *** Dept. Re ligious Studies *** *** Michael Strangelove 177 Waller, *** *** CONTENTS Project Director Ottawa, Ontario *** *** University of Ottawa Canada K1N 6N5 *** *** (441495@Acadvm1.UOttawa.CA) VOICE: (613) 237-2052 *** *** (441495@UOTTAWA) FAX: (613) 564-6641 *** ************************************************************* This project was made possible through funding from the Research Centre for the Study of Religion, Department of Religious Studies, University of Ottawa. N.B. - This Directory is intended for free dissemination as long as this header remains intact. The compilation as a whole is Copyright (C) by Michael Strangelove, 1991. All rights reserved. Permission is hereby granted for noncommercial use by electronic bulletin board/conference systems, individua ls and libraries. All commercial use requires the permission of the author. The Association of Researc h Libraries is the only authorized not-for-profit distributer of print copies of the Directory of Electr onic Journals and Newsletters.

To obtain a printed version of the Directory, contact: Office of Scientific & Academic Publishing Association of Research Libraries 1527 New Hampshire Avenue, NW Washington, DC 20036 USA ARLHQ@UMDC.Bitnet (202) 232-2466 (voice) (202) 462-7849 (fax) Contributions and corrections to this directory should be sent to Michael Strang elove (441495@Acadvm1.UOttawa.CA) and MUST be in the following format (use as much spa ce as necessary): TITLE: ISSN #: Description: To Subscribe: Submissions: Related List: Periodicity: Back Issues: Contact: Introduction The Directory of Electronic Journals and Newsletters is intended to provide a comprehensive listing of all electronic journals and newsletters which are of academic interest and available through Bitnet, Internet and any affiliated networks. This Directory is part of an ongoing project and is updated as new electronic journals and newsletters come into existence and as existing entries are changed. Every effort has been made to provide the user with up-to-date information. Most entries have been either provided from or scrutinized by the journal and newsletter editors themselves to assure accuracy. The primary intent of this Directory is to catalog all existing electronic journals and newsletters that are available over the various academic networks. A secondary intention is to catalog all e-serials that are being produced over the commercial networks. Thus, over time this Directory will provide an entirely comprehensive listing of all e-serials. As the traditional taxonomy of "journal" and "newsletter" is ill-suited to the diversity of formats found within the networks, a third category of "Hypercard Stacks, Digest-Newsletters and Others" (Section 4) is here included. This section catalogs hypercard stacks and other formats that represent significant sources of information that are similar in nature to journals and newsletters. It should be noted that digests which are straightforward collections of conversational questions and answers are considered to be a type of list, but any digests which mix a simple list format with the newsletter format are here included. Ordinary (conversational) digests and lists are covered in Diane Kovacs' compilation, Academic Lists. Thus, no attempt has been made to provide a comprehensive listing of the hundreds of existing digests in this Directory. For a complete catalog of digests and lists the reader is encourage to retrieve the Global List with the command: (if any) (via Bitnet and Internet) (whom to sent submissions to and in what form) (how to subscribe to a related list, if any) (how to access them) (for more information)

TELL LISTSERV AT NDSUVM1 GET INTEREST PACKAGE Or through FTP to 192.33.33.22 (NISC.SRI.COM) GET /netinfo/interest-groups Warning - this file will be sent to you in twelve or more sections and is over 500K in size. The philosophy behind the presentation of the information within this Directory is based on the intention of providing the reader with the most up-to-date information that is possible and in the most comprehensive fashion. Thus, I have avoided editing descriptions as size is not a factor for an e-text. I have also listed partial entries in the interest of providing the reader with the maximum of available information (these incomplete entries will be marked as such). This makes it possible for the reader to follow leads I have not yet completed and, in turn, to provide me with information not yet represented in the latest edition of the Directory. Users of this document are encouraged to sent me notices of defunct entries, new entries and related information and suggestions. By this means I hope to utilize fully the best features of the Net and to make information available in a fashion that draws upon and promotes the unique strength of the virtual community. Journals and Newsletters Electronic Journals Active Journals{32} Art Com Contemporary art and new communication technologies] ArtsNet Review Contemporary cross-cultural, arts and electronic networking issues Bryn Mawr Classical Review ** CATALYST: The Community Services Catalyst Community college educators CORE A literary journal for short fiction, poetry, and essays DargonZine Dargon Project fiction anthology The Distance Education Online Symposium ** EJournal Implications of electronic documents and networks The Electronic Journal of the Astronomical Society of the Atlantic ** Electronic Journal of Communication/La Revue Electronique de Communication (EJC/REC) Communication theory, research, practice, and policy Fineart Forum Application of science and technology to the contemporary arts and music ** Flora Online Systematic botany Intertext An electronic fiction digest IOUDAIOS Review Reviews in Early Judaism and Christian origins Issues In Science and Technology Librarianship $** Journal of the International Academy of Hospitality Research Journal of Technology Education

LIBRES (Library and Information Science Research Electronic Conference) MeckJournal A monthly from Meckler Publishing ** New Horizons in Adult Education NetWeaver Offline Computers in religious studies Online Chronicle of Distance Education and Communication The Public-Access Computer Systems News **The Public-Access Computer Systems Review Pigulki News and humor relating to Poland and Polish issues ** Postmodern Culture ** PSYCOLOQUY Quanta Science fiction and fantasy ** RD: Graduate Research in the Arts The Religious Studies Publications Journal - CONTENTS Socjety Journal Alumni journal of the Technical University of Wroclaw, Poland SOLSTICE: An Electronic Journal of Geography and Mathematics TeXMaG (TeX Typesetting System) TeX Publication Distribution List Textual Studies in Canada

Electronic Newsletters Access ACQNET (The Acquisitions Librarians Electronic Network) ALCTS Network News (AN2 - The Association of Library Collections and Technical Services) American Psychological Association's Research Funding Bulletin Arts Wire News Automatome BEN (Botanical Electronic News) Between the Lines Buffer CANOPUS Magazine CCNEWS CERFNet News ChE Electronic Newsletter (Chemical Engineering) Christian Growth Newsletter Class Four Relay Magazine Computer Science Center Link Computing and Telecommunications Newsletter Computists' Communique Consortium Update Cosmic Update CPSR/PDX Newsletter (Computer Professionals for Social Responsibility) CRTNet - Communication Research and Theory Current Cites DDN MANAGEMENT BULLETIN DECNEWS for Education and Research DevelopNet News Deutschland Nachrichten Digit Digital Games Review Disaster Research

Donosy Drosophila Information Newsletter EFFector Online (The Electronic Frontier Foundation, Inc.) Electronic AIR Electronic Hebrew Users Newsletter Energy and Climate Information and Exchange (ECIX) Newsletter and Digest Energy Research in Israel Newsletter Erofile Ethnomusicology Research Digest Fine Art, Science and Technology News (F.A.S.T. News) FARNET Gazette GLOSAS News (GLObal Systems Analysis and Simulating Association) GNU's Bulletin (Newsletter of the Free Software Foundation) HICNet Newsletter (Mednews - Health Infocom Newsletter History and Analysis of Disabilities Newsletter Hot Off the Tree (HOTT) Impact Online International Voice Newsletter Prototype List IS P.O.B. Bulletin YSSTI (Yugoslav System for Scientific and Technology Information) Laboratory Primate Newsletter Law and Politics Book Review Leonardo Electronic News Link Letter List Review Service MAB Northern Sciences Network Newsletter Machine Readable Texts News Material Science in Israel Newsletter MichNet News MICnews NEARnet Newsletter Network Audio Bits and Audio Software Review NetMonth Net-News Newsbrief Newsletter on Serials Pricing Issues Newsline (Comserve) News of Earth NIBNews - A Monthly Electronic Bulletin About Medical Informatics NLSNews Newsletter Old English Computer-Assisted Language Learning Newsletter (OECALL) Output Political Analysis and Research Cooperation (PARC) News Bulletin Principia Cybernetica Newsletter Prompt The Purple Thunderbolt of Spode (PURPS) Research and Educational Applications of Computers in Humanities (REACH) Rezo, bulletin irregulomadaire du RQSS $ St. Petersburg Business News SCUP Bitnet News (Society for College and University Planners) SCUPMA-L (Society of College and University Planners, Mid-Atlantic Region) Sense of Place South Florida Environmental Reader $ The Teleputing Hotline And Field Computing Source Letter Teiresias THINKNET (Electronic newsletter on philosophy, systems theory, interdisciplinary studies, and thoughtful conversation in cyberspace) TitNeT -- Titnews -- Titnotes VapourWare

ViewPoints (Newsletter of the Visual Communication Division of the Association for Educators in Journalism and Mass Communication [AEJMC]) The Week in Germany

How To Retrieve This Directory From Networked Sources The Directory is currently available in ASCII text from the following locations: CONTENTS PROJECT Listserv Fileserver

Send the following commands as an e-mail message to listserv@uottawa (BITNET) or listserv@acadvm1.uottawa.ca(Internet) GET EJOURNL1 DIRECTRY GET EJOURNL2 DIRECTRY (Please note the spelling carefully) Comserve

NB - The name of the Directory files changes to EJournal1 Sources and EJournal2 Sources on the Comserve fileserver. Send an electronic mail message to Comserve@Rpiecs (Bitnet) or Comserve@Vm.Ecs.Rpi.Edu (Internet) with the following command appearing on the first line of the message: Send EJournl1 Sources Send EJournl2 Sources No other words, punctuation, or symbols should appear in the electronic mail message. Comserve is an automated system for file retrieval; it will acknowledge receipt of your message and let you know that the files have been sent to you. Electronic Journal Exercise{33}

Each class member will be asked to Gopher to one of the following sites. Once c onnected, follow the menu choices indicated. Please be prepared to report to the class on what you have fo und. Exercise 1. 2. 3. 4. 5. Ucsbuxa.Ucsb.Edu Ds.Internic.Net Mirage.Acs.Ohio-State.Edu Infoslug.Ucsc.Edu Fedix.Fie.Com 8/1 7/4/choose any 8/2 Menu Selections 3/5/13/select a letter skip

6. 7. 8. 9.

Gopher.Uiuc.Edu Dewey.Lib.Ncsu.Edu Envirolink.Hss.Cmu.Edu Orion.Lib.Virginia.Edu 9/3 skip 7/6/2 5/3

10/10/choose any

7/8

10. Una.Hh.Lib.Umich.Edu 11. Joeboy.Micro.Umn.Edu 12. Mentor.Lanl.Gov 13. Info.Rutgers.Edu 14. Sunsite.Unc.Edu a book report!] 15. Gopher.Unt.Edu 16. Info.Umd.Edu 17. Gopher.Virginia.Edu 18. Gopher.Denet.Dk 19. Gopher.Th-Darmstadt.De 20. Gopher.Isnet.Is 21. Gopher.Chalmers.Se 22. Chronicle.Merit.Edu 34}

18/3/1 7/4/3/1 10/7/1/7 [please prepare 6/7/1 7/2 10/3/10/2/5/5 11/1 skip 10/2/10/8/choose any 5/3/2/15/1/1 you're there!Multimedia{

Definitions Multimedia the integrated presentation of textual, audio and video information, usually mediated by a microcomputer Interactive multimedia a multimedia presentation in which the learner is given the opportunity to affect the course of the presentation, even to the extent of changing the presentation for subsequent learners Application another term for computer program. File formats different types of material - text, graphics, audio, video - are stored on the computer in different formats. There are standards (sometimes more than one) for each type of file format. Thus, sound files are often stored as .WAV files ("waveform"); static graphic images as .BMP files ("bitmapped"), video sequences as .AVI files ("audio/video

interleaved"), or animations stored as .FLI files ("flicks"). Specific programs exist to edit, display, play or view each type of file format; a multimedia application can work with several file formats at once. Computer animations graphical and often textual materials that are animated on screen. Most animations, created using computer programs, are twodimensional, however some programs are capable of creating highresolution, shaded and 3-D computer images. Computer simulations computer-based models of real-world events and situations, most of which allow the learner to change critical parameters in the model for purposes of exploring the model. Sophisticated simulations allow the learner to make decisions and experience situations which may otherwise be too dangerous or costly. CD-ROM a compact disc which stored digital data instead of audio tracks. ROM stands for "read only memory" since most computers can only read the CD-ROM disc. Each disc contains approximately 600 megabytes of information. Videodisc a storage device much like a CD-ROM but physically larger and capable of storing more information than a CD-ROM. Videodisc players can be controlled by a computer to present audio and video information in a multimedia presentation. Because of the expense of creating videodiscs and the declining costs of other digital storage media, videodiscs are no longer the storage device of choice. Scanner a device which operates much like a photocopier but which stores the scanned document as an image. If the scanned image contains text, a program for "optical character recognition" can be used to convert the image of text into editable text for a word processor.

Examples of Multimedia and Related Applications in Several Disciplines: Video for Windows, by Microsoft. a utility which can capture, display and edit video sequences (and synchronized audio tracks) which are stored on a microcomputer's hard drive. Encarta, by Microsoft. a multimedia encyclopedia with three sections: The Encyclopedia with 25,000 topics, The Atlas of global maps in detail, and The Timeline. Clinton, Portrait of a Victory, created by San Anselmo (Californiabased Amazing Media). an interactive CD-ROM which documents Bill Clinton's private moments, profiles the politician, and details the cross-country bus trip while campaigning for President. Multimedia Beethoven: The Ninth Symphony, by Microsoft.

a CD-ROM based program which presents each of the four major movements of the symphony, describes the times in which Beethoven lived, explains music concepts with examples from the Ninth Symphony, and a close reading of the symphony in which the learner listens to the movements with textual annotation. Tough Choices: Ethics, the Elderly, and Life-sustaining Technologies Using video dramatizations, this PC-based videodisc lets health care providers explore the ethical and legal issues of life-sustaining technology. Oxford English Dictionary a CD-ROM that contains all the words in the English language (more than half a million). Includes their meaning, derivatives, and how they have been used over the years. Aids Roulette, created by San Francisco's Exploratorium Science Museum. a program that educates players by letting them explore the odds of contracting the disease. Players input their sexual orientation, use of condoms, intervenous drug use, and if so, whether needles are cleaned. The Presidents, created by the National Geographic Society. lets users explore the connections between U.S. chief executives and the times in which they lived. Included are slide shows of photos, drawings and paintings, audio clips, short movies of speeches and other events. Timeline: Understanding the Los Angeles Riots, by the New England Technology Group. an interactive CD-ROM project which presents mini-documentaries comprised of broadcast news footage. The objective is to educate the user so they can draw their own conclusions. Have You Seen Me?, created by The National Center for Missing and Exploited Children. an application that uses text, audio, and visual data (photos, recordings, and home videos) in packets for easy transmission throughout a telephone network. The network will supply agencies with up-to-data, computer age-progressed "wanted posters" of missing children at the touch of a button and transmit home video of a child or alleged abductor to help in identification by law enforcement. Cinemania, by Microsoft. a CD-ROM-based multimedia application with movie listings for 19,000 films, biographies on 3,000 film personalities and topical articles on subjects relating to film, such as directing, special effects, histories of studios. The program allows the user to annotate each film or biography with their own comments. Seven Days in August a CD-ROM based program that focuses on the week leading up to the construction of the Berlin Wall, August 10-16, 1961. The user

can choose their own track through the sections on the Berliners, biographies the "Home Front" (US media's record of electronic roundtable, a discussion by

material which includes of Kennedy and Krushchev, the events) and an five political analysts.

Photo CD Viewer, by Kodak. a simple image management application which allows the user to keep track of hundreds of high-quality images stored on a CDROM through Kodak's new Photo CD process. Power Japanese covers the basics of the Japanese language and teaches the country's business etiquette. It teaches how to write, pronounce, and recognize Katakana and Hiragana phonetic syllables, and how this fits into the structure of the language.

Requirements for Multimedia Applications Multimedia applications require a high-performance microcomputer (for example, a computer based on the Intel i486 chip). Additionally, multimedia presentations normally require a fast CD-ROM drive, a large hard drive, and at least 4 megabytes of main memory. Most modern multimedia applications run under Microsoft Windows and are best viewed at Super VGA resolution (800 X 600 pixels on the monitor, or higher resolution). Courseware{35}

Definitions Courseware any computer program which has been developed for instruction; a combination of the words course and software. Authoring tools computer programs which make it possible to create and modify other programs; a specialized type of "computer-aided software engineering" which greatly simplify the process of developing new programs Content specialist an individual with specialized knowledge in a field but one who may or may not have the experience or skills to design and implement courseware. Hypertext a method of "linking" related textual materials without the constraint of linearity. Hypertexts allow the learner to browse through complex texts by following different paths. Hypermedia non-linearly linked materials as in hypertexts but not restricted to textual material. Can include graphics, audio, video and text. CAI

Computer-Aided Instruction. The old model for using computers to instruct, using the computer as an electronic page-turner. Often called "drill and kill." Minimally effective for most applications, especially by today's standards which include personal interaction with multimedia materials.

Key Issues for Courseware Development in Academia What Resources are Required to Create Undergraduate-Level Courseware? In 1989, it was estimated that it took 200 hours of design and programming effort to develop one hour of courseware presentations. Since then, new courseware authoring tools have been developed which have reduced the time needed to develop materials and which have made it possible for content specialist themselves - with little or no programming experience - to create courseware materials. With five to ten hours of introduction to most modern courseware authoring tools, most non-programmers should be able to create one hour of new courseware for every five hours spent designing and linking the content material. What about Hardware and Software Standards? Hardware and software standards are a critical component in a successful plan for courseware development. The broad objective is to provide easy access to the materials to students. If students confront a maze of different computing systems, different interfaces with different rules for running programs, most of their time will be spent learning the tools rather than the content. Standards also help create a local knowledge base to promote and support further development. What Incentives are there for Faculty to Design and Implement Courseware? Courseware can be just as effective as the printed word, if not more so, in communicating scholarly work, so should the time spent in courseware development be counted toward tenure and promotion? Many new textbooks are accompanied by software to supplement the text. Should this be peer-reviewed and included in the faculty evaluation process? What role is played by other incentives to create curricular materials with technology, such as Kenyon's Academic Computing Award program?

Some Examples of Courseware Authoring Tools Authorware Professional a Windows program from Macromind which uses a graphical interface to create flow diagrams that represent varied pathways through course materials ToolBook, by Asymetrix.

a Windows program which emphasizes a scripting language to create the flow through course materials. Programs developed with ToolBook are called "books." Guide the first commercial hypertext program, originally written for DOS computers, now a Windows application that includes multimedia links. HyperCard the Macintosh hypertext program that was distributed freely by Apple Computer. Tens of thousands of HyperCard "stacks" (or programs) were written in the public domain as a result of the open distribution of HyperCard. Wincraft Converter a Windows program which converts Macintosh HyperCard stacks into ToolBook programs that run under Microsoft Windows.

Examples of Courseware Legacy of Graphic Design a ToolBook application which examines the lives and work of many late nineteenth and twentieth century graphics artists, with examples of their work and biographies. Neurosim, created by Art Leccese with Andy Stone. a series of computer-created 3-D animations illustrating the biochemical activities at the junction between two nerves. Cruise the Internet, developed by Merit. a basic guide to the Internet, the firm that manages parts of the Internet for the National Science Foundation. English Poetry an interactive database of all English poets from the year 600 to 1900. This programs allows the learner to use many search strategies, to review biographic information about each poet, and browse each poet's work. MapInfo a program to manage existing maps as well as to create new maps, and link the information to databases such as US Census data, historical information, environmental characteristics. ToolBook "books", converted from HyperCard stacks. hypertext programs in Islamic History, Shakespeare's Macbeth, Sonnets - just a few examples of what can be converted from the Mac to Windows environment. SEEN, Tutorials for a networked program procedures they use material. Students comments. Critical Reading that guides learners through the critical in their study of their own and other's written can read each others work and add their own

Conflict and Cooperation-War Games

a program which allows several users to interact with one another over a computer network to experiment with the relationship between conflict and cooperation. Quotemaster a indexed database of quotes which can be quickly searched and clipped into other documents.

Fugawiland a computer simulation which gives the learner experience in sampling and interpreting archaeological data. The Complete Political Science Simulation Library a series of six programs which introduces a body of substantive material in American government and provides decision -making experience in conditions of limited information. Students use variable levels of resources to "purchase" information; an important part of the strategy is in careful choice of which information to gather. Includes programs on political redistricting, legislative coalition building, political campaigning, the judicial process, presidential popularity and public opinion polling. Finale a Windows programs for must transcription, scoring, playback and professional publishing. Music can be entered through a MIDI keyboard or through the keypad and mouse; music can be played back through any MIDI instrument. Junior Year Abroad an intercultural simulation package to help student learn about the importance of non-verbal communication. Grammatik a rule-based grammar checker which is now part of WordPerfect for Windows. Rules can be customized to accommodate different styles of writing; the program interactively checks and reports deviations from the rule set selected. Boolean Searching Search Strategies HELPHELPHELPHELPHELPHELPHELPHELP{36}

I GOT NO HITS! WHAT AM I DOING WRONG??? Have I chosen the right database? Have I been too specific in formulating the search? Has there been anything done on this topic? Is there any literature to search? Have I included all possible terms and word forms? Should I truncate?

Was Boolean Logic used correctly? Did I make a technical error, e.g., spelling or command syntax? Should I search free text (natural language)? Where's the Librarian?

I GOT A BILLION HITS! HOW CAN I WHITTLE THIS DOWN? Delete less specific synonyms and ambiguous terms. Use controlled vocabulary. Search fewer subject fields, e.g., just the descriptor field not the full text, abstract, title. Add additional facets with AND or NOT. Add restrictions, e.g., date of publication, type of publication, language, etc. Find a Librarian. CD-ROM Databases

The following is a list of CD-ROM databases found in the infolab of the Olin and Chalmers libraries. 1990 Census of Population and Housing, U.S. Summary. United States Bureau of the Census. This database contains population and housing statistics for the U.S. as a whole, for states, and for sub-areas with populations over 10,000. Compact discs for other geograph ical areas are available in the Government Documents Department. America: History and Life. ABC-Clio Company. 1982 to present. Bibliographic citations and abstracts covering the historical literature of the U nited States and Canada from prehistoric times to the present. Sources include journals, book s, dissertations, and book reviews. Books in Print. R.R. Bowker Company. Updated Monthly. A listing of books currently published or distributed in the United States and so on-to-be released titles from "Forthcoming Books". The names and addresses of book publis hers are also available. Econlit. American Economic Association. 1969 to present. Bibliographic citations covering the literature of economics as found in journals , books, and collective volumes. Entries are compiled from the Journal of Economic Literature and the Index of Economic Articles.

GPO Online. Government Printing Office. 1976 to present. Bibliographic citations corresponding to the Monthly Catalog of the U.S. Governm ent Publications, the Periodical Supplement, and the U.S. Congressional Serial Set S upplement. Topics include finance, public health, business, and agriculture. Historical Abstracts. ABC-Clio Company. 1987 to present. Bibliographic citations and abstracts covering the historical literature of the w orld (sans United States and Canada) from 1450 to present. Topical areas covered: political , diplomatic, military, economic, social, cultural, religious, and intellectual history, as we ll as the history of science, technology, and medicine. Sources include journals, books, and disserta tions. INFOTRAC: Expanded Academic Index. Information Access Company. 1990 to present. Bibliographic citations covering a wide variety of topics, including, but not lim ited to, current events, ethnic & minority studies, general science and religion. Sources include scholarly and general interest publications and the New York Times.

Library Reference Plus. R.R. Bowker Company. 1991-92. This database contains reference information about U.S. Libraries, bookstores, p ublishers, distributors, wholesalers, and statistical data on library and book trade activi ties. Sources include the American Library Directory, the American Book Trade Directory, and L iterary Market Place. MLA International Bibliography. Modern Language Association. 1981 to present. Bibliographic citations covering scholarly work in literature, linguistics, and f olklore worldwide. Sources include journal & book articles, dissertations, monographs, and series. Music Library. OCLC Online Union Catalog. 1993. A discography representing sound recordings on LPs, 45 & 78 rpm records, cassette s, tape reels, compact discs, and cylinders. Coverage includes classical, popular, and t raditional forms of music from around the world. NESE (National, Economic, Social, and Environmental Data Bank). Economics & Sta tistics Administration.

This database contains the text of the Economic Report of the President, publicat ions from the U.S. Department of Education, Bureau of Economic Analysis and Bureau of Just ice Statistics covering such publications as the Census & Annual Survey of Manufactu re, Digest of Education Statistics, and Health United States: 1990. Material covered will c hange with each update. Psyclit. American Psychological Association. 1974 to present. Bibliographic citations and abstracts covering the literature of psychology and r elated subjects. Sources include journal articles, book chapters and books. Statistical Master File. Congressional Information Service. 1992 publications. Bibliographic records for the publications: American Statistical Index (U.S. fede ral government), Statistical Reference Index (U.S. state governments and private organizations), and Index to International Statistics (international, inter-gove rnmental organizations). Coverage includes social, economic, demographic, business, and i ndustrial statistics. Thesaurus Linguae Graecae. TLG Materials. Latin Text. Packard Humanities Inst itute. Full-text database containing virtually all of classical literature. Greek litera ture is until 6th century A.D. and Latin literature until 2nd century A.D.

CARL UnCover Database and Services{37}

General Information CARL UnCover is a multidisciplinary, bibliographic database listing articles from over 13,000 journal titles. The database indexes articles from late 1988, and is updated daily. Abstracts are available for most articles, and next-day delivery of articles is possible through CARL UnCover2, a document delivery service. A menu driven system makes CARL Uncover easy to use. More about the CARL UnCover Database CARL UnCover is easily searched in two ways. In browse mode, users can recreate the entire table of contents of an issue by searching the journal title. This is especially useful for users who follow a particular journal. In search mode, users may also search CARL UnCover by keyword to identify articles with desired title or abstract words, and by name to identify articles by particular authors.

CARL UnCover2 Document Delivery Service CARL UnCover2 makes use of disk storage, optical scanning technology, and telefacsimile delivery to provide copies of articles to users. Articles arrive within 24 hours after a user makes a request through the menu-driven system. Royalty fees can be charged to users' VISA or MasterCharge cards, or to CARL account numbers. Arranging to Use CARL UnCover Students, faculty and staff wishing to use the CARL UnCover System should contact the Libraries' Information Desk Staff (PBX 5691) or email INFODESK ). After an initial consultation, patrons may use the system via a standard Internet connection and any VAX-networked terminal, 24 hours a day. Please note: Kenyon College access to CARL UnCover in June, 1993, is through a trial subscription with an eye to subscribing by September. Please feel free to send comments on the system to Information Desk Staff.

Charges Currently, no fees are charged for the use of CARL UnCover. However, users can arrange and pay for CARL UnCover2 document delivery services only through the use of their own credit cards. Further Information Further information on CARL UnCover and UnCover2 is available at the Libraries' Information Desk. EPIC/FirstSearch Databases and Services{38}

General Information Epic and FirstSearch are computer based reference services currently offering 36 databases with information on the humanities, sciences, and social sciences. These services are made available through Online Computer Library Center, Inc. FirstSearch offers menu-driven access, and is easily used by faculty and students themselves. Epic offers command-driven access, and is used by librarians to perform student and faculty searches upon request. For both systems, the list of databases is printed on the reverse side. Frequently Used Databases OCLC Union Catalog A national bibliography of over 20 million records, OCLC indexes the holdings of over 9,000 U.S.libraries, including the Library of Congress. These holdings include out-of print and in-print books, journal titles, audiovisual media, sound recordings, foreign works held by U.S. libraries, and more. Records are searchable by subject,

keyword, author, title and year, and list libraries which hold the item. ArticleFirst ArticleFirst indexes articles appearing in over 11,000 journals in the sciences, medicine, technology, the humanities, social sciences, and popular culture. Coverage is from 1990 to present. For some records, abstracts are available. MLA Bibliography MLA indexes studies on literature, language, linguistics, and folklore. Materials indexed include books, essay collections, dissertations, bibliographies, and articles from over 4,000 journals. Coverage is from 1963 to present. Arranging to Use FirstSearch Students, faculty, and staff wishing to use FirstSearch should contact the Libraries' Information Desk Staff (PBX 5691, e-mail INFODESK ). After an initial consultation, patrons may use the system from any VAX-networked terminal during the following hours: Monday-Friday 6 A.M. to Midnight, Saturday 8 A.M. to 8 P.M., Sunday Noon to Midnight. Searches in EPIC Those wishing to place Epic search requests should fill out a form at the Information Desk. Searches are usually completed within three working days. Charges Currently, no fees are charged for use of Epic or FirstSearch. Further Information Further information on Epic and FirstSearch, and all databases available through these systems, is available at the Information Desk. Database Documentation List

First Search Database Reference Cards Database Name Date

AGRICOLA Feb 93 Applied Science & Technology Index Apr 93 Art Index Jan 93 ArticieFirst Sep 92 Arts & Humanities Search Feb 93

Biography Index Apr 92 Biology Digest Mar 93 BIOSIS/FS Dec 91 Business Periodicals Index Feb 92 BusinessOrgs May 92 Concise Engineering Index Oct 92 Consumerindx Sep 91 ContentsFirst Sep 92 Disclosure Corporate Snapshots Jul 92 ERIC Sep 91 EventLine Oct 92 FactSearch Jul 92 General Science Index Dec 92 GPO Sep 91 Humanities Index Feb 92 MiniGeoRef Dec 91 MLA Bibliography Oct 92 Newspaper Abstracts Jan 92 PAIS Decade Apr 92 Periodical Abstracts Jan 92 PsycFIRST May 92 Readers' Guide Abstracts Feb 92 Readers' Guide to Periodical Literature Feb 92 Social Sciences Index Oct 92 SocioAbs May 92 Wilson Business Abstracts Feb 92 WorldCat Sep 91 Database Descriptions and Reference Cards DB# 14 30 56 53 61 25 62 12 57 50 22 31 34 33 52 11 24 20 1 15 55 51 10 60 71 28 23 2 Database Name Date A Matter of Fact Jul 92 ABI/INFORM AGRICOLA Feb 93 Applied Science & Technology Index Apr 93 Art Index Jan 93 ArticleFirst Sep 92 Arts & Humanities Search Feb 93 Biography Index Biology Digest Mar 93 BIOSIS Previews Book Data Business Dateline Business Organizations Business Periodicals Index Compendex Plus Oct 92 Consumers Index ContentsFirst Sep 92 Dissertation Abstracts ERIC EventLine Oct 92 General Science Index Dec 92 GeoRef GPO Monthly Catalog Humanities Index MLA Bibliography Oct 92 Newspaper Abstracts OCLC Online Union Catalog PAIS International

29 40 3 26 27 4 7 2

Periodical Abstracts PNI (Pharmaceutical News Index) PsycINFO Readers' Guide Abstracts Readers' Guide to Periodical Literature Social Sciences Index Oct 92 Sociological Abstracts Wilson Business Abstracts

Knowledge Index Databases and Services{39}

General Information The Knowledge Index (KI) is a computer-based reference service offered by the Libraries to all faculty, students, and staff of Kenyon College. Through KI, researchers themselves can find information on a wide variety of topics, using any of over ninety databases available through Dialog Information Services, Inc. KI is searchable using either an easily used menu mode, or a more powerful command mode. Databases KI offers a broad selection of bibliographic and full-text databases. They include America: History and Life, BHA (Bibliography of the History of Art), Drug Information Fulltext, Economic Literature Index, Historical Abstracts, Medline, Philosopher's Index, Psychological Abstracts, Religion Index, Sociological Abstracts, National Newspaper Index and full-text files of over forty newspapers. All are listed on reverse. Arranging to Use Knowledge Index KI is available on Sunday through Thursday Evenings, from 6:30 until 10 P.M. Log-in and assistance is provided by staff at the Libraries' Information Desk. Log-in may not be possible after 9:30 P.M. Because KI is provided at a single search site in the Libraries' Reference Area, appointments are strongly recommended, and may be made at the Information Desk (PBX 5691, or by e-mail INFODESK ). Training KI is easily searched using either of two interfaces, a menu mode or a command mode. Several brief workshops on searching KI using the quicker, more powerful command mode are offered by the Libraries each semester. Researchers wishing to use KI for the first time will be required to attend a single workshop, or to demonstrate mastery of search basics described in The Knowledge Index User's Workbook. Charges Currently, no fees are charged for use of KI.

Further Information Further information on the Knowledge Index, and all databases available through it, is available at the Information Desk. Knowledge-Index Sections and Databases

The following table lists all active KNOWLEDGE INDEX databases, along with the d ate of the most recent Database Brief for each database. Agriculture Section AGRI I AGRICOL6/92 AGRI3,4 CAB ABSTRACTS12/86 Arts Section ARTS1 ARTS2

ARTBIBLIOGRAPHIE MODERN3/87 ART LITERATUREF INTERNATIONAL 3/87

Biology, Biosciences, and Biotechnology Section BIOL1 LIFE SCIENCES COLLECTION10/89 BIOL2 CURRENT BIOTECHNOLOGY ABSTRACTS3/89 Books Section BOOK1 BOOKS IN PRINT12/89 Business Information Section BUSI1 ABI/INFORM12/90 BUSI2 TRADE & INDUSTRY INDEX6/90 BUSI3 HARVARD BUSINESS REVIEW9/91 BUS14 CHEMICAL BUSINESS NEWSBASE6/87 BUSI5 BUSINESSWIRE9/91 BUSI6 PR NEWSWIRE9/91 BUSI7 BUSINESS DATELINE3/92 Chemistry Section CHEM1 CHAPMAN & HALL CHEMICAL DATABASE12/85 CHEM2 ANALYTICAL ABSTRACTS6/87 CHEM3 AGPROCHEMICALS HANDBOOK 6/87 CHEM5 KIRKOTHMER ONLIN12/88 Computers and Electronics Section COMP1 INSPEC (1969- )3/91 COMP3 MICROCOMPUTER INDEX12/91 COMP4 COMPUTER DATABASE212/91 COMP5 MICROCOMPUTER SOFTWARE GUIDE9/87 COMP6 BUSINESS SOFTWARE DATABASE6/88 COMP7 BUYER'S GUIDE TO MICRO SOFTWARE (SOFT) 6/89

COMP8

COMPUTER NEWS FULLTEXT3/91

Corporate News Section CORP1 STANDARD & POOR'S DAILY NEWS6/92 CORP2 ICC BRITISH COMPANY DIRECTORY9/91 CORP3 STANDARD & POOR'S CORPORATE DESCRIPTIONS plus NEWS3/92 CORP5 STANDARD & POOR'S REGISTER BIOGRAPHICAL3/90 CORP6 STANDARD & POOR'S REGISTER CORPORATE DRUG1 INTERNATIONAL PHARMACEUTICAL ABSTRACTS6/89 DRUG2 DRUG INFORMATION FULLTEXT6/89 DRUG3 CONSUMER DRUG INFORMATION FULLTEXT3/92 DRUG4 THE MERCK INDEX ONLINE10/89 DRUG5 PHARMACEUTICAL NEWS INDEX3/92 Economics Section ECON1 ECONOMIC LITERATURE INDEX6/87 Education Section EDUC1 ERIC11/92 EDUC2 PETERSON'S COLLEGE DATABASE11/92 EDUC3 PETERSON'S GRADLINE11/92 EDUC4 A-V ONLINE3/89 EDUC5 ACADEMIC INDEX6/89 Engineering Section ENGI1 COMPENDEX*PLUS6/91 ENGI2 CHEMICAL ENGINEERING AND BIOTECHNOLOGY ABSTRACTS3/89 ENG13 AEROSPACE DATABASE10/89 Environment Section ENVI1 POLLUTION ABSTRACTS12/88 Food Section FOOD1 FOOD SCIENCE AND TECHNOLOGY ABSTRACTS6/87 Government Publications Section GOVE1 GPO PUBLICATIONS REFERENCE FILE6/91 GOVE2 NTIS6/91 GOVE3,4 COMMERCE BUSINESS DAILY3/92 History Section HIST1 HIST2 AMERICA: HISTORY & LIFE3/87 HISTORICAL ABSTRACTS3/87

Legal Information Section LEGA1 LEGAL RESOURCE INDEX12/91 LEG2 BNA DAILY NEWS3/91 Literature and Language Section LITS2 LINGUISTICS AND LANGUAGE BEHAVIOR ABSTRACTS3/88 Magazines Section MAGA1 MAGAZINE INDEX12/89 MAGA2 CANADIAN BUSINESS AND CURRENT AFFAIRS3/88 Mathematics Section MATH1 MATHSCI6/92 Medicine Section MEDI1,2 MEDLINE6/90 MEDI3 EMBASE12/90 MEDI10 CANCERLIT6/92 MED11 HEALTH PLANNING AND ADMINISTRATION3/87 MED13 SPORT6/87 MED14 NURSING & ALLIED HEALTH6/92 MED16 SMOKING AND HEALTH12/88 MED17 AIDSLINE6/89 News Section NEWS COMPLETETEXT NEWSPAPERS12/91 NEWS1 NEWSEARCH3/90 NEWS2 NATIONAL NEWSPAPER INDEX6/91 NEWS3,4 UPI NEWS3/88 NEWS7 CURRENT DIGEST OF THE SOVIET PRESS3/89 Psychology Section PSYC1 PsycINFO6/90 PSYC2 MENTAL HEALTH ABSTRACTS3/84 Reference Section REFR1 QUOTATIONS DATABASE9/90 REFR2 MARQUIS WHO'S WHO3/90 REFR3 EVENTLINE9/90 REFR4 MACGILL'S SURVEY OF CINEMA3/92 REFR5 DISSERTATION ABSTRACTS ONLINE3/87 REFR6 CONSUMER REPORTS 6/87 REFR7 EVERYMAN'S ENCLYCLOPAEDIA12/90 REFR8 PUBLIC OPINION ONLINE (POLL)12/90 Religion Section RELI1 The BIBLE (KING JAMES VERSION)12/86 RELI2 RELIGION INDEX6/88

Science and Technology Section SCIT1 JAPAN TECHNOLOGY3/92 Social SOCS1 SOCS2 SOCS3 SOCS4 Sciences Section SOCIOLOGICAL ABSTRACTS11/86 PAIS INTERNATIONAL12/91 PHILOSOPHER'S INDEX6/88 AGELINE9/90

Travel Section OAG OFFICIAL AIRLINE GUIDES ELECTRONIC EDITIONTravel Service9/9 LEXIS/NEXIS Databases and Services{40}

General Information Lexis/Nexis are online information resources made available through Mead Data Central, Inc. Lexis offers bibliographic and full-text databases which contain legal, regulatory, and legislative information. Through Lexis, users can search for and obtain the text of court cases, law review articles, statutes, codes, etc. Nexis offers bibliographic and full text-databases which contain business and trade information. Through Nexis, users can search for and obtain the text of newspaper articles, newsletters, business journals, company reports, broadcast transcripts, etc. Techniques for using both systems are identical. Databases Lexis/Nexis databases are arranged in categories called "libraries." A list of these libraries is on the back of this sheet. Some libraries contain over 100 databases. Arranging to Use LEXIS/NEXIS Students, faculty, and staff wishing to use Lexis/Nexis should contact the Libraries' Information Desk Staff (PBX 5691, e-mail INFODESK ). Users should keep in mind that Kenyon's contract with Mead Data Central, Inc. stipulates that Lexis/Nexis services may be used for educational purposes only. They may not be used for legal, business, or commercial purposes. Charges Currently, no fees are charged for the use of Lexis/Nexis. Further Information Further information on Lexis/Nexis, and all the databases available through these systems, is available at the Libraries' Information Desk.

Services and Libraries

The LEXIS Service General legal libraries General federal (GENFED) Statutes (CODES) States (combined library) (STATES) Individual state legal libraries, e.g., Alabama, Alaska, American Law Reports (ALR) Law review (LAWREV) Legal reference (LEXREF) Specialized legal libraries Admiralty (ADMRTY) American Bar Association (ABA) Banking, federal (BANKNG) Bankruptcy, federal (BKRTCY) Bureau of National Affairs, The (BNA) CCH Blue Sky Law Reporter (CCHSKY) Commerce Clearing House (CCH) Communications, federal (FEDCOM) Corporate law (CORP) Corporation information, state (INCORP) Employment law, state (EMPLOY) Energy, federal (ENERGY) Environmental law (ENVIRN) Health law (HEALTH) Insurance law, state (INSRLW) Labor, federal (LABOR) Liens (LIENS) Military justice (MILTRY) Patent, trademark and copyright (PATCOP) Public contracts, federal (PUBCON) Public employment (PUBEMP) Public utilities law (UTILTY) Securities, federal (FEDSEC) Securities, state (STSEC) Tax, federal (FEDTAX) Tax, state (STTAX) Trade, international (ITRADE) Trade regulation, federal (TRADE) Transportation, federal (TRANS)

United Kingdom & Commonwealth legal libraries English general (ENGGEN) English industrial (ENGIND) English local government (ENGLG) European communities (EURCOM) Commonwealth cases (COMCAS) New Zealand (NZ)

Australia (AUST) United Kingdom intellectual property (UKIP) United Kingdom Journal library (UKJNL) United Kingdom tax (UKTAX) Ireland (IRELND) Scotland (SCOT) Admiralty (ADMRTY) French legal libraries (in French) International (INTNAT) Laws and regulations (LOIREG) Private cases (PRIVE) Public cases (PUBLIC) Case interpretations (REVUES) Complementary research tools LEXSEE feature LEXSTAT- feature The Auto-Cite Service (AC) Shepard's Citations Service (SHEP) LEXIS document services The Payback Service The Medis Service General medical library (GENMED) Drug information library (PHARM) Cancer information library (CANCER) Medline library (MEDLNE) Administration of Health Care library (ADMIN) MICROMEDEX library (MDEX)

The NEXIS Service

NEXIS library (NEXIS) The Information Bank library (INFOBK) Advertising and public relations library (ADPR) U.S. Patent and Trademark Office library (LEXPAT) Computers and communications library (CMPCOM) Government and political news library (GOVNWS) THE LEXIS FINANCIAL INFORMATION SERVICE Company library (COMPNY) THE LEXIS COUNTRY INFORMATION SERVICE Country Analysis Reports library (REPORT) International News library (INTNEVV) International News Alert library (ALERT)

THE ASSOCIATED PRESS POLITICAL SERVICE Associated Press political library (APOLIT) THE NATIONAL AUTOMATED ACCOUNTING RESEARCH SYSTEM (NAARS) SERVICE Accounting information library (NAARS) ASSISTS GUIDE library (GUIDE) Practice library (PRACT) STN International Databases and Services{41}

STN is an international scientific and technical information network providing a ccess to more than 130 databases. STN covers biology, chemistry, physics, engineering, health & safety , materials science, geology, medicine and other fields of science. In addition to bibliographic databases, S TN offers full-text files which provide access to the complete text of important scientific journals. Other data bases and STN's search capabilities provide access to scientific data such as chemical structures, the properties of materials, and nucleic acid/protein sequences. In North America, STN is operated by Chemical A bstracts Service (CAS). Through CAS and Kenyon's CAS Online Academic Program, faculty and students thems elves may search CAS files such as CA File and Registry (see below). Frequently Used Databases BIOSIS With over 8.3 million bibliographic records, BIOSIS covers the worldwide literature of biology, biomedicine, and related fields, and is the world's most comprehensive life sciences database. Sources indexed by BIOSIS include journal articles, meeting abstracts/papers, reviews, technical reports, patents, and books. Abstracts are provided for some records (journal articles). Coverage is from 1969 to present, and the database is updated weekly. In 1992 alone, BIOSIS indexed over 520,000 items. CA (Chemical Abstracts) The CA File includes over 10 million bibliographic records covering the international literature on chemistry and chemical engineering since 1967. Major subdivisions covered are: biochemistry; organic chemistry; macromolecular chemistry; applied chemistry and chemical engineering; and physical, inorganic, and analytical chemistry. CA indexes journal articles, patents, conference proceedings, technical reports, books, and dissertations. For most records, abstracts are available. The database is updated weekly, and in 1992 indexed over

532,000 items. Registry The REGISTRY File is a chemical structure and dictionary database containing over 12 million records for unique substances as identified by CAS since 1957. REGISTRY is searchable by CAS Registry Number, CA index name, commonly used synonyms, molecular formula, and structure. It includes structure diagrams, and identifies the 10 most recent documents citing the substance.

Arranging to use STN International Students, faculty and staff wishing to search CAS databases should contact the Libraries' Information Desk Staff Information Desk staff (PBX 5691 or e-mail (INFODESK) After an initial consultation or training, STN may be accessed from any VAX-networked terminal. Please note: Access to CAS databases (including CA) is limited to 5 P.M.-Midnight Monday through Friday and 9 A.M.-1 P.M. on Saturday. Charges Currently no fees are charged for the use of STN International. Further Information Further information on STN, and the databases available through this system, is available at the Libraries' Information Desk. Other Collections within the Kenyon Libraries{42}

Slide Collection The slide collection housed in the library includes visual materials from many disciplines. Images are organized into large groupings by artistic mediums such as painting, sculpture, architecture, furniture as well as the general liberal arts disciplines. The latter category includes, but is not limited to, the following: theater, history, music, religion, psychology, historical biography, and sociology. When appropriate, cross reference cards are placed into the collection as pointers to other portions of the collection for less experienced patrons. Accessing images by Harlem Renaissance artists requires some preparation by the patron. First, artists connected to the movement must be identified using reference books and general histories. I suggest using Bruce Kellner's The Harlem Renaissance (REF/700.8/H22) or Mary Campbell's Harlem Renaissance Art of Black America (FOLIO 704.03/H22) as a starting point for the names of artists. Once an artist has been identified and the patron can specify what medium(s) the artist worked in (painting, sculpture, photography), it becomes a simple matter to check the slide room's holdings. The historical biography section of the collection should always be searched for paintings or photographs of better known personages. Access to materials in this section of the collection is by last name of subject in the painting or photograph.

The slide collection also circulates three special slide sets produced by Instructional Resources Corporation. Each slide set includes a broad range of images so as to permit the slides to be used in conjunction with a variety of presentations. We currently own 'The American History Slide Collection', 'The World History Slide Collection (NonEuropean History)' and 'The Western Civilization Slide Collection' (European emphasis). The sets are filed into large wooden cases and access to the individual slides is possible through individual 'master guides'. Each slide set has a specific master guide with a very broad subject index in the back and captions which may be used as narratives for the images. It is not possible to easily browse through the images themselves, and, as I already mentioned, the subject index is very broad. The slide set covering American history only lists two slides under the subject heading 'Harlem Renaissance'. I checked the subject entries for the two slides identified under 'Harlem Renaissance' and only one of the slides is listed under the other appropriate subject heading. Videotape Collection The videotape collection at Kenyon is a rapidly growing teaching device, faculty often use the collection to supplement lectures as well as a discussion vehicle. Naturally the collection is governed by copyright regulations, outlined in a handout available from the AV Department. Faculty are expected to comply with the governmental regulations and to handle the videocassettes with care. Access to the collection may be either through the 3x5" card catalog in the AV Department or via the on-line catalog. The MARC record for fully cataloged videos includes the same types of tracings as it does for books. It is possible to use the author/title/subject search mode and the limiting devises of the on-line catalog to locate audiovisual materials. However, I favor the use of the keyword mode and the boolean operator 'and'. About one-seventh of the collection is not completely cataloged, that is to say, there is not a MARC record for the individual video titles. It is a little more tricky to locate those materials if you do not know a specific title. Search strategy for materials with MARC record: fi video? and harlem renaissance fi video? and holocaust Search strategy for materials only cataloged by a short record: fi video? and pather (using A WORD from the title) Search strategy for materials on order: fi ultimate swan lake (do not limit by format -- the designation 'video' is made during the cataloging process, not during the ordering process) Laser Disc Collection The Library's collection of laser discs is very small due to the limited playback facilities on campus. The MLL and Music departments are

actively ordering materials on video discs since they have playback capabilities. A limited number of other titles are available, purchased by faculty who arranged to have a laser disc reader temporarily housed in Olin Auditorium. Since the holdings are very small you may search the video disc collection by using the 3x5" card catalog in the AV Viewing & Listening Room or by the following search strategy: fi video disc or fi video disc and music or fi video disc and faerie tale 16mm Film Collection We own a limited number of 16mm films, often titles which are not presently available on video or laser disc format. The 3x5" card catalog in the AV Department has entries for 18 films. If you wish to access the 16mm film collection via the on-line catalog and you know we own a film on dancers you may formulate two different types of searches. Using the first on-line menu try the following strategy: t=four pioneers|m=gm or s=dance|m=gm (this will lead you to a long list of titles on both video and 16mm formats) or s=holm|m=gm (you would need to know which artists were included in the film and hope they were listed in the MARC record) Or use the keyword option and this strategy: fi motion picture and pioneers fi motion picture and dance (you must know title of film)

Filmstrip Collection At present we have only a small collection of filmstrips. Access is either via the 3x5" card catalog in the AV Department or by the online catalog. Search strategy using the on-line catalog would be as follows: fi filmstrip and french literature or fi filmstrip and music

Sound Recordings Collection The sound recordings collection includes almost exclusively spoken-

word recordings, although a few of music audio cassettes were purchased to circulate through the AV Department to non-music faculty. The spoken-word cassettes range in content from excerpts of Chaucer to taped seminars on copyright issues. Music recordings are very limited in scope to the decades of the 1950's and the 1960's. Since the collection is small it is possible to search the 3x5" card catalog in just a few minutes. An effective search strategy for the online catalog would resemble the following: fi sound recording and harlem renaissance or fi sound recording and hamlet Due to early cataloging inconsistencies by the Library of Congress some materials were not earmarked 'sound recording' in their OCLC records. The early materials may be more readily accessed by using the 3x5" card catalog marked 'AUDIO CATALOG' in the Viewing & Listening Room.

Spoken-Word LP Record Collection The library houses a selected collection of spoken-word phonodiscs, both 33 1/3 rpm as well as 75 rpm format. It is primarily a collection of poets and dramatists reading from their works and in several cases, some of the recordings were made at Kenyon in the 1940's. It is a collection which includes many splendid recordings, particularly that of Dylan Thomas's Under Milkwood as read by Richard Burton and others. Naturally, the fragility of the medium and the need for a cumbersome phonograph less desirable. However, it remains a valuable resource accessible via the 3x5" card catalog in the AV Department.

Numbered Microfilm/Microfiche Microfiche No. 141 Prompt Books and Actor's Copies This is a collection of Victoria & Albert Museum prompt books associated with William Poel (1852-1934), James Hackett (18001871), Mrs. Stella Patrick (1865-1940), and the Old Vic Theater (limited to the 1937-1963 seasons) in London. The prompt books, playbills as well as associated photographs are reproduced and are very useful for students in directing and theater history courses. Access to the material (after locating its MARC record) is via an index card file and small guide book. The guide book lists the plays alphabetically under each actor in two categories, 'Shakespeare' and 'Non-Shakespeare'. A collection number (designated 'Ormonde' number) specifies a fiche number for each manuscript or typescript.

Microfiche No. 144 The Dunlap Society The Architecture of Washington, D.C.

This microfiche collection was the pilot project of the Dunlap Society to document all aspects of American art. The microfiche included complete visual documentation of historically significant buildings. Construction drawings, photographic prints and a limited number of graphic prints, etc. all form a part of this visual catalog. Not only are the buildings representative of work designed by important architects, the buildings are associated with much of the 19th & 20th century American social history. Access is via two table of contents and small factual pages on each of the buildings. Microfilm no.89 Witchcraft in New England. Bell & Howell product prepared in cooperation with the Danvers Archival Center, a department of the Peabody Institute of Danvers, Massachusetts. Bell & Howell, 1980. Covers the printed history and interpretation of witchcraft occurrences in New England from 1648 to the end of the first quarter of the 20th century, centering on the outbreak in Salem Village in the Massachusetts Bay Colony in 1692. The collection includes over 60 works representing some 7,000 pages of information gleaned from the Danvers Archival Center collection. Excluded from the works are fictional works, strictly biographical works and multiple editions, and works that rely too heavily on quotes from already included material. There is a printed index volume that introduces the collection and gives a list of the titles and pages that were microfilmed, an index by reel and number. There is no subject, author, or name index. Microfilm no. 90 Voices from Ellis Island : an oral history of project of the Statue of Liberty-Ellis Island Collections in American Immigration. General Vecoli) Guide compiled by Nanette Dobrosky. Publications of America, 1988.

American Immigration : a Foundation. (Research Editor : Rudolph University

Includes 185 oral histories of immigrants or Ellis Island employees. Most of the oral histories include sections on life in country of origin, the immigration process, and settlement and assimilation in America. The index includes a list of documents by reel number, a name index, and a country index.

Microfilm no. 90 Department of Justice Investigative Files: Part I. Industrial Workers of the World. (Research Collections in American Radicalism. General Editors: Mark Naison and Maurice Isserman) Guide compiled by Martin Schipper. University Publications, 1989. 15 reels of microfilmed U.S. Department of Justice files on the IWW 1904-1955 including straight numerical files, political prisoner/pardon attorney files and previously restricted

materials. The companion guide indexes by reel and by subject. Conspiracy Trials in America Series (prepared for the Fund of the Republic) Wilmington, Delaware: Michael Glazier, 1977-78? Microfilm no. 84 The Alger Hiss Case : Basic Documents Microfilm no. 85 U.S. v. Rosenberg Microfilm no. 86 Gitlow v. New York Microfiche no. 147 Negro Periodicals in the United States. Frederick, Maryland: University Publications of America, 1990? A collection in two series of 35 titles of nineteenth and twentieth century African American periodical titles. Unfortunately not all titles are cataloged under the series title. An s=Afro-american periodicals search in the OPAC will produce a list that includes all the titles in this series. Microfilm Collections Housed in the Reference Section The Gerritsen Collection of Women's History, 1543-1945. The entire Gerritsen collection consists of monographs and periodicals in many languages covering international women's history and the feminist movement. The basis for this collection is the Gerritsen collection begun in the late 19th century by Dr. Aletta Jacobs (1854-1929) and her husband Carl V. Gerritsen. Dr. Jacob's collection was nearly 2,000 items. The original collection has been moved, supplemented and split a few times and now the largest part of the collection resides at the University of Kansas. The Kansas collection with 4,000 some titles was then supplemented with another 800 titles from the North Carolina collection for this micropublication. Kenyon has purchased the American English and British English language materials and the American and British Periodicals. These include 1237 American and 899 British titles in the language series, and 80 American and 47 British periodical titles. The fiche are housed in the fiche file in the reference area and the roll film will be located in the Microforms room level one Chalmers. Access to the materials is currently through guide which is split into 3 volumes. Volume language series and includes a bibliographic entry index, title index, subject index, and the producer's 1 indexes the listing, main/added chronological index.

Volume 2 categorizes the Gerritsen documents into 36 topical and subtopical categories. Volume 3 indexes the Gerritsen serials and includes a bibliographic listing, main/added entry index, title index and subject index.

CoreFiche Collections World's Best Drama. 851 plays by 245 international dramatists reproduced in English on 159 fiche, from classical Greece to early 20th century. Indexed chronologically, by playwright, title, characters, genre/topic, and nationality. Currently resides in its original fichebook notebook binder located on the fiche table in the reference area. Anthologies Listed in the Grangers Index to Poetry. Kenyon owns Phases I and II. Access to these fiche is through The Master Index to Poetry. (Ref. 808.810016/M39?1988) It includes author, title, first line and translator entries. These fiche and one copy of the index reside at the fiche table in the reference area. Books Listed in the Essay and General Literature Index. Kenyon owns Phases I-V. Access to these fiche is through the Roth's Essay Index. (Ref. 808.840016/R74/1988)

Additional Microfilm Collections in OPAC For additional microfilm collections in OPAC type: C=micro?

Other Resources The Kaiser Index to Black Resources 1948-1986 (Reference E185.K25 1992) The Kaiser index provides more than 174,000 citations to articles in black periodicals, primarily those published in the United State. Materials indexed, in addition to newspaper and magazine articles, include book, theater, and film reviews, editorials, obituaries, and much more. While the majority of the citations refer to articles in standard black periodical literature, the Index also cites information in obscure newspapers, chapters in books, newsletters, college bulletins, ephemeral publications, and a number of African and Caribbean periodicals.

"All of the materials cited in the Index are in the Schomburg's collections. If your library does not own any item, the Schomburg would be happy to mail a reproduction of the article." (Quote from brochure) Government Publication Resources{43}

Below is a list of titles of the major indexes for government publications. The list is not exhaustive; there are a variety of additional resources available to identify go vernment publications, particularly historical materials. Also included on this list are a few selected reference titles, helpful in locating basic information about the government. Monthly Catalog of United States Government Publications Commonly known as the Monthly Catalog or MoCat. Indexes most U.S. government documents. Cumulated annually. Located in government documents reference area. GPO on SilverPlatter CD-ROM version of the Monthly Catalog. Covers 1976 to the present. Located in t he InfoLab. American Statistics Index Indexes government publications of statistical nature. Volumes for 1987 to the present are located in the government documents reference area. Statistical Masterfile CD-ROM index which includes American Statistics Index. Only covers 1992 to the present. Located in the InfoLab. CIS/Index Comprehensive index to Congressional reports and documents, and public laws. Vo lumes from 1984 to the present are located in the government documents reference area. CIS U.S. Serial Set Index, 1789-1969 Indexes the series of U.S. government publications known as the Serial Set. A la rge portion of historical materials are contained within this collection. Although the Seri al Set is still published today, this index covers only the period from 1789-1969. Located in t he government documents reference area. Cumulative Subject Index to the Monthly Catalog of United States Government Publ ications, 1900-1971 Subject index to all documents published between 1900 and 1971. Located in the government documents reference area. List of Classes of United States Government Publications Available for Selection by Depository

Libraries Commonly known as the List of Classes. Contains a listing of the government aut hors of publications available to depositories, item numbers and format. Located at the Information Desk and government documents reference area. NESE-DB: National Economic, Social and Environmental Data Bank Full text CD-ROM containing a variety of government publications, mostly statist ical. Located in the InfoLab. Statistical Abstract of the United States Annual compilation of general state, national and international statistics, gath ered from various sources. Most recent edition located at the Information Desk, and in th e Government Documents Office; earlier editions located in the Data Center. The United States Government Manual Handbook of the Federal Government, containing information on the branches of th e government and their agencies, as well as information on quasi-official agencies , boards, commissions, and committees. Most recent edition located in Government Document s Office; earlier editions located at the Information Desk and in reference. Congressional Directory Contains information on all congressional committees and their subcommittees. Al so contains information on members of the Senate and House, and various other congressional information. The Complete Guide to Citing Government Documents, by Diane L. Garner. Manual detailing how to cite various kinds of government documents. Located at the Information Desk. Government Publications in Electronic Format{44}

The Government Printing Office (GPO) issued its first CD-ROM in November, 1988. Since that time, electronic publishing of government documents has been proliferate. Below is a list of titles that Kenyon has received in electronic format. Census Bureau Most of the data from the 1990 Census of Population and Housing is being release d on CDROMs, as well as in print. The CD-ROM versions of the reports contain data in f ar greater detail than is available in the print reports. Each CD-ROM contains GO software, which is menu-

driven, and easy to use. Data can be retrieved and manipulated using two other programs: Extract and dBase. 1990 Census of Population and Housing, Summary Tape File 1A Contains summary population and housing data derived from 100 percent of the pop ulation. Data is available for states, counties, places, census tracts/block numbering ar eas, block groups, Alaskan Native areas and American Indian areas. 1990 Census of Population and Housing, Summary Tape File 1C Contains the same summary data as STF 1A, but covers the entire U.S., regions, d ivisions, states (including summaries such as urban and rural), counties, places of 10,000 or mor e inhabitants, metropolitan areas, and urbanized areas. 1990 Census of Population and Housing, Summary Tape File 3A Contains social and economic summary data collected from the sample group of the population. Covers the same geographic areas as in STF 1A. 1990 Census of Population and Housing, Summary Tape File 3C Contains the same social and economic summary data as STF 3A, for the same geogr aphic areas available on STF 1C. 1990 Census of Population and Housing, PL 94-171 Data (Redistricting Data) Counts by total, race, and Hispanic origin for the total population and populati on 18 years and over, and counts of housing units. Includes data for the same geographic areas as the STF 1A and STF 1C. 1990 Census of Population and Housing, Block Statistics Block data for characteristics covered on the STF 1A and STF 1C. 1990 Census of Population and Housing, Equal Employment Opportunity (EEO) File Contains sample tabulations showing detailed occupations and educational attainm ent data by age, sex, Hispanic origin, and race. Data given for counties, metropolitan area s, and places of 50,000 or more inhabitants. 1990 TIGER/Line Census Files Files containing geographic and cartographic data that can be used to prepare ma ps using the same geographic areas as those used in the 1990 Census statistical data products listed above. These files do not contain any of the statistical data, nor do they contain any application software

necessary to use the files. Other Census Bureau CD-ROM titles available at Kenyon 1987 Census of Agriculture 1987 Economic Census American Housing Survey County & City Data Book County Business Patterns Current Population Survey USA Counties: A Statistical Abstract Supplement U.S. Exports of Merchandise U.S. Imports of Merchandise Other CD-ROM titles available at Kenyon CDP File, National Center for Disease Prevention & Health Promotion Congressional Record, 99th Congress Consu/Stats I, 1984-85 Consumer Expenditure Surveys Digital Line Graph Data Digitized Strong-Motion Accelerograms of North and Central American Earthquakes, 1933-1986 DLAPS: Defense Logistics Agency Publishing System GSA Regulations and Publications A Geologic Map of the Sea Floor in Western Massachusetts Bay, Constructed from Digital Sidescan-Sonar Images, Photography, and Sediment Samples Geology of Nevada: A Digital Representation of the 1978 Geologic Map of Nevada High School & Beyond, 1980-1986 HMC&M and HMIS: (Hazardous Material Control & Management and Hazardous Materials Information System) National Energy Research Seismic Library: Processed Seismic Data for 29 L ines in the National Petroleum Reserve in Alaska National Geochemical Data Base: National Uranium Resource Evaluation Dat a for the Conterminous Western United States

National Health Interview Survey National Postsecondary Student Aid Study NESE: National Economic, Social and Environmental Data Bank NTDB: National Trade Data Bank Occupational Outlook Handbook, 1992-1993 ed. OSHA CD-ROM Photographs from the U.S. Geological Survey Photographic Library (Earthqu akes, Volcanoes, Geologic Hazards, and Other Phenomena) REIS: Regional Economic Information System SASS: Schools and Staffing Survey SLAR: Side-Looking Airborne Radar Demo Disk Stratigraphic Nomenclature Databases for the United States, Its Possessio ns and Territories Toxic Release Inventory

Diskette Titles Available at Kenyon Below is a list of titles, primarily from the Department of Energy, that we have received in diskette format. These publications are primarily statistical in nature, and of ten include time series data, useful for economic studies. Most titles are periodicals, issued monthly, quarterly, or annually. Annual Energy Review Database Archival of World Energy Projection System CBECS: Commercial Building Energy Consumption Survey Fuel Oil and Kerosene Sales Historical Monthly Energy Review Database, 1973-1988 HyperVentilate: A Software Guidance System Created for Vapor Extraction A pplications International Coal Statistics Database Market Penetration Models Monthly Electric Utility Sales and Revenue

Monthly Energy Review Database Monthly Power Plant Report Natural Gas Annual Oak Ridge Uranium Market Model Oil Market Simulation Model Performance Profiles of Major Energy Producers, 1977-1991 Residential Energy Consumption Survey State Energy Data System State Energy Price & Expenditure System U.S. Crude Oil, Natural Gas, & Natural Gas Liquids Reserves World Energy Projection System World Integrated Nuclear Evaluation System Currently, the NESE D-B (National Economic, Social and Environmental Data Bank) and 1990 Census of Population and Housing, Summary Tape File 1C are mounted on the Govern ment Documents CD-ROM workstation in the InfoLab. All other CD-ROMs and diskettes ar e housed in a secure area within the Government Documents Department. To use any of the above publications, please ask for assistance. Appendix A - Glossary

Following is a glossary of computer terms for the Summer Institute. With permis sion portions of this glossary have been adapted from the glossary in Crossing the Internet Thres hold: an Instructional Handbook, Library Solutions Press: Berkeley, CA. 1993. Account When you use a particular computer system, you are given an account. Associated with the account are a unique username and a password. When you start to use a system, you type these to show that you are a legitimate user of the system. Adapter card A circuit board that can be inserted into a computer to provide optional functions, such as an interface for a hard disk or additional memory. Address A unique name (or number) identifying a computer user or computer is called an address. Addresses are used in network communications to transmit messages to a particular person or machine. In IP (Internet Protocol) form, it consists of a series of numbers, separated by dots,

which enables a machine in one part of the world to contact another (much like a personal zip code). Also, technical reference to a specific location in a computer's memory. Analog A way of representing data as a continuous, varying signal wave. Anonymous FTP A form of FTP which allows unregistered users access to files. When using, one logs in as anonymous and uses one's Internet address as the password. Archie A database and related programs giving the user information about the contents of various archives. Archive Collections of files related to a particular subject, which are stored on a computer and made available for distributions to the Internet community, usually via anonymous FTP. ARPANet Advanced Research Projects Administration. Department of Defense network to link contracting scientists and institutions for sharing information, forerunner of and prototype for protocols of today's Internet, such as TCP/IP. Acknowledging its Defense Department origin, also called DARPANET. Article Individual contributions to a Usenet newsgroup which have been given the standard Usenet header. ASCII American Standard Code for Information Interchange. A standard method for encoding characters--"text" files are usually ASCII files. ASCII represents upper and lower case letters, the numerals, and punctuation in 7 bits. Aspect ratio The width to height ratio of an object. The aspect ratio of pixels on a screen affects the screen's ability to represent circles and other images accurately. Backbone A high speed connection within a network which connects shorter (usually slower) branches. The NSFNet is generally considered to be the backbone of the Internet in the U.S. Bandwidth A measure of capacity and speed of the links between computing devices. Measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps). Batch file A file that contains a series of operating system commands. Baud rate A measure of transmission speed. Technically the baud rate is the number of times the communication changes state each second. Most

people use the baud rate and bits per second interchangeably. BBS See Bulletin Board System. Binary file All files which are not text files are considered binary files. Any combination of bits is possible within a binary file. BITNET Cooperative education and research network which primarily provides e-mail services. Bit BInary digiT. The smallest unit of information stored by digital computers, usually represented by a 1 (one) or 0 (zero). Bit-mapped display A method of generating images by creating a one-for-one correspondence between bits in memory and pixels on the screen. In color graphics, three or more bits are required in the bit map to represent red, green, and blue values of an individual pixel. Board See Adapter Card. Boilerplate Passages of text that are used over and over without modification. Boolean expression A statement which can be evaluated as true or false. For example, "Earth = the Moon" would be evaluated as false. Boolean expressions work with logical operators. Broadband A type of transmission which conveys text, data, and video or audio signals simultaneously. Bug The cause of improper operation of a computer or program. There can be a bug in hardware or software. Bulletin board system (BBS) A computer with a modem that answers incoming telephone calls. Nearly all bulletin board systems allow the caller to read and leave messages; many allow the caller to send or receive files as well. Byte The smallest unit of information processed by a computer, usually 8 bits in length. Also, the amount of space most often used to store an alphanumeric character. CAD Computer Aided Design or Computer Aided Drafting. The use of a computer in producing technical drawings such as blueprints. Card See Adapter Card.

CCITT From the French for International Telegraph and Telephone Consultative Committee. The international committee responsible for most international communications standards, such as ISDN. Compress To make a file smaller by removing repeated or unnecessary information and by employing one of a number of algorithms which summarize patterns in the data being compressed. CD-ROM Compact Disk-Read Only Memory. A small, polymer coated, usu. aluminum disk, which stores large amounts of data and is read by a laser. Central processing unit (CPU) The brain of a computer. The central processing unit contains circuits that execute instructions and control the other units of a computer. Note that this "brain" usually has only enough memory to store a few instructions at a time. Characters per second (CPS) A measure of the rate at which data is transferred or printed by a printer. Client A program running on a computer which requests services from another program, often called a "server," and usually running on a remote computer. Compatibility The ability of hardware and software from different vendors to work together. Control panel A portion of the screen reserved for status and information. CPU See Central Processing Unit. Crossnet A Bitnet utility which enables Bitnet users to send messages to recipients on the Internet. Cross-post Posting a message to several groups or listservs. Originated in Usenet, where the same message is easily sent to a number of newsgroups. Because of redundancy, this is discouraged and, at least, should be identified at the beginning of the article or message as a cross-posting. Cyberphobia The fear of computers. Database A logically connected collection of data. Database management system (DBMS) A set of programs that provide for the input, retrieval, formatting, modification, output, transfer, and maintenance of information in a

database. Datagram A formatted set of electronic data used in communication between computer systems. The datagram consists of two parts: the data proper, which may be part of a longer message; and the header, which indicates the source, the destination, the type of data, and other information. Default The standard value or setting that a program uses if the user does not specify a value. Desk accessories Memory-resident utility programs that provide convenient services such as an electronic calendar, phone dialer, calculator, or note pad. Directory Files on many computer systems are grouped together in directories. Directories are usually hierarchical and files and "subdirectories" are said to be "in" a directory. Files common to a program or topic are often organized into separate directories or subdirectories. Directory Service A service on a network giving information about sites, computers, resources, or users. Disk Most often particles. patterns. store data a round platter coated with magnetically chargeable As this disk spins rapidly, data is stored as magnetic Recently, disks using optical instead of magnetic means to have been introduced.

Domain A classification category used for identifying computers in a network. The names of successive domains are used to form a unique name by which the computer is known to the network. Domain name A structured name for a computer in a network, in the form kcvax1.kenyon.edu. Uniqueness is ensured by having a hierarchy of naming authorities, each one responsible for approving the names in its immediate domain. DOS Disk Operating System. See MS-DOS. Double-clicking Quickly pressing a mouse button twice in order to make a selection or give a command. Downloading The process of transferring files to your local machine using communications software. Often the last step necessary to have your own copy of a file. Editor A relatively simple program used to create and modify files. See also Text editor, Graphics editor.

E-mail Electronic mail; online messaging services between computer users. Emoticon A character-based drawing used to convey emotion. Smiley, :) , is the most common and is used to convey that a comment is meant humorously. You are cautioned against overuse (e.g. more than once per paragraph). Other facial expressions, such as frowney :( , are less frequently encountered. These are but the most common examples of ASCII art--drawing pictures using keyboard/display characters. Emulation A process by which one machine generates the input and/or output produced by another. This is a software capacity and, on the Internet, most frequently refers to emulating a certain type of terminal, such as the VT100 or a 3270 (input expected by IBM machines). Encryption Any of a number of methods of encoding data to protect it. Escape This is an Internet conundrum. On the Internet, escape is represented as <CTRL> ] or ^] or sometimes <CTRL> ] q . <ALT> X and <CTRL> @ are other common forms. Although described as the "Internet escape key," it is usually a combination of keystrokes. It is not the <ESC> key on the MS-DOS machines and can vary from keyboard to keyboard and would be a separate key on Macintosh. It is commonly used to terminate a session with a remote machine, but determining the exact form as a function of keyboard can vary. HYTELNET provides a guide for various systems and keyboards. E-serial A periodical distributed in electronic form. E-text The full text of a document available in electronic format (often through FTP). EARN European Academic Research Network. A European equivalent to BITNET. Uses BITNET-type protocols. .edu The standard highest level domain name used to identify educational institutions. FAQ Frequently Asked Question(s). Usually, the list of questions and answers which cover "the basics" and the obscure-but-frequentlyasked-about for a Usenet newsgroup or a listserv. The term may also be used to refer to a single question which is, or should be, on the list. Fiber optic cable A cable made from strands of glass that carries data in the form of pulses of light. File A series of bits recognized by the operating system as meaningful. Programs and data are stored as files.

Finger A simple network service which will report if a particular user is currently logged in, and often other information. Firmware Computer software which is stored on a ROM chip. It is a combination of hardware and software which stays in one place, hence "firmware". Flame A vitriolic attack on the contributions of another (either ideas or ad hominem) to a group conference. As a preventative measure, a contributor of controversial material may figuratively don asbestos underwear or an asbestos overcoat when submitting a message. Freenets Free, community-sponsored, computer-based information systems which are open to the public. Services may include electronic mail, Usenet news, and community services such as the library, government, and local organizational information. E.g., Cleveland Freenet: telnet to freenet-in-a.cwru.edu, or freenet-in-b.cwru.edu, or freenet-in-c.cwru.edu; and Youngstown FreeNet: telnet to yfn.ysu.edu (login: visitor). FTP File Transfer Protocol. A standard which allows for the moving of files from one computer to another utilizing TCP/IP. FTP also refers to the program which utilizes the FTP protocol to transfer files. Gateway A computer which connects two networks, often converting a message's protocol to one appropriate for the other network. Also used to refer in general to a system that provides direct access to other, remote networks or services. Gigabyte A unit of storage roughly equal to one billion characters. Graphics editor A program for editing pictures. Typical operations include drawing, moving, rotating, and enlarging items on the screen. Gopher Client-server software providing flexible access to Internet resources; developed at the University of Minnesota. GUI Pronounced "gooey"; a Graphic User Interface, such as Microsoft Windows. Hard disk A disk which is made of an inflexible usually polymer substance used to store data. Such disks store more information, and usually cannot be removed from the disk drive. See disk. Hardware Any physical piece of computer equipment. Host A computer system with which you can hold an interactive session, or

which is the source of network services. Hostname A textual string which is mapped to an IP address, e.g., "kxcvax1.kenyon.edu". HYTELNET A program that provides flexible connection to a variety of networked information resources including online public access catalogs. Icon A picture that represents an object such as a printer, program, trash can, or pad of paper. IMHO In My Humble Opinion. Acronym or shorthand for "In my opinion," frequently used in e-mail, listservs and Usenet communications. It emphasizes that what follows is opinion rather than fact. Interactive Multimedia A multimedia presentation (see Multimedia) in which the learner is given the opportunity to affect the course of the presentation, even to the extent of changing the presentation for subsequent learners. Internet INTERconnecting NETwork. The global network made up of smaller interconnected networks and which is based on the TCP/IP protocol. Also, with a small "i" any set of networks interconnected using TCP/IP. IP address A specially formulated and unique number assigned to Internet computers, (e.g., "31.1.0.11"). ISDN Integrated Services Digital Network. An evolving CCITT standard for a network capable of carrying voice, data, video, and other signals through a single telecommunications line. JANET Joint Academic Network. The academic and research network in the United Kingdom. Kilobit A measure of storage capacity equal to 1,024 bits. Kilobyte A measure of storage equal to 1,024 bytes (or characters). Kilobyte is often abbreviated by K or KB. Knowbot KNOWledge roBOT. Program designed to search for files on the Internet. It is a registered trademark of the Corporation for National Research Initiatives. Listserv (listserver) BITNET service (software) providing distributed messages that form conferences and allow the archiving of files and messages which can be searched and retrieved.

Logical operator A word such as and, not, or or, that is used to determine the truth of falsity of a statement. Login An opening procedure to identify yourself to a system as a legitimate user and begin a session. Normally, to login you need to give a valid username and password. The word "logon" is occasionally used. Also, a synonym for username on some systems. Logout A closing procedure to formally end a session with a system. Breaking a network connection will not necessarily result in logging you out. The word "logoff" is also used. Lollipop A post to a Usenet newsgroup which is intended to attract the attention of the gullible. Also, the "suckers" who respond to such articles. Memory The physical portion of a computer where data is stored while the computer is turned on. See also RAM, ROM. Microcomputer Any small computer based on a microprocessor. Microprocessor A programmable circuit built on a single silicon chip. Multimedia The integrated presentation of textual audio and video information. MS-DOS MicroSoft Disk Operating System. The most common operating system used by "IBM compatible" microcomputers. Nameserver A computer in a network responsible for keeping the hostname and IP address mapping tables, and for providing that information on request (usually to other machines, not people directly). Netiquette NETwork etIQUETTE. Originated in Usenet Conventions covering acceptable behavior. Used especially in group contexts--such as listservs and Usenet. Nibble Half of a byte, spec. the first (low order) or second (high order). NIC Network Information Center. Source of information on the network, for both people and machines. Examples include BITNIC (for BITNET) and the Department of Defense Network (DDN) NIC at NIC.DDN.MIL for the Internet in the U.S. which includes a registry of network users, WHOIS.

NOC Network Operations Center. The invisible-to-the-user management for a specific network or network of networks. Node A single computer within a network. OCR Optical Character Recognition. Optical character recognition devices allow computers to read printed information more reliably and faster than it can be typed. Operating system The master set of programs that manage the computer. Among other things, an operating system controls input and output to and from the keyboard, screen, disks, and other peripheral devices; loads and begins the execution of other programs; and manages the storage of data on disks. OSI Open Systems Interconnect. An internationally agreed upon set of standards for computer connection. In some ways it "competes" with TCP/IP. It is not yet widely used, especially in the United States. Overlapping window A method of presenting windows on the screen that allows them to overlap one another, like objects stacked on top of a desk. Port A communications connector on a computer suitable for attaching peripherals, such as a printer or a modem. Post The action of submitting an article to a Usenet newsgroup, or to a BBS. Also, such an article or item. See article. Postscript A standard language used in printing and displaying graphics and text. Developed by Adobe Systems, Inc. Porting Adapting software to run on a different machine or operating system. More broadly, to move something from one arena of activity to another (e.g., from Bitnet to Usenet). Protocol Specific rules defining one part of the transmission and receipt of information across a data communications link. In sets, or suites, they govern communication between entities, including type, size, and format of data units. RAM Random Access Memory. RAM is memory built from silicon chips that is used to store programs and data temporarily before and/or after they are being processed. Real-time Meaning new or interactive, used in contrast to "batch." As a

command or message is issued, it is executed or sent to its destination. For example, one of the requirements of OhioLINK was that it be updated in real-time, e.g. that a cataloging or circulation record would be immediately available on the system rather than placed in a buffer from which it would be added to the system overnight. RFC Requests For Comments. The documents which contain the standards and other information for the TCP/IP protocols and the Internet in general. Also, one such document. They are available at several sites through anonymous FTP. RLOGIN Remote LOGIN. A program which allows remote login, much like Telnet, typically to a machine on which you have an account with the same username and password. RLOGIN usually provides more information to the remote computer than Telnet does. ROM Read-Only Memory. ROM is internal memory that stores information permanently. Thus, the information in ROM can be read but cannot be changed. Router A machine which routes datagrams within a network. See routing. Routing Finding an effective or efficient path through a network to a destination computer. Routing is almost always handled by the network or communication software. RTFM Read The Manual. Abbreviation used to inform someone that they could have answered their own question by consulting the appropriate (usu. obvious) documentation. Server A program (or generically, a computer) that provides services, such as files or access to a database, when they are requested by a (usually remote) "client" program or computer. Smiley See Emoticon. :) SMTP Simple Mail Transfer Protocol. The Internet standard protocol for transferring electronic mail messages. Snail mail Referring to postal or delivery services (such as the U. S. Postal Service) which physically convey a message, in contrast to e-mail. Software The generic term for any program or programs. Speed The rate at which a computing device operates. Speed is not an overall measure of how fast a computer system is (more at

Bandwidth). Synchronous protocol A communications protocol that sends data in packets that do not contain timing signals. Syntax The format which must be followed for the computer to recognize statements or commands. System A computer and the devices (monitor, disk drives, keyboard,...) to which it is directly attached. See also Operating System. Talk Online, real-time exchange of written messages, usually one character at a time. Tl, T3 Standards that represent l.544 megabits (Tl) and 45 megabits (T3) per second transmission speeds in data communications. TCP/IP Transmission Control Protocol/Internet Protocol. The common designation for the Internet suite of protocols. Telnet Internet protocol providing interactive connection to a remote computer. Also, the name of the program implementing the protocol. Terminal A piece of equipment which provides for interactive communication with a computer. Most commonly, this is a keyboard and a monitor, providing only the most basic functions of each. Text editor A program which allows for the generation and modification of a text file. The major difference between a text editor and a word processor is that word processors have more features for formatting text and providing fancy output. Text file Usually, a file which contains only ASCII characters. Tiled window A method of displaying windows in which no two windows overlap. tn3270 A version of the Telnet software which allows connection to IBM mainframes by emulating a popular IBM terminal, the "3270" terminal. Transparency Word used to describe a program action that occurs automatically and usually without the user being aware of it. For example, the details of how a file is stored on the tracks and sectors of a disk are transparent to the user. UNIX An operating system available for a wide range of computers.

Originally developed at AT&T Bell Labs. Upload To transfer files from your local machine to another using communications software. Upward compatibility A piece of hardware is upwardly compatible if it can do everything the previous model could. System software is upwardly compatible if it supports all of the application programs available for the previous release. Usenet The set of people who exchange articles tagged with one or more universally-recognized labels, called "newsgroups" (or "groups" for short). From "What is Usenet?", a Usenet FAQ. Usenet News A means of communication for people with common interests. Usenet NEWS is arranged into newsgroups. Messages, called articles, can be contributed to these newsgroups. More at Usenet, Article. User The person using a computer, or computing device. Generically, anybody using anything. User interface A protocol for communicating between the computer and the user. Username or User ID The unique name by which you are known to a computer and, in turn, other users of that computer. UUCP Unix to Unix Copy Program. A networking protocol with less functionality than TCP/IP which is used by Usenet. VAX Virtual Array eXtension. A high performance computer system manufactured by Digital Equipment Corporation. VERONICA Very Easy Rodent-Oriented Net-wide Index to Computerized Archives. A recent (late 1992) index of Gopher servers with increasing sophistication--such as adding Boolean capabilities. VMS Virtual Memory System. An operating system used by Digital Equipment Corporation's VAX computers. VT1OO A standard terminal type, supported by many computer systems, and emulated by many terminals or personal computers which are not themselves VT1OO terminals. WAIS Wide Area Information Server. Client-server software providing

searching of and retrieval from various databases. Based on Z39.50 protocols and developed by Thinking Machines, Inc. Wild card character A character which specifies that "anything" could go in its place. A character used to specify a whole category of items. Window A region of a screen through which part of a file or some data in memory can be viewed. Some programs allow windows to be split into several parts each called windows panes. Windows Usually a specific reference to Microsoft Windows graphical user interface. World-Wide Web (W3) A system which provides hypertext access to a large universe of documents via the Internet. W3 may be accessed from many points (ex. subject area or type of service), since it is not hierarchical. WYSIWYG What-You-See-Is-What-You-Get. Refers to programs that attempt to make screen output and paper output look the same. X.25 A data communications protocol developed to govern how data passes into and out of public data communications networks such as Telenet and Tymnet. X.400 The OSI model which is intended to replace SMTP. X-Windows A UNIX-based windowing environment. Z39.50 A U.S. based protocol (with international, OSI, counterparts) that provides for the exchange of information, such as full text or catalog records, between dissimilar computer systems. Appendix B - Bibliography

Alberti, Bob, et. al. The Internet Gopher Protocol. University of Minnesota Mic rocomputer and Workstation Networks Center, 1992. [Available from host boombox.micro.umn.edu, pub/gopher/gopher_protocol directory, filename protocol.txt or protocol.MacWrite II.hqx] Barron, Billy., UNT's Accessing On-Line Bibliographic Databases. Denton, TX: U niversity of North Texas, 1991. [Available by anonymous FTP from host ftp.unt.edu., director y library, filenames libraries.ps, libraries.txt, libraries.con, libraries.adr, libraries.w p]

A directory to library catalogs around the world that are accessible over the Int ernet. Beckwith, Don., "Creative Group Problem Solving: An Innovative Computer Applica tion to Facilitate Learning and Retention of Difficult Scientific Principles", Collegiat e Microcomputer, 11(2) (May 1993): 70-74. Benedikt, Michael ed., Cyberspace: First Steps, p. 444, MIT Press, Cambridge, M A, 1991. $15.95. ISBN 0-262-02327-X. An anthology of sociological examinations of networks and related topics, by writ ers, scholars, and public figures. Edited by a professor of Architecture at the Univ ersity of Texas. Berners-Lee, T.J., R. Caillisau, J-F Groff, B. Pollerman., "World-Wide Web: The Information Universe," Electronic Networking: Research, Applications and Policy. 2(1) (Spr ing 1992). Bowers, Karen, et. al. FYI on Where to Start: A Bibliography of Internetworking Information. Network Working Group, Request for Comments 1175, August 1990. [Available by anonymous FTP from host ftp.nisc.sri.com, directory rfc, filename rfc1175.txt] Bransford, John D., Robert D. Sherwood, Ted S. Hasselbring, Charles K. Kinzer, a nd Susan M. Williams., "Anchored Instruction: Why We need It and How Technology Can Help ", Cognition, Education, Multimedia: Exploring Ideas in Higher Technology. Hillsda le, NJ: Lawrence Erlbaum, 1990. Bruce, Bertram C. and Andee Rubin. Electronic Quills: A Situated Evaluation of Using Computers for Writing in Classrooms. Hillsdale, NJ: Lawrence Erlbaum, 1993. Bunnell, Aaron. "Know Your Rights: Interactive ACLU", NewMedia, 3(1) (January 1 993): 29. Bunnell, David, ed. NewMedia. San Mateo, CA: Hypermedia Communications. (mont hly magazine) Chew, John J., Internet Mail Guide. [Available by anonymous FTP from host ftp. msstate.edu., password: user-id@institution, cd/pub/docs, get internetwork-mail-guide]

Comer, Douglas., Internetworking with TCP/IP; Volume 1: Principles, Protocols, and Architecture. Second edition. Englewood Cliffs, NJ: Prentice-Hall, 1991. Comer, Douglas., "A guide to RFCS," Internetworking with TCP/IP, Volume 1: Prin ciples, Protocols, and Architecture. Second edition. Englewood Cliffs, NJ: Prentice-Ha ll, 1991, p. 441-475. Dempsey, Lorcan., Libraries, Networks and OSI: A Review with a Report on North American Developments, 1992 Edition. Westport, CT: Meckler. Denning, Peter., Computers Under Attack: Intruders, Worms, and Viruses, p. 574, ACM Press/Addison-Wesley, Reading, MA, 1990. $23.95. ISBN 0-201-53067-8. Details of celebrated network security cases, including those described in the pr evious two books. Includes Stoll's original article about the Wiley Hacker, and respon ses and articles by others on the same subject. Has extensive coverage of the 1988 Inte rnet Worm. Also includes information on viruses. Has quite a bit of material on the cultures of the networks, and on social, legal, and ethical matters. Starts with the standa rd historical network papers, including "Notable Computer Networks" by Quarterman and Hoskins. Dern, Daniel P., The New User's Guide to the Internet, McGraw-Hill, New York, f orthcoming in 1993. ISBN 0-07-016510-6 (hc). ISBN 0-07-16511-4 (pbk). A forthcoming new user guide, not yet seen. Deutsch, Peter., archie -An Electronic Directory Service for the Internet. [Av ailable by anonymous FTP from host archie.mcgill.ca, directory/archie/pub, filename whatis. archie] Deutsch, Peter., "Resource Discovery in an Internet Environment--'The Archie Ap proach,' Electronic Networking: Research, Applications and Policy, 2(1) (Spring 1992): 4 5-51. Duffy, Thomas M. and David H. Jonassen, eds., Constructivism and the Technology on Instruction: A Conversation. Hillsdale, NJ: Lawrence Erlbaum, 1992. Farley, Laine, ed., Library Resources on the Internet: Strategies for Selection and Use. Chicago, IL: Reference and Adult Services Section, American Library Association, 1991.

[Available by anonymous FTP from host dla.ucop.edu, directory pub/internet, file name libcatguide] The essential user's guide to Internet-accessible library catalogs. Frey, Donnalyn and Rick Adams., !%@: A Directory of Electronic Mail Addressing and Networks, p. 436, O'Reilly & Associates, Sebastopol, CA, January 1991. $26.95. ISBN 0-937-17515-3 (pbk.). A quick desk reference to many networks, with two pages on each one. Gross, Robert A. "The Machine-Readable Transcendentalists: Cultural History on the Computer", Journal of Computing in Higher Education, 1(1) (March 1989):92-116. Guthrie, John T. and Mariam Jean Dreher., "Literacy as Search: Explorations Via Computer", Cognition, Education, Multimedia: Exploring Ideas in High Technology. Hillsdale , NJ: Lawrence Erlbaum, 1990. Hafner, Katie and John Markoff., Cyberpunk, p. 368, Simon & Schuster, New York, 1991. $22.95. ISBN 0-671-68322-5. Interviews with some of the crackers who have appeared conspicuously in the press in the past few years. One of the co-authors is the New York Times reporter who br oke the Stoll story to the public. Henry, Marcia Klinger., Search Sheets for OPACs on the Internet: A Selective Gu ide to U.S. OPACs Utilizing VT100 Emulation. Westport, CT: Meckler, 1991. The title says it all. Horton, Mark and Gene Spafford. Rules of Conduct on USENET. Kahin, Brian ed., Building Information Infrastructure: Issues in the Developmen t of the National Research and Education Network, p. 446, McGraw-Hill Primis, New York, 1992. $34. 95. ISBN 0-390-03083-X. Includes the entire text of the High Performance Computing Act (HPCA) of 1991 th at authorized the forthcoming National Research and Education Network (NREN), as we ll as numerous examinations of what it does and should mean. Papers from a workshop at Harvard's Kennedy School of Government. Tough sledding in spots, but very rewar ding in others. Kehoe, Brendan P., Zen and the Art of the Internet: A Beginner's Guide to the I

nternet. 2nd edition. Englewood Cliffs, NJ: Prentice-Hall, 1993. [The first edition is ava ilable by anonymous FTP from host ftp.cs.widener.edu, directory pub/zen, filename zen-1.0P S (PostScript version)] Simple explanations of electronic mail, remote login, file transfer, and Usenet n ews. Kochmer, Jonathan and NorthWestNet., The Internet Passport: NorthWestNet's Guide to Our World Online, 4th ed., p. 450, NorthWestNet, Bellevue, WA, 1993. $39.95. ISBN 0-9635281-0-6. info@nwnet.net A forthcoming guide and catalog, not yet seen. It is paradoxically both the four th edition of and the successor to the other NorthWestNet book listed later. Krol, Edward., The Hitchhiker's Guide to the Internet. Network Working Group, Request For Comments 1118, 1989. [Available by anonymous FTP from host ftp.nisc.sri.com, di rectory rfc, filename rfc 1118.txt] This often-cited guide to the Internet often rambles into technical back alleys b est not travelled by novices. Krol, Edward., The Whole Internet sociates, Inc., Sebastopol, CA, 13 September 1992. Perhaps the most ambitious of the ide and a catalog of resources in one. It the Internet for research. User's Guide & Catalog, p. 376, O'Reilly & As $24.95. ISBN 1-56592-025-2. new crop of books, this one is both a user's gu is aimed at graduate students who want to use

Lane, Elizabeth S. and Craig A. Summerhill., An Internet Primer for Information Professionals: A Basic Guide to Networking Technology, p. 200, Meckler Corp., We stport, CT, forthcoming in 1992. $37.50. ISBN 0-88736-831-X. This book, not yet seen, is apparently aimed at information professionals, presum ably meaning librarians and others. LaQuey, Tracy L., User's Directory of Computer Networks. Bedford, MA: Digital Press, 1990. LaQuey, Tracy and Jeanne C. Ryer., The Internet Companion: A Beginner's Guide t o Global Networking, p. 208, Addison-Wesley, Reading, MA, October 1992. $10.95. ISBN 0-201-62224-6. [Available online by anonymous FTP from world.std.com, two chapt ers a month] This is the least expensive introductory guide for new users of the Inter net, and perhaps

the only one aimed at the general public. Levy, Steven., Hackers: Heroes of the Computer Revolution, p. 473, Anchor Press /Doubleday, Garden City, NY, 1984. $17.95. ISBN 0-385-19195-2 (hc). $4.95. ISBN 0-440-1340 5-6 (pbk). Tales of the real hackers who invented the modern computer industry. Some of the se people are still quite active on the nets today. Lincoln, Barbara., Wide Area Information Servers (WAIS) Bibliography. [Availab le online on host quake.think.com, directory /pub/wais/wais-discussion, filename bibliography.txt] Lottor, Mark K., Internet Growth (1981-1991). Network Working Group, Request F or Comments 1296, January 1992. [Available by anonymous FTP from host ftp.nisc.sri .com, directory rfc, filename rfc1296.txt] How the lnternet has grown in recent years. Low, Lafe, ed. High Color. Camden, ME: Imagetech Publications. (bi-monthly mag azine) A bi-monthly magazine of PC graphics and video. Lynch, Clifford A., "Information Retrieval as a Network Application" Library H i Tech, 32(4), 1990 pp. 57-72.

Lynch, Clifford & Cecilia Preston., "Internet Access to Information Resources." Annual Review of Information Science and Technology. (1990) 26:263-312. A survey article that ranges from Memex to NREN

Lynch, Daniel C. and Marshall T. Rose, eds., The Internet System Handbook, p. 8 22, Addison-Wesley, Reading, MA, 1993. $40. ISBN 0-201-56741-5. A description of the process that produces Internet Standards, and some other use r level material in addition to protocol material. Malamud, Carl., Exploring the Internet: A Technical Travelogue, p. 376, Prentic e-Hall, Englewood Cliffs, NJ, August 1992. $26.95. ISBN 0-13-296898-3. Many fine lunches and dinners with users, administrators, and developers of the I nternet in many countries around the world, with accurate technical background. Certain ly the most wickedly funny of all the books about the Internet. Contains a subplot abo

ut how and why ITU and ISO do not publish their standards online. Malamud, Carl., Stacks: Interoperability in Today's Computer Networks. Englewo od Cliffs, NJ: Prentice-Hall, 1992. A discussion of networks, network protocols and standards, and related issues. Malkin, Gary Scott and April N. Marine., FYI on Questions and Answers: Answers to Commonly asked "New Internet User" Questions. Network Working Group, Request fo r Comments 1325, February 1991. [Available by anonymous FTP from host ftp.nisc.sr i.com, directory /rfc, filename rfcl325.txt] A good introduction for new users. Marine, April, ed., Internet: Getting Started, p. 380, SRI International, Menlo Park, CA, September 1992. $39.00. ISBN [none]. How to join the Internet, and some context so you will know why. This book is no t a guide, and not a catalog, but it does contain numerous contact listings. Markoff, John., "For the PC User, Vast Libraries," New York Times, (July 3, 199 1):Cl. McClure, Charles R., Ann P. Bishop, Philip Doty, and Howard Rosenbaum, eds., Th e National Research and Education Network (NREN): Research and Policy Perspectives . Norwood, NJ: Ablex, 1991. One of the only resources that covers research and policy issues. McLaughlin, Pamela W., et al., Beyond the Walls: The World of Networked Informa tion: An Instructional Workshop Package. Syracuse, NY: Syracuse University, 1991. McMillan, Tom, ed. Computer Artist. Tulsa, OK: Pennwell Publishing Corp. (bimonthly magazine) A bi-monthly magazine for creative professionals. Nix, Don., "Should Computers Know what You Can do With Them?", Cognition, Educa tion, Multimedia: Exploring Ideas in Higher Technology. Hillsdale, NJ: Lawrence Erlba um, 1990. Nix, Don and Rand Spiro, eds., Cognition, Education, Multimedia: Exploring Idea s in High Technology. Hillsdale, NJ: Lawrence Erlbaum, 1990.

National Science Foundation Network Service Center., Internet Resource Guide. Cambridge, MA: NSF Network Service Center, 1989. [Available by anonymous FTP from host nnsc.nsf.net, directory resource-guide] The "official" directory of Internet resources. Very incomplete. Papert, Seymour. Mindstorms: Children Computers and Powerful Ideas. New York, NY: Basic, 1980. Parkhurst, Carol A., ed., Library Perspectives on NREN: The National Research a nd Education Network, p. 86, LITA, Chicago, 1990. $10.50. ISBN 0-8389-7477-5. Another NREN policy anthology; this one oriented towards library uses. Polly, Jean Armour., "Surfing the Internet: An Introduction." Wilson Library B ulletin, 66(10) (June 1992): 38-42+. An overview to key Internet resources. Porter, Stephen, ed. Computer Graphics World. Tulsa, OK: Pennwell Publishing C orporation. (monthly magazine) A monthly magazine on computer graphics. Quarterman, John S., The Matrix: Computer Networks and Conferencing Systems Wor ldwide. Bedford, MA: Digital Press, 1990. The essential reference guide to computer networks describing the infrastructure of the Internet and its constituent networks. Quarterman, John S. and Susanne Wilhelm., UNIX, POSIX, and Open Systems: The Op en Standards Puzzle, p. 446, Addison-Wesley, Reading, MA, 1993. $42.50. ISBN 0-201-52772-3. Context about open systems standards. Includes a very brief history of the Inte rnet, comments on the effects of networks on standards and the reverse, commentary o n the benefits of publishing standards online, and an in-depth examination of the IET F standards process used to produce Internet Standards. Also includes an Internet growth graph. Rapaport, Matthew., Computer Mediated Communications: Bulletin Boards, Computer Conferencing, Electronic Mail, and Information Retrieval. NY: Wiley, 1991. Raymond, Eric S. ed., Guy Steele., The New Hacker's Dictionary, p. 453, MIT Pre ss, Cambridge, MA, 1991. ISBN 0-262-18145-2 (hc). $10.95. ISBN 0-262-68069-6 (pbk).

The authority on hacker jargon, and a very amusing book. Look it up in here when you doubt a definition in the press. Shaffer, Deborah, Henri Devries, and Gregory Parham. Exploring Internet Trainin g Series, Module 1-Exploring Internet: Using your Computer to Communicate. Shaffer, Deborah, Henri Devries, and Gregory Parham. Exploring Internet Trainin g Series, Module 2-Mail-based Information and Delivery: Almanac and Listserv. Shapiro, Norman, et al. Towards an Ethics and Etiquette for Electronic Mail. S anta Monica, CA: Rand Corporation (publication R-3283-NSF/RC), 1985. Shapiro, Rand J. and Jihn-Chang Jehng. "Cognitive Flexibility and Hypertext: Th eory and Technology for the Nonlinear and Multidimensional Traversal of Complex Subject M atter", Cognition, Education, Multimedia: Exploring Ideas in Higher Technology. Hillsda le, NJ: Lawrence Erlbaum, 1990. Sloan, D. ed., The Computer in Education: A Critical Perspective. New York, NY: Teachers College Press, 1985. Stanton, Deidre E., Using Networked Information Resources: A Bibliography. Per th, WA: Author, 1992. [Available by anonymous FTP from host infolib.murdoch.edu.au, dir ectory pub/bib, filename stanton.bib or stanton.bib.wp] A bibliography on networked information resources, both print and electronic. Stein, Richard., "Browsing Through Terabytes," BYTE, (May 1991): 157-164. The full list of Internet and BITNET electronic discussions. Sterling, Bruce., The Hacker Crackdown: Law and Disorder on the electronic fron tier, p. 352, Bantam, New York, 1992. $23. ISBN 0-553-08058-X. An in-depth examination of the forces of law who try to deal with computer crime, and of the issues involved, written by one of the science fiction writers who invented cyberpunk. The real story behind Operation Sundevil and the Legion of Doom. Readable, info rmative, amusing, and necessary. Stoll, Clifford., The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, p.

332, Doubleday, New York, 1989. $19.95. ISBN 0-385-24946-2 A spy novel, except it's true: a first person account by a ley astronomer who with others tracked down a KGB network spy. y concentration on cracking, still a readable introduction to about.

(alk. paper). down-on-his-luck Berke Despite its necessar what the Internet is

Strangelove, Michael and Diane Kovacs., Directory of Electronic Journals, Newsl etters and Academic Discussion Lists. Washington, DC: Association of Research Libraries, 1 992. [The electronic journals portion is available by sending the message GET EJOURNLL DIR ECTRY and GET EJOURNL2 DIRECTRY to listserv@acadvm l.uottawa.ca; the academic discussi on lists portion is available by sending the messages GET ACADLIST FILE l, GET ACAD LIST FILE2 ... GET ACADLIST FILE7 to LISTSERV@KENTVM.BITNET] Organized into two parts: 1) Journals and Newsletters and, 2)Academic Discussion Lists and Interest Groups. This guide is a directory to these resources with subject categorization of academic discussion lists. St. George, Art and Ron Larsen., Internet-Accessible Library Catalogs and Datab ases. Albuquerque, NM: University of New Mexico, 1991. [Available by anonymous FTP fr om host ariel.unm.edu, directory library, filename internet.library] A thorough directory of library catalogs on the Internet. Organized geographical ly. Tennant, Roy., "Internet Basic Training: Teaching Networking Skills in Higher E ducation," Electronic Networking: Research, Applications and Policy. 1(2) (Winter 1991): 37 -46. Tennant, Roy, John Ober, Anne G. Lipow, and Foreword by Clifford Lynch., Crossi ng the Internet Threshold: an Instructional Handbook, p. 142, 1993. $45.00. ISBN 1-882 208-01-3. simsc.si.edu:networks/crossing.ad A short textbook on using the Internet, by two librarians at the University of Ca lifornia at Berkeley. Tiller, David A. "World Peace and Natural Writing Through E-mail", Collegiate M icrocomputer, 11(2) (May 1993): 67-69. Todino, Grace. Using UUCP and Usenet. Fourth ed. Revised by Tim O'Reilly and D ale Dougherty. Newton, MA: O'Reilly & Associates, 1987.

Turkle, S. The Second Self: Computers and the Human Spirit. New York, NY: Simo n & Schuster, 1984. An in-depth study of how computers affect learning and development. Updegrove, Dan, John Muffo, and Jack Dunn. Electronic Mail and Networks: New To ols for Institutional Research and Planning. University of Pennsylvania, PA. Von Ropach, Chuq. A Primer on How to Work with the USENET Community. Wallace, Louis R., ed. Desktop Video World. Peterborough, NH: Techmedia Publis hing. (bimonthly magazine) Presents articles and reviews of current desktop video editing software and hardw are. Weizenbaum, J. Computer Power and Human Reason: From Judgement to Calculation. San Francisco, CA: Freeman, 1976. An early but important reference which takes a less optimistic stand on the use o f computers. Yanoff, Scott. Special Internet Connections. [Available by anonymous FTP to cs d4.csduwm.edu and GET pub/inet.services.text] "Communications, Computers and Networks." Scientific American [Special issue]. 265(3) (September 1991). This issue is devoted to computer networks. Computers and the Humanities: Official Journal of The Association for Computers and the Humanities. Dordrecht, Netherlands: Kluwer Academic Publishers. (bimonthly jour nal) A Guide to Electronic Communication and Network Etiquette Revised and submitted by Joan Garango, edited by Ivars Balkits, Computing Service s; University of California Davis. Heartland Free-Net Registered User Guidelines. Bradley University; Peoria, IL. High Performance Computing Act of 1991. Passed by the U.S. Congress, and signed into law by President Bush on December 9, 1991. The public law that enables development of the National Research and Education Network.

Interest Groups. Menlo Park, CA: SRI International, Network Information Systems Center, 1992. [Available by anonymous FTP from host ftp.nisc.sii.com, directory netinfo , filename interest-groups] Journal of Computing in Higher Education. Ashfield, MA: Paideia Publishers. (bi annual journal) NNSC, Internet Resource Guide, p. 240, NSF Network Service Center (NNSC), BBN, Cambridge, MA, 1991. $15. ISBN [none]. nnsc.nsf.net:resource-guide/README. The original Internet Resource Guide. NorthWestNet, NorthWestNet User Services Internet Resource Guide, p. 297, NorthW estNet, Bellevue, WA, 1992. $20. ISBN [none]. NorthWestNet's Resource Guide. Terms and Conditions of Membership and Affiliation. CREN Information Center, Oc tober 25, 1990. Appendix C - List of Participants

Faculty Joseph Adler Michael Brint John Elliott Laurie Finke Mortimer Guiney GUINEY Robert Hinton Rita Kipp Joseph Klesner KLESNER Arthur Leccese LECCESE David Marcey Theodore Mason MASONTE Sarah Murnen Micah Rubenstein Ronald Sharp Ric Sheffield Judy Smith Gregory Spaid Patricia Urban Stephen Van Holde Administrators Reed Browning Thomas Moberg Anne Ponder BROWNINR MOBERG PONDER ADLERJ BRINTM ELLIOTTJ FINKEL HINTON KIPP MARCEY MURNEN RUBENSTEINM SHARP SHEFFIER SMITHJU SPAIDG URBAN VANHOLDE

username@KENYON.EDU

Instructors, Presenters and Session Trainers Greg Carter CARTERG Mike Fox FOXM Patricia Geschwent GESCHWENTP David Lilly LILLY Jami Peelle PEELLE Bill Quimby QUIMBY Jennifer Ross ROSSJ David Shea SHEA Scott Siddall SIDDALL Paul Gherman GHERMANP Jo Rice RICE Elizabeth Forman FORMANL Nadine George GEORGE Carmen King KING Andrea Peakovic PEAKOVIC Appendix D - Faculty groups for Thursday's Exploratory Sessions

Department Interdisciplinary theme1 selected: Group 1: John Elliott Laurie Finke Mort Guiney David Marcey Greg Spaid Group 2: Joseph Adler Religion Joseph Klesner Political Science Ted Mason English Sarah Murnen Psychology Ric Sheffield Sociology, Legal St. Group 3: Art Leccese Psychology Micah Rubenstein Music Ron Sharp English Pat Urban Anthropology Steve VanHolde Political Science Group 4: Political Science Womens & Gender St. MLL - French Biology Art Coach(es):

Michael Brint Robert Hinton Rita Kipp Judy Smith

IPHS History Anthropology English

1 Interdisciplinary themes: abortion, AIDS, censorship, environment, fine arts a nd politics, homelessness, labor, race and diversity, technology and society Appendix E - Reserve Room Reading List

The following books may be found on reserve in the library listed under the cour se title "Pew". Goodwin, Tim, ed., Frequently Asked Questions list for comp.mail.mime. from In ternet. Krol, Ed. The Whole Internet: user's guide and catalog. Sebastopol, CA: O'Reil ly & Associates. 1993. Krol, Ed., FYI on "What is the Internet?". University of Illinois, IL: E. Hoff man Merit Network, Inc. 1993. Kehoe, Brendan P. Zen and the Art of the Internet: a beginner's guide. Englewo od Cliffs, NJ : PTR Prentice Hall. 1993. Malkin, G., FYI on Questions and Answers: Answers to Commonly asked "Nes Inter net User" Questions. Xylogics. SRI. 1992. Martin, J., There's Gold in them thar Networks! Ohio State University, OH. 199 3. Tennant, Roy. Crossing the Internet Threshold: an instructional handbook. Berk eley : Library Solutions Press. 1993. Appendix F - Issues

The following is a list of major issues for the Summer Institute on Academic Inf ormation Resources. Intellectual property and copyrights

Ethics and morality issues

Censorship

"Netiquette"

Commercialization of the Internet

The Internet is an ocean, not a swimming pool: Locating information Security of information "Quality" of information

Verifiability of information; citation of Internet resources

Use of these new technologies in the first two years of the undergraduate curriculum

The Institute promotes what cannot be provided to all as quickly as they would like. Appendix G - Pre-Institute Assignment page 2 of pree ccccc Utility Diskette This document explains what is contained on the Summer Institute Utility Disk, h ow to install the software on your microcomputer, and where the software is installed on your microcomputer. Contents File What is it

PKZIP.EXE DOS Program which allows you to compress one or more files befor e transferring over the Internet. The resulting file is created with the extension .EXE. The docum entation for using this program is contain within the program itself. The documentation may be

displayed by typing PKZIP at the DOS prompt. PKUNZIP.EXEDOS Program which allows you to decompress a ZIPed file created with PKZIP. The documentation for using this program is contained in the program itself. The documentation may be displayed on screen by typing PKUNZIP at the DOS prompt. UUENCODE.EXEDOS Program which allows you to encode a BINARY file into ASCII text to be transferred over the Internet. The resulting file is created with the extension .UUE. The documentation for using this program is contained in the program itself. The documentation may be displayed on screen by typing UUENCODE at the DOS prompt. UUDECODE.EXEDOS Program which allows you to decode a UUENCODed file. The docume ntation for using the program is contained in the program itself. The documentation may be displayed on screen by typing UUENCODE at the DOS prompt. GIFPRT.EXEDOS Program which allows you to view and print .GIF (Graphic Interchan ge Format) files. GIF sample files are included. The documentation for using this program is contained in the file GIFPRT.DOC. The documentation can be displayed and printe d out with WordPerfect. PSP.EXEWindows Program which allows you to view, alter, and Interchange Format) files. The documentation for using this program is gram itself under the HELP menu. The documentation can be displayed on HELP from the main menu and selecting INDEX to display a list of Installing 1.Insert the Summer Institute Utility Disk in the A: drive (or B:). 2At the DOS prompt (i.e. C:\>) type A: (or B:) and press the ENTER key. 3.At the DOS prompt (i.e A:\> or B:\>) type INSTALL and press the ENTER key. Where are the programs installed? print .GIF (Graphic contained in the pro screen by selecting topics.

1.PKZIP.EXE, PKUNZIP.EXE, UUENCODE.EXE, UUDECODE.EXE, GIFPRT.EXE, and all .GIF f iles are installed in C:\UTILITY. 2.PSP.EXE is installed in C:\PSP. Index{45}

Access Files55 Account22, 24, 50, 54, 55, 59-61, 65, 70, 145, 173, 184, 195 Address5, 7, 8, 10-13, 22-25, 29, 36, 47-49, 59-61, 64, 65, 68, 76, 77, 79-81, 9 5, 100, 105, 121, 173, 180, 181, 182 Anonymous FTP47, 63, 76, 83, 98, 101, 102, 104, 173, 184, 189-197 Archie24, 26, 48, 82, 86, 102-105, 173, 190 Archive11, 47, 84, 99, 173 ARPANet173 ASCII18, 66, 67, 70-72, 74, 75, 77, 79-81, 130, 174, 178, 185, 204 Authoring Tools136, 137 Backbone174 Bandwidth174, 185 Baud174 Binary file73, 82, 84, 85, 174, 204 Bit13, 33, 70, 76, 95, 174, 175, 190 BITNET5, 6, 13, 22, 23, 48, 88, 101, 105, 125, 126, 129, 130, 174, 176, 178, 181 -183, 195 Byte71, 72, 175, 182, 195 CARL UnCover145, 146 CCITT175, 181 Change directory65 Client28, 70-72, 82-85, 92-96, 98, 101, 103, 104, 176, 180, 184, 187 Close16, 54, 55, 58, 66, 67, 75, 77-81, 133 Compress39, 40, 175, 204 Copy3, 12, 16, 34, 36, 37, 41-44, 48, 50, 54, 58, 82, 85, 90, 97, 102, 105, 165, 178, 187 Courseware136-138 Cross-post176 Crossnet176 Datagram177 Delete16, 17, 25, 30, 37-41, 46, 51-53, 56-58, 67, 90, 142 Directory Service102, 177, 190 Discussion Group5, 7-11, 49 Distribution List35, 36, 128 Domain22-29, 59, 64, 66, 68, 76, 83, 95, 98, 103, 119, 138, 177, 179 Domain Name22, 24, 26, 28, 76, 95, 177, 179 Downloading47, 48, 178 E-mail5, 7, 8, 11, 22, 24, 45-48, 50, 76, 95, 119, 130, 145, 147, 150, 154, 158, 174, 178, 180, 184, 196 E-serial178 E-text126, 178 EARN3, 82, 88, 97, 101, 102, 105, 178 Emoticon178, 184 Emulation178, 191 Escape178 Exit16, 17, 19, 21, 25, 30, 31, 36-38, 47, 53-55, 58, 60, 66, 76, 78, 89, 95 Extract16, 18, 33, 34, 36, 37, 54, 57, 169 FAQ179, 186 Finger24, 27-29, 179 Flame49, 179 Folder8, 30-34, 38-40, 42, 43 Forward16, 30, 34, 35, 48, 58, 89, 106 Freenets59, 62, 179 FTP27, 28, 47, 48, 61, 63-77, 79-83, 86, 98, 101, 102, 104, 105, 119, 126, 173, 178, 179, 184, 189-197 Gateway94, 179 Gopher82-86, 88-94, 97, 102, 131, 180, 187, 189

Help12, 16, 26, 27, 31, 32, 52, 54, 55, 63, 67, 84, 85, 87, 89, 90, 95, 100, 105 , 134, 137, 139, 189, 204 Host12, 22, 23, 26, 28, 47, 50, 59, 64, 66, 70, 72, 75, 76, 95, 105, 180, 189-19 7 Hostname59, 64, 68, 83, 91, 180, 182 HYTELNET178, 180 IMHO49, 180 Index84-86, 93, 99, 100, 117, 118, 143, 144, 149-153, 157, 159, 162, 163, 165-16 7, 187, 204, 205 Internet3, 5, 9-12, 18, 22-27, 29, 33, 45, 46, 48, 59-61, 63-65, 82, 84, 88, 93, 98, 102, 107, 115, 116, 125, 126, 130, 138, 145, 173, 174, 176, 178, 180-182, 184, 185, 187, 189-1 97, 200, 201, 204 IP (Internet Protocol)173 IP address64, 68, 95, 180-182 ISDN175, 181 JANET181 KCinfo92 Knowbot63, 181 List-Request5, 6 Listserv (listserver)181 Login23, 24, 26-28, 33, 55, 56, 59, 61-63, 65, 76, 83, 90, 93, 98, 102, 179, 181 , 184, 191 Logout76, 78, 181 Mail5-8, 10-12, 16, 20, 22-24, 27-50, 52, 53, 57, 58, 61, 76, 86-90, 92, 95, 99, 101-103, 105, 115, 116, 119, 130, 145, 147, 150, 154, 158, 166, 174, 178-180, 184, 189-191, 194-19 6, 200 Move15-17, 20, 23, 31, 36, 38, 42-44, 56, 64, 89, 92, 183 MS-DOS177, 178, 182 Multimedia132-137, 180, 182, 189, 191, 193, 195 Nameserver182 NIC24, 26, 182 Node23, 182 Operating system14, 64, 65, 174, 177, 179, 182, 183, 185-187 OSI183, 188, 190 Personal Name36 Print16, 30, 31, 37, 53, 54, 58, 71, 85, 89, 90, 92, 116, 125, 143, 147, 152, 16 9, 195, 204 Protocol47, 64, 70, 84, 94, 173, 179, 181, 183-189, 193 Quit25, 38, 67, 68, 75, 76, 78-81, 84, 85, 89, 90, 92, 95, 100 Read8, 11, 15, 16, 18, 28, 30, 32-39, 41-43, 47, 51, 52, 55, 57, 76, 92, 93, 97, 116, 132, 138, 162, 175, 176, 183, 184 Real-time183-185 Receive5, 7, 8, 10, 12, 30-32, 34, 36, 40, 41, 44, 63, 68, 175 Reply7, 12, 16, 29-31, 34, 49, 52, 53, 57, 58 Retrieve11, 30, 38, 71, 74, 82, 94, 114, 119, 126, 130 RFC184, 189, 191-193 RLOGIN184 Router184 Routing184 Search25-27, 36, 40, 41, 63, 82, 84-89, 96, 98, 104, 112, 114, 115, 138, 141, 14 2, 145, 148-150, 154, 157, 158, 160-162, 164, 181, 191 Select9, 15, 17, 25, 31, 32, 38-40, 43, 63, 85, 92, 131 Send5, 7-12, 16, 20, 22, 23, 29, 30, 32-36, 41, 42, 44, 45, 47, 48, 57, 58, 68, 88, 90, 101, 104,

105, 115, 119, 124, 130, 145, 175, 176 Server8, 9, 18, 21, 25, 27, 28, 69, 70, 75, 76, 78, 82-84, 92-94, 98, 99, 102-10 5, 117, 124, 176, 180, 184, 187 Smiley178, 184 SMTP184, 188 Speed59, 107, 174, 185 Subscribe6-8, 50, 88, 101, 105, 125 TCP/IP82, 98, 173, 179, 181, 183-185, 187, 190 Telnet24-26, 47, 59-63, 82-86, 93, 95, 97, 98, 102, 103, 179, 184-186 Text file18, 19, 33, 53, 54, 58, 70, 72, 79, 84, 85, 95, 185 tn3270186 UNIX65, 83, 94, 95, 98, 102, 103, 186-188, 194 Unsubscribe7, 12, 49, 50 Usenet13, 14, 16, 17, 48, 57, 58, 84, 88, 101, 102, 174, 176, 179, 180, 182, 183 , 186, 187, 191, 196 Usenet News13, 14, 16, 17, 57, 58, 179, 186, 191 Username or User ID186 UUCP187, 196 VERONICA86, 88, 187 VMS14, 30, 44, 57, 58, 65, 71-75, 83, 94, 98, 99, 103, 187 VT10061, 93, 178, 191 WAIS82, 93-96, 187, 192 Wastebasket30, 32, 38, 42 Windows87, 94, 98, 102, 106, 107, 133, 135, 137-139, 180, 183, 186-188, 204 World-Wide Web (W3)187 X.25187 X.400188 Z39.5094, 187, 188 FOOTNOTES******************************** {1} {2} {3} {4} {5} {6} {7} This article was written by Scott Siddall. This article was written by Scott Siddall. This article was written by Jo Rice. This article was written by Jo Rice. This article was written by the ICS staff. This article was prepared by Patricia Geschwent. This text was adapted from the help screens in Netfind.

{8} This text was adapted from whois-servers.list. ftp sipb.mit.edu; login anonymous; cd /pub/whois; get whoisservers.list To get a current list of whois servers on Internet, please ftp the above citation. {9} This text is adapted from ftp a.gp.cs.cmu.edu; login: anonymous; password: user-id@institution; cd /afs/cs.cmu.edu/user/mkant/Public/Email {10} This article was written by the ICS Staff.

{11} This article was written by Arlene H. Rinaldi, Computer User Services, Florida Atlantic University, 1992. {12} {13} {14} {15} {16} This article was written by Jo Rice. This article was written by Scott Siddall. This exercise was written by Patricia Geschwent. This article was written by Greg Carter. These exercises were created by Mike Fox.

{17} This document has been compiled and produced by the EARN Association. Permission to copy all or part of this document without fee is granted provided the copies are not used for commercial advantage and that the EARN Association is cited as the source of the document.

{18} The following material is extracted from a larger document being written by Bev Actis. Portions of it were adapted from information from the Indiana University-University Computing Services. {19} This exercise was prepared by Bill Quimby.

{20} The following is excerpted from an article titled "Shopping for Information on the Internet with WAIS" by Lynn Ward, in UIUCNET, October 1992, Vol. 5, No. 6. UIUCNET is a newsletter produced at the University of Illinois. Permission to reprint all or part of UIUCnet for non-profit purposes is granted, provided full acknowledgement of the original source (publication name, vol. #, issue #, and author's name) is given. {21} The following is extracted from a document produced by the EARN Association (European Academic Network Association.) Permission to copy all or part of this document without fee is granted provided the copies are not used for commercial advantage and that the EARN Association is cited as the source of the document. {22} The following is extracted from a document produced by the EARN Association (European Academic Network Association.) Permission to copy all or part of this document without fee is granted provided the copies are not used for commercial advantage and that the EARN Association is cited as the source of the document. To obtain the full document see the instructions at the end of this article. {23} {24} {25} This article was written by Scott Siddall. This article was prepared by Jennifer Ross. These examples were prepared by Jennifer Ross.

{26} {27} {28} {29} {30}

This article was written by Jennifer Ross. This document was prepared by Jennifer Ross. This article was written by Bill Quimby. This article was written by Jennifer Ross. Courtesy of Oregon State University

{31} This has been extracted from a much longer document which is available online. Instructions for getting this document are at the end of the article. {32} {33} {34} {35} {36} {37} {38} {39} {40} {41} {42} {43} {44} {45} $ indicates subscription is not free ** indicates journal is peer reviewed

This exercise was prepared by Bill Quimby. This article was written by Scott Siddall. This article was written by Scott Siddall. This article was written by Jami Peelle. This article was prepared by David Shea. This article was prepared by David Shea. This article was prepared by David Shea. This article was prepared by David Shea. This article was prepared by David Shea. This article was prepared by Carmen King and Jami Peelle. This article was written by Andrea Peakovic. This article was prepared by Andrea Peakovic. The Index was prepared by Margaret Main.