By Casey Reas, Nick Montfort, Ian Bogost, John Bell, Patsy Baudoin, Jeremy Douglass, Mark C. Marino, Michael Mateas, Mark Sample, Noah Vawter
A unmarried line of code deals the way to comprehend the cultural context of computing.
This ebook takes a unmarried line of code--the super concise uncomplicated application for the Commodore sixty four inscribed within the title--and makes use of it aa a lens by which to think about the phenomenon of inventive computing and how machine courses exist in tradition.
The authors of this collaboratively written ebook deal with code no longer as only practical yet as a text--in the case of 10 PRINT, a textual content that seemed in lots of diversified published sources--that yields a narrative approximately its making, its objective, its assumptions, and extra. they think about randomness and regularity in computing and artwork, the maze in tradition, the preferred easy programming language, and the hugely influential Commodore sixty four computing device.
Read Online or Download 10 PRINT CHR$(205.5+RND(1)); : GOTO 10 PDF
Similar computing books
Style and Organization
Best practices and conventions.
Best instruments for entrance and back-end development.
Performance exams and server-side reminiscence testing.
Cloud computing has turn into an important know-how development. specialists think cloud computing is at the moment reshaping info expertise and the IT market. some great benefits of utilizing cloud computing comprise price mark downs, velocity to industry, entry to larger computing assets, excessive availability, and scalability.
Reliable Ubiquitous Computing covers facets of belief in ubiquitous computing environments. The points of context, privateness, reliability, usability and person event regarding “emerged and intriguing new computing paradigm of Ubiquitous Computing”, comprises pervasive, grid, and peer-to-peer computing together with sensor networks to supply safe computing and conversation companies at every time and anyplace.
- The Hacker Playbook 2: Practical Guide To Penetration Testing
- Computing with Spatial Trajectories
- CEH: Certified Ethical Hacker Version 8 Study Guide
- Wired [UK] (December 2015)
- Information Computing and Applications: International Conference, ICICA 2010, Tangshan, China, October 15-18, 2010. Proceedings, Part II
- Pentaho Data Integration Cookbook (2nd Edition)
Extra resources for 10 PRINT CHR$(205.5+RND(1)); : GOTO 10
Thanks to Ariadne’s thread, Theseus successfully makes his way through the maze, slays the Minotaur, and escapes. The allegory here invokes the danger of illicit desire; it also shows that those who hold tight to a predetermined path can succeed. The Knossos maze is best understood in terms of Theseus’s narrative path through it, not as the space of the labyrinth itself. 1 The central labyrinth and maze patterns of Amiens Cathedral were built in the thirteenth century. Courtesy of Stephen Murray.
The BASIC programs printed in this chapter can be run on a Com- modore 64 emulator. The reader is encouraged to download an emulator, run the programs, and imagine how various differences between emulation and the original hardware influence the experience. For instance, the modern PC keyboard does not have the Commodore 64 graphics characters printed on the keys, and mapping the Commodore 64 keys to a modern keyboard layout is not straightforward. 5+RND(1)); : GOTO 10 1/3/13 9:33:08 PM overly crisp when compared to those seen on an early display.
The program starts as a puzzle for those who have some understanding but not complete knowledge of BASIC and the Commodore 64. Once the code has been typed and executed and the programmer witnesses the maze, there is no returning to a naive view of this line of code— it is impossible to read the line without imagining its output. 5+RND(1)); : GOTO 10 1/3/13 9:33:09 PM path through this short but initially tangled program is revealed. Yet the program’s output also suggests a multicursal maze, because the patterm can apparently be traversed, or at least attempted, in several ways.