Delete the value at the current position in the file and close up the gap.Fatal error: NO FILE IS HELD: triggers if you try to move the file pointer while not holding any file.If the cursor is moved beyond the beginning or end of the file, it will be clamped at the first entry of the file, or the "append" position at the end of the file. Move the file cursor back or forward by offset steps.Fatal error: NO FILE IS HELD: triggers if you try to copy the id while not holding any file.Copy the id (number) of the held file into the given register.Fatal error: CANNOT GRAB A SECOND FILE: triggers if you try to grab a file while holding one.Fatal error: FILE ID NOT FOUND: triggers if the file does not exist.Fatal error: CANNOT GRAB A SECOND FILE: triggers if you try to make a file while holding one.Create a new file held by the current EXA.If several EXAs execute TEST MRD at once and at least one message is ready, all can receive the value 1 even though not all such EXAs may be able to actually read the message. Sets T to 1 if reading from M would not block, or 0 otherwise. Read a value from M, triggering all the standard effects of doing so, but then just throw the value away.Toggle the M register between the local and global channels.Copy the name of the current host, as a symbol, into register dest.Fatal error: LINK ID NOT FOUND: triggers if the link does not exist.If such a link does not exist, the EXA will crash. Any EXA with a KILL command in its program will appear to have a weapon attached to it. This penalty is suffered even if no other EXA was killed. In most hacker battles there is a penalty for using the KILL command. If there are no target EXAs, nothing will happen. It will target other EXAs owned by you first if none exist, it will target any other EXA (such as those owned by your opponent in hacker battles). Attack a randomly selected EXA in the current host this will cause it to HALT next cycle.You do not need a HALT instruction at the bottom of a program since reaching the end of the program will halt the EXA anyway including one will lower your line efficiency for no benefit. Note that this is the only way to drop a file if the EXA is occupying the last available space in the host. Immediately destroys the current EXA and drops any file it is carrying in the current host.If the limit of EXAs that can be created on the current mission has been reached, blocks until one of these EXAs is destroyed (this usually applies only to hacker battles) If there is no room for the new EXA in the current host, blocks until there is room. Any file held by the current EXA is not duplicated. Values of X and T are copied to the new EXA. Creates a new EXA in the current host and starts it running at label.If a and b are different types the result is always false. A and b can be both numbers (compared by value) or both symbols (compared alphabetically). Sets T to 1 if the appropriate condition is true or 0 if it is false.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |