Solved

QBasic question

Posted on 1998-05-25
3
452 Views
Last Modified: 2012-06-27
Is there a version of QBasic between the one that comes with the old DOS and QB4.5? Because I have QBasic programs that won't run in the old QBasic because "Advanced feature unavailable" and QB4.5 doesn't like a CALL statement it made.  Also, is there somewhere that lists the peek and poke addresses for QBasic? Or are the memory address universal? Because I know that QBasic handles memory allocation differently than other programming languages.
0
Comment
Question by:TeleKawaru
3 Comments
 
LVL 8

Expert Comment

by:Kobe_Lenjou
ID: 1461529
There is a QuickBasic 4.0 (however it had a buggy compiler/linker).
And to my knowmedge the peek/poke adresses are universel (at least in intel based systems)
0
 
LVL 9

Accepted Solution

by:
cymbolic earned 50 total points
ID: 1461530
yep. There was a 2.0 and a 3.0 as well, but things didn't really get good till 4.5.  Also, there was (were) versions of the Basic Professional Development system around as well, and those versions had a Quick Basic corollary (QBX I think it was called) that had some variations as well.  The call statement that gives you problems probably comes from the fact that there were many third party libraries available for Quick Basic that extende the functions.  One that comes to mind that did most of its work thru calls was Probasic.  It evelved froma shareware version called ADVBAS.

Peek and Poke addresses are primarily relevant to the IBM PC archeticture and many relate to screen addresses and BIOS memory addresses.  A good source for possibilities there is the old books by Peter Norton on the IBM PC that go into detail on the memory architecture.  Another good source is some of the sample code in add on libraries, such as PDQ from Crescent Software.  Still another good source is the Book by Ethan Weiner on Quick Basic.
0
 

Author Comment

by:TeleKawaru
ID: 1461531
Thanks again for the answers Cymbolic.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I’ve seen a number of people looking for examples of how to access web services from VB6.  I’ve been using a test harness I built in VB6 (using many resources I found online) that I use for small projects to work out how to communicate with web serv…
Introduction In a recent article (http://www.experts-exchange.com/A_7811-A-Better-Concatenate-Function.html) for the Excel community, I showed an improved version of the Excel Concatenate() function.  While writing that article I realized that no o…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now