DataMuseum.dk

Presents historical artifacts from the history of:

Christian Rovsing CR7, CR8 & CR16 CP/M

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Christian Rovsing CR7, CR8 & CR16 CP/M

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: 5 A B C D E I J K L N S T

⟦96695c514⟧ Bits:30005859 DBase II og SuperCalc2, 5¼" Floppy Disk, CpmFSCr16, ImdContainer

    Length: 709632 (0xad400)
    Description: Bits:30005859 DBase II og SuperCalc2
    Types: 5¼" Floppy Disk, CpmFSCr16, ImdContainer
    Notes: CP/M-fs(512_2048_0x0_*1+1_1:0_1:1_64)

CpmFSCr16

Media:             [0, 0, 1] … [76, 1, 9] {512: 1386}
Signature:         512_2048_0x0_*1+1_1:0_1:1_64
Confidence score:  +75/-0 
Sector size:       512
Block size:        2048
Directory entries: 64
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5, 6, 7, 8
Tracks:            (1, 0), (2, 0), (3, 0), (4, 0), (5, 0), (6, 0) […] (6, 1), (5, 1), (4, 1), (3, 1), (2, 1), (1, 1)
user bc length name artifact
001024ABC.DBF⟦cb40765a5⟧
001024ANDRE.DBF⟦94efeffc2⟧
00896APPECARD.FMT⟦90b4d30f8⟧ TextFile
004096BRKEVN.CAL⟦0e7c8644f⟧
001280BUDGET.CAL⟦eee27d4f9⟧ TextFile
003328CHECKS.CAL⟦fee6f9266⟧
001024CHECKS.DBF⟦001e90e27⟧
00512CHXBOOK.MEM⟦9937d4fa4⟧
00768CHXDEPOS.FMT⟦12ade3291⟧ TextFile
001024CHXINPUT.FMT⟦ae2679fc4⟧ TextFile
007680CMAIN.PRG⟦cdd04bde1⟧ TextFile
003328CPRINT.PRG⟦201d02f47⟧ TextFile
002688DATER.PRG⟦118e53ff0⟧ TextFile
0032256DBASE.CMD⟦1d5c3b66b⟧
00640DBASEMSG.TXD⟦b2c1b6417⟧ TextFile
0053760DBASEMSG.TXE⟦3b5a97496⟧ TextFile
0051840DBASEMSG.TXT⟦d3027af47⟧ TextFile
0037376DBASEOVR.COM⟦08f373a11⟧
001536E'BYNAME.NDX⟦d0d81bc36⟧ TextFile
001024E'BYNMBR.NDX⟦4f0f8c029⟧ TextFile
001152EDITCARD.FMT⟦e40389f93⟧ TextFile
00256EMP-CONS.FRM⟦86d9b3ad9⟧ TextFile
00384EMP-PRT.FRM⟦3105222b8⟧ TextFile
00896EMP-UPD.FMT⟦174050140⟧ TextFile
002048EMPLOYEE.DBF⟦aef6c148d⟧ TextFile
00512EMPLOYEE.MEM⟦e24e102ee⟧
00768EMPSCRN.FMT⟦b11297642⟧ TextFile
001024I'BYDESC.NDX⟦432345c9a⟧
001024I'BYNMBR.NDX⟦bdaddb238⟧
001536IMAIN.BAK⟦bbff51cc5⟧ TextFile
00256INV'CONS.FRM⟦3565a5cf1⟧ TextFile
00256INV'PRTR.FRM⟦2365652fe⟧ TextFile
001024INVENT.DBF⟦afc3fbe34⟧
001536JAK.DBF⟦09e83aa65⟧
001280KEYWORD.NDX⟦3e0282872⟧
001024KIM.DBF⟦6f1a68d37⟧
003584LABELS.PRG⟦856ae74f4⟧ TextFile
001024LAGER.DBF⟦c877e9fc8⟧
001024NAMES.DBF⟦2e4feff7b⟧
005248SAMPLE.CAL⟦9b1c3958c⟧
0033024SC2.CMD⟦c682d0954⟧
0015104SC2.HLP⟦dba360469⟧ TextFile
0022144SC2.O86⟦7628a3079⟧
007040SC2KOPI.CMD⟦ff4e14f61⟧
0016640SDI.CMD⟦f6f043a99⟧
0015616SDI.OVL⟦a862e5975⟧
001920TENMIN.CAL⟦b851b1e44⟧ TextFile
002048TEXT.DBF⟦c5f45e80f⟧ TextFile
00256TICKLE.FRM⟦4f7a59ffa⟧ TextFile
001024TICKLE.NDX⟦7bb1ebaf8⟧ TextFile

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 9]]

First credible dirsect is: (1, 0, 1) at 0x2400 with 0x0 attribute records

Credible directory tracks:
   (1, 0)  0x2400 17-17-17-16-0-0-0-0-1

Total credibility: 63

Block number width: ok16

   8     0     1   195   132  False
  16     0     1   195     0  False

Block Sizes:
    2048 0x00 +63 -0
    4096 0x01 +33 -30
    8192 0x03 +33 -30
   16384 0x07 +33 -30
   32768 0x0f +33 -30
   65536 0x1f +33 -30
    1024 0x00 +26 -37
     512 0x00 +9 -54
     256 0x00 +6 -57
     128 0x00 +0 -63

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5-6-7-8-9)                                                       [16, 16, 16, 15]   +64/-358
From the beastiarium: CpmFSCr16   +75/-0
From the beastiarium: CpmFSJames   +0/-0

File & label names found:
  0x0002400 (1, 0, 1)
    ProbeDirEnt {status=0x00, name=»CHECKS  CAL«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=01000200000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BRKEVN  CAL«, xl=0x00, bc=0x00, xh=0x00, rc=0x20, al=03000400000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SC2     O86«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=050006000700080009000a000b000c00}
    ProbeDirEnt {status=0x00, name=»SC2     O86«, xl=0x01, bc=0x00, xh=0x00, rc=0x2d, al=0d000e000f0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SC2     HLP«, xl=0x00, bc=0x00, xh=0x00, rc=0x76, al=10001100120013001400150016001700}
    ProbeDirEnt {status=0x00, name=»TENMIN  CAL«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=18000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SC2     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=19001a001b001c001d001e001f002000}
    ProbeDirEnt {status=0x00, name=»SC2     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=21002200230024002500260027002800}
    ProbeDirEnt {status=0x00, name=»SC2     CMD«, xl=0x02, bc=0x00, xh=0x00, rc=0x02, al=29000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BUDGET  CAL«, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=2a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SAMPLE  CAL«, xl=0x00, bc=0x00, xh=0x00, rc=0x29, al=2b002c002d0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDI     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2e002f00300031003200330034003500}
    ProbeDirEnt {status=0x00, name=»SDI     CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x02, al=36000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SDI     OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x7a, al=3700380039003a003b003c003d003e00}
    ProbeDirEnt {status=0x00, name=»SC2KOPI CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x37, al=3f004000410042000000000000000000}
    ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=43004400450046004700480049004a00}
  0x0002600 (1, 0, 2)
    ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=4b004c004d004e004f00500051005200}
    ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x02, bc=0x00, xh=0x00, rc=0x24, al=53005400550000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DBASE   CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=56005700580059005a005b005c005d00}
    ProbeDirEnt {status=0x00, name=»DBASE   CMD«, xl=0x01, bc=0x00, xh=0x00, rc=0x7c, al=5e005f00600061006200630064006500}
    ProbeDirEnt {status=0x00, name=»CMAIN   PRG«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=66006700680069000000000000000000}
    ProbeDirEnt {status=0x00, name=»DATER   PRG«, xl=0x00, bc=0x00, xh=0x00, rc=0x15, al=6a006b00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LABELS  PRG«, xl=0x00, bc=0x00, xh=0x00, rc=0x1c, al=6c006d00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»IMAIN   BAK«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=6e000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHXINPUTFMT«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=6f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPRINT  PRG«, xl=0x00, bc=0x00, xh=0x00, rc=0x1a, al=70007100000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EMP-CONSFRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=72000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INV'CONSFRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=73000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TICKLE  FRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=74000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INV'PRTRFRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=75000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EMP-PRT FRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=76000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHXDEPOSFMT«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=77000000000000000000000000000000}
  0x0002800 (1, 0, 3)
    ProbeDirEnt {status=0x00, name=»APPECARDFMT«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=78000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EDITCARDFMT«, xl=0x00, bc=0x00, xh=0x00, rc=0x09, al=79000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EMP-UPD FMT«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=7a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»KEYWORD NDX«, xl=0x00, bc=0x00, xh=0x00, rc=0x0a, al=7b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»E'BYNMBRNDX«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=7c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»E'BYNAMENDX«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=7d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»I'BYNMBRNDX«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=7e000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»I'BYDESCNDX«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=7f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EMPLOYEEMEM«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=80000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHECKS  DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=81000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CHXBOOK MEM«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=82000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»KIM     DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=83000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EMPLOYEEDBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=84000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INVENT  DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=85000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»NAMES   DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=86000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TEXT    DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x10, al=87000000000000000000000000000000}
  0x0002a00 (1, 0, 4)
    ProbeDirEnt {status=0x00, name=»TICKLE  NDX«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=88000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EMPSCRN FMT«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=89000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXD«, xl=0x00, bc=0x00, xh=0x00, rc=0x05, al=8a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ANDRE   DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=8b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»JAK     DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=8c000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»LAGER   DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=8d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXE«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=8e008f00900091009200930094009500}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXE«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=96009700980099009a009b009c009d00}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXE«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=9e009f00a000a100a200a300a400a500}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXE«, xl=0x03, bc=0x00, xh=0x00, rc=0x24, al=a600a700a80000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a900aa00ab00ac00ad00ae00af00b000}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=b100b200b300b400b500b600b700b800}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=b900ba00bb00bc00bd00be00bf00c000}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x03, bc=0x00, xh=0x00, rc=0x15, al=c100c200000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BYG     DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x00, al=00000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ABC     DBF«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=c3000000000000000000000000000000}
*  75 -   0 [1, 2, 3, 4, 5, 6, 7, 8]
+  64 - 358 [1, 2, 3, 4, 5, 6, 7, 8, 9]

Full view