DataMuseum.dk

Presents historical artifacts from the history of:

Jet Computer Jet80

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about Jet Computer Jet80

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: 5 A B C D E F H I M P S T V W

⟦5b35a3f8b⟧ Bits:30002866 MicroPro WordStar release 3.00 for JET80, 5¼" Floppy Disk, CpmFSAuto

    Length: 819200 (0xc8000)
    Description: Bits:30002866 MicroPro WordStar release 3.00 for JET80
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CP/M-fs(1024_2048_0x0_*1+1_1:0_79:1_64)

CpmFSAuto

Media:             [0, 0, 1] … [79, 1, 5] {1024: 800}
Signature:         1024_2048_0x0_*1+1_1:0_79:1_64
Confidence score:  +47/-0 
Sector size:       1024
Block size:        2048
Directory entries: 64
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 2, 3, 4, 5
Tracks:            (1, 0), (1, 1), (2, 0), (2, 1), (3, 0), (3, 1) […] (77, 0), (77, 1), (78, 0), (78, 1), (79, 0), (79, 1)
user bc length name artifact
00512APPSTAT.FRM⟦cc687fb55⟧ TextFile
00896APPTAL.CMD⟦5afc86684⟧ TextFile
00768BIL.CMD⟦2592a9cf8⟧ TextFile
00384BIL2.CMD⟦a184d7740⟧ TextFile
003200CCP.COM⟦d5f2012fa⟧
0021760CPM3.SYS⟦be04209af⟧
003072D.COM⟦cefd77dc2⟧
007424DEVICE.COM⟦220e51042⟧
0014592DIR.COM⟦19adf2b74⟧
00896DIST.CMD⟦96e849a53⟧ TextFile
00384EDIT.CMD⟦e12e34fc6⟧ TextFile
003456FASTCOPY.COM⟦08624979f⟧
00768FKTNUM.CMD⟦52dc07262⟧ TextFile
008576HPPRISEC.COM⟦03ac54b21⟧
00384INDTAST.CMD⟦91b0badc1⟧ TextFile
007680MAILMRGE.OVR⟦0993c9bf8⟧
008704PIP.COM⟦acce36279⟧
00128PROFILE.SUB⟦cbf6e582a⟧ TextFile
001792SAVE.COM⟦d9ae482b5⟧
001920SIOJET.COM⟦4525ffdf2⟧
001536SKBOOT.COM⟦83b40604b⟧
00512SLUTVSYS.CMD⟦a654ff44c⟧ TextFile
005248SPELSTAR.DCT⟦f53b88aee⟧
0018432SPELSTAR.OVR⟦9aff36fda⟧
005376SUBMIT.COM⟦2e0941854⟧
00768VMEN.CMD⟦fb65ad61a⟧ TextFile
0029184WINSTALL.COM⟦aeb19f846⟧
0015872WS.COM⟦0c33b7b9d⟧
0050304WS.INS⟦54269d92b⟧
0032768WSINSTAL.COM⟦2d889f84f⟧
0027904WSMSGS.OVR⟦e1792b75e⟧
0034048WSOVLY1.OVR⟦4af3480aa⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [79, 1, 5]]

First credible dirsect is: (1, 0, 1) at 0x2800 with 0x0 attribute records

Credible directory tracks:
   (1, 0)  0x2800 28-16-1-1-0

Total credibility: 42

Block number width: ok16

   8     0     2   175   125  False
  16     0     2   175     0  False

Block Sizes:
    2048 0x00 +42 -0
    4096 0x01 +14 -28
    8192 0x03 +14 -28
   16384 0x07 +14 -28
   32768 0x0f +14 -28
   65536 0x1f +14 -28
    1024 0x00 +11 -31
     512 0x00 +6 -36
     128 0x00 +1 -41
     256 0x00 +1 -41

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-1     (1-2-3-4-5)                                                               [27, 15]   +47/-0
From the beastiarium: CpmFSJames   +0/-0

File & label names found:
  0x0002800 (1, 0, 1)
    ProbeDirEnt {status=0x00, name=»CCP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x19, al=02000300000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DEVICE  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=05000600070008000000000000000000}
    ProbeDirEnt {status=0x00, name=»SKBOOT  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0c, al=09000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIOJET  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0f, al=0a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPM3    SYS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=0b000c000d000e000f00100011001200}
    ProbeDirEnt {status=0x00, name=»CPM3    SYS«, xl=0x01, bc=0x00, xh=0x00, rc=0x2a, al=13001400150000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DIR     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x72, al=16001700180019001a001b001c001d00}
    ProbeDirEnt {status=0x00, name=»D       COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x18, al=1e001f00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x44, al=20002100220023002400000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMIT  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=25002600270000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WINSTALLCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=280029002a002b002c002d002e002f00}
    ProbeDirEnt {status=0x00, name=»WINSTALLCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x64, al=30003100320033003400350036000000}
    ProbeDirEnt {status=0x00, name=»WS      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=3700380039003a003b003c003d003e00}
    ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=3f004000410042004300440045004600}
    ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x5a, al=4700480049004a004b004c0000000000}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4d004e004f0050005100520053005400}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=550056005700580059005a005b005c00}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x02, bc=0x00, xh=0x00, rc=0x0a, al=5d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=5e005f00600061006200630064006500}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=66006700680069006a006b006c006d00}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=6e006f00700071007200730074007500}
    ProbeDirEnt {status=0x00, name=»WS      INS«, xl=0x03, bc=0x00, xh=0x00, rc=0x09, al=76000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WSINSTALCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7700780079007a007b007c007d007e00}
    ProbeDirEnt {status=0x00, name=»WSINSTALCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=7f008000810082008300840085008600}
    ProbeDirEnt {status=0x00, name=»PROFILE SUB«, xl=0x00, bc=0x00, xh=0x00, rc=0x01, al=88000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»FASTCOPYCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=89008a00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIL     CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=8b000000000000000000000000000000}
  0x0002c00 (1, 0, 2)
    ProbeDirEnt {status=0x00, name=»DIST    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=8f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPTAL  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=90000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SLUTVSYSCMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=92000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»APPSTAT FRM«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=93000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»HPPRISECCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x43, al=94009c009d009e009f00000000000000}
    ProbeDirEnt {status=0x00, name=»FKTNUM  CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=95000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»VMEN    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x06, al=97000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INDTAST CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=98000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIL2    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=99000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SAVE    COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=9a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»EDIT    CMD«, xl=0x00, bc=0x00, xh=0x00, rc=0x03, al=9b000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»MAILMRGEOVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=a000a100a200a3000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPELSTARDCT«, xl=0x00, bc=0x00, xh=0x00, rc=0x29, al=a400a500a60000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SPELSTAROVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=a700a800a900aa00ab00ac00ad00ae00}
    ProbeDirEnt {status=0x00, name=»SPELSTAROVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x10, al=af000000000000000000000000000000}
*  47 -   0 [1, 2, 3, 4, 5]

Full view