DataMuseum.dk

Presents historical artifacts from the history of:

RegneCentralen RC700 "Piccolo"

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about RegneCentralen RC700 "Piccolo"

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: 5 A B C D E F H I L M P Q R S T W Z

⟦72577d508⟧ Bits:30003297 Diverse BIOS typer til RC703, 5¼" Floppy Disk, CpmFSAuto

    Length: 819200 (0xc8000)
    Description: Bits:30003297 Diverse BIOS typer til RC703
    Types: 5¼" Floppy Disk, CpmFSAuto
    Notes: CP/M-fs(512_2048_0x0_*2+1+2_2:0_79:1_96)

CpmFSAuto

Media:             [0, 0, 1] … [79, 1, 10] {512: 1600}
Signature:         512_2048_0x0_*2+1+2_2:0_79:1_96
Confidence score:  +67/-0 
Sector size:       512
Block size:        2048
Directory entries: 96
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 3, 5, 7, 9, 2, 4, 6, 8, 10
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (77, 0), (77, 1), (78, 0), (78, 1), (79, 0), (79, 1)
user bc length name artifact
001024AUTOEXEC.COM⟦b8bc8b3ca⟧
005632BDOS-CCP.COM⟦bfc22c884⟧
006400BIOS.DOC⟦6e375be63⟧ TextFile
006144BIOS5.COM⟦144010768⟧
0011392BIOS703.MAC⟦4714ffe37⟧ TextFile
00256BIOSLINK.703⟦5946f8ec8⟧ TextFile
00896BIOSTYPE.MAC⟦143072cde⟧ TextFile
006528COPIFIL.ASM⟦b8e041c50⟧ TextFile
0011136CPMBOOT.MAC⟦89dad7362⟧ TextFile
0013056DANISHOF.MAC⟦93b2fa6f9⟧ TextFile
001664ERAQ.COM⟦90a1d4ee4⟧
0031232FLOPPY.MAC⟦7cf144912⟧ TextFile
001664FORMAT.COM⟦91eff4182⟧
0011392HARDDSK.MAC⟦cafaff2d2⟧ TextFile
007168INIPARMS.MAC⟦ef741535b⟧ TextFile
0017664INIT.MAC⟦376238eb5⟧ TextFile
001408INTTAB.MAC⟦ffa5d4524⟧ TextFile
008960L80.COM⟦89a120a88⟧
0018560M80.COM⟦e02ffd8ca⟧
002176PIO.MAC⟦77e4fc87f⟧ TextFile
007424PIP.COM⟦6fda28913⟧
0022272QDISKTAB.MAC⟦4713a6bb4⟧ TextFile
0031360QDISPLAY.MAC⟦bc858396a⟧ TextFile
006144QQMM.PCH⟦4c4c48c6b⟧
006144QQMP.PCH⟦f7d853aea⟧
006144QQPP.SCE⟦45143b4c3⟧
00512README.DOC⟦93b59c10f⟧ TextFile
007936SIO.MAC⟦ed9e942fe⟧ TextFile
005248STAT.COM⟦614d0b1d6⟧
002176TRACKSYS.COM⟦c6ea14ed6⟧
0031104WS.COM⟦7d67746b4⟧
0015872WSD.COM⟦3dfbe12c0⟧
0027904WSMSGS.OVR⟦e1792b75e⟧
0034048WSOVLY1.OVR⟦8cd1240cc⟧
0016256ZAP.COM⟦780a2d3cc⟧
0010240ZSID.COM⟦8d1b1153f⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [79, 1, 10]]

First credible dirsect is: (2, 0, 1) at 0x5000 with 0x0 attribute records

Credible directory tracks:
   (2, 0)  0x5000 17-3-16-1-9-1-3-1-3-1
   (2, 1)  0x6400 1-1-1-0-1-0-1-0-1-0

Total credibility: 45

Block number width: ok16

   8    20     1   246   150  False
  16     0     4   374     0  False

Block Sizes:
    2048 0x00 +45 -0
    4096 0x01 +7 -38
    8192 0x03 +7 -38
   16384 0x07 +7 -38
   32768 0x0f +7 -38
   65536 0x1f +7 -38
    1024 0x00 +4 -41
     512 0x00 +2 -43
     256 0x00 +1 -44
     128 0x00 +0 -45

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
      0  normal-2     (1-3-5-7-9-2-4-6-8-10)                                                    [16, 15, 8, 2, 2, 2]   +67/-0
     13  normal-4     (1-5-9-3-7-2-6-10-4-8)                                                    [16, 8, 2, 15, 2, 2]   +56/-1
     28  normal-1     (1-2-3-4-5-6-7-8-9-10)                                                    [16, 2, 15, 0, 8, 0, 2, 0, 2]   +53/-2
     28  normal-3     (1-4-7-10-3-6-9-2-5-8)                                                    [16, 0, 2, 0, 15, 0, 2, 2, 8]   +51/-4
     31  Butler3      (1-4-7-10-2-5-8-3-6-9)                                                    [16, 0, 2, 0, 2, 8, 0, 15, 0, 2]   +50/-1
From the beastiarium: CpmFSJames   +0/-0

File & label names found:
  0x0005000 (2, 0, 1)
    ProbeDirEnt {status=0x00, name=»BIOSTYPEMAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x07, al=04000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»TRACKSYSCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=0500c200000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SIO     MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=06000700080009000000000000000000}
    ProbeDirEnt {status=0x00, name=»DANISHOFMAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x66, al=0a000b000c000d000e000f0010000000}
    ProbeDirEnt {status=0x00, name=»COPIFIL ASM«, xl=0x00, bc=0x00, xh=0x00, rc=0x33, al=110012001d001e000000000000000000}
    ProbeDirEnt {status=0x00, name=»FORMAT  COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0d, al=1f000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ERAQ    COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x0d, al=1a000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INIT    MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2000210032003c00b700b800b900ba00}
    ProbeDirEnt {status=0x00, name=»QDISPLAYMAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=1700180019001b001c00220023002400}
    ProbeDirEnt {status=0x00, name=»QDISPLAYMAC«, xl=0x01, bc=0x00, xh=0x00, rc=0x75, al=250026002700280029002a002b002c00}
    ProbeDirEnt {status=0x00, name=»FLOPPY  MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=2d002e002f0033003400350036003700}
    ProbeDirEnt {status=0x00, name=»FLOPPY  MAC«, xl=0x01, bc=0x00, xh=0x00, rc=0x74, al=380039003a003b003d003e003f004000}
    ProbeDirEnt {status=0x00, name=»HARDDSK MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=31004100420043004400450000000000}
    ProbeDirEnt {status=0x00, name=»INTTAB  MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x0b, al=46000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PIO     MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x11, al=47004800000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»QDISKTABMAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=49004a004b004c004d004e004f005000}
  0x0005400 (2, 0, 3)
    ProbeDirEnt {status=0x00, name=»QDISKTABMAC«, xl=0x01, bc=0x00, xh=0x00, rc=0x2e, al=51005200530000000000000000000000}
    ProbeDirEnt {status=0x00, name=»ZSID    COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x50, al=5400a900aa00ab00ac00000000000000}
    ProbeDirEnt {status=0x00, name=»WS      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=550056005700580059005a005b005c00}
    ProbeDirEnt {status=0x00, name=»WS      COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x73, al=5d005e005f0060006100620063006400}
    ProbeDirEnt {status=0x00, name=»WSD     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x7c, al=650066006700680069006a006b006c00}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=6d006e006f0070007100720073007400}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=750076007700780079007a007b007c00}
    ProbeDirEnt {status=0x00, name=»WSOVLY1 OVR«, xl=0x02, bc=0x00, xh=0x00, rc=0x0a, al=7d000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=7e007f00800081008200830084008500}
    ProbeDirEnt {status=0x00, name=»WSMSGS  OVR«, xl=0x01, bc=0x00, xh=0x00, rc=0x5a, al=86008700880089008a008b0000000000}
    ProbeDirEnt {status=0x00, name=»QQPP    SCE«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=8c008d008e0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIOS5   COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=bc00bd00be0000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIOS703 MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x59, al=8f009000910092009300940000000000}
    ProbeDirEnt {status=0x00, name=»BDOS-CCPCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x2c, al=c300c400c50000000000000000000000}
    ProbeDirEnt {status=0x00, name=»CPMBOOT MAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x57, al=950096009700980099009a0000000000}
  0x0005800 (2, 0, 5)
    ProbeDirEnt {status=0x00, name=»INIPARMSMAC«, xl=0x00, bc=0x00, xh=0x00, rc=0x38, al=9b009c009d009e000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIOSLINK703«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=30000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»L80     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=a300a400a500a600a700000000000000}
    ProbeDirEnt {status=0x00, name=»ZAP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x7f, al=ad00ae00af00b000b100b200b300b400}
    ProbeDirEnt {status=0x00, name=»AUTOEXECCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x08, al=b5000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»INIT    MAC«, xl=0x01, bc=0x00, xh=0x00, rc=0x0a, al=bb000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»BIOS    DOC«, xl=0x00, bc=0x00, xh=0x00, rc=0x32, al=13001400150016000000000000000000}
    ProbeDirEnt {status=0x00, name=»README  DOC«, xl=0x00, bc=0x00, xh=0x00, rc=0x04, al=cd000000000000000000000000000000}
  0x0005c00 (2, 0, 7)
    ProbeDirEnt {status=0x00, name=»M80     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=39013a013b013c013d013e013f014001}
    ProbeDirEnt {status=0x00, name=»M80     COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x11, al=41014201000000000000000000000000}
  0x0006000 (2, 0, 9)
    ProbeDirEnt {status=0x00, name=»PIP     COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x3a, al=f600f700f800f9000000000000000000}
    ProbeDirEnt {status=0x00, name=»QQMP    PCH«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=74017501760100000000000000000000}
  0x0005200 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»QQMM    PCH«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=5b015c015d0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»STAT    COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x29, al=35013601370100000000000000000000}
*  67 -   0 [1, 3, 5, 7, 9, 2, 4, 6, 8, 10]
+  56 -   1 [1, 5, 9, 3, 7, 2, 6, 10, 4, 8]
+  53 -   2 [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]
+  50 -   1 [1, 4, 7, 10, 2, 5, 8, 3, 6, 9]
+  51 -   4 [1, 4, 7, 10, 3, 6, 9, 2, 5, 8]

Full view