DataMuseum.dk

Presents historical artifacts from the history of:

RegneCentralen RC850

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about RegneCentralen RC850

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics
Index: 8 C D F G I J L M O P Q S T X

⟦6710c9ebd⟧ Bits:30005928 QuickCode (RC855), 8" Floppy Disk, CpmFSAuto, ImdContainer

    Length: 1177344 (0x11f700)
    Description: Bits:30005928 QuickCode (RC855)
    Types: 8" Floppy Disk, CpmFSAuto, ImdContainer
    Notes: CpmFSAuto,512,2048,112,0x0,1<2<3<4,2:0-76:1

CpmFSAuto

Media:             [0, 0, 1] … [76, 1, 15] {128: 26, 256: 26, 512: 2280}
Signature:         CpmFSAuto,512,2048,112,0x0,1<2<3<4,2:0-76:1
Confidence score:  +39/-0
Sector size:       512
Block size:        2048
Directory entries: 112
Block number size: 16
Extent-mask:       0x00
Sector-interleave: 1, 5, 9, 13, 2, 6, 10, 14, 3, 7, 11, 15, 4, 8, 12
Tracks:            (2, 0), (2, 1), (3, 0), (3, 1), (4, 0), (4, 1) […] (74, 0), (74, 1), (75, 0), (75, 1), (76, 0), (76, 1)
user bc length name artifact
0 0 20224 DBASE.COM ⟦2b9348bdd⟧
0 0 52736 DBASEMSG.TXT ⟦22b3a61f6⟧ TextFile
0 0 40192 DBASEOVR.COM ⟦4308502a3⟧
0 0 6784 DQMODE.OVL ⟦a7e47bb36⟧
0 0 1792 DSTART.OVL ⟦dff050ed8⟧
0 0 11008 FIELDE.OVL ⟦4189ce036⟧
0 0 7680 GETMOR.OVL ⟦96f4be2be⟧
0 0 4224 JUGGLE.OVL ⟦db4f4393b⟧
0 0 7040 LBLMOR.OVL ⟦212ffc88a⟧
0 0 7680 MENU.MNU ⟦7f4257906⟧
0 0 7936 MENU.OVL ⟦0badc809f⟧
0 0 6784 OUTCM1.OVL ⟦59c42fef7⟧
0 0 8320 OUTCM2.OVL ⟦976c40c06⟧
0 0 2304 OUTGO.OVL ⟦b099f2208⟧
0 0 8960 PARSE.OVL ⟦31f81033d⟧
0 0 32896 QC.COM ⟦d9637a0ed⟧
0 0 25728 QINSTALL.COM ⟦befe583f6⟧
0 0 256 QUICK.CFG ⟦4fa03e585⟧
0 0 32512 SF.COM ⟦c9e31b0ac⟧
0 0 9984 SUBMEN.OVL ⟦c212f2a49⟧
0 0 6272 XADD.OVL ⟦fd7274eeb⟧
0 0 8192 XCMD.OVL ⟦4df2b4a1e⟧
0 0 5888 XEDT.OVL ⟦2cae4a6ca⟧
0 0 11136 XGET.OVL ⟦9cfd2f46d⟧
0 0 5376 XLBL.OVL ⟦79e4fc9cf⟧
0 0 3456 XRPT.OVL ⟦fdfed2512⟧
0 0 9216 XVAL.OVL ⟦9a7d421b2⟧
0 0 6144 XWS.OVL ⟦8dd76ce6c⟧

CP/M filesystem probe

Geometry: [[0, 0, 1], [76, 1, 15]]

First credible dirsect is: (2, 0, 1) at 0x6300 with 0x0 attribute records

Credible directory tracks:
   (2, 0)  0x6300 7-8-0-0-7-12-0-0-1-8-0-0-2-1-0

Total credibility: 38

Block number width: ok16

   8   108     1   210    64  False
  16     0     2   462     0  False

00:DBASEMSGTXT rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=02000300040005000600150016001700}
00:DBASEMSGTXT rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=18001d001e001f002000210022002300}
00:QUICK   CFG rc=0x002 c=0x001 ProbeDirEnt {status=0x00, name=»QUICK   CFG«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=08000000000000000000000000000000}
00:DBASEMSGTXT rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=240025002600270028002a002b002c00}
00:DBASEMSGTXT rc=0x01c c=0x002 ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x03, bc=0x00, xh=0x00, rc=0x1c, al=2d002e00000000000000000000000000}
00:SF      COM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»SF      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=37006700680069006a006b006c006d00}
00:QC      COM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»QC      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701}
00:QC      COM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»QC      COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=680169016a016b016c016d016e016f01}
00:QC      COM rc=0x001 c=0x001 ProbeDirEnt {status=0x00, name=»QC      COM«, xl=0x02, bc=0x00, xh=0x00, rc=0x01, al=70010000000000000000000000000000}
00:QINSTALLCOM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»QINSTALLCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
00:QINSTALLCOM rc=0x049 c=0x005 ProbeDirEnt {status=0x00, name=»QINSTALLCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x49, al=79017a017b017c017d01000000000000}
00:DQMODE  OVL rc=0x035 c=0x004 ProbeDirEnt {status=0x00, name=»DQMODE  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x35, al=81018201840185010000000000000000}
00:DSTART  OVL rc=0x00e c=0x001 ProbeDirEnt {status=0x00, name=»DSTART  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=86010000000000000000000000000000}
00:DBASE   COM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DBASE   COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b00c800cb00cc00cd00cf00d000d100}
00:MENU    MNU rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»MENU    MNU«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=4e007a00840085000000000000000000}
00:DBASEOVRCOM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=53005400550056005700580059005a00}
00:DBASEOVRCOM rc=0x080 c=0x008 ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200}
00:DBASEOVRCOM rc=0x03a c=0x004 ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x02, bc=0x00, xh=0x00, rc=0x3a, al=63006400650066000000000000000000}
00:SF      COM rc=0x07e c=0x008 ProbeDirEnt {status=0x00, name=»SF      COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x7e, al=6e006f007000bd00ce00ec00fa000201}
00:FIELDE  OVL rc=0x056 c=0x006 ProbeDirEnt {status=0x00, name=»FIELDE  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x56, al=8701880189018a018b018c0100000000}
00:GETMOR  OVL rc=0x03c c=0x004 ProbeDirEnt {status=0x00, name=»GETMOR  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=8d018e018f0190010000000000000000}
00:JUGGLE  OVL rc=0x021 c=0x003 ProbeDirEnt {status=0x00, name=»JUGGLE  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x21, al=91019201930100000000000000000000}
00:LBLMOR  OVL rc=0x037 c=0x004 ProbeDirEnt {status=0x00, name=»LBLMOR  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x37, al=94019501960197010000000000000000}
00:MENU    OVL rc=0x03e c=0x004 ProbeDirEnt {status=0x00, name=»MENU    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=980199019a019b010000000000000000}
00:OUTCM1  OVL rc=0x035 c=0x004 ProbeDirEnt {status=0x00, name=»OUTCM1  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x35, al=9c019d019e019f010000000000000000}
00:OUTCM2  OVL rc=0x041 c=0x005 ProbeDirEnt {status=0x00, name=»OUTCM2  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x41, al=a001a101a201a301a401000000000000}
00:OUTGO   OVL rc=0x012 c=0x002 ProbeDirEnt {status=0x00, name=»OUTGO   OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=a501a601000000000000000000000000}
00:PARSE   OVL rc=0x046 c=0x005 ProbeDirEnt {status=0x00, name=»PARSE   OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=a701a801a901aa01ab01000000000000}
00:SUBMEN  OVL rc=0x04e c=0x005 ProbeDirEnt {status=0x00, name=»SUBMEN  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x4e, al=ac01ad01ae01af01b001000000000000}
00:XADD    OVL rc=0x031 c=0x004 ProbeDirEnt {status=0x00, name=»XADD    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=b101b201b301b4010000000000000000}
00:XCMD    OVL rc=0x040 c=0x004 ProbeDirEnt {status=0x00, name=»XCMD    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x40, al=b501b601b701b8010000000000000000}
00:XEDT    OVL rc=0x02e c=0x003 ProbeDirEnt {status=0x00, name=»XEDT    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x2e, al=b901ba01bb0100000000000000000000}
00:XGET    OVL rc=0x057 c=0x006 ProbeDirEnt {status=0x00, name=»XGET    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x57, al=bc01bd01be01bf01c001c10100000000}
00:XLBL    OVL rc=0x02a c=0x003 ProbeDirEnt {status=0x00, name=»XLBL    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=c201c301c40100000000000000000000}
00:XRPT    OVL rc=0x01b c=0x002 ProbeDirEnt {status=0x00, name=»XRPT    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=c501c601000000000000000000000000}
00:XVAL    OVL rc=0x048 c=0x005 ProbeDirEnt {status=0x00, name=»XVAL    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=c701c801c901ca01cb01000000000000}
00:XWS     OVL rc=0x030 c=0x003 ProbeDirEnt {status=0x00, name=»XWS     OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=cc01cd01ce0100000000000000000000}
00:DBASE   COM rc=0x01e c=0x002 ProbeDirEnt {status=0x00, name=»DBASE   COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x1e, al=d200d300000000000000000000000000}
Block Size 2048.00 2048 extent_mask = 0x0

Candidate interleaves in order of directory credibility:

Penalty  Name         Order                                                                     Resulting dir order
     12  normal-4     (1-5-9-13-2-6-10-14-3-7-11-15-4-8-12)                                     [6, 6, 0, 1, 7, 11, 7]   +39/-0
From the beastiarium: CpmFSCr16   +0/-0

File & label names found:
  0x0006300 (2, 0, 1)
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=02000300040005000600150016001700}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=18001d001e001f002000210022002300}
    ProbeDirEnt {status=0x00, name=»QUICK   CFG«, xl=0x00, bc=0x00, xh=0x00, rc=0x02, al=08000000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x02, bc=0x00, xh=0x00, rc=0x80, al=240025002600270028002a002b002c00}
    ProbeDirEnt {status=0x00, name=»DBASEMSGTXT«, xl=0x03, bc=0x00, xh=0x00, rc=0x1c, al=2d002e00000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»SF      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=37006700680069006a006b006c006d00}
  0x0006b00 (2, 0, 5)
    ProbeDirEnt {status=0x00, name=»DBASE   COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=4b00c800cb00cc00cd00cf00d000d100}
    ProbeDirEnt {status=0x00, name=»MENU    MNU«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=4e007a00840085000000000000000000}
    ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=53005400550056005700580059005a00}
    ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=5b005c005d005e005f00600061006200}
    ProbeDirEnt {status=0x00, name=»DBASEOVRCOM«, xl=0x02, bc=0x00, xh=0x00, rc=0x3a, al=63006400650066000000000000000000}
    ProbeDirEnt {status=0x00, name=»SF      COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x7e, al=6e006f007000bd00ce00ec00fa000201}
  0x0007b00 (2, 0, 13)
    ProbeDirEnt {status=0x00, name=»DBASE   COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x1e, al=d200d300000000000000000000000000}
  0x0006500 (2, 0, 2)
    ProbeDirEnt {status=0x00, name=»QC      COM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=60016101620163016401650166016701}
    ProbeDirEnt {status=0x00, name=»QC      COM«, xl=0x01, bc=0x00, xh=0x00, rc=0x80, al=680169016a016b016c016d016e016f01}
    ProbeDirEnt {status=0x00, name=»QC      COM«, xl=0x02, bc=0x00, xh=0x00, rc=0x01, al=70010000000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»QINSTALLCOM«, xl=0x00, bc=0x00, xh=0x00, rc=0x80, al=71017201730174017501760177017801}
    ProbeDirEnt {status=0x00, name=»QINSTALLCOM«, xl=0x01, bc=0x00, xh=0x00, rc=0x49, al=79017a017b017c017d01000000000000}
    ProbeDirEnt {status=0x00, name=»DQMODE  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x35, al=81018201840185010000000000000000}
    ProbeDirEnt {status=0x00, name=»DSTART  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x0e, al=86010000000000000000000000000000}
  0x0006d00 (2, 0, 6)
    ProbeDirEnt {status=0x00, name=»FIELDE  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x56, al=8701880189018a018b018c0100000000}
    ProbeDirEnt {status=0x00, name=»GETMOR  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x3c, al=8d018e018f0190010000000000000000}
    ProbeDirEnt {status=0x00, name=»JUGGLE  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x21, al=91019201930100000000000000000000}
    ProbeDirEnt {status=0x00, name=»LBLMOR  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x37, al=94019501960197010000000000000000}
    ProbeDirEnt {status=0x00, name=»MENU    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x3e, al=980199019a019b010000000000000000}
    ProbeDirEnt {status=0x00, name=»OUTCM1  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x35, al=9c019d019e019f010000000000000000}
    ProbeDirEnt {status=0x00, name=»OUTCM2  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x41, al=a001a101a201a301a401000000000000}
    ProbeDirEnt {status=0x00, name=»OUTGO   OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x12, al=a501a601000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»PARSE   OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x46, al=a701a801a901aa01ab01000000000000}
    ProbeDirEnt {status=0x00, name=»SUBMEN  OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x4e, al=ac01ad01ae01af01b001000000000000}
    ProbeDirEnt {status=0x00, name=»XADD    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x31, al=b101b201b301b4010000000000000000}
  0x0007500 (2, 0, 10)
    ProbeDirEnt {status=0x00, name=»XCMD    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x40, al=b501b601b701b8010000000000000000}
    ProbeDirEnt {status=0x00, name=»XEDT    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x2e, al=b901ba01bb0100000000000000000000}
    ProbeDirEnt {status=0x00, name=»XGET    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x57, al=bc01bd01be01bf01c001c10100000000}
    ProbeDirEnt {status=0x00, name=»XLBL    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x2a, al=c201c301c40100000000000000000000}
    ProbeDirEnt {status=0x00, name=»XRPT    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x1b, al=c501c601000000000000000000000000}
    ProbeDirEnt {status=0x00, name=»XVAL    OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x48, al=c701c801c901ca01cb01000000000000}
    ProbeDirEnt {status=0x00, name=»XWS     OVL«, xl=0x00, bc=0x00, xh=0x00, rc=0x30, al=cc01cd01ce0100000000000000000000}
+  39 -   0 <Tree 0x0-0x8fb80-0x11f700>

Full view