Top 10k strings from Afghan Attack (1984)(Southern Software).tap
in <root> / bin / z80 / software / Sinclair Spectrum Collection TOSEC.exe / Sinclair ZX Spectrum - Games / [TAP] /
Back to the directory listing
2 d;e?eReqexe}e 2 d'd.d5d>dJdVd]dddkdrd~d 1 |:h0|:hE|; 1 z-.'z-.8z-.Nz-.]z-.nz0'vz7 1 you will meet many friendly 1 words will be accepted. This is 1 words used in everyday English, 1 without complications. 1 with a character in any way, you 1 with Afghanistan. 1 will cause unwanted confusion." 1 whatsoever. Resemblance to any 1 very lucky that we could divide 1 ve)"ve-'ve.,ve.:ve/?vg 1 valued goods! If you think you 1 us in confidence, you will not 1 trouble torn Afghanistan, where 1 to attack." 1 to cover production, but don't 1 this is very easily overcome." 1 the invading Soviet army is in 1 the complexity of the problems 1 the camp in part one." 1 the Eastern road out of Kabul." 1 the program exactly in half 1 that you will find a little 1 story by Mark Phillips with the 1 special forces Commander. 1 sheet, a list of objects, and a 1 royalties? If yes to both these 1 rights, this material should not 1 reproduced, or resold without 1 questions, then send it to us 1 problem overcome. I have chosen 1 political or educational bearing 1 person, living or deceased, 1 p"# p"#*p"F4p$I;p&%Lp'(Yp(5mp)*|p+, 1 our prior permission." 1 or words used in the text." 1 only the first two recognised 1 on total fiction and holds no 1 on their North Western border 1 objects conveyable." 1 numbers of Soviet troops massing 1 must first state the name of the 1 may have acquired this program 1 known as ""verb, noun"" input, but 1 is purely coincidental." 1 in part two, you will lose 1 highly trained men to destroy 1 have played before." 1 go unrewarded. ""piRATes"" will be 1 give up too soon." 1 for evaluation." 1 five Officers, to be led by a 1 fifty British Paratroopers and 1 entertainment. The plot is based 1 encounter enemy troops who are 1 each word will be examined, and 1 due to the unlimited amount of 1 drastically over armed and ready 1 different from adventures you 1 designed as one program. We were 1 decide to send a crack force of 1 control of who is deployed, but 1 complex, modern day adventure 1 complex weapons. You will also 1 complete list of the vocabulary. 1 characters and must use various 1 character, and then the action." 1 can sometimes be the hardest 1 by the Pakistani leaders seeking" 1 by less than legal means contact 1 beware of over simplifying, this 1 been put to western Governments, 1 be given at the end of part one." 1 be dropped. This is not a burden 1 be copied, printed, hired, 1 and disrupt Soviet movement on 1 and Longfellow." 1 allies where you wish. Due to 1 aid of Gilsofts Quill Adventure 1 after intense negotiations they 1 a desperate battle with stubborn 1 _{:hi{:h~{:h 1 You will start part two North of 1 You will be this Commander!! 1 Would you like to earn 25% 1 This command will deploy your 1 The parts are loaded by typing- 1 TIME (T OR K) (PART 2). 1 Spectrum by Mark Phillips and 1 Southern Software welcome you to 1 Southern Software reserve all 1 Send us a stamp and a 20p piece 1 Sean Irksome-Brown, Elaine, 1 SEVERELY dealt with." 1 SERGEANT GRANT OPEN FIRE. 1 Richard Digby." 1 Paris to discuss the crisis and 1 PRESS ANY KEY TO LOAD PART 1. 1 PLAYING INSTRUCTIONS 1 PIC 1 PART 2 1 PART 1 1 OPEN FIRE. 1 Nick, Helen, Steve, Cheryl, 1 Mark's Mum and Mike, 1 LOAD ""2"" (for part two) 1 LOAD ""1"" (for part one) 1 LIEUTENANT TRAVIS ATTACK (....) 1 Ian, Linda, Shona, 1 INVENTORY (I). 1 INST 1 GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGAGGGGGGGGGGGGAAAAAAAGGGGGGGGGG 1 Follow Sinclair manual procedure 1 DISTRIBUTE." 1 DEPLOY GRANT. 1 CORPORAL MARSH FIRE BLOWPIPE. 1 Bilbo, Samuel, Tabatha, Timmy, 1 Andy's Mum and Dad, 1 Andrew Graham from the short 1 An entry code for part two, will 1 Afghan rebels. A request has 1 Afghan 1 AFGHAN ATTACK, a long, detailed, 1 =q0'@q0'Pq0'hq0'wq0' 1 2 i 1 1984 SOUTHERN SOFTWARE." 1 1984 SOUTHERN SOFTWARE. 1 1 i 1 0se 6se2Asg8Hsh 1 "intervention due to increasing 1 "You will not appreciate under 1 "When you wish to communicate 1 "This crack force will consist of 1 "This adventure is purely for 1 "The vocabulary of an adventure 1 "The adventure is set deep in 1 "The Western leaders meet in 1 "THANKS TO - Mum, Mike, Mac and 1 "Some items, once taken, cannot 1 "Some commands you will need onthis adventure are as follows. 1 "PRESS ANY KEY TO LOAD PART 1. " 1 "PERPETUAL DUSK IN THE NEW WORLD" 1 "Only the first four letters of 1 "On your adventure in Afghanistan 1 "On request we will supply a clue 1 "Have you written any Software? 1 "Afghan Attack, when written, was 1 "Afghan Attack was coded for the 1 " PRESS ANY KEY TO CONTINUE. " 1 " DEDICATED TO 1 " DEPLOY 1 " 1 SOUTHERN SOFTWARE 1 ____________" 1 _________ "