Top 10k strings from Afghan Attack (1984)(Southern Software).tap in <root> / bin / z80 / software / Sinclair Spectrum Collection TOSEC.exe / Sinclair ZX Spectrum - Games / [TAP] /

Back to the directory listing

   2 d;e?eReqexe}e
   2 d'd.d5d>dJdVd]dddkdrd~d
   1 |:h0|:hE|;
   1 z-.'z-.8z-.Nz-.]z-.nz0'vz7
   1 you  will  meet  many   friendly
   1 words will be accepted.  This is
   1 words used in everyday  English,
   1 without complications.
   1 with a character in any way, you
   1 with Afghanistan.
   1 will cause unwanted confusion."
   1 whatsoever. Resemblance  to  any
   1 very lucky that we could  divide
   1 ve)"ve-'ve.,ve.:ve/?vg
   1 valued goods! If you  think  you
   1 us  in  confidence, you will not
   1 trouble torn Afghanistan,  where
   1 to attack."
   1 to  cover  production, but don't
   1 this is very easily overcome."
   1 the invading Soviet  army  is in
   1 the complexity  of  the problems
   1 the camp in part one."
   1 the Eastern road out of Kabul."
   1 the  program   exactly  in  half
   1 that  you  will  find  a  little
   1 story by Mark  Phillips with the
   1 special forces Commander.
   1 sheet, a list of objects,  and a
   1 royalties?  If yes to both these
   1 rights, this material should not
   1 reproduced,  or  resold  without
   1 questions, then send  it  to  us
   1 problem overcome.  I have chosen
   1 political or educational bearing
   1 person,  living   or   deceased,
   1 p"# p"#*p"F4p$I;p&%Lp'(Yp(5mp)*|p+,
   1 our prior permission."
   1 or words used in the text."
   1 only the  first  two  recognised
   1 on total  fiction  and  holds no
   1 on  their  North Western  border
   1 objects conveyable."
   1 numbers of Soviet troops massing
   1 must first state the name of the
   1 may have acquired  this  program
   1 known as ""verb, noun"" input, but
   1 is purely coincidental."
   1 in  part  two,   you  will  lose
   1 highly trained  men  to  destroy
   1 have played before."
   1 go unrewarded. ""piRATes"" will be
   1 give up too soon."
   1 for evaluation."
   1 five Officers, to  be  led  by a
   1 fifty  British  Paratroopers and
   1 entertainment. The plot is based
   1 encounter  enemy  troops who are
   1 each word will be examined,  and
   1 due to the  unlimited  amount of
   1 drastically over armed and ready
   1 different  from  adventures  you
   1 designed as one program. We were
   1 decide to send a crack force  of
   1 control of who is deployed,  but
   1 complex,  modern  day  adventure
   1 complex weapons. You  will  also
   1 complete list of the vocabulary.
   1 characters and must use  various
   1 character, and then the action."
   1 can  sometimes  be  the  hardest
   1 by the Pakistani leaders seeking"
   1 by less than legal means contact
   1 beware of over simplifying, this
   1 been put to western Governments,
   1 be given at the end of part one."
   1 be dropped. This is not a burden
   1 be   copied,   printed,   hired,
   1 and disrupt Soviet  movement  on  
   1 and Longfellow."
   1 allies  where  you  wish. Due to
   1 aid of Gilsofts  Quill Adventure
   1 after intense  negotiations they
   1 a desperate battle with stubborn
   1 _{:hi{:h~{:h
   1 You will start part two North of
   1 You will be this Commander!!
   1 Would  you  like  to  earn   25%
   1 This command  will  deploy  your
   1 The parts are loaded by typing- 
   1 TIME (T OR K) (PART 2).
   1 Spectrum by  Mark  Phillips  and
   1 Southern Software welcome you to
   1 Southern  Software  reserve  all
   1 Send us a stamp and a 20p  piece
   1 Sean Irksome-Brown, Elaine,
   1 SEVERELY dealt with."
   1 SERGEANT GRANT OPEN FIRE.
   1 Richard Digby."
   1 Paris to discuss the crisis  and
   1 PRESS ANY KEY TO LOAD PART 1.  
   1 PLAYING INSTRUCTIONS
   1 PIC       
   1 PART 2    
   1 PART 1    
   1 OPEN FIRE.
   1 Nick, Helen, Steve, Cheryl,
   1 Mark's Mum and Mike,
   1 LOAD ""2""  (for part two)
   1 LOAD ""1""  (for part one)
   1 LIEUTENANT TRAVIS ATTACK (....)
   1 Ian, Linda, Shona,
   1 INVENTORY (I).
   1 INST      
   1 GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGEGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGAGGGGGGGGGGGGAAAAAAAGGGGGGGGGG
   1 Follow Sinclair manual procedure
   1 DISTRIBUTE."
   1 DEPLOY GRANT.
   1 CORPORAL MARSH FIRE BLOWPIPE.
   1 Bilbo, Samuel, Tabatha, Timmy,
   1 Andy's Mum and Dad,
   1 Andrew  Graham  from  the  short
   1 An entry code for part two, will
   1 Afghan  rebels.  A  request  has
   1 Afghan    
   1 AFGHAN ATTACK, a long, detailed,
   1 =q0'@q0'Pq0'hq0'wq0'
   1 2         i
   1 1984 SOUTHERN SOFTWARE."
   1 1984 SOUTHERN SOFTWARE.
   1 1         i
   1 0se 6se2Asg8Hsh
   1 "intervention  due to  increasing
   1 "You  will  not  appreciate under
   1 "When  you  wish  to  communicate
   1 "This crack force will consist of
   1 "This  adventure  is  purely  for
   1 "The vocabulary  of an  adventure
   1 "The  adventure  is  set  deep in
   1 "The  Western  leaders  meet   in
   1 "THANKS TO  -  Mum, Mike, Mac and
   1 "Some items,  once taken,  cannot
   1 "Some commands you  will  need onthis  adventure  are as follows.
   1 "PRESS ANY KEY TO LOAD PART 1.  "
   1 "PERPETUAL DUSK IN THE NEW WORLD"
   1 "Only the first four  letters  of
   1 "On your adventure in Afghanistan
   1 "On request we will supply a clue
   1 "Have you written  any  Software?
   1 "Afghan Attack, when written, was
   1 "Afghan Attack was coded for  the
   1 "   PRESS ANY KEY TO CONTINUE.   "
   1 "         DEDICATED TO
   1 "            DEPLOY              
   1 "          
   1  SOUTHERN SOFTWARE
   1          ____________"
   1            _________          "