Access Jokes / Recent Jokes
Everything I Needed to Know About Computers I Learned in the Movies
Word processors never display a cursor.
You never have to use the spacebar when typing long sentences.
All monitors and hand-held devices display 2-inch-high letters whenever you
need to see what the operator is typing.
High-tech computers, such as those used by NASA, the CIA, or some such
governmental institution, have easy-to-understand graphical interfaces.
Those that don't will have incredibly powerful text-based command shells
that can correctly understand and execute commands typed in plain English.
Corollary you can gain access to any information you want by simply typing
"ACCESS ALL OF THE SECRET FILES" on any keyboard.
Likewise, you can infect a computer with a destructive virus by simply
typing "UPLOAD VIRUS". Viruses cause temperatures in computers, just like they
do in humans. After a while, smoke billows out of disk drives and more...
Proper Care of Floppies:
1. Never leave diskettes in the disk drive, as data can leak out of the disk and corrode the inner mechanics of the drive. Diskettes should be rolled up and stored in pencil holders.
2. Diskettes should be cleaned and waxed once a week. Microscopic metal particles can be removed by waving a powerful magnet over the surface of the disk. Any stubborn metallic shavings can be removed with scouring powder and soap. When waxing diskettes, make sure application is even. This will allow the diskettes to spin faster, resulting in better access time.
3. Do not fold diskettes unless they do not fit in the drive.' Big' diskettes may be folded and used in' little' disk drives.
4. Never insert a disk into the drive upside down. The data can fall off the surface of the disk and jam the intricate mechanics of the drive.
5. Diskettes cannot be backed up by running them through the Xerox machine. If your data is going to more...
1. Word processors never display a cursor.
2. You never have to use the space-bar when typing long sentences.
3. All monitors display inch-high letters.
4. High-tech computers, such as those used by NASA, the CIA, or some such governmental institution, will have easy-to-understand graphical interfaces.
5. Those that don't will have incredibly powerful text-based command shells that can correctly understand and execute commands typed in plain English.
6. Corollary: You can gain access to any information you want by simply typing "ACCESS ALL OF THE SECRET FILES" on any keyboard.
7. Likewise, you can infect a computer with a destructive virus by simply typing "UPLOAD VIRUS." (See "Fortress")
8. All computers are connected. You can access the information on the villain's desktop computer, even if it's turned off.
9. Powerful computers beep whenever you press a key or more...
By following the instructions below, you should have error-free, long-lasting floppy disks. Never leave diskettes in the disk drive, as data can leak out of the disk and corrode the inner mechanics of the drive. Diskettes should be rolled up and stored in pencil holders. Diskettes should be cleaned and waxed once a week. Microscopic metal particles can be removed by waving a powerful magnet over the surface of the disk. Any stubborn metallic shavings can be removed with scouring powder and soap. When waxing the diskettes, make sure the surface is even. This will allow the diskette to spin faster, resulting in better access time. Do not fold diskettes unless they do not fit into the drive. "Big" diskettes may be folded and used in "little" disk drives. Never insert a diskette into the drive upside down. The data can fall off the surface of the disk and jam the intricate mechanics of the drive. Diskettes cannot be backed up by running them through the xerox machine. more...
Word processors never display a cursor.
You never have to use the space-bar when typing long sentences.
All monitors display inch-high letters.
High-tech computers, such as those used by NASA, the CIA, or some such governmental institution, will have easy to understand graphical interfaces. Those that don't, have incredibly powerful text-bases command shells that can correctly understand and execute commands typed in plain English.
Corollary: you can gain access to any information you want by simply typing "ACCESS ALL OF THE SECRET FILES" on any keyboard.
Likewise, you can infect a computer with a destructive virus by simply typing "UPLOAD VIRUS" (see "Fortress").
All computers are connected. You can access the information on the villain's desktop computer, even if it's turned off.
Powerful computers beep whenever you press a key or whenever the screen changes. Some computers also slow down the output on the screen so that it more...
Word processors never display a cursor.
You never have to use the space-bar when typing long sentences.
Movie characters never make typing mistakes.
All monitors display inch-high letters.
High-tech computers, such as those used by NASA, the CIA or some such governmental institution, will have easy to understand graphical interfaces.
Those that don't have graphical interfaces will have incredibly powerful text-based command shells that can correctly understand and execute commands typed in plain English.
Note: Command line interfaces will give you access to any information you want by simply typing, "ACCESS THE SECRET FILES" on any near-by keyboard.
You can also infect a computer with a destructive virus by simply typing "UPLOAD VIRUS". (See "Fortress".)
All computers are connected. You can access the information on the villain's desktop computer even if it's turned off.
Powerful computers beep whenever you press a key more...
COMPUTERS & ELECTRONICS:
As depicted in movies,
Word processors never display a cursor.
You never have to use the space-bar when typing long sentences.
All monitors display inch-high letters.
High-tech computers, such as those used by NASA, the CIA, or some such governmental institution, will have easy to understand graphical interfaces. Those that don`t, have incredibly powerful text-bases command shells that can correctly understand and execute commands typed in plain English.
Corollary: you can gain access to any information you want by simply typing "ACCESS ALL OF THE SECRET FILES" on any keyboard.
Likewise, you can infect a computer with a destructive virus by simply typing "UPLOAD VIRUS" (see "Fortress").
All computers are connected. You can access the information on the villain`s desktop computer, even if it`s turned off.
Powerful computers beep more...