Joke's Database
     
Have fun searching 100254 jokes and pictures!


While we believe we will be fully Y2K compliant by January 1, 2000, and most of our subsidiary units and contractors claim they will also be fully compliant, we obviously need to make some preparations in case unexpected challenges impair our ability to meet the needs of our customers.

Enclosed with this memo is a “Y2K Backup System” device designed to meet short time emergency needs in case of a computer operations failure, or operational delay. This device is the company’s Primary Emergency Network Computer Interface Liaison device (P.E.N.C.I.L.). This device has been field tested extensively, including certification testing, as well as volume and stress testing. Properly maintained, the device meets all the requirements for coding and data input. Prior to use, the (P.E.N.C.I.L.) will require preparation and testing. Tools and supplies required will be: A sharpened knife or grinding device; and a supply of computer paper (with or without holes).

Gripping the device firmly in your hand, proceed to scrape or grind the wooded end until it has a cone-like appearance. The dark core area must be exposed to properly function. (Left-handed employees should read this sentence backwards, and then go to your supervisor for assistance.)

Place a single sheet of computer paper on a smooth, hard surface. Take the backup device, place the sharpened point against the paper, and pull it across the paper. If properly done, this will input a single line.

CAUTION: Excessive force may damage components of the device or damage the data reception device. If either the P.E.N.C.I.L. or the paper are damaged, go back to the preparation instructions above.

Proper use of the device will require data simulation input by the operator. Placing the device against the computer page forming symbols as closely resembling the computer lettering system you normally use. At the completion of each of the simulated letters, lift the device off the page, move it slightly to the right, replace it against the page, and form the next symbol. This may appear tedious, and somewhat redundant, but, with practice, you should be able to increase your speed and accuracy. The P.E.N.C.I.L. is equipped with a manual deletion device. The device is located on the reverse end of the P.E.N.C.I.L. Error deletions operate similarly to the “backspace” key on your computer. Simply place the device against the erroneous data, and pull it backwards over the letters. This should remove the error, and enable you to resume data entries.

CAUTION: Excessive force may damage the data reception device. Insufficient force, however, may result in less than acceptable deletion, and may require re-initialization of action as above. This device is designed with user maintenance in mind. However, if technical support is required, you can still call your local computer desk supervisor at (800)-YOU-DUMMY.

1.Their company logo is two tin cans and a length of string.

2.You check out their address, and it’s a phone booth containing a Compaq portable and an acoustic coupler.

3. Their chief technical officer lives in a 10-foot-by-7-foot shack in the woods.

4. Their proud boast: “We’ve been on the Internet since it was CB radio.”

5. Their promo materials use the words “information” and “superhighway” in the same sentence.

6. You order an SLIP/PPP connection, email, and 2MB of server space for your personal Web site, and the voice on the other end of the phone asks, “Would you like fries with that?”

7. “As seen in Better Business Bureau special reports.”

8. “Access speeds up to 9,600 BPS in most areas.”

9. They hawk both domain names and Rolexes on the street corner.

10. They charge for e-mail and downloads by the word.

What’s the first question that the computer community asks?
“Is it PC compatible?”

A is for awk which runs like a snail, and
B is for biff which reads all your mail.

C is for cc as hackers recall, while
D is for dd the command that does all.

E is for emacs which rebinds your keys, and
F is for fsck which rebuilds your trees.

G is for grep a clever detective, while
H is for halt which may seem defective.

I is for indent which rarely amuses, and
J is for join which nobody uses.

K is for kill which makes you the boss, while
L is for lex which is missing from DOS.

M is for more from which less was begot, and
N is for nice which it really is not.

O is for od which prints out things nice, while
P is for passwd which reads in strings twice.

Q is for quota a Berkeley-type fable, and
R is for ranlib for sorting ar table.

S is for spell which attempts to belittle, while
T is for true which does very little.

U is for uniq which is used after sort, and
V is for vi which is hard to abort.

W is for whoami which tells you your name, while
X is, well, x of dubious fame.

Y is for yes which makes an impression, and
Z is for zcat which handles compression.

A helicopter was flying around above Seattle when an electrical malfunction disabled all of the aircraft’s electronic navigation and communications equipment. Due to the clouds and haze, the pilot could not determine the helicopter’s position and course to steer to the airport.

The pilot saw a tall building, flew toward it, circled, drew a handwritten sign, and held it in the helicopter’s window. The pilot’s sign said “WHERE, AM?” in large letters.

People in the tall building quickly responded to the aircraft, drew a large sign, and held it in a building window. Their sign said “YOU ARE IN A HELICOPTER.”

The pilot smiled, waved, looked at his map, determined the course to steer to SEATAC airport, and landed safely.

After they were on the ground, the copilot asked the pilot how the “YOU ARE IN A HELICOPTER” sign helped determine their position. The pilot responded “I knew that had to be the MICROSOFT building because they gave me a technically correct, but completely useless answer.”



© 2015 ijokedb.com