Input Jokes

  • Funny Jokes

    CAT v.6.1b: Completely Autonomous Tester, Manufactured by MOMCAT
    User Installation and Maintenance Documentation:
    Features:
    User Friendly
    Low Power CPU
    Self Portable Operation
    Dual Video and Audio Input
    Audio Output
    Auto Search Capability for Input Data
    Auto Search for Output Bin
    Auto Learn Program in ROM
    Instant Transition To Energy Saving Standby Mode When Not In Use
    Wide Operating Temperature Range
    Mouse Driven
    Self Cleaning
    Production Details:
    After basic KIT construction, the unit undergoes six weeks of
    onsite ROM programming and burn-in testing. Listed features are
    installed during this period. Since MOMCAT uses local suppliers,
    there may be a variation between individual units. Some of the
    units may not meet general standards. MOMCAT's quality assurance
    may reject inferior units. Users may sometimes salvage rejected
    units. Beware of Far East clones. These may violate more...

    When I went to college in the 1980's, I heard a lot of words like "data input" and "beta version." They confused me. I wanted desperately to know what people were talking about, what Big Secret resided in the computer industry.
    Now that I've worked in a computer company for the last few years, I've gained an insider's perspective. I decided to share my knowledge with the uninitiated by creating the following brief, handy glossary:
    Alpha. Software undergoes alpha testing as a first step in getting user feedback. Alpha is Latin for "doesn't work."
    Beta. Software undergoes beta testing shortly before it's released. Beta is Latin for "still doesn't work."
    Computer. Instrument of torture. The first computer was invented by Roger "Duffy" Billingsly, a British scientist. In a plot to overthrow Adolf Hitler, Duffy disguised himself as a German ally and offered his invention as a gift to the surly dictator. The plot worked. On more...

    While we believe we will be fully Y2K compliant by January 1, 2000, and most of our subsidiary units and contractors claim they will also be fully compliant, we obviously need to make some preparations in case unexpected challenges impair our ability to meet the needs of our customers.

    Enclosed with this memo is a "Y2K Backup System" device designed to meet short time emergency needs in case of a computer operations failure, or operational delay. This device is the company's Primary Emergency Network Computer Interface Liaison device (P. E. N. C. I. L.).

    This device has been field tested extensively, including certification testing, as well as volume and stress testing. Properly maintained, the device meets all the requirements for coding and data input. Prior to use, the (P. E. N. C. I. L.) will require preparation and testing. Tools and supplies required will be: A sharpened knife or grinding device; and a supply of computer paper (with or without more...

    While we believe we will be fully Y2K compliant by January 1, 2000, and most of our subsidiary units and contractors claim they will also be fully compliant, we obviously need to make some preparations in case unexpected challenges impair our ability to meet the needs of our customers.
    Enclosed with this memo is a "Y2K Backup System" device designed to meet short time emergency needs in case of a computer operations failure, or operational delay. This device is the company's Primary Emergency Network Computer Interface Liaison device (P.E.N.C.I.L.).
    This device has been field tested extensively, including certification testing, as well as volume and stress testing. Properly maintained, the device meets all the requirements for coding and data input. Prior to use, the (P.E.N.C.I.L.) will require preparation and testing. Tools and supplies required will be: A sharpened knife or grinding device;and a supply of computer paper (with or without holes).
    Gripping the more...

    Those vexatious software companies.
     
    We all know about them. Their software products range from user friendly software to the truly inimical software. Most people would tell you that the majority of software fall in to the latter category. Why?, One might ask. Well, it's just the way it is. To elaborate my point, I present you with the following "Important Notice" I found on the back side of a certain software package.
    Important Notice to the purchaser.
     The purchaser of this package, hereinafter referred to as the goose punter, is requested to read the under mentioned notice, and on opening and breaking the seal of this package, shall be deemed to have agreed to the following terms.
     The goose punter undertakes to use the software on one computer only, and not to duplicate the software on to other computers whether owned by the goose punter or not.
     The goose punter also undertakes not to complain about the ridiculously complicated copy more...

  • Recent Activity