Zeus_Hunt Posted March 29, 2009 Share Posted March 29, 2009 1. Any PERMISSION DENIED has an OVERRIDE function.2. Complex calculations and loading of huge amounts of data will beaccomplished in under three seconds. In the movies, modems transmitdata at two gigabytes per second.3. When the power plant/missile site/whatever overheats, all thecontrol panels will explode, as will the entire building.4. If you display a file on the screen and someone deletes the file,it also disappears from the screen. There are no ways to copy abackup file -- and there are no undelete utilities.Corollary: Deleting a file instantly removes all copies of said file fromdisks, memory, frame buffers and caches across all computers in the universe.5. If a disk has got encrypted files, you are automatically asked fora password when you try to access it.6. No matter what kind of computer disk it is, it'll be readable byany system you put it into. All application software is usable by allcomputer platforms.7. The more high-tech the equipment, the more buttons it has. However,everyone must have been highly trained, because the buttons aren't labeled.8. Most computers, no matter how small, have reality-defying three-dimensional,real-time, photo-realistic animated graphics capability.9. Laptops, for some strange reason, always seem to have amazing real-timevideo phone capabilities and the performance of a CRAY.10. Whenever a character looks at a terminal, the image is so bright that itprojects itself onto his/her face.11. Computers never crash during key, high-intensity activities. Humansoperating computers never make mistakes under stress.12. (From Independence Day) No matter what kind of virus it is, any computercan be infected with it -- even an alien spaceship's computer -- simply byrunning a virus upload program on a laptop.13. (From Jurassic Park) A custom system with millions of lines of codecontrolling a multimillion dollar theme park can be operated by a 13 yearold who has seen a Unix system before. Seeing an operating system means youknow how to run any application on that system, even custom apps.Note: What OS was it really running?(1) "These are super computers". A CrayOS?(2) "Quicktime movie, Apple logo, trash can." MacOS?(3) "Reboot. System ready. C:\" DOS?(4) "Hey, this is Unix. I know this" Unix?The computers in Jurassic Park were Cray supercomputers running the MacOSas a graphical shell of DOS all layered on top of a Unix base.14. You cannot stop a destructive program or virus by unplugging the computer.Presumably the virus has it's own built-in power supply.15. You cannot stop a destructive program downloading onto your system byunplugging the phone line. You must figure out the mandatory "back door"all evil virus programmers put in.16. Computers only crash if a virus or a hacker is involved.17. All text must be at least 72 point.18. Word processors do not have an insert point.19. The only way to reboot is to shut off the main power to the building.20. Passwords can be guessed in three and exactly three tries. If you cannotguess the password in three tries, you must give up immediately.21. Any task or program can be executed by simply pressing Enter, no matterwhich program or window is in the foreground.22. All scanners, video cameras and digital cameras have a resolution ofapproximately 500 megapixels. Any image can be infinitely magnified withno pixelization.23. Security will not improve over time. Nonaffialiated personnel can takeover a space ship without needing an account or access control.Corollary: Anyone can override access control lists in the future.24. All hackers wear black T-shirts or Hawaiian shirts.25. Incoming messages are displayed letter by letter. Email over the Internetworks like telegraphs.26. Microsoft Windows doesn't exist. Macintosh has a 75% market share.27. GUI operations, such as image selection and manipulation, can be handledeasily and quickly via the keyboard. Link to comment Share on other sites More sharing options...
shought Posted March 29, 2009 Share Posted March 29, 2009 :moon: Nice Link to comment Share on other sites More sharing options...
Marik Posted March 29, 2009 Share Posted March 29, 2009 14. You cannot stop a destructive program or virus by unplugging the computer.Presumably the virus has it's own built-in power supply. :P ;) :hehe: :tooth: Link to comment Share on other sites More sharing options...
myidisbb Posted March 30, 2009 Share Posted March 30, 2009 aww the memories of movies :) Link to comment Share on other sites More sharing options...
Toshiro Posted March 31, 2009 Share Posted March 31, 2009 I Lolled :dance2:Nice one XD Link to comment Share on other sites More sharing options...
manbotdbot Posted April 21, 2009 Share Posted April 21, 2009 Lol. I wonder why they do that. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.