HOME
*





Lace Card
A lace card is a punched card with all holes punched (also called a whoopee card, ventilator card, flyswatter card, or IBM doily). They were mainly used as practical jokes to cause disruption in card readers. Card readers tended to jam when a lace card was inserted, as the resulting card had too little structural strength to avoid buckling inside the mechanism. Card punches could also jam trying to produce cards with all holes punched, owing to power-supply problems. When a lace card was fed through the reader, a card knife or card saw (a flat tool used with punched card readers and card punches) was needed to clear the jam. See also * Black fax * Christmas tree packet * Denial of service * List of practical joke topics This is a list of practical joke topics (also known as a prank, gag, jape or shenanigan) which are mischievous tricks or jokes played on someone, typically causing the victim to experience embarrassment, perplexity, confusion, or discomfort. Pra ... Note ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Punched Card
A punched card (also punch card or punched-card) is a piece of stiff paper that holds digital data represented by the presence or absence of holes in predefined positions. Punched cards were once common in data processing applications or to directly control automated machinery. Punched cards were widely used through much of the 20th century in the data processing industry, where specialized and increasingly complex unit record equipment, unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. The IBM 12-row/80-column punched card format came to dominate the industry. Many early digital computers used punched cards as the primary medium for input of both computer programs and Data (computing), data. While punched cards are now obsolete as a storage medium, as of 2012, some voting machines still used punched cards to record votes. They also had a significant cultural impact. History The idea of contr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Whoopee (other)
Whoopee or whoopie may refer to: * Whoopee , an exclamation used as a form of cheering or to express jubilation * Whoopee or whoopie, a euphemism for sexual intercourse * ''Whoopee!'', a 1928 musical comedy ** ''Whoopee!'' (film), a 1930 adaptation of the musical * ''Whoopee!'' (comics), a British comic book magazine of the 1970s and '80s * Whoopee cap, a type of zigzagged felt cap * Whoopee cushion, a practical joking device that mimics flatulence * Whoopie pie The whoopie pie, alternatively called a black moon, gob (term indigenous to the Pittsburgh region), black-and-white, bob, or "BFO" for Big Fat Oreo (also recorded as "Devil Dogs" and "Twins" in 1835), is an American baked product that may be cons ..., a kind of cookie sandwich * Whoopie sling, a type of rope sling used in tree pruning and hammock suspension ** Whoopie hook, a type of hook or fastener used in a whoopie sling See also * Whoopee Camp, developers of the game '' Tomba!'' * Whoopee Hill, a hill in Ohio Cou ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Ventilator
A ventilator is a piece of medical technology that provides mechanical ventilation by moving breathable air into and out of the lungs, to deliver breaths to a patient who is physically unable to breathe, or breathing insufficiently. Ventilators are computerized microprocessor-controlled machines, but patients can also be ventilated with a simple, hand-operated bag valve mask. Ventilators are chiefly used in intensive-care medicine, home care, and emergency medicine (as standalone units) and in anesthesiology (as a component of an anesthesia machine). Ventilators are sometimes called "respirators", a term commonly used for them in the 1950s (particularly the "Bird respirator"). However, contemporary medical terminology uses the word "respirator" to refer instead to a face-mask that protects wearers against hazardous airborne substances. Function In its simplest form, a modern positive pressure ventilator, consists of a compressible air reservoir or turbine, air and oxygen s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Flyswatter
A fly-killing device is used for pest control of flying insects, such as houseflies, wasps, moths, gnats, and mosquitoes. Flyswatter A flyswatter (or fly-swat, fly swatter) usually consists of a small rectangular or round sheet of some across of lightweight, flexible, vented material (usually thin metallic, rubber, or plastic mesh), attached to a lightweight wire or plastic handle, wood, or metal handle about long. The venting or perforations minimize the disruption of air currents, which can be detected by the fly and allow it to escape, and also reduce air resistance, making it easier to hit a fast-moving target such as a fly. A flyswatter is ideally lightweight and stiff, allowing quick acceleration to overcome the fast reaction time of the fly (six to ten times faster than a human), while also minimizing damage caused by hitting other objects. The flyswatter usually works by mechanically crushing the fly against a hard surface, after the user has waited for the fly to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Doily
A doily (also doiley, doilie, doyly, doyley) is an ornamental mat, typically made of paper or fabric, and variously used for protecting surfaces or binding flowers, in food service presentation, or as a head covering or clothing ornamentation. It is characterized by openwork, which allows the surface of the underlying object to show through. Etymology Doiley was a 17th-century London draper, who made popular "a woolen stuff, 'at once cheap and genteel,' introduced for summer wear in the latter part of the 17th c." At the time, it was used as an adjective, as in "doily stuffs" or "doily suit." Later, usage shifted to refer to "a small ornamental napkin used at dessert," known as a "doily-napkin." Usage Furniture protection In addition to their decorative function doilies have the practical role of protecting fine-wood furniture from the scratches caused by crockery or decorative objects such as nativity scenes, or from spilled tea when used on tea trays or with cups an ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Punched Card Reader
A computer punched card reader or just computer card reader is a computer input device used to read computer programs in either source or executable form and data from punched cards. A computer card punch is a computer output device that punches holes in cards. Sometimes computer punch card readers were combined with computer card punches and, later, other devices to form multifunction machines. It is a input device and also an output device. Most early computers, such as the ENIAC, and the IBM NORC, provided for punched card input/output. Card readers and punches, either connected to computers or in off-line card to/from magnetic tape configurations, were ubiquitous through the mid-1970s. Punched cards had been in use since the 1890s; their technology was mature and reliable. Card readers and punches developed for punched card machines were readily adaptable for computer use. Businesses were familiar with storing data on punched cards and keypunch machines were widely employe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Card Knife
Card or The Card may refer to: * Various types of plastic cards: **By type ***Magnetic stripe card ***Chip card *** Digital card **By function ***Payment card ****Credit card ****Debit card ****EC-card ****Identity card ****European Health Insurance Card ****Driver's license * Playing card, a card used in games * Printed circuit board * Punched card, a piece of stiff paper that holds digital data represented by the presence or absence of holes in predefined positions. *In communications ** Postcard ** Greeting card, an illustrated piece of card stock featuring an expression of friendship or other sentiment * \operatorname, in mathematical notation, a function that returns the cardinality of a set * Card, a tool for carding, the cleaning and aligning of fibers * Sports terms ** Card (sports), the lineup of the matches in an event ** Penalty card As a proper name People with the name * Card (surname) Companies * Cards Corp, a South Korean internet company Arts and entertainment * ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Card Saw
Card or The Card may refer to: * Various types of plastic cards: **By type ***Magnetic stripe card *** Chip card *** Digital card **By function ***Payment card ****Credit card **** Debit card ****EC-card ****Identity card ****European Health Insurance Card ****Driver's license * Playing card, a card used in games * Printed circuit board * Punched card, a piece of stiff paper that holds digital data represented by the presence or absence of holes in predefined positions. *In communications ** Postcard ** Greeting card, an illustrated piece of card stock featuring an expression of friendship or other sentiment * \operatorname, in mathematical notation, a function that returns the cardinality of a set * Card, a tool for carding, the cleaning and aligning of fibers * Sports terms ** Card (sports), the lineup of the matches in an event ** Penalty card As a proper name People with the name * Card (surname) Companies * Cards Corp, a South Korean internet company Arts and entertainm ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Black Fax
The term black fax refers to a prank fax transmission, consisting of one or more pages entirely filled with a uniform black tone. The sender's intention is generally to use up as much of the recipient's fax ink, toner, or thermal paper as possible, thus costing the recipient money, as well as denying the recipient use of their own machine (similar to computer-based denial of service attacks). This is made easier because fax transmission protocols compress the solid black image very well, so a very short fax call can produce many pages. Black faxes have been used to harass large institutions or government departments, to retaliate against the senders of junk faxes, or merely as simple pranks. The basic principle of a black fax can be extended to form a ''black fax attack.'' In this case, one or more sheets are fed halfway through the sender's fax machine and taped end to end, forming an endless loop that cycles through the machine. Not only can solid black be used, but also images ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Christmas Tree Packet
In information technology, a Christmas tree packet is a packet with every single option set for whatever protocol is in use. Background The term derives from a fanciful image of each little option bit in a header being represented by a different-colored light bulb, all turned on, as in "the packet was lit up like a Christmas tree". It can also be known as a ''kamikaze packet'', ''nastygram'', or ''lamp test segment''. Christmas tree packets can be used as a method of TCP/IP stack fingerprinting, exposing the underlying nature of a TCP/IP stack by sending the packets and then awaiting and analyzing the responses. When used as part of scanning a system, the TCP header of a Christmas tree packet has the flags FIN, URG and PSH set. Many operating systems implement their compliance with the Internet Protocol standards in varying or incomplete ways. By observing how a host responds to an odd packet, such as a Christmas tree packet, inferences can be made regarding the host's operat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Denial Of Service
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack, as simply attempting to block a single source is insufficient because there are multiple sources. A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade. Criminal perpetrators of DoS attacks oft ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]