Set your Wayback Machine to the early ’80s. Disco was dead and gone, pop rock was making waves, and consumer computers were available enough that some schools started figuring out that teaching computers was something they should do.
My school was one of those—the lovely Manheim Township High School in Neffsville, PA. A classroom was repurposed as a computer lab, as the prior computer area was barely larger than a closet and only had four terminals connected to some type of "miniframe" computer, with one Apple II computer on a rolling cart.
As I had already had one class in programming in BASIC during a summer camp course (does anything even support BASIC anymore?), I was excited about the possibilities of more computer programming learning in my future.
The lab made pretty good use of the space. There were roughly eight to 10 Apple II computers on tables across the back wall and up one sidewall, and then eight more set up back-to-back on an island of tables in the middle of the room.
Well, one day, a friend of mine and I got to the class early and decided to have fun. For folks not familiar with the Apple II computer (boy oh boy, I'm dating myself here), it was generally set up as a three-component system—computer and keyboard were one piece, the monitor was separate (and cases for both were such that the monitor sat nicely on top), and then a 5.25" floppy drive would sit next to it (you could also use an audio cassette drive, but fortunately those were already phasing out).
Now, the cable to connect the computer to the monitor was pre-VGA; it was just a simple RCA connector, as everything was monochrome. No screws to help hold the connector on tight. My friend and I (I don’t recall who had the idea, but I’d like to think it was me) decided to cross-wire all the monitors, so the monitor for one seat was connected to the computer at another seat. We did it side-by-side where we had to, but the ones on the island were really fun as we could connect them so the computer on one side of the table would drive the monitor on the other side of the table.
Thankfully, it was so long ago that I don’t remember if we got in trouble for it or not.
[ Want to test your sysadmin skills? Take a skills assessment today. ]
About the author
Unix/Linux admin for over 20 years, across various platforms, companies, and vertical markets. Founding member in the Red Hat Accelerators Program, and one-time holder of RHCE certification. Geek and nerd at heart, with a smattering of medievalness for good measure. https://www.linkedin.com/in/rick-greene-19440/
More like this
File encryption and decryption made easy with GPG
Behind the scenes of RHEL 10, part 3
OS Wars_part 1 | Command Line Heroes
OS Wars_part 2: Rise of Linux | Command Line Heroes
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Virtualization
The future of enterprise virtualization for your workloads on-premise or across clouds