Лексичні та синтактико-стилістичні зміни в сучасній англійській мові: вплив комп’ютерних технологій
for historical reasons - for hysterical raisins
Soundalike slang has been compared to the Cockney rhyming slang it has been compared to in the past (see the Glossary of Terms). They are not really similar because Cockney substitutions are opaque whereas hacker punning jargon is intentionally transparent.
2.1.3. The -P convention
The –P convention means turning a word into a question by adding the syllable `P'. It originated from the LISP convention of appending the letter `P' to denote a predicate. The question expects a yes/no answer.
E.g.: 1) At dinnertime:
Question: "Foodp?"
Answer: "Yeah, I'm pretty hungry." or "T!"
2) Instead of «How are you doing?»:
Question: "State-of-the-world-P?"
Answer: (Straight) "I'm about to go home."
Answer: (Humorous) "Yes, the world has a state."
3) On the phone to Florida:
Question: "State-p Florida?"
Answer: "Been reading JARGON.TXT again, eh?"
Once, when Bill Gosper, a famous hacker, was at a Chinese restaurant with his friends, he wanted to know whether someone would like to share with him a two-person-sized bowl of soup. His inquiry was: "Split-p soup?" It is known to be one of the best hacks.
The most frequently used positive reply to a question using Îøèáêà! Çàêëàäêà íå îïðåäåëåíà.) is «T’, which is taken from the LISP terminology and means «true’. Some LISP hackers use `T' and `NIL' (New Implementation of LISP) instead of `Yes' and `No' almost reflexively. This sometimes causes misunderstandings. For example, when a waiter or flight attendant asks whether a hacker wants coffee, he may absently respond `T', meaning that he wants coffee; but of course he will be brought a cup of tea instead.
2.1.4. Generalization
A very conspicuous feature of jargon is the frequency with which techspeak items such as names of program tools, command language primitives, and even assembler codes are applied to contexts outside of computing wherever hackers find amusing analogies to them. One of the best-known examples of generalization is that Unix hackers often grep (see the Glossary of Terms) for things rather than search for them.
Hackers enjoy generalization on the grammatical level as well. They add the wrong endings to various words and them make nouns and verbs, often by extending a standard rule to non-uniform cases (or vice versa).
E.g.: porous - porosity
generous - generosity
Hackers successfully generalize:
mysterious - mysteriosity