首页
登录
职称英语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
游客
2023-09-11
52
管理
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out. [br] According to Prof. Weizenbaum, what led to the hackers’ strange behavior is ______.
选项
答案
their strong desire to control the computer
解析
转载请注明原文地址:http://tihaiku.com/zcyy/3003697.html
相关试题推荐
[originaltext]Althoughthefirstcomputerswereproducedforuseingovernm
Anineyearoldschoolgirlsinglehandedlycooksupasciencefairexperimen
Anineyearoldschoolgirlsinglehandedlycooksupasciencefairexperimen
Anineyearoldschoolgirlsinglehandedlycooksupasciencefairexperimen
Anineyearoldschoolgirlsinglehandedlycooksupasciencefairexperimen
Manypeopleseemtothinkthatsciencefictionistypifiedbythecoversof
Manypeopleseemtothinkthatsciencefictionistypifiedbythecoversof
Manypeopleseemtothinkthatsciencefictionistypifiedbythecoversof
Manypeopleseemtothinkthatsciencefictionistypifiedbythecoversof
[originaltext]Sciencefictionisoneofthemostpopularbookstoday.Hundr
随机试题
It’saprogramdesignedto______mainlyto16to25yearolds.A、includeB、appreci
Bytheendofnextmonthhe________everythinginschool.A、willfinishB、wouldha
Thechantof"digital,digital,digital"continuestogrowinvolumeworldwi
根据《中华人民共和国注册建筑师条例》,下列()不是注册建筑师的义务。A.保证
风机盘管机组和绝热材料进场时,应对其下列技术性能参数进行复验,复验应为见证取样送
以下计量单位是“m2”的是( )。A.中粒式沥青混凝土 B.现浇混凝土加固土
李某,女性,78岁。1年来渐见肢体痿软无力,尤以下肢明显,腰膝酸软,不能久立,腿
房地产经纪机构代办存量房抵押贷款时,应按()收取服务费。A.抵押贷款期限
商品租金包括的内容有()。A:折旧费、维修费B:管理费、投资利息C:房产税、
甲公司欠乙公司30万元,一直无力偿付,现丙公司欠甲公司20万元,已到期,但甲公司
最新回复
(
0
)