首页
登录
职称英语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
游客
2023-09-11
63
管理
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out. [br] What is the passage mainly concerned with?
选项
答案
The different opinions .concerning the hacker phenomenon.
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3003696.html
相关试题推荐
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Itishardtopredicthowscienceisgoingtoturnout,andifitisreally
Itishardtopredicthowscienceisgoingtoturnout,andifitisreally
Itishardtopredicthowscienceisgoingtoturnout,andifitisreally
Itishardtopredicthowscienceisgoingtoturnout,andifitisreally
[originaltext]W:Hi,ProfessorHiggins.M:Hi,Julia.W:Wouldyoubeabletoh
[originaltext]W:Hi,ProfessorHiggins.M:Hi,Julia.W:Wouldyoubeabletoh
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
随机试题
HowtoSurvivetheHeat1.Heatwavescanbedeadly■nature’sdeadlies
Marijuana(大麻)isagreen,brown,orgraymixtureofdried,shreddedleaves,
It’snormaltothinkofaconversationastakingplacebetweenpeoplewhoar
神经细胞兴奋时,其兴奋性的周期变化是( )。A.绝对不应期→相对不应期→超常期
患儿男,6岁。反复咳嗽、咳痰、咳血3年,常见于清晨起床后。曾有重症麻疹肺炎病史,
子宫内膜不完全脱落性功血的诊刮时间与可能的病理结果是A.经前诊刮,病理:增殖期子
下列制备注射剂方法中,不能除去热原的方法是A.蒸馏水器上附灭隔沫装置B.250℃
在高压设备上工作,应至少由()进行,并完成保证安全的组织措施和技术措施。一人;两
下列关于人力资源预测方法的说法,不正确的是()A:趋势外推法最简单,自变量只有一
下列混合成本分解方法中,可能是最完备的方法,但在进入细节之后要使用其他技术方法作
最新回复
(
0
)