首页
登录
职称英语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
游客
2023-09-11
46
管理
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out. [br] In Prof. Dertouzos’ opinion, the hackers probably have ______.
选项
答案
better insight into the future than other people
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3003698.html
相关试题推荐
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,us
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,us
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,us
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
[originaltext]W:Mike,you’resittinginfrontofyourcomputeragain!Thesea
[originaltext]W:Mike,you’resittinginfrontofyourcomputeragain!Thesea
Muchoftoday’sscienceofphysicsisbasedonNewton’sdiscoveryofthethr
Muchoftoday’sscienceofphysicsisbasedonNewton’sdiscoveryofthethr
随机试题
软件著作权人可以向( )认定的软件登记机构办理登记。A.国务院法制办 B.全
关于世界银行贷款项目的投标资格审查,下列说法中正确的是()。A:凡采购大而复杂
肝素体内抗凝最常用的给药途径是A、口服 B、肌内注射 C、深部皮下注射 D
参与骨盆构成的骨骼不包括( )A.骶骨 B.腰椎 C.耻骨 D.髂骨
基金管理人运用证券投资基金买卖股票、债券的差价收入,( )营业税。A.免征
发行人将相关信息披露文件送全国银行间同业拆借中心的,通过()披露。A.全国银
某偏远地区,当地的生产水平落后,交通很不方便,但是自然环境秀丽优美,民风民俗也有
银行风险是指银行在经营过程中,由于各种不确定因素的影响,而使其()蒙受损失的可
下面是抽样调查的10个学生的考试分数等级,分别为:不及格,中,中,良,良,良,良
成本控制步骤中管理行为控制程序是对成本全过程控制的基础,()则是成本进行
最新回复
(
0
)