首页
登录
职称英语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
游客
2023-09-11
36
管理
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out. [br] The passage tries to convey the idea that ______.
选项
答案
perhaps the hacker phenomenon is not bad at all
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3003700.html
相关试题推荐
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,us
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,us
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,us
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
[originaltext]W:Mike,you’resittinginfrontofyourcomputeragain!Thesea
[originaltext]W:Mike,you’resittinginfrontofyourcomputeragain!Thesea
Muchoftoday’sscienceofphysicsisbasedonNewton’sdiscoveryofthethr
Muchoftoday’sscienceofphysicsisbasedonNewton’sdiscoveryofthethr
Muchoftoday’sscienceofphysicsisbasedonNewton’sdiscoveryofthethr
Muchoftoday’sscienceofphysicsisbasedonNewton’sdiscoveryofthethr
随机试题
Large,multinationalcorporationsmaybethecompanieswhoseupsanddownsse
Whatisthemaintopicofthispassage?[br]SinglemotherLynneHargreavesdeci
安防视频监控布点应设在(____)处,配置高清摄像机。变电站大门$;$变电站周界
根据下列资料回答问题。 《河北省2010年国民经济和社会发展统计公报》显示:河
1.在城里公立小学开学的9月1日,张老师的打工子弟学校也开学了,在垃圾场边的平房
根据监管规定,商业银行所面临的流动性风险分为()。A.机构流动性风险 B.
张某从甲商场购买一电热毯,电热毯为乙厂所生产。使用中电热毯发生漏电,致使房间着
患者,男性,67岁。 病例摘要 (1)主诉:上颌牙齿拔除4个月,要求修复
下列税种,实行超率累进税率的是()。A、房产税 B、车船税 C、土地增值税
实施股票分割与发放股票股利产生的效果相似,它们都会( )。A.改变股东权益结构
最新回复
(
0
)