首页
登录
职称英语
It is 3 a.m. Everything on the university campus seems ghostlike in the quie
It is 3 a.m. Everything on the university campus seems ghostlike in the quie
游客
2024-03-01
84
管理
问题
It is 3 a.m. Everything on the university campus seems ghostlike in the quiet, misty darkness everything except the computer center. Here, twenty students rumpled(弄皱的,散乱的) and bleary-eyed (视力模糊不清的), sit staring at their consoles, tapping away on the terminal keys. With eyes glued to the video screen, they tap on for hours. For the rest of the world, it might be the middle of the night, but here time does not exist. This is a world to itself. These young computer "hackers" are pursuing a kind of compulsion, a drive so consuming that it overshadows nearly every other part of their lives and forms the focal point of their existence. They are compulsive computer programmers. Some of these students have been at the console for thirty hours or more without a break for meals or sleep. Some have fallen asleep on sofas and lounge chairs in the computer center, trying to catch a few winks but are reluctant to get too far away from their beloved machines.
Most of these students don’t have to be at the computer center in the middle of the night. They aren’t working on assignments. They are there because they want to be they are irresistibly drawn there.
And they are not alone. There are hackers at computer centers all across the country, In their extreme form, they focus on nothing else. They drop out of school and lose contact with friends; they might have difficulty finding jobs, choosing instead to wander from one computer center to another.
"I remember one hacker. We literally had to carry him off his chair to feed him and put him to sleep. We really feared for his health," says a computer science professor at MIT.
Computer science teachers are now more aware of the implications of this hacker phenomenon and are on the lookout for potential hackers and cases of computer addiction(沉溺,上瘾) that are already severe. They know that the case of the hackers is not just the story of one person’s relationship with a machine. It is the story of a society’s relationship to the so-called thinking machines, which are becoming almost ubiquitous(到处存在的). [br] It can be reasonably inferred from the passage that ______.
选项
A、the "hackers" are largely dependent on their teachers to take care of their routine life
B、university computer centers are open to almost everyone
C、university computer centers are expecting outstanding programmers out of the "hackers"
D、the "hacker" phenomenon is partly attributed to the insufficiency of the computer centers
答案
B
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3497045.html
相关试题推荐
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
AccordingtoDr.HaraldurKarlsson,thereasonwhyTexasTechUniversityoffers
AccordingtoDr.HaraldurKarlsson,thereasonwhyTexasTechUniversityoffers
AccordingtoDr.HaraldurKarlsson,thereasonwhyTexasTechUniversityoffers
DavidBernalwasfamoussinceheenteredtheuniversity.[br]Sincethatnighti
随机试题
[A]mirror[B]winter[C]newspaper[D]pen[E]water[F]food[G]paperD原文“用来写东
[originaltext]Mycousinjustcalled.Theydidn’tmanagetogetaliftandares
Inrecentyears,Chinesefancyknotshavebecomeverypopular.【76】Theyare
[audioFiles]audio_ehbm_j27002(20082)[/audioFiles]A、5:20B、5:00C、5.35D、5:45CW
社会主义核心价值体系包括() A、社会主义荣辱观 B、社会主义思想道德 C、
风险管理策略主要包括()。 Ⅰ、风险转移 Ⅱ、风险控制 Ⅲ、风险分散
(2018年11月)( )不属于企业人员内部供给预测的方法。A.经验推断法
原方对服法规定极严格,要求每日服兔屎大一点一丸,加至三丸的方剂是A.大黄廑虫丸
属于临床前研究工作,应遵循GLP规范的是A.Ⅰ期临床试验 B.Ⅳ期临床试验
项目监理机构在施工阶段进度控制的任务有()A、完善建设工程控制性进度计划 B
最新回复
(
0
)