首页
登录
职称英语
It is 3 a.m. Everything on the university campus seems ghostlike in the quie
It is 3 a.m. Everything on the university campus seems ghostlike in the quie
游客
2024-03-01
48
管理
问题
It is 3 a.m. Everything on the university campus seems ghostlike in the quiet, misty darkness everything except the computer center. Here, twenty students rumpled(弄皱的,散乱的) and bleary-eyed (视力模糊不清的), sit staring at their consoles, tapping away on the terminal keys. With eyes glued to the video screen, they tap on for hours. For the rest of the world, it might be the middle of the night, but here time does not exist. This is a world to itself. These young computer "hackers" are pursuing a kind of compulsion, a drive so consuming that it overshadows nearly every other part of their lives and forms the focal point of their existence. They are compulsive computer programmers. Some of these students have been at the console for thirty hours or more without a break for meals or sleep. Some have fallen asleep on sofas and lounge chairs in the computer center, trying to catch a few winks but are reluctant to get too far away from their beloved machines.
Most of these students don’t have to be at the computer center in the middle of the night. They aren’t working on assignments. They are there because they want to be they are irresistibly drawn there.
And they are not alone. There are hackers at computer centers all across the country, In their extreme form, they focus on nothing else. They drop out of school and lose contact with friends; they might have difficulty finding jobs, choosing instead to wander from one computer center to another.
"I remember one hacker. We literally had to carry him off his chair to feed him and put him to sleep. We really feared for his health," says a computer science professor at MIT.
Computer science teachers are now more aware of the implications of this hacker phenomenon and are on the lookout for potential hackers and cases of computer addiction(沉溺,上瘾) that are already severe. They know that the case of the hackers is not just the story of one person’s relationship with a machine. It is the story of a society’s relationship to the so-called thinking machines, which are becoming almost ubiquitous(到处存在的). [br] Which of the following may be a most appropriate title for the passage?
选项
A、The Charm of Computer Science
B、A New Type of Electronic Toys
C、Computer Programming, A Worthwhile Cause
D、Computer Addicts
答案
D
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3497047.html
相关试题推荐
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
【S1】[br]【S3】HTokyoNationalUniversity的研究小组的成员对不同年龄(differentages)和不同职业(varyi
AccordingtoDr.HaraldurKarlsson,thereasonwhyTexasTechUniversityoffers
DavidBernalwasfamoussinceheenteredtheuniversity.[br]Sincethatnighti
DavidBernalwasfamoussinceheenteredtheuniversity.[br]Adethoughtthatt
随机试题
Yourbossholdsyourfutureprospectsinhishands.Somebossesarehardto
[audioFiles]audio_eusm_j87_001(20082)[/audioFiles]A、Theybothgraduatedfromar
[originaltext]Asthenewsalesdirectorforanationalcomputerfirm,(16)A
TheresultofthewarwithMexicoin1846was______.A、apaymentof$15milliont
DRAM存储器的中文含义是()。A.静态随机存储器 B.动态只读存储器 C.
地面铺装图是在室内不布置可移动的装饰要素(如家具、设备、盆栽等)的状况下,假想用
220kV及以上无人值守变电站应通过硬接点经监控系统将继电保护和安全自动装置动作
符合记账的条件是()。A、期初余额平衡 B、上月已结账 C、凭证已审核 D
施工方进度控制的任务是依据施工任务委托合同对施工进度的要求控制施工工作进度,这是
下列进度控制措施中,属于施工方进度控制的管理措施的是()。A.编制施工进度控制的
最新回复
(
0
)