首页
登录
职称英语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
游客
2024-06-04
12
管理
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out. [br] What is the passage mainly concerned with?
选项
答案
The different opinions .concerning the hacker phenomenon.
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3619962.html
相关试题推荐
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
[originaltext]M:Comein!W:Er,excuseme,professorSerafin,areyoubusy?M:
[originaltext]M:Comein!W:Er,excuseme,professorSerafin,areyoubusy?M:
随机试题
【题目来源】5月20日下午湖北省武汉市结构化面试考题 【考题二回顾】小明
运用对称分量法分析简单故障时,一般取特殊相作为参考相
品牌经济是品牌在市场竞争中充分发展的_,是一国经济发展达到较高水平的重要标志。发
七、 案例分析:(每题5分,共10分) 1、 在用户变安装计量表计工作中触
恩格斯总结和概括了哲学发展特别是近代哲学发展的历史事实,并吸取了黑格尔和费尔巴哈
()是影响证券市场供给的最根本因素。A:投资者的投资热情 B:上市公司数量
根据《抗菌药物临床应用管理办法》,医疗机构开展细菌耐药监测工作,建立细菌耐药预警
工程监理企业只能在核定的业务范围内开展经营活动,这里所指的业务范围有()。A.工
粗装修消防验收属于消防设施的()验收。A.完整性 B.可用性 C.功能性
下列施工质量保证体系的内容中,属于组织保证体系的是()。A.制定技术管理制
最新回复
(
0
)