首页
登录
职称英语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
游客
2024-06-04
24
管理
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out. [br] According to Prof. Weizenbaum, what led to the hackers’ strange behavior is ______.
选项
答案
their strong desire to control the computer
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3619963.html
相关试题推荐
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
JosephWeizenbaum,professorofcomputerscienceatMIT,thinksthatthesen
JosephWeizenbaum,professorofcomputerscienceatMIT,thinksthatthesen
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
[originaltext]M:Comein!W:Er,excuseme,professorSerafin,areyoubusy?M:
[originaltext]M:Comein!W:Er,excuseme,professorSerafin,areyoubusy?M:
Afterheretired,theprofessorlivedin__________(纽约西面的一个小镇上).asmalltownt
随机试题
A.differentlyB.ensuresC.unusualD.prohibitE.fairlyF.Inreturn
[originaltext]Peopleenjoytakingtrips.[9]Butwhatarethereasonstheyl
当索赔事件持续进行时,承包方应当阶段性向()发出索赔意向通知,在索赔事件终了后
()是可靠性最直接的表示方式。A.失效强度 B.可靠度 C.失效率 D.M
下列关于工业炉煤气区域的预防控制措施,说法正确的是()。A.加热炉操作室内应配
A.胰岛素释放试验 B.尿糖测定 C.空腹血糖 D.葡萄糖耐量试验 E.
患者女,40岁。在田间劳作时小腿被毒蛇咬伤,局部留下一对大而深的齿痕,伤口出血不
下列定额中,属于按编制程序和用途分类的有()。A.国家定额 B.施工定额
社会策划模式中,社会工作者收集资料,进行社区分析及社区诊断,进行社会调查,对服务
(2017年真题)很多吸烟成瘾的人并非没有尝试过戒烟,老任就是其中之一。他吸烟已
最新回复
(
0
)