首页
登录
职称英语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sen
游客
2024-06-04
13
管理
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out. [br] The passage tries to convey the idea that ______.
选项
答案
perhaps the hacker phenomenon is not bad at all
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3619966.html
相关试题推荐
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
Forme,scientificknowledgeisdividedintomathematicalsciences,natural
JosephWeizenbaum,professorofcomputerscienceatMIT,thinksthatthesen
JosephWeizenbaum,professorofcomputerscienceatMIT,thinksthatthesen
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
Everyprofessionortrade,everyart,andeverysciencehasitstechnicalvo
[originaltext]M:Comein!W:Er,excuseme,professorSerafin,areyoubusy?M:
[originaltext]M:Comein!W:Er,excuseme,professorSerafin,areyoubusy?M:
[originaltext]M:Comein!W:Er,excuseme,professorSerafin,areyoubusy?M:
随机试题
Studythefollowingpicturecarefullyandwriteacompositionto1.desc
What’sthefocusofthispassage?[br][originaltext]Thewell-knownRushmor
细集料中的轻物质是指表观密度小于()的物质。A.1700kg/m3 B.180
患儿,男,10岁,反复腹痛、腹胀近1个月。大便时干时稀,有时大便含有较多黏液和血
膳食调查分析报告的格式内容不包括( )。A.结语 B.题目 C.数据库
将解剖学、透视法运用于绘画,从而逼真地表现出人体美的画家是( )。A.达·芬奇
HBsAg处于携带状态时,其在血液中持续时间为( )。A.3个月以上 B.5
有线电视系统由信号源装置、( )、干线传输系统和用户分配网络组成。 A、放大
下列哪些做法最能体现尊重病人的自主权A、提供的信息隐其害扬其利 B、提供的信息
日本人松本与美国人比尔在1架开往英国的中国飞机上签订1份转让在中国某公司股权的
最新回复
(
0
)