首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
admin
2010-07-14
40
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out.
What does the phrase "to develop an identity" (Paragraph 5) mean?
选项
答案
To seek a unique answer of their own (Or: To get a specific response in their own way).
解析
转载请注明原文地址:https://kaotiyun.com/show/Sh7K777K
0
大学英语六级
相关试题推荐
A、Theman’sprofessor.B、Theman’sroommate.C、Aneighbor.D、Theman’sbrother.B由文中的相关词“movein,apartment,aroomchange”可推断出他们是
TheSeattleTimesCompanyisonenewspaperfirmthathasrecognizedtheneedforchangeanddonesomethingaboutit.Inthenews
AIDSThediseaseAIDShasbecometheleadingcauseofdeathamongyoungadultsinAmerica.MuchrecentAmericanculturedeal
WhatSelectivityMeansforYouUnderstandingAdmissionFactorsCollegeadmissionofficersacrossmostofthenationrepo
A、Theyloveeachother.B、Theyhateeachother.C、Theyarenotverygoodfriends.D、NotofaboveallC她和这些朋友关系只是一般,她的好朋友中没有参加妇女运
Themoretimeswehavewalkedaroute,thelongerwejudgeittobe,aUKresearcherhasconfirmed.His【B1】______couldhelpexp
AcrosstheUnitedStates,scientistsaremountingwhatmaybecomethemostinnovativeagriculturalresearchdrivesincethe1920
Ifyoudon’tliketoswim,______(你不妨呆在家里).
Plagiarismisthepracticeofdishonestlyclaimingorimplyingoriginalauthorshipofmaterialwhichonehasnotactuallycreate
随机试题
休克病人的体位一般应采用()
男性,67岁,头痛、头晕、心悸6年余,加重伴视力模糊1周就诊。查体:血压180/100mmHg,意识清,双肺呼吸音清,未闻及啰音,心率90次/min,律不齐,可闻及早搏,未闻及杂音。眼底Ⅲ级。该患者入院后需进一步完善如下检查
患者,男,35岁。左耳堵闷2周,伴听力减退。检查左外耳道少许耵聍,取出后耳道充血,鼓膜内陷,有液平。初步诊断是
试验管理标准与制度主要包括()。
下列选项中,属于建设工程项目进度控制管理措施的有()。
近年来,国家对必须经过认证的产品实行严格统一管理,其内容包括()。
下列选项说法正确的是()。
根据党的十八大报告,加强社会建设,必须加快推进社会体制改革。要围绕构建中国特色社会主义管理体系,()。
长期计划往往是()。
在Intranet安全与防范方面提到了“采用相应的一些常用安全技术措施”,请你用100字以内文字简明回答,除了防治病毒以外,还有哪些Intranet常用安全技术措施(列举三种即可)。在上述服务器软件中所列举的“Proxy服务器”软件有什么基本功能,请你
最新回复
(
0
)