首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
It is 3 A.M. everything on the university campus seems ghostlike in the quiet, misty darkness- everything except the computer ce
It is 3 A.M. everything on the university campus seems ghostlike in the quiet, misty darkness- everything except the computer ce
admin
2013-01-20
77
问题
It is 3 A.M. everything on the university campus seems ghostlike in the quiet, misty darkness- everything except the computer center. Here, twenty students rumpled and blear-eyed, sit transfixed at their consoles(操作台), tapping away on the terminal keys. With eyes glued to the video screen, they tap on for hours. For the rest of the world, it might be the middle of the night, but here time does not exist. This is a world unto itself. These young computer "hackers" are pursuing a kind of compulsion, a drive so consuming it overshadows nearly every other part of their lives and forms the focal point of their existence. They are compulsive computer programmers. Some of these students have been at the console for thirty hours or more without a break for meals or sleep. Some have fall- en asleep on sofas and lounge chairs in the computer center, trying to catch a few winks but loathe to get too far away from their beloved machines.
Most of these students don’t have to be at the computer center in the middle of the night. They arch’ t working on assignments. They are there because they want to be--they are irresistibly drawn there.
And they are not alone. There are hackers at computer centers all across the country. In their extreme form, they focus on nothing else. They flunk out of school and lose contact with friends; they might have difficulty finding jobs, choosing instead to wander from one computer center to an- other.
Computer science teachers are now more aware of the implications of this hacker phenomenon and are on the lookout for potential hackers and cases of computer addiction that are already severe. They know that the case of the hackers is not just the story of one person’ s relationship with a ma- chine. It is the story of a society’ s relationship to the so-called thinking machines, which are be- coming almost ubiquitous(无所不在的).
The author’s attitude towards the "hacker" phenomenon can be described as______.
选项
A、affirmative
B、contemptuous
C、anxious
D、disgusted
答案
D
解析
从作者第一段对深夜电脑中心hacker的外貌描述和以及后文说他们找不到工作四处游荡等处可以看出作者对这些黑客们持厌恶的态度。affirmative赞成的,肯定的。contemptuous轻蔑的,侮辱的。anxious担忧的。disgusted厌恶的。
转载请注明原文地址:https://kaotiyun.com/show/7O2O777K
0
考博英语
相关试题推荐
DealingwithDepression(51)Contrarytowhatmanypeoplethinkdepressionisnotanormalpartofgrowingolder.Norisith
ScienceFictioncanprovidestudentsinterestedinthefuturewithabasicintroductiontotheconceptofthinkingaboutpossibl
Aschildrengetolder,self-disciplineshouldtaketheplaceofimposeddiscipline.Constrainsbecomeinternalizedandchildren
Inmanycountriestobaccoandmedicinearegovernment______.
Althoughwedecoratedtheroomonlysixmonthsago,thepaintontheceilingisalready______becauseofthedamp.
Personalcomputersarenolongersomethingbeyondtheordinarypeople;theyareavailablethesedays.
Newandbizarrecrimeshavecomeintobeingwiththeadventofcomputertechnology.Organizedcrimehasbeendirectlyinvolved;
Becausealcoholisasolvent,itisacomponentofmanyliquidmedicines.
Theintellectually_____enterpriseofsciencedependsonfreecommunication.
Modernplantbreadingislargelybasedonplannedhybridizationcombinedwith_____selectiontospeeduptheevolutionofnewvar
随机试题
有利原则必须满足的条件,不包括
期末结存量如同蓄水池,当本期产品供大于求时,期末结存量增加;当供不应求时,期末结存量减少。()
2013年一季度,社会融资规模为6.16万亿元,比上年同期激增2.27万亿元。其中,当季人民币贷款增加2.76万亿元,人民币贷款占同期社会融资规模的44.7%,同比大幅降低了18.6个百分点。一季度,委托贷款占同期社会融资规模的8.5%,同比高1
下列哪些行为应以职务侵占罪论处?()(2008/2/63)
患儿,女性,5岁。出生后体弱。易生病感冒。查体:胸骨左缘第3、4肋间可闻及粗糙的全收缩期杂音,传导范围广,有震颤。该患儿最可能的诊断是
某项目编制施工成本计划时,先将成本按分部分项工程进行了划分,又根据施工进度计划将各分部分项工程成本按月汇总进行编制,形成各月成本支出计划,这种编制方法属于()。
教育法规
①在基因时代,生物学家们收集分子层次上的癌症成因信息,这些信息使他们开始质疑传统的癌症分类法:即根据肿瘤出现在身体中的位置来分类癌症。②研究者们认识到传统的分类法应该被根据突变种类的分类法取代,正是这些突变使得细胞以不受控制的形式生长而形成肿瘤。
某发展中国家所面临的问题是,要维持它的经济发展,必须不断加强国内企业的竞争力;要保持社会稳定,必须不断建立健全养老、医疗、失业等社会保障体系。而要建立健全社会保障体系,则需要企业每年为职工缴纳一定比例的社会保险费。如果企业每年为职工缴纳这样比例的社会保险费
在数据库中,数据的正确性、合理性及相容性(一致性)称为数据的______。
最新回复
(
0
)