首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
admin
2010-05-08
41
问题
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (2) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (3), sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (4), like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures.
Yet the program (5), unlike the poet’s words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself. It prints results, draws pictures, produces sounds, moves arms. Programming then is fun because it gratifies creative longings built deep within us and delights sensibilities we have in common with all men.
(2)
选项
A、repeating
B、basic
C、non-repeating
D、advance
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/KTWZ777K
本试题收录于:
嵌入式系统设计师上午基础知识考试题库软考中级分类
0
嵌入式系统设计师上午基础知识考试
软考中级
相关试题推荐
信息通过网络进行传输的过程中,存在着被篡改的风险,为了解决这一安全隐患,通常采用的安全防护技术是(39)________________。
电子邮件已经成为传播恶意代码的重要途径之一,为了有效防止电子邮件中的恶意代码,应该用(25)________________的方式阅读电子邮件。
目前网络安全形势日趋复杂,攻击手段和攻击工具层出不穷,攻击工具日益先进,攻击者需要的技能日趋下降。以下关于网络攻防的描述中,不正确的是(66)________。
网页木马是一种通过攻击浏览器或浏览器外挂程序的漏洞,向目标用户机器植入木马、病毒、密码盗取等恶意程序的手段,为了要安全浏览网页,不应该(41)________。
有一些信息安全事件是由于信息系统中多个部分共同作用造成的,人们称这类事件为“多组件事故”,应对这类安全事件最有效的方法是(38)________。
在机房工程设计与建设过程中,下面是关于机房电源技术指标要求的描述,请说明哪些是错误的,并指出错误之处。(1)电源规格:电压为220~280V:频率为47~63Hz:其他单一谐波不得高于3%。(2)设备电力总容量是指各单位设备电力容量的总和另加30%的安
阅读下列说明,回答问题1至问题2,将解答或相应的编号填入对应栏内。[说明]测试是信息系统工程质量控制最重要的手段之一,这是由信息系统工程本身的特点所决定的。信息系统工程一般由网络系统、主机系统、应用系统等组成,而这些系统的质量到底如何,只有通过实
Maintenance activities include(74)。 ①making enhancements to software products ②developing a new software product ③co
在智能化建筑中如有几组槽道在同一路由,且在同一高度安装敷设时,为了便于维护检修和日常管理,槽道之间应留有一定的空间距离,一般不宜小于(48)mm。
Manypeopleviewtheterm“electroniccommerce”(ore-commerce)asshoppingonthepartoftheInternetcalledthe_______________
随机试题
邓小理理论的精髓是()
A、左旋多巴B、金刚烷胺C、溴隐亭D、硫必利E、苯海索氯丙嗪引起的急性运动障碍的解救药
A.骨质破坏、坏死B.骨髓内脓肿C.骨膜下脓肿D.反应性新骨形成E.软组织蜂窝织炎急性血源性骨髓炎后期的病理特点是
A.X线可见肺部原发灶、淋巴管炎及肺门淋巴结肿大B.X线显示右锁骨上下片状、絮状阴影,边缘模糊,其内有薄壁空洞C.X线显示双肺浓密细网状阴影,可见大小及密度大体相等的粟粒状阴影D.右肺上叶尖后段显示一厚壁空洞,双肺纹理增强,散在斑片状影,肺门被牵拉向
麦芽与谷芽的共同主治证是
某建设所在区域声环境功能区为1类,昼间环境噪声限值为55dB(A),夜间环境噪声限值为45dB(A),则该区域声环境功能区的环境质量评价量为()。
为了生产经营发展的需要,诚志股份有限公司准备以生产经营过程中使用的一辆客运汽车和一批库存电脑换取B公司的一辆运输设备、一台生产设备和一台锻压设备。诚志股份有限公司的客运汽车购入时的账面原值为200000元,已提折旧50000元,交换日公允价值为180000
教育中的非人道性的表现包括()
农业、农村和农民问题
软件测试与______是软件质量保证措施中互相联系但又性质不同的两类活动。
最新回复
(
0
)