首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
admin
2010-05-08
31
问题
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (2) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (3), sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (4), like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures.
Yet the program (5), unlike the poet’s words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself. It prints results, draws pictures, produces sounds, moves arms. Programming then is fun because it gratifies creative longings built deep within us and delights sensibilities we have in common with all men.
(3)
选项
A、semantic
B、practical
C、lexical
D、syntactical
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/OTWZ777K
本试题收录于:
嵌入式系统设计师上午基础知识考试题库软考中级分类
0
嵌入式系统设计师上午基础知识考试
软考中级
相关试题推荐
如果未经授权的实体得到了数据的访问权,这属于破坏了信息的(14)________________。
以下关于虚拟专用网VPN描述错误的是(61)________。
中间人攻击就是在通信双方毫无察觉的情况下,通过拦截正常的网络通信数据,进而对数据进行嗅探或篡改。以下属于中间人攻击的是(50)________。
网页木马是一种通过攻击浏览器或浏览器外挂程序的漏洞,向目标用户机器植入木马、病毒、密码盗取等恶意程序的手段,为了要安全浏览网页,不应该(41)________。
数据备份通常可分为完全备份、增量备份、差分备份和渐进式备份几种方式。其中将系统中所有选择的数据对象进行一次全面的备份,而不管数据对象自上次备份之后是否修改过的备份分式是(39)________。
在本项目需求分析阶段的监理中,监理方有没有不妥当的地方,监理应该怎样做?阐述软件需求分析阶段监理的主要任务。根据对单元测试进度检查的结果,请确定:①工作B、C、D的进度是正常还是延误(给出延误的天数);是否影响工期并说明为什么。②在项目总工期允许拖延的
总监理工程师做的监理准备工作,哪些事情做得不妥,为什么?专业监理工程师编制的监理实施程序是否全面?请排出正确的顺序。
计算机系统中用来连接CPU、内存储器和I/O接口的总线称为系统总线。(1)总线属于系统总线技术的一种。
Whyis(1)fun?Whatdelightsmayitspractitionerexpectashisreward?Firstisthesheerjoyofmakingthings.Asthechildd
Whyis(1)fun?Whatdelightsmayitspractitionerexpectashisreward?Firstisthesheerjoyofmakingthings.Asthechildd
随机试题
在时间流动的地方,一定有种子在歌唱。我向大地的远方走去,我将播下我的种子。以上材料引发了你哪些思考?请结合自己的理解和感悟,自选角度写一篇不少于800字的文章。要求:①题目自拟,立意自定,文体自选;②不得套作,不得抄袭;③用规范汉字书写。
论述过程管理的要求。
有关非化脓性关节炎,以下哪项是恰当的
肱骨外上髁炎诊断依据是
由于永续年金持续期无限,因此只有现值,不存在终值。()
()的特点是供需水量相匹配,节约能源、节省设备和建筑面积。
基于应用型学习风格的课程设计,不适合采用()。
某市安全生产监督管理局在进行全市煤矿企业安全情况大检查时,发现甲企业在安全生产方面存在巨大隐患,责令该企业停产停业进行整顿,该企业对此决定不服,该企业()。
______software,alsocalledend-userprogram,includesdatabaseprograms,wordprocessors,spreadsheetsetc.
Weallhaveupsanddowns,andusuallyit’sjustbesttoacceptthem.Butperhapsyouareconcernedaboutsomeonewhoseemstob
最新回复
(
0
)