首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
admin
2010-05-08
39
问题
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (2) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (3), sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (4), like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures.
Yet the program (5), unlike the poet’s words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself. It prints results, draws pictures, produces sounds, moves arms. Programming then is fun because it gratifies creative longings built deep within us and delights sensibilities we have in common with all men.
(3)
选项
A、semantic
B、practical
C、lexical
D、syntactical
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/OTWZ777K
本试题收录于:
嵌入式系统设计师上午基础知识考试题库软考中级分类
0
嵌入式系统设计师上午基础知识考试
软考中级
相关试题推荐
恶意软件是目前移动智能终端上被不法分子利用最多、对用户造成危害和损失最大的安全威胁类型。数据显示,目前安卓平台恶意软件主要有(10)________________四种类型。
面向数据挖掘的隐私保护技术主要解决高层应用中的隐私保护问题,致力于研究如何根据不同数据挖掘操作的特征来实现对隐私的保护。从数据挖掘的角度,不属于隐私保护技术的是(8)________________。
信息安全风险评估是指确定在计算机系统和网络中每一种资源缺失或遭到破坏对整个系统造成的预计损失数量,是对威胁、脆弱点以及由此带来的风险大小的评估。在信息安全风险评估中,以下说法正确的是(43)________。
无线传感器网络WSN是由部署在监测区域内大量的廉价微型传感器节点组成,通过无线通信方式形成的一个多跳的自组织网络系统。以下针对WSN安全问题的描述中,错误的(37)________。
[说明]某政府部门A定制开发的业务信息化系统通过多年的使用,运行稳定,但是,由于业务的扩展,系统已经满足不了业务的需要,A在征集了各业务处室的改进建议之后,决定借鉴原系统的成功经验,重新开发一套新的业务信息化系统。
根据事件1提供的预计现金流量分别计算A、B两方案的净现值,并据以比较选其一。监理的做法正确吗?为什么?阐述需求分析的目标和需求分析阶段研究的对象。
为了开发高质量的软件,从计划阶段开始,不但需要明确软件的功能,还要明确软件应达到什么样的质量标准,即制定软件的质量目标。在本项目中软件开发所依据的质量标准选择了《GB/T16260-2003软件工程产品质量》。请选择恰当的内容并将相应的标号填入到以
针对事件1的情况,监理工程师应当如何处理?请根据你对项目阶段质量控制的理解,将下列项目验收阶段质量控制的工作序号填入图3-1框图中,形成项目验收阶段质量控制流程。a.审查验收条件b.审查验收过程c.验收组实施验收
Adding5peopletoa4personteamincreasesthecommunicationchannelsbyafactorof()
Sincetabletsandsmartphoneshave______interface,manypeoplebelievethatallhomeandbusinesscomputerswilleventuallyhav
随机试题
肝性脑病患者不宜
A、病原体被消灭或排出体外B、病原体携带状态C、隐性感染D、潜在性感染E、显性感染感染病原体后不出现临床表现,但产生了特异性免疫()
人工合成的单环β-内酰胺类药物:
舌红瘦少苔有裂纹多见于
2个月以上小儿首次接种卡介苗以下哪点最重要()
下列不属于气雾剂构成的是()。
业务员张某到某地采购一批等离子电视机,张某到该地后意外发现当地乙公司的液晶电视机很畅销,就用盖有甲公司公章的空白介绍信和空白合同书与乙公司签订了购买200台液晶电视机的合同,并约定货到付款。货到后,甲公司拒绝付款。下列表述中,正确的有()。
A、B两条流水线每小时均能装配1辆汽车。A流水线每装配3辆汽车要用1小时维护,B流水线每装配4辆汽车要用1.5小时维护。问两条流水线同时开始工作,装配200辆汽车需用多少个小时?
Completethetablebelow.WriteNOMORETHANTHREEWORDSforeachanswer.
A、Theywillbemorecarefulinbuyingpresents.B、Theywilllearnhowtobudgetandinvestinthefuture.C、Theywillbemoreli
最新回复
(
0
)