首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
admin
2010-05-08
18
问题
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (2) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (3), sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (4), like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures.
Yet the program (5), unlike the poet’s words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself. It prints results, draws pictures, produces sounds, moves arms. Programming then is fun because it gratifies creative longings built deep within us and delights sensibilities we have in common with all men.
(4)
选项
A、poet
B、architect
C、doctor
D、programmer
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/dTWZ777K
本试题收录于:
嵌入式系统设计师上午基础知识考试题库软考中级分类
0
嵌入式系统设计师上午基础知识考试
软考中级
相关试题推荐
2016年11月7日,十二届全国人大常委会第二十四次会议以154票赞成、1票弃权,表决通过了《中华人民共和国网络安全法》。该法律由全国人民代表大会常务委员会于2016年11月7日发布,自(1)________________起施行。
中间人攻击就是在通信双方毫无察觉的情况下,通过拦截正常的网络通信数据,进而对数据进行嗅探或篡改。以下属于中间人攻击的是(50)________。
有一些信息安全事件是由于信息系统中多个部分共同作用造成的,人们称这类事件为“多组件事故”,应对这类安全事件最有效的方法是(38)________。
蜜罐是一种在互联网上运行的计算机系统,是专门为吸引并诱骗那些试图非法闯入他人计算机系统的人而设计的。以下关于蜜罐的描述中,不正确的是(25)________。
[说明]某政府部门A定制开发的业务信息化系统通过多年的使用,运行稳定,但是,由于业务的扩展,系统已经满足不了业务的需要,A在征集了各业务处室的改进建议之后,决定借鉴原系统的成功经验,重新开发一套新的业务信息化系统。
在本项目需求分析阶段的监理中,监理方有没有不妥当的地方,监理应该怎样做?阐述软件需求分析阶段监理的主要任务。阐述承建单位应该产生的单元测试工作成果。
某机房改造项目涉及网络、存储等设备的升级改造及迁移等工作。监理在项目建设过程中,重点关注机房改造时关键系统的不间断运行情况,同时还要对承建单位各项测试工作进行旁站记录,必要时进行抽检。事件1:对于该项目中的机柜、机架安装工作,总监理工程师委派监理
为了提高软件测试的效率,应该(33)。与设计测试用例无关的文档是(34)。
Manypeopleviewtheterm“electroniccommerce”(ore-commerce)asshoppingonthepartoftheInternetcalledthe_______________
阅读下列说明,回答问题1至问题5,将解答填入答题纸的对应栏内。【说明】PNG(PortableNetworkGraphicFormat)图像文件格式是一种常用的位图文件存储格式。PNG文件中能够以无损压缩方式存储深度最高为16位的灰度图像
随机试题
BeingaperiodofthegreatfloweringofAmericanliterature,theperiodisalsocalled"theAmericanRenaissance".()
企业为何要实施转移型战略()
青年李某骑车逆行,与某机关执行公务的袁某开的越过机动车行车线的汽车相撞,造成李某人身伤害和财产损害。对此承担责任的主体是()
横道图进度计划的优点是( )。
关于艾森克人格问卷(EPQ)说法正确的是()
结构化程序设计主要强调的是______。
要将“选课成绩”表中学生的“成绩”取整,可以使用的函数是()。
在考生文件夹下,打开文档WORD1.DOCX,按照要求完成下列操作并以该文件名(WORD1.DOCX)保存文档。将正文第4段文字(“第2步为‘落’……自动巡视勘测技术”)移至第3段文字(“第3步为‘回’……自动返回地求的技术。”)之前;正文各段文字(“
(1)SoRogerChillingworth—adeformedoldfigure,withafacethathauntedmen’smemorieslongerthantheyliked—tookleaveofHe
DevelopHealthyEatingHabitsinYourChildrenA)Whatdoyouthinkyourchildrenareservedatschool?Thechildrenwerese
最新回复
(
0
)