首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child d
admin
2010-05-08
47
问题
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (2) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (3), sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (4), like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures.
Yet the program (5), unlike the poet’s words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself. It prints results, draws pictures, produces sounds, moves arms. Programming then is fun because it gratifies creative longings built deep within us and delights sensibilities we have in common with all men.
(4)
选项
A、poet
B、architect
C、doctor
D、programmer
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/dTWZ777K
本试题收录于:
嵌入式系统设计师上午基础知识考试题库软考中级分类
0
嵌入式系统设计师上午基础知识考试
软考中级
相关试题推荐
防火墙的安全规则由匹配条件和处理方式两部分组成。当网络流量与当前的规则匹配时,就必须采用规则中的处理方式进行处理。其中,拒绝数据包或信息通过,并且通知信息源该信息被禁止的处理方式是(63)________。
信息安全风险评估是指确定在计算机系统和网络中每一种资源缺失或遭到破坏对整个系统造成的预计损失数量,是对威胁、脆弱点以及由此带来的风险大小的评估。在信息安全风险评估中,以下说法正确的是(43)________。
文件加密就是将重要的文件以密文形式存储在媒介上,对文件进行加密是一种有效的数据加密存储技术。以下文件加密系统中,基于Windows系统的是(19)________。
[说明]某政府机关的电子政务一期工程包括网络平台建设和应用系统开发,通过公开招标,确定工程的总承建单位是公司A。A公司自行决定,将其中一部分核心软件开发工作分包给其下属公司B,而公司B又将部分软件开发工作分包给了公司C。
《中华人民共和国招标投标法》中规定的招标方式有哪几种?开标、评标时出现了以下情况:B投标单位虽按招标文件的要求编制了投标文件但有一页文件漏打了页码;C投标单位投标保证金超过了招标文件中规定的金额;D投标单位投标文件记载的招标项目
阅读以下说明,回答问题1、问题2,将解答填入对应栏内。【说明】某信息系统工程网络计划如下图所示,建设方要求工期为26周。
我国信息产业与信息化建设主管部门和领导机构,在积极推进信息化建设的过程中,对所产生的问题予以密切关注,并逐步采取了有效的措施,概括起来,主要是实施计算机信息系统(38)管理制度;推行计算机系统集成(39)制度以及信息系统工程监理制度。
在CPU与主存之间设置高速缓冲存储器(Cache)的目的是为了(4)。
Peopleareindulginginanillusionwhenevertheyfindthemselvesexplainingatacocktail(鸡尾酒)party,say,thattheyare"inc
Whyis(1)fun?Whatdelightsmayitspractitionerexpectashisreward?Firstisthesheerjoyofmakingthings.Asthechildd
随机试题
哪种方法不能减轻桥体所承受的力
可燃材料堆场及其加工场、固定动火作业场与在建工程的防火间距不应小于()m。
熊猫债券指的是在中国发行的()。
Accordingtothepassage,MountUnzenWhyisthisresearchprojectsoimportanttoJapan?
I’llWritebackassoonasI________yourletter.
"Whatdoesthemiddlemandobutaddtothepriceofgoodsintheshops?"Suchremarksareaimedattheintermediateoperationsb
WinstonChurchill:HisOtherLifeMyfather,WinstonChurchill,beganhisloveaffairwithpaintinginhis40s,amiddisastro
Themerchantspacecraftismeantto
Ourcountryhasreleasedthepolicytoalleviatetheburdenonstudents,buthasstudents’burdenreallybeenlightened?Lookat
MywifeandIspenttwoweeksinLondonlastyear.Wewentthereinthe【11】WethinkitisthebestseasontovisitEngland.The
最新回复
(
0
)