首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
admin
2010-07-14
85
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out.
What is the passage mainly concerned with?
选项
答案
The different opinions .concerning the hacker phenomenon.
解析
转载请注明原文地址:https://kaotiyun.com/show/lh7K777K
0
大学英语六级
相关试题推荐
A、Fatheranddaughter.B、Husbandandwife.C、Motherandson.D、Friends.C要辨别对话中二人的关系,需听懂全部对话,尤为关键的是女士说ItwasbeforeImetyourf
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,usingsciencefortheconstructionofwhatwecallmod
TheSeattleTimesCompanyisonenewspaperfirmthathasrecognizedtheneedforchangeanddonesomethingaboutit.Inthenews
Iflifeexpectancywereamarathon,theUnitedStatesisfadingfromthepack.Althougheveryoneislivinglonger,theinhabitan
Themoretimeswehavewalkedaroute,thelongerwejudgeittobe,aUKresearcherhasconfirmed.His【B1】______couldhelpexp
Ifyoudon’tliketoswim,______(你不妨呆在家里).
Plagiarismisthepracticeofdishonestlyclaimingorimplyingoriginalauthorshipofmaterialwhichonehasnotactuallycreate
Plagiarismisthepracticeofdishonestlyclaimingorimplyingoriginalauthorshipofmaterialwhichonehasnotactuallycreate
随机试题
从所给的四个选项中,选择最合适的一个填入问号处,使之呈现一定的规律性。
我国宪法规定,全国人大代表在全国人大各种会议上的发言和表决不受法律追究。此项权利被称为()。
监理工程师办公室各专业部门负责人及驻地监理工程师等(高)级专业监理人员,一般应占监理总人数的()。
明渠均匀流的流量一定,当渠道断面形状、尺寸和壁面粗糙程度一定时,正常水深随底坡增大而:
根据《中华人民共和国刑事诉讼法》规定,逮捕的执行机关是()。
资本市场有效的外部标志有()。
科学计量、工程计量和法制计量是按照计量的()进行分类的。
方程组的通解是__________.
下列关于人员配备管理计划的叙述中,()是错误的。
Hospitals,hopingtocurbmedicalerror,haveinvestedheavilytoputcomputers,smartphonesandotherdevicesintothehandso
最新回复
(
0
)