首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
admin
2010-07-14
93
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out.
According to Prof. Weizenbaum, what led to the hackers’ strange behavior is ______.
选项
答案
their strong desire to control the computer
解析
转载请注明原文地址:https://kaotiyun.com/show/qh7K777K
0
大学英语六级
相关试题推荐
Tornadoes,whirlwinds,andwatersproutsarerotatingfunnelcloudairmassesofsmalldiameter.Theyaredifferentiatedbythei
Foraboutthreecenturieswehavebeendoingscience,tryingscienceout,usingsciencefortheconstructionofwhatwecallmod
AIDSThediseaseAIDShasbecometheleadingcauseofdeathamongyoungadultsinAmerica.MuchrecentAmericanculturedeal
Iflifeexpectancywereamarathon,theUnitedStatesisfadingfromthepack.Althougheveryoneislivinglonger,theinhabitan
WhatSelectivityMeansforYouUnderstandingAdmissionFactorsCollegeadmissionofficersacrossmostofthenationrepo
"Itdoesn’tpaytobedishonest,doesit?""__________(那当然啦)!
A、Colleagues.B、Husbandandwife.C、Motherandson.D、Classmates.B本题问“谈话者之间什么关系”。对话中反复出现了“honey”这个呢称,加上最后的那段话一并道出了明确的答案。故B项“夫妻关
A、Greatbuttiring.B、Relaxingandmemorable.C、Unsatisfactoryandexhausting.D、Exhaustingbutworthwhile.C对话中男士谈起自己去Mexico的旅行
Itisacknowledgedthatbesidesone’sIQ,____________________(还有许多别的的因素与一个人的成就有着很大的关系。)
Plagiarismisthepracticeofdishonestlyclaimingorimplyingoriginalauthorshipofmaterialwhichonehasnotactuallycreate
随机试题
糖酵解的关键酶是三羧酸循环的关键酶是
含牙囊肿的定义是
我们常说“屋漏偏逢连夜雨”,灾难接连而来,真是()。
根据我国《物权法》的规定,遗失物自发布招领公告之日起一段时间内无人认领的,归国家所有,该段时间为( )。
工程量计算是建设方筹集建设资金、安排工程价款拨付和结算、进行财务管理和核算的重要依据。()
根据《建设工程质量管理条例》,下列关于质量保修期限的说法正确的有()。
上市公司增发新股时,发行人刊登招股意向书当日停牌1小时,连续停牌日为T日至T+2日。( )
投资人在设立个人独资企业登记申请书上没有注明是以个人财产出资还是以家庭共有财产出资的,应以家庭共有财产对企业债务承担无限责任。()
IMF
设随机事件A与B互不相容,且P(A)>0,P(B)>0,则下列结论中一定成立的是
最新回复
(
0
)