首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the
admin
2010-07-14
60
问题
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately corrupts the computer hacker and makes him into a not very desirable sort of programmer. The hackers are so involved with designing their program, making it more and more complex and bending it to their will, that they don’t bother trying to make it under standable to other users. They rarely keep records of their programs for the benefit of others, and they take rarely time to understand why a problem occurred.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their ingenuity.
But perhaps those hackers know something that we don’t about the shape of things to come. "That hacker who had to be literally dragged off his chair at-MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen in this light, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then the hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people’s lives. She points out that the computer, because it seems to us to be so "intelligent," so "capable," so "human," affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children’s efforts to develop an identity by allowing them to test ideas about what is alive and what is not.
"The youngsters can form as many subtle nuances and textured relation ships with the computers as they can with people," Turkle points out.
What does the phrase "to develop an identity" (Paragraph 5) mean?
选项
答案
To seek a unique answer of their own (Or: To get a specific response in their own way).
解析
转载请注明原文地址:https://www.kaotiyun.com/show/Sh7K777K
0
大学英语六级
相关试题推荐
A、Shewantsthemantostopusingthecomputer.B、Shewantsthemantopayattentiontoher.C、Shewantsthemantopayattentio
AIDSThediseaseAIDShasbecometheleadingcauseofdeathamongyoungadultsinAmerica.MuchrecentAmericanculturedeal
Iflifeexpectancywereamarathon,theUnitedStatesisfadingfromthepack.Althougheveryoneislivinglonger,theinhabitan
WhatSelectivityMeansforYouUnderstandingAdmissionFactorsCollegeadmissionofficersacrossmostofthenationrepo
Ice-cream’soriginsareknowntoreachbackasfarasAlexandertheGreat,althoughnospecificdateorpersonalityhavebeencr
It’shardlynewsthattheimmigrationsystemismess.Foreignnationalshavelongbeenslippingacrosstheborderwithfakepape
Themoretimeswehavewalkedaroute,thelongerwejudgeittobe,aUKresearcherhasconfirmed.His【B1】______couldhelpexp
AcrosstheUnitedStates,scientistsaremountingwhatmaybecomethemostinnovativeagriculturalresearchdrivesincethe1920
Plagiarismisthepracticeofdishonestlyclaimingorimplyingoriginalauthorshipofmaterialwhichonehasnotactuallycreate
Plagiarismisthepracticeofdishonestlyclaimingorimplyingoriginalauthorshipofmaterialwhichonehasnotactuallycreate
随机试题
核医学工作人员的健康管理不包括
非营利性中医医疗机构,依照国家有关规定享受
关于肛痈,下列哪项说法不正确()
在下列影响宗地价格的因素中,()是个别因素。
公共建筑防火门应选用()。
案例一般资料:求助者,女性,36岁,部门经理。案例介绍:求助者5岁时父母离异,她和母亲一起生活,母亲没有再婚。求助者与丈夫在同一单位工作,十年前结婚,女儿7岁。一个多月前,丈夫升职,即将被派往外地任分公司总经理。得知此消息后,求助者紧张
在教学过程中,教师为了让学生掌握知识的本质意义,需要变换知识的呈现方式,其中本质属性保持恒在,而非本质属性可有可无,这在心理学中称为()
政府的教育投入不见得真正有利于学生。在七十年代和八十年代,美国政府用于教育项目的投入的总量增加了150%,而此期间,学生在标准考试中的成绩却逐年下降。上述论证基于以下哪个假设?()
对于“小悦悦”无人救助事件和“农民工”见义勇为抬车救人事件。请你谈谈你的看法?
下列是一台第三层交换机的部分路由表,表中的路由信息完全正确的是()。
最新回复
(
0
)