首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
It is 3 A. M. Everything on the university campus seems ghostlike in the quiet, misty darkness -- everything except the computer
It is 3 A. M. Everything on the university campus seems ghostlike in the quiet, misty darkness -- everything except the computer
admin
2012-10-30
61
问题
It is 3 A. M. Everything on the university campus seems ghostlike in the quiet, misty darkness -- everything except the computer center. Here, twenty students untidy and blurred-eyed, sit transfixed at their consoles([计]挖制台), tapping away on the terminal keys. With eyes glued to the video screen, they tap on for hours. For the rest of the world, it might be the middle of the night, but here time does not exist. This is a world unto itself. These young computer "hackers" are pursuing a kind of impulse, a drive so consuming it overshadows nearly every other part of their lives and forms the focal point of their existence. They are compulsive computer programmers. Some of these students have been at the console for thirty hours or more without a break for meals or sleep. Some have fallen asleep on sofas or chairs in the computer center, trying to catch a few winks but hate to get too far away from their beloved machines.
Most of these students don’t have to be at the computer center in the middle of the night. They aren’t working on assignments. They are there because they want to be -- they are irresistibly drawn there.
And they are not alone. There are hackers at computer centers all across the country. In their extreme form, they focus on nothing else. They flunk(考试不及格)out of school and lose contact with friends; they might have difficulty finding jobs, choosing instead to wander from one computer center to another. They may even decline personal cleanliness.
"I remember one hacker. We literally had to carry him off his chair to feed him and put him to sleep. We really feared for his health," says a computer science professor at MIT.
Computer science teachers are now more aware of the implications of this hacker phenomenon and are
on the lookout for potential hackers and cases of computer addiction that are already severe. They know that the case of the hackers is not just the story of one person’s relationship with a machine. It is the story of a society’s relationship to the so-called thinking machines, which are becoming almost everywhere.
The author’s attitude towards the "hacker" phenomenon can be described as ______.
选项
A、optimistic
B、indifferent
C、anxious
D、disgusted
答案
C
解析
从全文可知作者对这些黑客是担心的、焦虑的,尤其第四段作者举的例子:我们几乎是强迫让他进食和睡觉的。所以选C)。A)“乐观的”;B)“漠不关心的”;D)“使人讨厌的”。
转载请注明原文地址:https://www.kaotiyun.com/show/pZ57777K
0
大学英语四级
相关试题推荐
Mostpeopleareawarethatoutdoorairpollutioncandamagetheirhealth,butmanydonotknowthatindoorairpollutioncanals
Voluntarylearninginorganizedcoursesbymaturemenandwomeniscalledadulteducation.Sucheducationis【36】tomakepeoplea
Paperairlinetickets,oncetheindustry【36】,areonthefasttracktobeforgotten.IftheInternationalAirTransportAsso
A、Grasslandforanimals.B、Alandcoveredwithtrees.C、Asteepslopeofahill.D、Alandwithfertilesoil.C短文开头提到边缘性土地土质差,一般位
PresidentBanda’sbackgroundasadoctorhasgivenhim______intothemedicalproblemsthatfacethecountry.
ItiscertainthatAmericanEnglishhas______influencedBritishEnglish,especiallyinthelastquarterofthecentury.
Hecompletely______allthesefactsasthoughtheyneverexisted,sohefailed.
A、Moved.B、Annoyed.C、Delighted.D、Discouraged.C选项均为表示态度的词表明,本题可能考查人们对某事或某物的态度。短文中提到Mostpeoplewillbepleasedbytheefforty
A、Tocreatestabilityintheirlives.B、Toembracechangesofthought.C、Toadapttothedisintegratedfamilylife.D、Toreturn
A、Theywantedtosavemoney.B、Theydecidedtoopenastore.C、Theycouldn’taffordexpensivethings.D、Theywantedtobuygifts
随机试题
社会主义社会基本的人际关系是()。
在Windows7,可以对磁盘文件按()排列。
某安全评价服务中心为一家生产剧毒磷化物的企业进行安全评价,收取9万元服务费,出具了虚假安全评价报告。根据《安全生产法》,安全监管部门应当依法没收该机构违法所得,并处()的罚款。
监理规划的作用不包括( )。
根据我国现行规定,资本公积包括( )。
《中华人民共和国行政复议法》第九条第一款规定:“公民、法人或者其他组织认为具体行政行为侵犯其合法权益的,可以自知道该具体行政行为之日起六十日内提出行政复议申请;但是法律规定的申请期限超过六十日的除外。”关于该款规定的行政复议申请期限的计算,下列说法不正确的
在量表编制过程中,因素分析的主要目的是()
扩张解释是根据立法原意,对刑法条文超过字面意思的解释。()
观察学习
在常见的分布式数据库参考模式结构中,存在多种分布透明性。关于分布透明性,下列说法错误的是()。
最新回复
(
0
)