几个同学做这篇阅读,但是做出的答案都不大一样,恳请大家帮忙分析一下,急需正确答案,谢谢!
Joseph Weizenbaum, professor of computer science at MIT, thinks that the sense of power over the machine ultimately spoils the computer hacker and makes him into a not very pleasant sort of programmer. The hackers are so involved with designing their programs, making them more and more complex and bending them to their will, that they do not bother trying to make them understandable to other users. They rarely keep records of their programs for the benefit of others, and they rarely take time to understand why a problem happened.
Computer science teachers say they can usually pick out the prospective hackers in their courses because these students make their homework assignments more complex than they need to be. Rather than using the simplest and most direct method, they take joy in adding extra steps just to prove their cleverness.
But perhaps those hackers know something that we don't about the shape of things to come. "That hacker who had to drop out of MIT is now a multimillionaire of the computer industry," says MIT professor Michael Dertouzos. "And two former hackers became the founders of the highly successful Apple home computer company."
When seen from this aspect, the hacker phenomenon may not be so strange after all. If, as many psychiatrists say, play is really the basis for all human activity, then hacker games are really the preparation for future developments.
Sherry Turkle, a professor of sociology at MIT, has for years been studying the way computers fit into people's lives. She points out that the computer, because it seems to us to be so intelligent, capable and so human, affects the way we think about ourselves and our ideas about what we are. She says that computers and computer toys already play an important role in children's efforts to develop an identity by allowing them to test ideas about what is alive and what is not. And the youngsters can form as many slight differences and harmonious relationships with the computers as they can with people.
1. For what reason do hackers make their programs more complex than necessary?
A. They may do so to show that they are cleverer than others.
B. They may not want their programs to be copied by other users.
C. They want to get a high score from their professors.
D. They don’t want their programs to be attacked by others.
2. It can be safely inferred from the passage that ______.
A. computer toys play an important role in children's efforts to develop an identity
B. hackers are less likely to predict what will happen in their future life
C. hackers will spend a lot of time analyzing the problems that appear in their designs
D. it seems that hackers are not very popular with other computer users
3. According to Joseph Weizenbaum, who or what helps to produce computer hackers?
A. Computer toys.
B. Homework assignments.
C. Sense of power over computers.
D. University professors.
4. Which of the following statements is True according to the passage?
A. All the hackers avoid making their programs understandable to other users on purpose.
B. The prospective hackers are poor in their studies at college.
C. Some former hackers may become very successful in their future careers.
D. Computer games do more harm than good to young people.
5. What is the writer’s attitude towards computer hackers?
A. Sarcastic.
B. Objective.
C. Anxious.
D. Critical.
标签: 欧阳修苦读阅读答案