首页
登录
职称英语
It is 3 a.m. Everything on the university campus seems ghostlike in the quie
It is 3 a.m. Everything on the university campus seems ghostlike in the quie
游客
2024-03-01
43
管理
问题
It is 3 a.m. Everything on the university campus seems ghostlike in the quiet, misty darkness everything except the computer center. Here, twenty students rumpled(弄皱的,散乱的) and bleary-eyed (视力模糊不清的), sit staring at their consoles, tapping away on the terminal keys. With eyes glued to the video screen, they tap on for hours. For the rest of the world, it might be the middle of the night, but here time does not exist. This is a world to itself. These young computer "hackers" are pursuing a kind of compulsion, a drive so consuming that it overshadows nearly every other part of their lives and forms the focal point of their existence. They are compulsive computer programmers. Some of these students have been at the console for thirty hours or more without a break for meals or sleep. Some have fallen asleep on sofas and lounge chairs in the computer center, trying to catch a few winks but are reluctant to get too far away from their beloved machines.
Most of these students don’t have to be at the computer center in the middle of the night. They aren’t working on assignments. They are there because they want to be they are irresistibly drawn there.
And they are not alone. There are hackers at computer centers all across the country, In their extreme form, they focus on nothing else. They drop out of school and lose contact with friends; they might have difficulty finding jobs, choosing instead to wander from one computer center to another.
"I remember one hacker. We literally had to carry him off his chair to feed him and put him to sleep. We really feared for his health," says a computer science professor at MIT.
Computer science teachers are now more aware of the implications of this hacker phenomenon and are on the lookout for potential hackers and cases of computer addiction(沉溺,上瘾) that are already severe. They know that the case of the hackers is not just the story of one person’s relationship with a machine. It is the story of a society’s relationship to the so-called thinking machines, which are becoming almost ubiquitous(到处存在的). [br] The author’s attitude towards the "hacker" phenomenon can be described as ______.
选项
A、subjective
B、prejudiced
C、anxious
D、disgusted
答案
C
解析
转载请注明原文地址:https://www.tihaiku.com/zcyy/3497046.html
相关试题推荐
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
A1999reportbytheUniversityofMichiganshowedthatabout62percentofhigh
AccordingtoDr.HaraldurKarlsson,thereasonwhyTexasTechUniversityoffers
随机试题
Whatkindofweatherwillitbewhendistantobjectssuchashillsandtalltree
Whatisthemainideaofthepassage?[br]Theenergyissavedbecause______.A、
FormanyAmericans,summerisatimetoputonswimwearandspendtimeatt
[originaltext]Cambridgeisabout90kilometersnortheastofLondon.Itiso
IEEE802.11MAC层采用() 协议A.CSMA/CA B.CSMA
关于施工升降机的安全使用的说法中,错误的是()。A.施工升降机的司机必须持
在大肠癌病人和对照组中进行血型分布的大样本调查,血型分为O/A/B/AB型,为比
Thechangeinthatvillagewasmiraculou
“四个全面”战略布局,确立了新的历史条件下党和国家各项工作的战略目标和战略举措,
投资项目决策分析与评价的基本要求包括贯彻落实科学发展观、资料数据准确可靠和()
最新回复
(
0
)