皮皮学,免费搜题
登录
搜题
【单选题】
Computers have aided in the study of humanities for almost as long as the machines have existed. Decades ago, when the technology consisted solely of massive, number- crunching mainframe. computers, the chief liberal arts applications were in compiling statistical indexes of works of literature. In 1964, IBM held a conference on computers and the humanities where, according to a 1985 article in the journal Science, 'most of the conferees were using computers to compile concordances, which are alphabetical indices used in literary research.' Mainframe. computers helped greatly in the highly laborious task, which dates back to the Renaissance, of cataloging each reference of a particular word in a particular work. Concordances help scholars scrutinize important texts for patterns and meaning. Other humanities applications for computers in this early era of technology included compiling dictionaries, especially for foreign or antiquated languages, and cataloging library collections. Such types of computer usage in the humanities may seem limited at first, but they have produced some interesting results in the last few years and promise to continue to do so. As computer use and access have grown, so has the number of digitized texts of classic literary works. The computer-based study of literary texts has established its own niche in academia. Donald Foster, an English professor at Vassar College in Poughkeepsie, New York, is one of the leaders in textual scholarship. In the late 1980s Foster created SHAXICON, a database that tracks all the 'rare' words used by English playwright William Shakespeare. Each of these words appears in any individual Shakespeare play no more than 12 times. The words can then be cross-referenced with some 2,000 other poetic texts, allowing experienced researchers to explore when they were written, who wrote them, how the author was influenced by the works of other writers, and how the texts changed as they were reproduced over the centuries. In late 1995 Foster's work attracted widespread notice when he claimed that Shakespeare was the anonymous author of an obscure 578-1ine poem, A Funeral Elegy (1612). Although experts had made similar claims for other works in the past, Foster gained the backing of a number of prominent scholars because of his computer-based approach. If Foster's claim holds up to long-term judgment, the poem will be one of the few additions to the Shakespearean canon in the last 100 years. Foster's work gained further public acclaim and validation when he was asked to help identify the anonymous author of the best-selling political novel Primary Colours (1996). After using his computer programme to compare the stylistic traits of various writers with those in the novel, Foster tabbed journalist Joe Klein as the author. Soon after, Klein admitted that he was the author. Foster was also employed as an expert in the case of the notorious Unabomber, a terrorist who published an anonymous manifesto in several major newspapers in 1995. Foster is just one scholar who has noted the coming of the digital age and what it means for traditional fields such as literature. 'For traditional learning and humanistic scholarship to be preserved, it, too, must be digitized,' he wrote in a scholarly paper. 'The future success of literary scholarship depends on our ability to integrate those electronic texts with our ongoing work as scholars and teachers, and to exploit fully the advantages offered by the new medium.' Foster noted that people can now study Shakespeare via Internet Shakespeare Editions, using the computer to compare alternate wordings in different versions and to consult editorial footnotes, literary criticism, stage history, explanatory graphics, video clips, theater reviews, and archival records. Novelist and literary journalist Gregory Feeley noted that 'the simplest (and least radical) way in which computer technol
A.
computers have not been very helpful in humanities study until recently.
B.
computers were widely used in all kinds of literary texts very long ago.
C.
computers were invented by International Business Machines Corporation.
D.
computers began to be used for literary study as soon as they were invented.
拍照语音搜题,微信中搜索"皮皮学"使用
参考答案:
参考解析:
知识点:
.
..
皮皮学刷刷变学霸
举一反三
【单选题】寒极生热,热急生寒体现阴阳的那一关系
A.
相互交感
B.
对立制约
C.
阴阳平衡
D.
相互转化
E.
阴阳消长
【单选题】下列哪一个不是类中成员的访问修饰符( )。
A.
private
B.
while
C.
public
D.
protected
【简答题】房地产评估中,只能评估不包含无形资产的房地产价值。( )
【单选题】优质蛋白质占膳食蛋白质
A.
10-20%
B.
20-30%
C.
30-50%
D.
50-70%
【单选题】在TCP/IP参考模型中,将网络结构自上而下划分为四层:应用层、传输层、网际互联层、网络接口层。工作室()
A.
发送方从下层向上层传输数据,每经过一层附加协议控制信息
B.
接收方从下层向上层传输数据,每经过一层附加协议控制信息
C.
发送方从上层向下层传输数据,每经过一层去掉协议控制信息
D.
接收方从下层向上层传输数据,每经过一层去掉协议控制信息
【判断题】在房地产估价中,只能评估不包含无形资产的房地产价值。( )
A.
正确
B.
错误
【判断题】Evidence is not the only one of the most important parts to support our claims in English writing.
A.
正确
B.
错误
【判断题】房地产评估中只能评估不包含无形资产的房地产价值
A.
正确
B.
错误
【单选题】膳食营养搭配过程中,应保证优质蛋白质占膳食蛋白质总供给量的()。
A.
50%以上
B.
40%以上
C.
25%以上
D.
33.3%以上
【单选题】在TCP/IP参考模型中,将网络结构自上而下划分为四层:应用层、传输层、网际互联层、网络接口层。工作时()。
A.
发送方从下层向上层传输数据,每经过一层附加协议控制信息
B.
接收方从下层向上层传输数据,每经过一层附加协议控制信息
C.
发送方从上层向下层传输数据,每经过一层去掉协议控制信息
D.
接收方从下层向上层传输数据,每经过一层去掉协议控制信息
相关题目: