This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Poetry

Hackers: Wizards of the Information Age

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

Hackers: Wizards of the Information Age

Question 1

The hackers in the documentary give a totally different definition of the term hacker from the one we are accustomed to today. In modern times, hackers are perceived as people who gain unauthorized access to people’s computers. One of the hackers in the documentary – Nicknamed “catalyst” – describes a hacker as someone who hacks away at the computer keyboard until a program works. “Catalyst” distinguishes hackers from crackers by explaining that a “cracker” is someone who breaks the system security of a computer. Andy Herzfeld describes a hacker as someone who has a passion for designing programs and seeing their use actualized. They are not driven by money but only by the love or joy of seeing their programs work. They are people who conceive ideas and want to see them actualized. Hackers are also described in the documentary as people who love what they do, and they spend time improving or working on their hacking skills.

Question 2

The individuals in the video explain that they learned to use computers using college computers. As the narrator explains, the first wave of hackers emerged at MIT when the students who would later be hackers got attracted to the university’s mainframe computers. They learned to use the computers in the middle of the night when they locked themselves in computer rooms and learned gradually. According to Richard Greenblatt – one of the hackers featured in the documentary, getting time to use the machines was very difficult; hence those who wanted to use the computers were required to fill their details in a signup list. Greenblatt explains that passionate hackers would hang around the machines in case some people did not show up, or just in case someone got tired of using the machines.  Richard Stallman also explains that during his time at MIT, he would code the whole night.

Question 3

Electronic democracy describes the use of communication technologies for a free exchange or sharing of information. These electronic channels, according to the video, are available on electronic bulletin boards and different computer networks. Using these channels, users can chat with others or send and receive information or messages. As the narrator explains, despite the benefits brought by electronic democracy, there are also prices to be paid. With many electronic channels available for users to use, channels are experiencing information overload. Electronic democracy has resulted in too much information that can be overwhelming to handle. On the question about the growth of services and products, Wozniak thinks that too much stuff than the world needs has been created. He argues the many computer hackers that exist today have created too many pieces of hardware and software, much of which the world does not even need.

Don't use plagiarised sources.Get your custom essay just from $11/page

Question 4

The hackers in the video had a number of things in common. For instance, Greenblatt states that they had a love for programming and that they wanted to excel in what they did. They wanted to design or make programs that could work in ways that cannot be imagined. Doug Carlston also explains that most of these early programmers did not have any information to refer to; hence they learned through trial and error.  These early hackers also worked illegally and tirelessly at night because they were not allowed to sign up for hacking. Most of today’s popular technologies such as computer games, drawing programs were inspired by the programs that were developed by these hackers in the university labs.

 

 

 

References

 

 

 

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask