JargonFile/original/html/education.html
2014-03-27 18:54:56 +00:00

9 lines
2.1 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Education</title><link rel="stylesheet" href="jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="index.html" title="The Jargon File"/><link rel="up" href="appendixb.html" title="Appendix B. A Portrait of J. Random Hacker"/><link rel="previous" href="physical.html" title="Physical Activity and Sports"/><link rel="next" href="hates.html" title="Things Hackers Detest and Avoid"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Education</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="physical.html">Prev</a> </td><th width="60%" align="center">Appendix B. A Portrait of J. Random Hacker</th><td width="20%" align="right"> <a accesskey="n" href="hates.html">Next</a></td></tr></table><hr/></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a id="education"/>Education</h2></div></div><div/></div><p>Nearly all hackers past their teens are either college-degreed or
self-educated to an equivalent level. The self-taught hacker is often
considered (at least by other hackers) to be better-motivated, and may be more
respected, than his school-shaped counterpart. Academic areas from which
people often gravitate into hackerdom include (besides the obvious computer
science and electrical engineering) physics, mathematics, linguistics, and
philosophy.</p></div><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="physical.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="appendixb.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="hates.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Physical Activity and Sports </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Things Hackers Detest and Avoid</td></tr></table></div></body></html>