首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
admin
2019-05-26
52
问题
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’ s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a flowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’ s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled(诈骗)the most confidential(保密)records tight under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage is mainly about______.
选项
A、why computer criminals are often able to escape punishment
B、why computer crimes are difficult to detect by systematic inspections
C、how computer criminals mange to get good recommendations from their former employers
D、why computer crimes can’ t be eliminated
答案
A
解析
主旨大意题。全文先介绍了计算机犯罪的严重性,接着介绍这些罪犯被发现后不受处罚的事实,接着分析造成这种事实的原因。所以,A项更为合适。
转载请注明原文地址:https://kaotiyun.com/show/rhnZ777K
0
考研英语一
相关试题推荐
In1929JohnD.Rockefellerdecideditwastimetosellshareswhenevenashoeshineboyofferedhimasharetip.Duringthepas
Industrialism,atleastwithinourexperienceofitformorethan200years,never【B1】______apointofequilibriumoralevel
Recentyearshavebroughtminority—ownedbusinessesintheUnitedStatesnotonlyunprecedentedopportunitiesbutalsonewands
Drinkingwaterandwaterfordomesticuseoftencomefromgroundwater.Inordertoprotectthiswater,localwaterauthoritiesc
Whenyouaskyoungpersontotellthenamesofsomefamousmoviesandthechancesarethatmanyofthosementionedwillbepopul
Firsttwohours,nowthreehours—thisishowfarinadvanceauthoritiesarerecommendingpeopleshowuptocatchadomesticflig
Firsttwohours,nowthreehours—thisishowfarinadvanceauthoritiesarerecommendingpeopleshowuptocatchadomesticflig
PlayersofFarmVille,anonlinegame,raisevirtualchickensonanimaginaryfarm.Yettheyarehappytoswaprealmoneyforvir
WhatdoestheauthorintendtoillustratewithAAAAcarsandZodiaccars?Whatcanweinferfromthefirstthreeparagraphs?
随机试题
电气线路的保护措施有()、过负载保护和接地故障保护。
简述造成测量误差的因素。
气管异物患者,其呼吸困难的类型属于
合成和释放血管性血友病因子(vWF)的是
初始权属调查的基本单元是()。
针对居住建筑的墙体保温隔热材料,应进行复验的性能指标有()。
目的港交货合同和CIF合同是两种不同性质的合同,前者属于到货合同,后者为装运合同。()
按规定,无形资产规定有效期的,按规定期限平均摊销;没有规定有效期的,按预计使用期限或者不少于()的期限平均摊销。
张某向杨某借款3万元到期未还。双方因债务清偿问题发生纠纷,张某被杨某打伤,住院治疗共支出医疗费4.5万元。杨某有权主张在3万元内抵销,只向张某支付1.5万元医疗费。()
据报道,我国数据中继卫星“天链一号0l星”于2008年4月25日在西昌卫星发射中心发射升空,经过4次变轨控制后,于5月1日成功定点在东经770赤道上空的同步轨道。关于成功定点后的“天链一号01星”,下列说法正确的是()。
最新回复
(
0
)