首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
admin
2019-05-26
51
问题
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’ s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a flowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’ s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled(诈骗)the most confidential(保密)records tight under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______.
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that are discovered
答案
C
解析
从第三段第二句可知,我们现在知道的计算机犯罪都是在很偶然的情况下发现的,而不是经过系统检测或是其他安全程序。由此可以推断,计算机犯罪者可以很狡猾地隐蔽其犯罪行为。
转载请注明原文地址:https://kaotiyun.com/show/0hnZ777K
0
考研英语一
相关试题推荐
Thetranslatormusthaveanexcellent,up-to-dateknowledgeofhissourcelanguages,full【C1】______inthehandlingofhistarget
Industrialism,atleastwithinourexperienceofitformorethan200years,never【B1】______apointofequilibriumoralevel
Directions:Inthispart,youareaskedtowriteanessaybasedonthefollowingtable.Inyourwriting,youshould1)i
[A]SetaGoodExampleforYourKids[B]BuildYourKids’WorkSkills[C]PlaceTimeLimitsonLeisureActivities[D]Talkab
Somehousesaredesignedtobesmart.Othershavesmartdesigns.AnexampleofthesecondtypeofhousewonanAwardofExcellen
CigarettesmokingisahealthhazardofsufficientimportanceintheUnitedStates.Itwas50yearsagothismonththatAmerica’
Firsttwohours,nowthreehours—thisishowfarinadvanceauthoritiesarerecommendingpeopleshowuptocatchadomesticflig
Youarewhatyoueat,orsothesayinggoes.ButRichardWrangham,ofHarvardUniversity,believesthatthisistrueinamorep
Fromthefirstthreeparagraphs,welearnthat______.AccordingtotheNAS’sreport,oneoftheproblemsinend-of-lifecarei
Fromthefirstthreeparagraphs,welearnthat______.Whichofthefollowingbestdefinestheword"aggressive"(Line2,Pargr
随机试题
下列关于强制许可的说法哪些是正确的?
Alltheclassburst______laughterwhentheysawthefunnypicture.
Whatisthenatureofthescientificattitude,theattitudeofthemanorwomanwhostudiesandappliesphysics,biology,chemis
妊高征妇女使用硫酸镁解痉时,应停用药物的情况是()
施工质量控制的系统过程,按工程实体质量形成过程的时间阶段可划分为( )控制。
背景材料: 某工程有5座通道,每座通道的工序和流水节拍为:挖基坑2d→清基底2d→立模浇筑混凝土基础4d→立模浇筑混凝土墙身8d→盖板4d→回填6d。承包人组织一个通道施工队按照对应的6道工序设6个专业队(班组)进行流水施工。 问题:计算不间歇
期货公司业务实行许可制度,由工商行政管理机关按照其商品期货、金融期货业务种类颁发许可证。()
企业有供热、供电两个辅助生产车间,按交互分配法核算辅助生产费用。5月份交互分配前供热车间共归集辅助生产费用152000元,交互分配时向供电车间分配费用7000元,由供电车间分入5000元电费。则当月供热车间应向辅助生产以外的其他受益部门分配费用(
在指导学生面试时,教师非常重视训练学生进入面试考场时的仪态、眼神、与面试官打招呼等细节,以期给面试官留下好印象,这是充分利用了()。
若某人持有盗版软件,但他本人确实不知道该软件是盗版的,则(15)承担侵权责任。
最新回复
(
0
)