首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
admin
2019-05-26
24
问题
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’ s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a flowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’ s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled(诈骗)the most confidential(保密)records tight under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______.
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that are discovered
答案
C
解析
从第三段第二句可知,我们现在知道的计算机犯罪都是在很偶然的情况下发现的,而不是经过系统检测或是其他安全程序。由此可以推断,计算机犯罪者可以很狡猾地隐蔽其犯罪行为。
转载请注明原文地址:https://kaotiyun.com/show/0hnZ777K
0
考研英语一
相关试题推荐
Severalyearsintoacampaigntogetkidstoeatbetterandexercisemore,childobesityrateshaveappearedtostabilize,andm
AlthoughtherearemanyskillfulBraillereaders,thousandsofotherblindpeoplefinditdifficulttolearnthatsystem.Theya
Whenshopkeeperswanttolurecustomersintobuyingaparticularproduct,theytypicallyofferitatadiscount.Accordingtoa
In1929JohnD.Rockefellerdecideditwastimetosellshareswhenevenashoeshineboyofferedhimasharetip.Duringthepas
Therearealwaysgoodreasonsforpeopletocareaboutthewelfareofanimals.EversincetheEnlightenment,theirtreatmenthas
Asayoungbondtrader,Buttonwoodwasgiventwopiecesofadvice,tradingrulesofthumb,ifyouwill:thatbadeconomicnewsi
Writeanessaybasedonthefollowingpiechart.Inyouressay,youshould1)interpretthegraph,and2)giveyourcommen
Ifyouweretoexaminethebirthcertificatesofeverysoccerplayerin2006’sWorldCuptournament,youwouldmostlikelyfind
Manyofthetechindustry’sbiggestcompanies,likeAmazon,Google,IBMandMicrosoft,arejockeyingtobecometheleaderfora
ArtificialintelligencewasacatchwordattheSummerDavosforuminDalian,Liaoningprovince,whichconcludedonThursday.Whi
随机试题
在治疗心功能不全时,应用洋地黄的临床意义在于
CT机将X线锥形束转化为扇形束的部件是()。
履行《安全生产法》所规定的职责,不允许存在超越法律之上的或逃避、抗拒《安全生产法》所规定的监督管理,这体现了安全生产监督监察具有()。
某海港航道疏浚工程长20km,设计底高程一20.0m(当地理论深度基准面),航道浚前平均高程为一9.0m(当地理论深度基准面),其中有一段长1.5km的浅水段,浚前高程一7.0~一8.0m(当地理论深度基准面),当地平均高潮位为+1.5m(黄海平均海平面)
以概念、判断、推理等形式进行的思维是()。
根据以下情境材料,回答下列问题。陈某为求职,要求李某为其定制一份本科文凭。因价格谈不拢,陈某用刀杀死了李某。案发后,公安局刑警队侦查员杜某、戴某讯问陈某至深夜,陈某交代了作案工具匕首和抢得的现金等物在其家中卧室床下。为了尽快获取证据,杜某、戴某向大队领导
“四书五经”中的“四书”指的是()。
Inaworldwhereitseemswealreadyhavetoomuchtodo,andtoomanythingstothinkabout,itseemsthelastthingweneediss
ATM网络采用固定长度的信源传送数据,信元长度为______。
在考生文件夹下,打开文档Word2.docx,按照要求完成下列操作并以该文件名(Word2.docx)保存文档。【文档开始】学号姓名高等数学英语物理99050201李
最新回复
(
0
)