首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
admin
2015-01-09
42
问题
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage(破坏), politically related sabotage, vandalism, crimes against the individual and financially related crimes... Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational a-bility, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their record keeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defense work suffered more than $2 million in damages as a result of bombing.
Computer vulnerability has been documented in great details. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders...
Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both nation and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
What is the purpose of a competitor to sabotage a company’s computer?
选项
A、His purpose is to destroy or weaken the firm’s operational ability.
B、His purpose is to weaken firm’s competitive capability and get it.
C、His purpose is to buy the rival’s company at a relatively low price.
D、His purpose is to steal important data.
答案
B
解析
题目问:竞争对手破坏公司电脑的目的是什么?通过阅读文章可知,竞争对手通过破坏一个公司的电脑系统,达到摧毁或削弱公司电脑的运行操作能力,进而使公司丧失在私人或政府部门中的竞争力。文章第二段“A competitor sabotages a company’s computer system to destroy…thus neutralizing its competitivecapability either in the private or the government sector.”所以,B项内容符合题意,应选择B。
转载请注明原文地址:https://kaotiyun.com/show/7lQO777K
0
考博英语
相关试题推荐
Inthepast,Americancollegesanduniversitieswerecreatedtoserveadualpurposetoadvancelearningandtoofferachancet
Educationisoneofthekeywordsofourtime.Aman,withoutaneducation,manyofusbelieve,isanunfortunatevictimofadve
Thedeteriorationoftheenvironment,bothphysicallyandaesthetically,ismostapparentinourcities.Thedehumanizingeffect
Mathematicalabilityandmusicalabilitymaynotseemonthesurfacetobeconnected,butpeoplewhohaveresearchedthesubject
Tourismdevelopsculture.Itbroadensthethinkingofthetravelerandleadstoculture【C1】______betweenthehostsandguestsfr
Tourismdevelopsculture.Itbroadensthethinkingofthetravelerandleadstoculture【C1】______betweenthehostsandguestsfr
ThefamiliarsoundsofanearlyEnglishsummerarewithusonceagain.MillionsofchildrensitdowntoSATs,GCSEs,AS-levels,
Lookingahead,thecomputerindustryseespuregold.Estimatesforthenumberofpersonalcomputersinusebytheendofthecen
Themoretimescientistsspenddesigningcomputersthemoretheymarvelatthehumanbrain.Tasksthatbaffle(难住)themostadvanc
随机试题
药学服务最基本的要素是()。
甲市乙县法院强制执行生效民事判决时执行了案外人李某的财产且无法执行回转。李某向乙县法院申请国家赔偿,遭到拒绝后申请甲市中级法院赔偿委员会作出赔偿决定。赔偿委员会适用质证程序审理。下列哪一说法是正确的?
某施工企业用卵石、中砂和水泥强度等级42.5普通硅酸盐水泥配制C40混凝土,混凝土强度标准差为6MPa,水泥强度等级值的富余系数为1.13,若用水量为230kg,则每立方米混凝土的水泥用量为()kg。
疏浚工程中水下断面边坡按台阶形开挖时,超欠比应控制在(
属于土方路基工程施工质量控制关键点的有()。
技术在国家、地区、行业内部或之间以及技术自身系统内输出与输人的活动过程,包括技术成果、信息、能力的转让、移植、引进、交流和推广普及。这种情况是()。
SHIBOR是指()。
一般资料:求助者,男性,42岁,硕士研究生,公司高级管理人员。案例介绍:求助者经常要乘飞机,但对乘飞机非常害怕,尽量避免乘飞机,严重地影响了工作与生活。为此非常苦恼,主动前来咨询。下面是心理咨询师与该求助者之间的一段咨询对话:
有人认为,一个国家如果能有效率地运作经济,就一定能创造财富而变得富有;而这样的一个国家要想保持政治稳定,它所创造的财富必须得到公正的分配:而财富的公正分配将结束经济风险;但是,风险的存在正是经济有效率运作的不可或缺的先决条件。从上述观点可以得出以下哪项
在窗体上画一个文本框、一个标签和一个命令按钮,其名称分别为Text1、Label1和Command1,然后编写如下两个事件过程:PrivateSubCommand1_Click()strText=InputBox("请输入")
最新回复
(
0
)