More and more, the operations of our business, governments, and financial institutions are controlled by information that exists

admin2023-03-20  6

问题     More and more, the operations of our business, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can get substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
    It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
    Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may be the victims of uncommonly bad luck.
    For example, a certain keypunch (键盘打孔) operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off (向……透露) the company that was being robbed.
    Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
    Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (要弄) the most confidential records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage is mainly about _____.

选项 A、why computer crimes are difficult to detect by systematic inspection
B、why computer criminals are often able to escape punishment
C、how computer criminals manage to get good recommendation from their former employees
D、why computer crimes can’t be eliminated

答案B

解析 主旨大意题。纵观全文各个段落(除第4段举例外),可以明确地判断出它们都是围绕一个主题展开讨论:为什么计算机罪犯得以成功逃脱惩罚。选项A所述的“很难通过系统的检查发现计算机罪犯”并不完全属实,原文并未指出这样做difficult(很难);选项C所述的“计算机罪犯想法从前任老板那里得到好推荐”虽然属实,但文章并没有详细解释how(怎么样);本文也并没有讨论如何消除计算机犯罪及其结果,因此选项D也并非本文的中心论题。
转载请注明原文地址:https://kaotiyun.com/show/8hqD777K
0

最新回复(0)