首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
admin
2019-05-26
45
问题
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’ s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a flowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’ s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled(诈骗)the most confidential(保密)records tight under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
Which of the following statements is mentioned in the passage?
选项
A、A strict law against computer crimes must be enforced.
B、Companies usually hesitate to uncover computer crimes to protect their reputation.
C、Companies will guard against computer crimes to protect their reputation.
D、Companies need to impose restrictions on confidential information.
答案
B
解析
最后一段第三句提到“They hesitate…security staff.”这与B项所说的“公司通常为了保护声誉而不去揭发计算机犯罪”相符,所以B项正确。
转载请注明原文地址:https://kaotiyun.com/show/MhnZ777K
0
考研英语一
相关试题推荐
AlthoughtherearemanyskillfulBraillereaders,thousandsofotherblindpeoplefinditdifficulttolearnthatsystem.Theya
Whenshopkeeperswanttolurecustomersintobuyingaparticularproduct,theytypicallyofferitatadiscount.Accordingtoa
Whenshopkeeperswanttolurecustomersintobuyingaparticularproduct,theytypicallyofferitatadiscount.Accordingtoa
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswe
ForthousandsofCanadians,badserviceisneithermake-believenoramusing.Itisanaggravatingandworseningreal-lifephenom
EllenPaospentthelastfewyearsspotlightingthetechnologyindustry’slackofdiversity,incourtandbeyond.EricaBakerca
Stratford-on-Avon,asweallknow,hasonlyoneindustry—WilliamShakespeare—buttherearetwodistinctlyseparateandincreasingl
Manyofthetechindustry’sbiggestcompanies,likeAmazon,Google,IBMandMicrosoft,arejockeyingtobecometheleaderfora
WhatdoestheauthorintendtoillustratewithAAAAcarsandZodiaccars?Whatcanweinferfromthefirstthreeparagraphs?
随机试题
驾驶汽车行车中怎样选择超车路段?
关于计算机网络传输介质,下列叙述正确的是______________。
在word2010的编辑状态下,选择“开始”→“复制”命令后()
A.化学监测法B.物理监测法C.生物监测法D.仪器监测法E.无菌检验用指示菌株监测的方法属于
下列建筑类型中,属于公共建筑的是()。
某事业单位于2012年1月1日正式动工兴建一栋办公楼,工期预计为1年零6个月,工程采用出包方式,分别于2012年1月1日、2012年7月1日和2013年1月1日支付工程进度款。该事业单位为建造办公楼于2012年1月1日专门借款2000万元,借款期
人民群众满意不满意、赞成不赞成、答应不答应是衡量公安工作的最高标准。()
下图所示国家为世界重要红茶生产国。据考察发现,M地第一季度生产的茶叶质量最好。读图完成小题。导致M地该季度茶叶质量最高的主要因素是()。
人的自尊可以划分为有条件的自尊和无条件的自尊。前者是通过达到一些预设的标准来获得的自尊,自我价值感有赖于这些标准的实现,而非自我的本真需要,比如认为拥有美貌才有价值感。有条件自尊者往往并不了解自己的需要,其衡量自尊的标准是内化得来的。如果父母的爱是有条件的
在孙中山的民生主义中,“平均地权”的基本方案包括()
最新回复
(
0
)