首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
48
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage is mainly about______
选项
A、why computer criminals are often able to escape punishment
B、why computer crimes are difficult to detect by systematic inspections
C、how computer criminals manage to get good recommendations from their former employers
D、why computer crimes can’t be eliminated
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/NMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
Therearetwoaspectswhichdetermineanindividual’sintelligence.Thefirstisthebrainheisborn【B1】Humanbrainsdifferc
Theconceptofpersonalchoiceconcerninghealthisimportantbecause______.AccordingtoFriesandCraposoundhealthchoices
Theconceptofpersonalchoiceconcerninghealthisimportantbecause______.Soundpersonalhealthchoiceisoftendifficultt
Manyyearsago,whenIworked【B1】avolunteeratStanfordHospital,IgottoknowalittlegirlnamedLizwhowas【B2】ararea
—IsMrSmithintheoffice?—Yes,_____heisinchargeoftheoffice,hemustbethere.
We’vetestedthreehundredtypesofboot,iscompletelywaterproof.
Whatmakesonepersonmoreintelligentthananother?Whatmakesonepersonagenius,likethebrilliantAlbertEinstein,andano
TheearliestimmigrantstoNorthAmericafoundIndiansalreadylivingthere.TheIndiansnumberedabout500,000atthattime.Th
InKansasCity,Missouri,acomputerhelpsfirefighters.Thecomputercontainsinformationabouteveryoneofthe350,000street
Paris,21stNovember1783.Therewerehundredsofpeopleinthestreetroundanenormous(巨大的)balloon."Whatisit?"theyasked.
随机试题
弯头多数是通过()制造的。
根据卫生部制定的《医疗机构专业技术人员岗位结构比例原则》,三级医院高级、中级和初级员工的比例为
李某,女,38岁。经产妇,妊娠34周,因先兆子痫入院。护士要仔细观察的子痫表现是
魏晋南北朝时期法律发生了许多发展变化,对后世法律具有重要影响。下列哪些表述正确揭示了这些发展变化?
堤防护脚工程的主要类型有( )。
私募股权投资基金最常采用、回报率最高的一种退出机制是()。
关于股利政策,下列叙述有误的是( )
()股是指注册在我国内地、上市地在我国香港的外资股。
外国人犯罪案件,由()立案侦查。
A、Theyoccupiedthembyforce.B、JewishleftthemtoPalestiniansasgifts.C、Private,foreigndonorsgivethemthesegreenhouse
最新回复
(
0
)