首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
52
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage is mainly about______
选项
A、why computer criminals are often able to escape punishment
B、why computer crimes are difficult to detect by systematic inspections
C、how computer criminals manage to get good recommendations from their former employers
D、why computer crimes can’t be eliminated
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/NMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
Ithasoftenbeensaidbypeopleinvolvedinlanguageteachingthatastudentwhoreallywantstolearnwillsucceedwhateverth
Myparentsarenotinterestedinmodernmusic.Theyare______thetimes.
Thisletterwaswrittenby______.Themanlosthisjobbecause______.
Manyyearsago,whenIworked【B1】avolunteeratStanfordHospital,IgottoknowalittlegirlnamedLizwhowas【B2】ararea
ItallstartedinwartimeMunichwhenadoctor,KlausMaertens,hadabadskiingaccident.Hedecidedtomakehimselfacomforta
Bytheendoflastyear,anothernewgymnasium______inBeijing.
Thisstoryis【21】afarmhandandalandlord.Thefarmhandworkedhardalldaylong.【22】hegotvery【23】moneyandneverhadmuchto
Innoway______frompractice.
Oneanswertothequestionsoflandshortagewassuggestedbyacommitteesomeyearsago.Acitywastobebuiltatsea,housing
Eric’sfather,askilledworkerhasrepairedalotofbikesofthiskind,sohewill______succeedinrepairingyourbike,Isup
随机试题
根据《车间空气中有毒物质监测研究规范》要求,固体吸附剂采样后的解吸效率最好应大于和不得低于的水平分别是
肺心功能不全的慢性肺心病患者,下列治疗措施哪项是错误的
(2009年)图5—67所示圆轴,在自由端圆周边界承受竖直向下的集中力F,按第三强度理论,危险截面的相当应力στ3为()。
隧道监控量测时,当位移一时间曲线出现反弯点时,则表明围岩()。
清代皇帝举行祭天、祭地、祭日、祭月典礼的地点分别位于京城()。
下列选项属于公安法制工作的主要内容的有()
【案情】1995年10月31日,富利达公司与汇通银行签订了两份借款合同,约定:汇通银行分别借给富利达公司610万元、100万元,借款期限分别为4个月、5个月。对于610万元的借款,富利达公司以其对富利达地下商贸城拥有的管理权和出租权作为该笔借款的抵押担保
(2018年真题)下列关于单位犯罪的表述,正确的是()。
Inmoderndays,onthewesternbankoftheupperTigrisRiverstandsanIraqicitycalledQal’atSherqat.Thousandsofyearsago
Whilesiltingatthefootofacliff,______.
最新回复
(
0
)