首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
财经
More and more, the operations of our business, governments, and financial institutions are controlled by information that exists
More and more, the operations of our business, governments, and financial institutions are controlled by information that exists
admin
2015-05-10
5
问题
More and more, the operations of our business, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing, but even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off the company that was being robbed. Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It can be concluded from the passage that______.
选项
A、it is still impossible to detect computer crimes today
B、computer crimes are one of the most serious problems in the operation of financial institutions
C、computer criminals can escape punishment because they can’t be detected
D、people commit computer crimes at the request of their company
答案
B
解析
推断题。首先根据第二段可知,A是错误的,因为计算机犯罪不是不能发现的。C“用计算机犯罪的罪犯可以逃脱惩罚,因为他们不会被发现”,D“利用计算机犯罪的人是应他们公司的要求这样做的”都是错误的,文中没有提到。只有B,“计算机犯罪是金融机构里最严重的问题”是在文中第一段中暗示了的。因此选B。
转载请注明原文地址:https://kaotiyun.com/show/Xvgc777K
本试题收录于:
英语题库银行系统招聘考试分类
0
英语
银行系统招聘考试
相关试题推荐
Treesshouldonlybepruned(修剪)whenthereisagoodandclearreasonfordoingsoand,fortunately,thenumberofsuchreasonsis
Scienceisadominantthemeinourculture.Sinceittouchesalmosteverytacetofourlife.educatedpeopleneedatleastsomeac
PassageoneManyobjectsindailyusehaveclearlybeeninfluencedbyscience,buttheirformandfunctlon’theirdlmensionsand
TheDresidentwould__________toseeallnewemployeesinherofficeimmediately.
Mr.Whitehasnothadanytime________forsixmonthsandwantsaholiday.
TheMESBICthenprovidescapitalandguidancetominoritybusinessesthathavepotentialtobecomefuturesuppliersorcustomers
[2010年典型真题】将下面文章中画线的句子翻译成中文。ThechiefUSnegotiator,TradeRepresentativeCharleneBarshefsky,describedthedealas“profound
Afteralongandgruesomeseason,JeffWillshasbeenperforming___bettersincetheplayoffsstartedaweekago.
Sincethe1970s,scientistshavebeensearchingforwaystolinkthebrainwithcomputers.Brain-computerinterface(BCI)technolo
Hereamidthesteelandconcretecanyons,greengrassgrows.Ahawthorntree(山楂树)standsinnewsoil,andfreshlydugplantsbend
随机试题
现代社会的人才总是某一方面或某一领域的人才,这表明人才具有
盈亏平衡分析只用于()。
工程单价包括()等四部分内容。
我国从事代理记账的机构,应至少有( )名持有会计证的专业人员。
下列公益性捐赠支出,可以在计算应纳税所得额时全额据实扣除的有()。
会出现名义借款人失踪,实际借款人悬空贷款的后果的欺诈行为是()。
风和日丽的下午,某人看完电影从电影院走出来,其瞳孔的变化情况是()。
1929~1933年资本主义世界经济危机中,垄断资本家大量销毁商品的目的是()。
有以下程序#inc1ude<stdio.h>intf(intx,inty){return((y-x)*x);)main(){inta=3,b=4,c=5,d;
Plasticsisakindof______whichiswidelyusedinindustrynowadays.
最新回复
(
0
)