首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
admin
2012-06-13
62
问题
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage (破坏), politically related sabotage, vandalism, crimes against the individual and financially related crimes"…Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market Buyers for stolen programs may from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their record keeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defense work suffered more than $ 2 million in damages as a result of bombing.
Computer vulnerability has been documented in great details. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders…
Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both nation and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not Many still think in terms of traditional criminology.
What is the purpose of a competitor to sabotage a company’s computer?
选项
A、His purpose is to destroy or weaken the firm’s operational ability.
B、His purpose is to weaken firm’s competitive capability and get it
C、His purpose is to buy the rival’s company at a relatively low price.
D、His purpose is to steal important data.
答案
B
解析
文章第二段指出“A competitor sabotages a company’s computer system to destroy…thus neutralizing its competitive capability either in the private or the government sector”,竞争对手破坏一个公司的计算机系统以摧毁或削弱其操作运行能力,从而使其丧失在私人或政府部门中的竞争力。重点内容是thus后面连接的结果。
转载请注明原文地址:https://kaotiyun.com/show/bVnO777K
0
考博英语
相关试题推荐
Ithappenedinthelatefallof1939when,afteraNazisubmarinehadpenetratedtheBritishseadefensearoundtheFirthofFor
Yearsago,peoplewouldhave______thenotionthatrobotswouldoperateonpatientsinsteadofsurgeons.
Thelanguagebarriermadecommunicationdifficult,butfinally,partofmymessage______.
Thedisputebetweenthefacultyandtheadministrationwasnotresolveduntilthefacultymembersgotbetterworkingconditions.
IfSustainablecompetitiveadvantagedependsonworkforceskills,Americanfirmshaveaproblem.Humanmanagementisnottradit
Theriseinstockpriceshasbeendrivenlargelybyimprovementsintheeconomy,principallyrising______profits,fallinginfl
Soifyounoticeaslightworseningofsymptomsaftertakingaremedy,thisisasignthatthemedicineisworkingandyoushoul
Everyonewhoheardthestoryfounditincredible.
Thewomenworkersprotestedstronglythattheirwageswerenotin______totheworktheyhaddone.
Hecutthestringandheldupthetwo______totiethebox.
随机试题
当债务人不履行债务时,债权人在()合同中享有留置权。
收集统计资料时,对于重大或敏感性强的问题应采用()方式设置调查项目表。[2005年考题]
谨慎性原则要求会计核算工作中做到考虑谨慎,不夸大企业的资产。()
下列各项属于经济周期中萧条阶段采用的财务管理战略的有()。
企业应当在职工提供服务从而增加了其未来享有的带薪缺勤权利时,确认与累积带薪缺勤相关的职工薪酬,并以累积未行使权利而增加的预期支付金额计量。()
2×18年4月1日,甲公司销售一批商品给乙公司,销售货款总额为8300万元(含增值税)。甲公司于同日收到一张票面金额为8300万元、期限为6个月的不带息商业汇票。有关资料如下:(1)2×18年10月1日,乙公司未能兑付到期票据,甲公司将应收票据金额转
高频次的活动可以作为低频次活动的强化物。小明喜欢玩积木,不喜欢写作业,我们可以告诉小明写不完作业不可以玩积木,以此来强化小明写作业。这种原理是由谁提出的()
(2014年真题)《中华人民共和国刑法》第395条第1款规定:“国家工作人员的财产或者支出明显超过合法收入,差额巨大的,可以责令说明来源。本人不能说明其来源是合法的,差额部分以非法所得论,处五年以下有期徒刑或者拘役,财产的差额部分予以追缴。”请分析:
结合材料回答问题。材料1据有关部门统计,我国国有和集体企业下岗职工近1000万人,每年新增劳动力800多万人,社会失业人员570多万人。“十五”期间,我国将把失业率控制在5%以下。按国际通行的标准,一个国家60岁以上人口占总人口比重的10%以上,就属
A、Someonewasaccusedofreceivingadvancepaymentformurderingthegovernor.B、NothingwasfoundintheEmergency-runhospital
最新回复
(
0
)