首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
admin
2019-05-26
29
问题
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’ s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a flowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’ s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled(诈骗)the most confidential(保密)records tight under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It can be concluded form the passage that______.
选项
A、it is still impossible to detect computer crimes today
B、people commit computer crimes at the request of their company
C、computer criminals escape punishment because they can’ t be detected
D、computer crimes are the most serious problem in the operation of financial institutions
答案
D
解析
从全文第一句可看出,许多公司,政府以及金融机构的运行都单单依靠电脑进行控制,所以可以推断,计算机犯罪是最严重的问题。选项D正确。从第二段第一句可知,如果没人检查电脑的运行情况,计算机犯罪是不容易被发现的。但不是说其不能够被发现。所以选项A、c都是不正确的。B项文中未提及。
转载请注明原文地址:https://kaotiyun.com/show/chnZ777K
0
考研英语一
相关试题推荐
Writeanessayof160-200wordsbasedonthefollowingdrawing.Inyouressay,youshould1)describethedrawing,2)in
Directions:Inthispart,youareaskedtowriteanessayaccordingtotheinformationbelow.Youshouldwritemorethan150w
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswe
Inspiteof"endlesstalkofdifference,"Americansocietyisanamazingmachineforhomogenizingpeople.Thereis"thedemocrat
OfallthechangesthathavetakenplaceinEnglish-languagenewspapersduringthepastquarter-century,perhapsthemostfar-re
EllenPaospentthelastfewyearsspotlightingthetechnologyindustry’slackofdiversity,incourtandbeyond.EricaBakerca
Asanyhumanbeingknows,manyfactorsgovernwhetherpeoplearehappyorunhappy.Externalcircumstancesareimportant:employe
Writeanessayof160~200wordsbasedonthefollowingdrawing.Inyouressay,youshould1)describethedrawingbriefly,
Adealisadeal—except,apparently,whenEntergyisinvolved.Thecompany,amajorenergysupplierinNewEngland,provokedjus
Scientistshavefoundthatalthoughwearepronetosnapoverreactions,ifwetakeamomentandthinkabouthowwearelikelyto
随机试题
从20世纪80年代初起,以探险和自然观光为主题的旅游活动越来越受欢迎。伴随着全球环境意识的增强及对多元文化的尊重,生态观光(ecotourism)已经成为旅游业中快速发展的一个组成部分。度假者可以享受都市里五星级酒店的舒适,可以品味高雅餐厅的宜人,而爬山、
免疫组织化学技术中最常用的制片方法是
关于滤线栅栅比的叙述,错误的是
药物出现副作用的原因主要是
管道的吹扫的顺序应该为()。
办事公道的基本要求不包括()。
狭义的教育制度是指()。
教生物课的李老师为了让学生更真切地了解导管功能,他事先把带叶的枝条插入红色溶液里,放在温暖而有阳光的地方晒了几个小时。上课时,将枝条一段一段剪下来,分到学生手里。他一边讲一边提问,学生一边剥一边思考一边回答。简要说明:(1)李老师采用的是什么教学方法;
在全球化的时代,如果一个民族没有自己的历史脉络和特点,就会被时代淹没。要想增强中华民族的凝聚力,一个很重要的工作就是要接续我们的民族记忆。而现实的情况是,想在短期内通过考古把五千年到三千年这段历史固定下来,难度极大。因此搜集、整理在这个时段内所流传下来的神
设根结点的层次为0,则高度为k的二叉树的最大结点数为【】。
最新回复
(
0
)