首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
More and more, the operations of’ our businesses, governments, and financial institutions are controlled by information that exi
More and more, the operations of’ our businesses, governments, and financial institutions are controlled by information that exi
admin
2011-01-02
32
问题
More and more, the operations of’ our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify, this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one cheeks up Mint the computer is doing. But even if’ the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were de tected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have, been the victims of uncommonly bad hick.
For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another ease, dissatisfied employees of the thief tipped off the company that was being robbed.
Unlike ether lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not lee charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the roses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to con tinue his crimes elsewhere.
What may happen to computer criminals once they are caught?
选项
A、With bad reputation they can hardly find another job.
B、They will be denied access In confidential records.
C、They may walk away and easily find another job.
D、They must leave the country or go to jail.
答案
C
解析
根据第一段中的“...a number of people who have done this and been caught at it have managed to get away without punishment.”和第二段中的“But even if the crime is detected,the criminal may walk away not only unpunished but with a glowing recommendation from his former employes.”可以明确得知止确答案是[C]。
转载请注明原文地址:https://kaotiyun.com/show/e1eO777K
0
专业英语八级
相关试题推荐
A、sportsmanB、publicservantC、mayorD、policemanB
ItisincongruousthatthenumberofBritishinstitutionsofferingMBAcoursesshouldhavegrownby254’percentduringaperiod
InformationSuperhighwayatWorkThechangesinhowwecommunicatemakeitnecessarytochangehowwethinkaboutcommunicati
InformationSuperhighwayatWorkThechangesinhowwecommunicatemakeitnecessarytochangehowwethinkaboutcommunicati
InformationSuperhighwayatWorkThechangesinhowwecommunicatemakeitnecessarytochangehowwethinkaboutcommunicati
Aswellastheproblemsconcernedwithobtaininggoodqualityaudiorecordings,recordingalsoraisesimportanttheoreticalprob
OncefoundalmostentirelyinthewesternUnitedStatesandinAsia,dinosaurfossilsarenowbeingdiscoveredonallsevencont
随机试题
“防消结合”,要求把同火灾做斗争的两个基本手段——防火和灭火有机地结合起来,做到相辅相成、互相促进。()
下列对于供配电线路的描述中,正确的有()。
按照《中国共产党章程》的规定,中国共产党是()
甲股份有限公司(以下简称甲公司)适用的所得税税率为33%,按净利润的10%提取法定盈余公积,按净利润的10%提取法定公益金。甲公司20×1年度的财务会计报告批准报出口为20×2年3月10日。甲公司发生的有关事项如下:1.20×1年11月10日,甲公司因对
旅客或者其继承人向铁路运输企业请求赔偿的请求,应当自事故发生之日起()内提出。
(单选)河姆渡氏族遗址发现于()。
①这些霜花团团簇簇的,很有点花园的气象②一旦太阳从山峦中升起来,印着霜花的玻璃窗就像魔镜一样,散发出奇诡的光辉③早晨,迎接我的是一夜寒流和冷月,以及凝结在玻璃窗上的霜花④这天的霜花不似往日的,总是呈树的形态⑤想必霜花也知道立春了吧⑥你能从中看出喇
对于ODS体系,有下列说法:Ⅰ.ODSⅠ:第一类ODS数据更新频率是天级,一般隔夜后将数据更新到ODS中Ⅱ.ODSⅡ:第二类ODS的数据更新频率是小时级,如4小时更新一次Ⅲ.ODSⅢ:第三类ODS的数据更新频率是秒级,即操作型系统中的数据发生改变后,
Whereisthewomangoingtospendherholiday?
Lookatthenotes.Someinformationismissing.Youwillhearpartofatalkbyaninvestmentconsultantofacompany.Foreach
最新回复
(
0
)