首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2010-05-26
40
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done th. is and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected hy accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may be the victims of uncommonly bad luck.
For example, a certain keypunch (打卡机) operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off (给…通风报信) the company that was being robbed.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only those they not be charged but those they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open of how he juggled (巧妙地应付) the most confidential records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage mainly talks about ______.
选项
A、why computer crimes are difficult to detect by companies
B、why computer criminals can often easily escape punishment
C、how computer criminals commit a crime
D、why computer crimes can’t be detected
答案
B
解析
通览全文可知文章主要谈了电脑犯罪能够逃避惩罚的原因以及其犯罪形式。故选项B正确。
转载请注明原文地址:https://kaotiyun.com/show/kFV7777K
0
大学英语四级
相关试题推荐
Technologyisanothergreatforceforchange.Inpart,technologyhascausedthepopulationexplosion;manyofuswon’tnowbea
A、becausehehastowaituntilhebasthreechildrenB、becausehehastomakeenoughmoneyforhiswife’sfamilyC、becauseitis
Themodernageisanageofelectricity.Peoplearesousedtoelectriclights,radios,televisions,andtelephonesthatitish
A、HeenjoyedteachingEnglish.B、Hewantedtoearnmoretosupporthisfamily.C、Theowneroftheschoolpromisedhimagoodpos
ASenseofCrisisAroundtheworld,governmentsseeviolenceinschoolsasagrowingproblem.Thesubjectisontheagen
youshouldgiveadescriptionofthewholeincidentindetail。此题主要考查短语indetail“详细的”的用法。
Businessandgovernmentleadersalsoconsidertheinflationratetobeanimportantgeneralindicator.Inflationisaperiodof
A、Practiceworkingtogether.B、CarrythepartsOutside.C、Findthetroubles.D、Actonthedirections.D
A、Four.B、Three.C、Two.D、One.C
A、Becausehedislikedhisradio.B、Becausehedidn’treturntheradiotothewoman.C、Becausehelefthisradiotooloud.D、Beca
随机试题
对于同时分属于不同级别的临时性水工建筑物,其级别应按照其中的()确定。
(2003年第69题)下列关于嗜铬细胞瘤病人的代谢紊乱,错误的是
A.选择偏倚B.信息偏倚C.混杂偏倚D.随机偏倚E.系统偏倚无应答偏倚属于
A.慢性咽炎B.咽白喉C.颈突过长综合征D.食道肿瘤E.颈咽痛症
浸润型肺结核与慢性纤维空洞型肺结核分型的依据是
关于乳少的刺灸治疗正确的阐述为
根据马克思主义法学的基本观点,下列表述哪一项是正确的?
正线轨道有条件时,特大桥、大桥及长度大于1000m的隧道内,宜采用()。
卖出套期保值主要用于( )情况中。
Accordingtothepassage,whichofthefollowinghaschangedthemostinthelast500years?Whichofthefollowingstatements
最新回复
(
0
)