首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2012-07-17
75
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may be the victims of uncommonly bad luck.
For example, a certain keypunch (键盘打孔) operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off (向......透露) the company that was being robbed.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (耍弄) the most confidential records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage is mainly about______.
选项
A、why computer crimes are difficult to detect by systematic inspections
B、why computer criminals are often able to escape punishment
C、how computer criminals manage to get good recommendations from their former employers
D、why computer crimes can’t be eliminated
答案
B
解析
本题是一道涉及全文中心思想类的问题。利用浏览式阅读法通读全文内容,我们发现文章说明计算机犯罪越来越普遍,而之所以普遍的原因在于计算机犯罪一般不会受到法律惩罚。因此,本题的正确答案应是选项B,文章主要是介绍为何计算机犯罪的犯罪分子常常能够逃脱惩罚的原因。
转载请注明原文地址:https://kaotiyun.com/show/mLXO777K
0
在职攻硕英语联考
相关试题推荐
The______ofaculturalphenomenonisusuallyalogicalconsequenceofsomephysicalaspectinthelifestyleofthepeople.
TheordinaryfamilycolonialNorthAmericawasprimarilyconcernedwithsheerphysicalsurvivalandbeyondthat,itsowneconomi
TheordinaryfamilycolonialNorthAmericawasprimarilyconcernedwithsheerphysicalsurvivalandbeyondthat,itsowneconomi
TheordinaryfamilycolonialNorthAmericawasprimarilyconcernedwithsheerphysicalsurvivalandbeyondthat,itsowneconomi
MostgraduateprogramsinAmericanuniversitiesproduceaproductforwhichthereisnomarket(candidatesforteachingposition
EveryoneknowsthatEnglishdepartmentsareintrouble,butitisdifficulttoappreciatejusthowmuchtroubleuntilyoureadt
Inasurveylastyearthebossesofsmallbusinessesoverwhelminglycameoutinfavourofhardworkandastrongcharacterover
Collegepaysoff.Financially,sure,butalsoinwaysthatareimpossibletomeasure.【T1】Fromtheearliestdaysofourcount
ReadthefollowinginformationandwriteanessayofABOUT200WORDS.ItisanARGUMENTATIVEESSAYANDATITLEisNEEDED.Acc
"Whatdoesthemiddlemandobutaddtothepriceofgoodsintheshops?"Suchremarksareaimedattheintermediateoperationsb
随机试题
需要层次理论中的最高层次的需要是()
某发明专利权法律保护期为20年,截至评估基准日已使用3年,经专家分析鉴定,因为无形损耗较大,该发明专利的剩余使用期限为7年,则运用剩余经济寿命预测法计算该发明专利的成新率为【】
在Access数据库中数据实际保存在______中。
患者,男,35岁,稍长距离步行后感右小腿疼痛。肌肉抽搐而致跛行,稍休息后症状消失。平时感右足发凉,怕冷,有麻木感。右足背动脉搏动减弱。应考虑
施工成本目标控制主要依据之一是()。
2007年10月1日,南海市工商管理部门对华昌公司做出吊销营业执照的决定,并于当日以信函方式寄出,华吕公司于10月5日收到该信函。根据我国《行政复议法》的有关规定,华昌公司对南海市工商管理部门的决定不服,那么可以在10月1日起60日内提出行政复议申请。
下列关于多种产品加权平均边际贡献率的计算公式中,错误的是()。
玲玲家买了一个电热水壶,其铭牌如下表所示。玲玲和小华想测量电热水壶的实际功率。当电路中只有电热水壶工作时,玲玲发现在3min内脉冲式电能表的指示灯闪了180次(脉冲式电能表表盘上标有“3000imp/(kW.h)”字样,表示指示灯每闪3000
在独立编址方式下,存储设备和I/O设备是()来区分的。
打开工作簿文件EXCEL.XLSX:(1)将工作表Sheet1的A1:D1单元格合并为一个单元格,内容水平居中;计算“学生均值”行(学生均值=贷款金额/学生人数,保留小数点后两位),将工作表命名为“助学贷款发放情况表”。复制该工作表为“SheetA”工作表
最新回复
(
0
)