首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Internet piracy refers to the use of the Internet for illegally copying or distributing unauthorized software. In these cases th
Internet piracy refers to the use of the Internet for illegally copying or distributing unauthorized software. In these cases th
admin
2015-09-30
30
问题
Internet piracy refers to the use of the Internet for illegally copying or distributing unauthorized software. In these cases the Internet is the medium for advertising, offering, acquiring, or distributing pirated software.
The Business Software Alliance, a software industry trade association, estimates that there are 840 000 Internet sites selling illegal software as genuine product. Many consumers who acquire software over the Internet never receive the programs they paid for. Others are not able to get their money back if they discover that the software they acquired is counterfeit. Disreputable Internet businesses often quickly vanish, leaving behind hundreds of dissatisfied consumers.
The ease of creating a Website and then advertising and distributing software through the Internet has increased sales of pirated software passed off by seemingly legitimate businesses. Plus, the explosive growth of e-commerce, combined with anonymity (匿名) and unlimited volume, have made it even easier for criminals to sell counterfeit (伪造的) software online.
Illegal online businesses often have professional-looking Internet sites that could fool even the smartest consumer. Distinguishing counterfeit software on the Internet is understandably difficult because consumers can’t visually examine the product for physical warnings on the hardware, or see the person from whom they’re buying.
Pirated software can often contain viruses with the potential to damage both individual computers or entire networks. Viruses can and do cause data loss, which would be devastating to most companies. When using unlicensed software, you are not eligible for technical support from the software publisher. If you have a technical issue in need of resolution, oftentimes a work-stopping issue, you are out of luck. In addition, product upgrades (升级)—less expensive upgrades of existing products—are not available to you.
Based on Business Software Alliance estimates, the current loss of jobs, wages, and critical investments in software and technology innovation worldwide due to piracy so far this year is estimated at: $11 326 675 282.
"Software piracy continues unabated (不减弱的),robbing the industry of thousands of jobs, billions in wages, tax revenues and critical investments in new technologies," according to Robert Holleyman, president and CEO, Business Software Alliance.
Which of the following harms of pirated software is NOT mentioned in the passage?
选项
A、It often contains devastating viruses.
B、Buyers are not eligible for technological support from the software publisher.
C、It causes huge loses of tax revenues.
D、It may cause incompatibility (不兼容) between programs that normally function together.
答案
D
解析
是非题。在文章最后三段中,作者讲到盗版软件的危害:电脑病毒,得不到厂家的技术支持,升级困难,造成就业机会、工资、税收、世界软件和技术革新方面的重大投资等的巨大损失。但没有提到盗版软件的兼容性问题,所以D是本题正确选项。
转载请注明原文地址:https://kaotiyun.com/show/o4WO777K
0
在职攻硕英语联考
相关试题推荐
TheInternethasmadesomemensorichandambitiousthatEarthnolongerseemslargeenoughtocontaintheirfortunesoregos.
TheInternethasmadesomemensorichandambitiousthatEarthnolongerseemslargeenoughtocontaintheirfortunesoregos.
TheInternethasmadesomemensorichandambitiousthatEarthnolongerseemslargeenoughtocontaintheirfortunesoregos.
Youcan______abouttheseuniversitieseasilyifyouhavereadyaccesstotheInternet.
InancientGreek,thetermeuthanatosmeant"easydeath".Todayeuthanasia(安乐死)generallyreferstomercykilling,thevoluntar
The"madmoment"inthefirstparagraphreferstothetimewhenwe______.Bygivingtheexample"youmeetMrs.Beattyandyou
"Couchpotatoes"inParagraph1referstothosewho______.Intermsofleisuretimeactivities,peopleintheUnitedStates__
"Couchpotatoes"inParagraph1referstothosewho______.Apartfromtechnology,thegrowingleisuretimethroughoutthetwen
Duringthelastthirtyyears,theinternationaleconomyhasexperiencedabasicchange.ImprovementsintheInternetandotherc
随机试题
CAPM模型的主要思想是()。
数字签名实质上是采用加密的附加信息来验证消息发送方的身份,以鉴别消息来源的真伪。()
A.发热期B.低血压休克期C.少尿期D.多尿期E.恢复期继发性休克多发生在流行性出血热的哪一病期
安全生产投入主要用于以下哪些方面:()。
对于规模大、工艺复杂、需要分期出图的工程项目,承包单位要求分阶段报审施工组织设计的,应该经过()批准。
下列选项中不是中央银行货币政策的最终目标的是( )。
下列选项中,()不属于银行二级资本。
关于高等教育的说法,正确的是()。
目前全国房地产权属登记管理体制,大体有4种模式,包括()。
进程在运行过程中有3种基本状态,它们分别是运行状态、等待状态和()。
最新回复
(
0
)