首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
admin
2012-06-13
43
问题
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage (破坏), politically related sabotage, vandalism, crimes against the individual and financially related crimes"…Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market Buyers for stolen programs may from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their record keeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defense work suffered more than $ 2 million in damages as a result of bombing.
Computer vulnerability has been documented in great details. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders…
Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both nation and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not Many still think in terms of traditional criminology.
What does the word "homicide" possibly mean in Paragraph 5?
选项
A、Kill people at home
B、Murdering
C、Terrorist
D、Crime
答案
B
解析
作者在倒数第二段中指出,罪犯可能用电脑轻易杀掉人,甚至可能研发出更为恐怖的武器,城市可能沦陷;最后总结说电脑可能成为20世纪的职业杀手。综上可知,这里主要是讲电脑的杀人功能,由此推断homicide指谋杀。
转载请注明原文地址:https://kaotiyun.com/show/sVnO777K
0
考博英语
相关试题推荐
ItseemsincredibletomethatLatinisnottaughtinschoolsasamatterofcourse,especiallyinacountrythatisforeverlam
Americansarepeopleobsessedwithchild-rearing.Intheirbooks,magazines,talkshows,parenttrainingcourses,WhiteHouseco
Sincethedawnofhumaningenuity.peoplehavedevisedevermorecunningtoolstocopewithworkthatisdangerous,boring,burd
Foreignpropagandistshaveastrangemisconceptionofournationalcharacter.TheybelievethatweAmericansmustbehybrid,mo
ImyselffirstsawSamarkandfromariseacrossawildernessofcrumblingruinsandgreatgraveyardswhichliebetweenitandth
Deforestationis______oneofthemostseriousenvironmentalissuesofourtime.
Governmentswillbeinvitedto______theassessment’stechnicalleadauthors.
Julietisnotatwork.Sheistakinga______untiltheendofthisweek.
Theballadandthefolksonghavelongbeenrecognizedasimportantkeystothethoughtsandfeelingsofapeople,butthedime
Researcherswarn(against)taking(largenumbersof)vitaminApills,becausethetabletscontainaformof(thechemical)flint
随机试题
自力式调压阀的指挥器是()的设备,它发出调节信号的大小,由调节手轮改变弹簧挡板对喷嘴的压力来实现。
女性,28岁。1个月来自觉腹胀、腹痛,午后低热、盗汗。查体:腹膨隆,全腹轻压痛,移动性浊音(+)。为明确诊断应立即检查
牙周病患者在使用牙线前应首先进行
低钾血症的病人,补钾后病情仍无改善时,应首先考虑缺乏
在病房里,舒适的温度是
林某与甲房地产经纪公司签订房屋委托购买合同。合同约定,甲公司为林某购买某小区一套住房,房价款为24万元。购房定金1万元,林某一次性支付购房款,其首付款不低于房价款的30%,余款在该房房屋产权转移前3日内补齐。甲公司为林某办理房屋过户手续后,林某支付8万元,
场景水是一种溶解能力较强的溶剂。水在自然界循环过程中会混入各种各样的杂质,这些杂质,尤其是生活和生产污水中所含的杂质进入天然水体都会引起各种污染,甚至改变天然水体原有的物质平衡状态,破坏人类周围的自然环境,给人类社会的生活和生产带来极其恶劣的影响。根据
为保护水资源,提倡洗衣时使用无磷洗衣粉,原因是磷进入河湖后会使()。
公共危机发生之后,网民经常会在网络上发表对事件的看法,同时凭借个人经验进行主观判断,甚至会存在一些人借危机事件表达对社会或者政府的不满,使网络舆论呈现复杂化。政府作为危机管理机构,在网络舆论出现不当情况时,应适当加以引导。这种引导,不是人为控制人们情绪的宣
A、By10:00am.B、By9:00am.C、By8:30am.D、By8:00am.B对话中女士解释她迟到的原因是住的太远了,而且交通很糟糕,男士回答他知道,他也住在郊区,但是公司要求员工早上九点上班。由此可知,公司要求员工早
最新回复
(
0
)