首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Read the following passage and choose the correct answer from A, B, C and D. More and more, the operation of our businesses,
Read the following passage and choose the correct answer from A, B, C and D. More and more, the operation of our businesses,
admin
2017-04-19
103
问题
Read the following passage and choose the correct answer from A, B, C and D.
More and more, the operation of our businesses, government, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purpose can reap substantial rewards. Even worse, a number of people who have done this and been caught by it have managed to get away without punishment.
It is easy for computers crime to go undetected if no one checks up what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a growing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it is disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommon bad luck.
For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigating revealed that the extra cards she was being asked were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off the company that has been robbed.
Unlike other lawbreakers, who must leave the country, commit suicide or go to jail, computer criminals sometimes escape punishment, demanding or not only that they not be charged but that they be given good recommendations and perhaps other benefiting, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives, accountants, and security staff. And so another staff computer criminal departs with just the recommendation he needs to continue his crime elsewhere.
According to the whole passage, the author feels______towards the computer crimes.
选项
A、worried
B、indifferent
C、happy
D、sad
答案
A
解析
本题是推断题。根据这篇文章的主要内容可以看出作者对计算机犯罪是很担心的。
转载请注明原文地址:https://kaotiyun.com/show/vL9d777K
本试题收录于:
BFT阅读题库国际化人才外语考试(BFT)分类
0
BFT阅读
国际化人才外语考试(BFT)
相关试题推荐
Supposethereisakindergarteninyourhometownandyouareaskedtowriteacopyforit.Youhavetoprovideinformationonth
Writeaboutthefollowingtopic:Technologygivesyoungpeopletodayknowledgeandpowerthattheyhaveneverhadbefore.Th
Youareaskedtowriteacompositioninwhichyougiveyourownopinionsonthefollowingstatement:Trafficandhousingpro
HereisaletterfromColoradoStateUniversitytoinformtheapplicantMr.LithathehasbeenadmittedtoCognitivePsychology
HereisaletterwhichcomplainsaboutthequalityoftheTVsetboughtinastore.Readtheletterandcompletethegiveninfor
HereisanadvertisementaboutaBusinessBookClub.Readtheadvertisementandcompletethegiveninformationform.Wri
Therehavebeenmanytechnologicaldevelopmentsinthe20thcentury,forexample,computersandelectricpower.Chooseeitherof
Readthefollowingletterandcompletethegiveninformationform.Writeaword,phraseornumberinthespaces1-5.De
随机试题
保护公民人身自由不包括以下哪项内容?()
结核性浆膜腔积液明显增高的指标是
A.生理性多尿B.病理性多尿C.肾前性少尿D.肾性少尿E.肾后性少尿急性肾盂肾炎性少尿为
支气管扩张病人痰的特点是
制定损失控制措施必须以( )风险评价的结果为依据,才能确保损失控制措施具有针对性,取得预期的控制效果。
我国《工程网络计划技术规程》推荐的常用的工程网络计划类型包括()。
根据一贯性原则的要求,为了企业前后各期会计信息相互可比,企业应做到( )。
3,,()。
城管执法人员为阻止摊贩继续非法占道经营,暂扣了摊贩兜售的物品,这一行为在法律上属于()。
向量组α1,α2,…,αm线性无关的充分必要条件是().
最新回复
(
0
)