首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
88
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that arc discovered
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/yMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
Myparentsarenotinterestedinmodernmusic.Theyare______thetimes.
Experiencedpeoplecan(tellimmediatelywhichoneisreal).
______,followthedirectionsonthebottlecarefully.
Thesandwiches______byyourmotherwereverydelicious.
Astronomersandscientiststhinkthatablackholeisaregionofspace______whichmatterhasfallenand______whichnothingca
Thehigherthestandardoflivingandthegreaterthenationalwealth,the
TheearliestimmigrantstoNorthAmericafoundIndiansalreadylivingthere.TheIndiansnumberedabout500,000atthattime.Th
Mr.Smithgavehiswifetenpoundforherbirthday--tenprettypoundnotes.Sothedayafterherbirthday,MrsSmithwentshoppi
Whenwe______themuseumisnotdecided.
Havingtakenaroomatthehotelwhichhehadbeeninstructedtostay,Smallwoodwentout;itwasalovelyday,earlyinAugust,
随机试题
下列有关同一细胞兴奋传导的叙述,不正确的是
A.2~3dB.3~7dC.7~10dD.10~14dE.2~3周女婴乳腺肿块自然消退的时间()。
甲、乙、丙三人有多年的业务合作关系。5月5日,甲与乙交流时谈起甲最近的一批低价木材将照顾合作伙伴,以丙为出卖对象,就等丙答应了。5月6日,乙因另外一批生意向丙寄发合同书时顺便发出了甲出卖这批木材的合作意向。信件于5月7日到达。5月8日,丙致电报甲:将近日汇
根据我国《合同法》的有关规定,合同变更表述中正确的有( )。
应交消费税的委托加工物资收回后用于连续生产应税消费品的,按规定准予抵扣的由受托方代扣代交的消费税,应当记入()。
应用市盈率模型评估企业的股权价值,在确定可比企业时需要考虑的因素有()。(2009年新制度)
一般来讲,高水平物流服务必由高物流成本所支撑。因此,在加强物流服务管理的同时,明确相应的服务成本,从而保持成本与服务之间的一种均衡关系。()
某公司所有的销售人员都是男性,所有的文秘都是女性,所有的已婚者都是文秘,公司的总经理尚未结婚。据此,我们可以知道:
语句DimArr(-2To4)AsInteger所定义的数组的元素个数为
Inthispartofthetest,youaregivenadiscussiontopic.Youhave30secondstolookatthetaskprompt,anexampleofwhich
最新回复
(
0
)