首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
45
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that arc discovered
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/yMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
Itwasessentialthattheapplicationforms______backbeforethedeadline.
Personalinterviewingismosteffectivewhenallthepeopletobeinterviewedarelocatedinarelativelysmallgeographicalare
HisrecommendationthattheAirForce______(investigate)theUFOsightingwasapprovedbythecommittee.
Itisphysicallyimpossibleforawall-educatedintellectual,orabravemantomakemoneythechiefobjectofhisthoughts;as
Itisphysicallyimpossibleforawall-educatedintellectual,orabravemantomakemoneythechiefobjectofhisthoughts;as
"I’dliketobuyadigitalcamera.""Well,wehaveseveralmodels______."
A、insureB、leisureC、measureD、pleasureA
Thereareseveralmeansofmasscommunication.Thenewspaperisone.Televisionis______.
TodaytheofficiallanguageoftheUnitedStatesandmostofCanadaisEnglish.However,Frenchalmostbecametheofficiallangu
NosoonerhadMrs.Tylerenteredthekitchen______aknockatthegatedoor.
随机试题
T68型镗床电气控制主电路由电源开关QS、()、接触器KM1~KM7、热继电器FR、电动机M1和M2等组成。
(2012年4月)______是中国特色社会主义公务员制度的根本指导原则。
大华公司承租阳光船舶公司的桑夏号油轮,该定期租船合同约定12月1日为还船日期。承租人大华公司经过合理计算,完成最后一个航次的日期大约为12月1日,很可能会略微超出。则以下说法正确的是:()
“备案号”栏:()。“随附单据”栏:()。
企业预期收益的预测大致可分为几个步骤,对其相关说法,错误的为()。
将自己的讲课与学生的谈话或其他活动录制下来,然后在不受外界干扰的环境重复播放录音或录像,观察自己的课堂行为和言语表达,分析评价自己的教学组织能力以及学生的行为表现等言语和非言语线索。这种方法属于教学认知问题调节中的()。
根据以下资料。回答下列问题。2016年全年广东省进出口总额63029.47亿元,比上年下降0.8%。其中,出口39455.07亿元,下降1.3%;进口23574.40亿元,增长0.01%。进出口差额(出口减进口)15880.66亿元,比上年减少5
____________是指不同文化之间的差异程度,主要包括语言方面的差异、生活习惯的差异、社会文化方面的差异等。(暨南大学2017)
在鹏程公司任销售部总监的王明涛收到了一份销售情况统计表,便指派其助理小刘对其中的数据进行整理和分析。请按下列要求帮助小刘完成数据的整理和分析工作:在工作表“月统计表”的G3:M20区域中,插入与“销售经理成交金额按月统计表”数据对应的二维“堆积柱形图”
【S1】【S6】
最新回复
(
0
)