首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
83
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that arc discovered
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/yMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
Anothergoodtitleforthepassagewouldbe______.Accordingtothearticle,allofthefollowingaretrueaboutthetwoWanda
Wereyou______thephonealotthisafternoon?Itriedcallingyoufivetimesandalwaysgotabusysignal.
Shetalkedaboutbuyingahouseinthecountry,butnothingever______.
Marydoesnotreadnewspapers;shereadsShakespeare,______.
你(LiYuan)所在的酒店需招聘数名管理人员,请你写一则招聘广告,内容包括:(1)招聘原因和人数。(2)招聘对象(年龄、性别、学历要求、工作经验等)。(3)优先考虑条件(如高学历、有多年工作经验、会外语等)。(4)
WhenMr.Kentuckyfellill,hissontook______thebusinessfromhim.
IlistenedtoDrWilson’slectureabouttheprotectionofwildanimals,butIwasunabletograspitskey______.
Parentsandteenagersoftendisagreeabouttheamountoffreedomandresponsibilitythatyoungpeoplearetohave.Theteenager
根据中文提示,将对话中缺少的内容写在线上。这些句子必须符合英语表达习惯。打句号的地方,用陈述句;打问号的地方,用疑问句。提示:Mike给Susan打电话,问她周六晚上是否有事情,他想约她去一个新开的迪斯科舞厅看看。Susan周六晚没什么特别的事并认
Innoway______frompractice.
随机试题
甲公司固定资产、无形资产相关业务如下:(1)2013年12月1日购入一台设备供销售部门使用,入账价值180万元,预计使用5年,预计净残值12万元,按年数总和法计算折旧。(2)2013年12月份,公司总部的一辆轿车使用期满予以报废。该轿车原价74万元,预
红色血栓可见于
A.牛传染性鼻气管炎B.牛流行热C.牛传染性胸膜肺炎D.牛出血性败血病E.炭疽在我边境口岸隔离场检疫期间,发现部分引进牛体温升高达40~42℃,干咳数日,弓形站立,头前伸,肘外展。病牛可见关节炎症状。病料在含10%马血清的马丁琼脂培养基上培养,
绕阴器的经脉是()
股票是一种间接融资的金融工具。()
采用填埋法处理垃圾时,一般采用的防渗技术有()。
李白的《将进酒》以描写梦中游历来张扬诗人的自我形象。()
对犯罪客体按照其范围大小可划分为()。(2009年多选21)
证明:当x>0时,(x2一1)lnx≥(x一1)2.
已知某汉字的区位码是2256,则其国标码是(.)。
最新回复
(
0
)