首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
89
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that arc discovered
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/yMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
Theconceptofpersonalchoiceinrelationtohealthbehaviorsisanimportantone.Anestimated90percentofallillnessesmay
Thefoodweeatseemstohaveprofoundeffectsonourhealth.Althoughsciencehasmadeenormousstepsinmakingfoodmorefitt
Adarkenedskyinthedaytimeisusuallyanindicationthatastormis______.
Notuntilyoutalkedwithhim______thathehadmadeaseriousmistake.
OnedayinJanuary,myuncle,mycousinandIdecidedtogohunting.Weleftbycarintheafternoon.ItwasaRangeRoverwith
Theboysspentthewholemorning______possibleanswerstothequestion.
—IsMrSmithintheoffice?—Yes,_____heisinchargeoftheoffice,hemustbethere.
Thetrain______atthepresentspeeduntilitreachesthefootofthemountainataboutnineo’clocktonight.
IntheU.S.,peoplepreferwaitingforatabletosittingwithpeopletheydon’tknow.Thismeansahostessmaynotseatasmall
Whatalovelyday,______?
随机试题
设等价.若存在可逆矩阵P,使得PA=B,则P可以为()
Thedisabledchildrenneedmanythings,but______,theyneedlove.
举例说明教师在教学中如何帮助学生掌握科学概念。
甲状腺激素对下列哪些器官的发育最为重要?
某患者,巩膜和皮肤染黄,诊断为溶血性黄疸,那么其血中胆红素变化情况为
基金与银行储蓄存款的差异包括()。Ⅰ.性质不同Ⅱ.收益不同Ⅲ.风险特征不同Ⅳ.信息披露程度不同
(2012年)下列会计事项中,不应在“其他应收款”科目核算的是()。
自有资金现金流量表是设定在全部投资均为自有资金的情况下,以此为计算基础,贷款作为现金流入,借款利息和本金的偿还均作为现金流出。()
对症状的自知是指求助者()。
TheTerm"CYBERSPACE"wascoinedbyWilliamGibson,ascience-fictionwriter.InthebookMr.Gibsondescribescyberspaceas"a
最新回复
(
0
)