首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
39
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that arc discovered
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/yMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
Ithasoftenbeensaidbypeopleinvolvedinlanguageteachingthatastudentwhoreallywantstolearnwillsucceedwhateverth
Becauseoftheirwealthandpower,theycouldseetoitthatgovernmentspassedlawsfavorabletothem.
你(LiYuan)所在的酒店需招聘数名管理人员,请你写一则招聘广告,内容包括:(1)招聘原因和人数。(2)招聘对象(年龄、性别、学历要求、工作经验等)。(3)优先考虑条件(如高学历、有多年工作经验、会外语等)。(4)
Dr.Zhangwasalways______thepoorandthesick,hisprivateclinicoftenprovidingthemwithfreemedicalcare.
NewshasjustbeenreceivedofanaircrashinthenorthofEngland.Theplane,whichwasonacharter(包租)flightfromLondonto
Theboysspentthewholemorning______possibleanswerstothequestion.
IntheU.S.,peoplepreferwaitingforatabletosittingwithpeopletheydon’tknow.Thismeansahostessmaynotseatasmall
Oneanswertothequestionsoflandshortagewassuggestedbyacommitteesomeyearsago.Acitywastobebuiltatsea,housing
Wouldyouliketospendalleveningreadingalovelystorywithbeautifulillustrationsandmake$35,000atthesametime?Milli
ItwasnotuntilthenthatIcametoknowknowledge______onlyfrompractice.
随机试题
领导绩效考评的类型。
当颈动脉窦压力感受器的传人冲动增多时,可引起
双向转诊服务中,下列哪项患者不需要从第一级机构转向第二级机构
1996年6月3日,某甲向某丙借款30万元,由某丁作为保证人。某丁和某丙约定:只有在某甲于债务届满两年还不还款时,某丁才代为履行。1997年6月3日,债务期限届满,某甲没有还款。到了1999年8月4日,某丙向某丁要求代为履行。某丁的一个律师朋友告诉某丁,该
(2005)系统如图4.5—22所示,在取基准功率100MVA时,各元件的标幺值电抗分别是:G:xd’’=x(2)=0.1,E|0|’’=1.0;T:xT=0.1,YNd11联结。则在母线B发生BC两相短路时,变压器三角形联结侧A相电流为()。
依据《危险化学品安全管理条例》的规定,下列关于危险化学品安全使用许可的说法,正确的是()
人机系统可靠性设计原则中,不仅要考虑可靠性和安全性,还必须考虑系统的质量因素和输出功能指标,其中还包括()。
列关于建设工程监理特点的说法中,不正确的是()
西周初期统治者总结了历史经验教训,对夏商的“天罚”思想进行了修正,在此基础上提出的立法思想是()(2015年一综一第30题)
从学生管理数据库中考生成绩.dbf检索所有分数大于或等于名次为2的学生的成绩的学号所用的SQL命令为:SELECTDISTINCT学号FROM考试成绩WHERE成绩【】;(SELECT成绩FROM考生成绩WHERE
最新回复
(
0
)