首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
More and more, the operations of our business, governments, and financial institutions are controlled by information that exist
More and more, the operations of our business, governments, and financial institutions are controlled by information that exist
admin
2011-07-28
57
问题
More and more, the operations of our business, governments, and financial
institutions are controlled by information that exists only inside computers 1.
memories. Anyone clever enough to modify this information for his own
purposes can reap substantial awards. Even worse, a number of people who 2.______
have done this and caught at it have managed to get away without punishment. 3. ______
It’s easy for computer crimes to go undetected if no one checks up 4.______
what the computer is doing, but even if the crime is detected, the criminal
may walk away not only unpunished and with a glowing recommendation 5.______
from his former employers. Of course, we have no statistics on crimes that
go undetected. But it’s disturbing to note how many of the crimes we do
know about were detected by accident, not by systematic inspections or
other security procedures. The computer criminals who have been caught
could simply have been the victims of uncommonly bad luck. 6.______
For example, a certain keypunch operator complained of having to stay
overtime to punch extra cards. Investigation revealed that the extra cards
she was being asked to make were for dishonest transactions. 7.______
In other case, dissatisfied employees of the thief tipped off the company 8.______
that was being robbed. Unlike other lawbreakers, who must leave the
country, commit suicide, or go to the jail, computer criminals sometimes 9. ______
escape punishment, demanding not only that they not be charged but that
they be given good recommendations and perhaps other benefits. All too
often, their demands have been satisfied. 10. ______
选项
答案
other——another
解析
本题为逻辑错误。根据上下文可知此处是另举一例,应采用another,而other后应加复数名词,表示其他一些。
转载请注明原文地址:https://www.kaotiyun.com/show/CgYO777K
0
专业英语八级
相关试题推荐
A、securingfinancialaidB、persuadingU.S.tocompelIsraeltowithdrawitstroopsfromtheoccupiedterritoryC、gainingU.S.re
TheAmericanTaxSystemGovernmentsraiserevenuesthroughtaxation.Ataxisa【1】______paymenttogovernment.IntheUnit
TheAmericanTaxSystemGovernmentsraiserevenuesthroughtaxation.Ataxisa【1】______paymenttogovernment.IntheUnit
TheAmericanTaxSystemGovernmentsraiserevenuesthroughtaxation.Ataxisa【1】______paymenttogovernment.IntheUnit
TheAmericanTaxSystemGovernmentsraiserevenuesthroughtaxation.Ataxisa【1】______paymenttogovernment.IntheUnit
TheAmericanTaxSystemGovernmentsraiserevenuesthroughtaxation.Ataxisa【1】______paymenttogovernment.IntheUnit
Therearetwomainmethodsoforganizinggovernments—theunitarysystemandthefederalsystem.Theunitarystateplacesmostpo
随机试题
中国人民的第一个和最凶恶的敌人是( )
A.一级结构B.二级结构C.三级结构D.模序结构整条肽链中全部氨基酸残基的相对位置属于蛋白质的
具有软坚作用的泻下药为
(2013年)一阶系统的单位阶跃响应的动态过程为()。
不属于锅炉正常运行中监督调节范围的是()。
2×15年1月1日甲公司与乙商业银行达成协议,将乙商业银行于2×13年1月1日贷给甲公司的3年期、年利率为9%、本金为5000万元的贷款进行债务重组。乙商业银行同意将贷款延长至2×16年12月31日,年利率降至6%,免除积欠的利息450万元,本金减至420
Thegirlstandingattheschoolgateisafriendof______.
信息加工理论对实际教学的启示是()
社会救助是指国家和社会依照法律、法规给特定对象提供确保一定生活水平的资金和服务的特殊社会保障制度。()
以下函数sstrcat()的功能是实现字符串的连接,即将t所指字符串复制到s所指字符串的尾部。例如:s所指字符串为abcd,t所指字符串为efgh,函数调用后s所指字符串为abcdefgh。请填空。#include<string.h>v
最新回复
(
0
)