首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
1. More and more, the operations of our businesses, governments, and financial institutions are controlled by information that e
1. More and more, the operations of our businesses, governments, and financial institutions are controlled by information that e
admin
2017-04-21
138
问题
1. More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his purpose can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
2. It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a growing recommendation from his former employers. Of course, we have no statistics on crime that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
3. For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off the company that was being robbed.
4. Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits.
5. All too often, their demands have been met. Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
Questions 1-5
Directions: For questions 1-5, choose the best title for each paragraph from below. For each numbered paragraph(1-5), mark one letter(A-6)on your Answer Sheet. Do not mark any letter twice.
A. the fear of company executives
B. the present situation about the computer crime
C. an example of computer crime
D. computer crime often go undetected
E. computer criminals easily escape punishment
F. computer criminals continue his crimes elsewhere
G. the reason why computer criminals are easy to escape punishment
Paragraph 5 ______
选项
答案
G
解析
第5段介绍了计算机罪犯不受惩罚而得以逃脱的原因。
转载请注明原文地址:https://www.kaotiyun.com/show/ON9d777K
本试题收录于:
BFT阅读题库国际化人才外语考试(BFT)分类
0
BFT阅读
国际化人才外语考试(BFT)
相关试题推荐
YougotaletterrequestinginformationfromAndreaPhilips,themarketingmanagerofLinguaServicesLtd.
Usingtheinformationinthetext,completeeachsentence14-18withanexpressionfromthelistbelow.Foreachsentence(14
1.Whoknowsbetterthanyourcustomerswhereyouroperationscanbeimproved?Today,progressivefirmsincreasinglyrelyonadv
Therearemanydifferentreasonswhyfashionissuchapowerfulculturalandeconomicinfluenceindevelopedsocietiesatthebe
Couldthebadolddaysofeconomicdeclinebeabouttoreturn?SinceOPECagreedtosupplycutsinMarch,thepriceofcrudeoil
Couldthebadolddaysofeconomicdeclinebeabouttoreturn?SinceOPECagreedtosupplycutsinMarch,thepriceofcrudeoil
Therearevariouswaysinwhichindividualeconomicunitscaninteractwithoneanother.Threebasicwaysmaybedescribedasth
ItiscommonlybelievedintheUnitedStatesthatschooliswherepeoplegotogetaneducation.Nevertheless,ithasbeensaid
【R1】______Itismorethanjustclothingandhairstylesthatareinstyleoneyearandoutofdatethenext.Itisawholewayof
FreezingtoDeathforBeautyPeopleinBeijingwearalotofclothingduringwintertofend(抵御)offthecold.IntheUnited
随机试题
疫情防控期间,你在某一天工作结束后正要下班,接到一个居民电话,该居民称某小区有人从中风险地区回来,而且有与亲友聚餐的经历。请问作为街道工作人员,面对此事你该怎么办?
以下()是计算机程序设计语言所经历的主要阶段。
A.HAVB.HBVC.HCVD.HUV儿童发病多见于
患者,女性,26岁,颊向阻生,在行上牙槽后神经、腭前神经阻滞麻醉5分钟后出现左下唇麻木感,探颊侧牙龈仍有痛感,其原因可能是
利多卡因用于局部浸润麻醉或神经阻滞时,成人一次限量为
涩肠,温中行气涩肠,固崩止带
监理服务是监理单位的高智能投入,服务工作的好坏取决于()。
日出:日落
设向量组α1,α2,α3为R。的一个基.β1=2α1+2kα3,β2=2α2,β3=α1+(k+1)α3.证明向量β1,β2,β3为R3的一个基;
Thedebateaboutproblemdrinkingandhowtostopitnowadayscentresmostontheworking-classyoung.Theyare【M1】______highly
最新回复
(
0
)