首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
admin
2019-05-26
65
问题
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’ s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a flowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’ s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled(诈骗)the most confidential(保密)records tight under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
What may happen to computer criminals once they are caught?
选项
A、With a had reputation they can hardly find another job.
B、They may walk away and easily find another job.
C、They will be denied access to confidential records.
D、They must leave the country to go to jail.
答案
B
解析
从第二段第二句可看出,即使罪犯被发现了,他们不仅不受任何惩罚地离开公司,还可以从之前的老板那得到一份很好的推荐信。
转载请注明原文地址:https://www.kaotiyun.com/show/ghnZ777K
0
考研英语一
相关试题推荐
AlthoughtherearemanyskillfulBraillereaders,thousandsofotherblindpeoplefinditdifficulttolearnthatsystem.Theya
Thetranslatormusthaveanexcellent,up-to-dateknowledgeofhissourcelanguages,full【C1】______inthehandlingofhistarget
Thepercentageofimmigrants(includingthoseunlawfullypresent)intheUnitedStateshasbeencreepingupwardforyears.At12
Olderpeoplemustbegivenmorechancestolearniftheyaretocontributetosocietyratherthanbeafinancialburden,accordi
Directions:Writeanessaybasedonthefollowingchart.Inyourwriting,youshould1)describethechart,and2)g
Firsttwohours,nowthreehours—thisishowfarinadvanceauthoritiesarerecommendingpeopleshowuptocatchadomesticflig
Firsttwohours,nowthreehours—thisishowfarinadvanceauthoritiesarerecommendingpeopleshowuptocatchadomesticflig
Firsttwohours,nowthreehours—thisishowfarinadvanceauthoritiesarerecommendingpeopleshowuptocatchadomesticflig
HeartdiseasehaslongbeenBritain’sbiggestsinglekiller.Despiteoureffortstowardoffitsriskfactorswithmoreexercise
Tomakeyourhumorwork,youshould______.Itcanbeinferredfromthetextthatpublicservices______.
随机试题
未接种过卡介苗的健康中年人,做结核菌素试验阳性。下列哪种说法不正确
A.中性粒细胞B.嗜酸粒细胞C.嗜碱粒细胞D.单核-巨噬细胞E.淋巴细胞参与非特异性细胞免疫的细胞是
下列不是竣工决算审计内容的是()。
某技术方案的设计年产量为8万件,单位产品销售价格为100元/件,单位产品变动成本为20元/件,单位产品营业税金及附加为5元/件,按设计生产能力生产时,年利润为200万元,则该技术方案的盈亏平衡点产销量为()万件。
A公司2010年1月18日购入一台机器设备并投入使用,取得的增值税专用发票上注明的设备价款为150000元,增值税税额为25500元。A公司采用年限平均法计提折旧,该设备预计使用寿命为10年,预计净残值率为固定资产原价的3%。因产品转型,2012年1月26
“八卦”中的“乾”“坤”“巽”“震”分别代表()。
由我国明朝科学家宋应星撰写的世界第一部关于农业和手工业生产的综合性著作是(),该著作也被外国学者称为“中国17世纪的工艺百科全书”。
已知曲线在直角坐标系中由参数方程给出:x=t+e-1,y=2t+e-2t(t≥0).证明该参数方程确定连续函数Y=y(戈),z∈[1,+∞).
设A=2a+b,B=ka+b,其中|a|=1,|b|=2,且a⊥b.若A⊥B,k=______.
阅读以下说明,回答问题。【说明】Windows组网是指Windows操作系统和服务器具有的连网能力。图5-1给出了在Windows操作系统中的典型LAN配置。
最新回复
(
0
)