首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
专升本
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exis
admin
2011-07-31
71
问题
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (诈骗) the most confidential (保密) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that arc discovered
答案
B
解析
转载请注明原文地址:https://www.kaotiyun.com/show/yMlC777K
本试题收录于:
英语题库成考专升本分类
0
英语
成考专升本
相关试题推荐
(万一他失败了),wewouldencouragehimtotryagain.
Itishardforustorealizewhat______livespeoplelivedintheMiddleAges.
Itcanbeconcludedfromthepassagethatwhenallthepeopletobeinterviewedarelocatedinarelativelybiggeographicalare
______thatcalledthismorning?
Peterpreferstostayathome______outtoagathering.
IsupposeIcancount______youforhelpinthismatter.
Tom’smotherkepttellinghimheshouldworkharder,but______didn’thelp.
Duringthenineteenthcentury,womenintheUnitedStatesorganizedandparticipatedinalargenumberofreformmovements,incl
TheotherdayIheardanAmericansaytoaChinesestudentofEnglish"YouspeakverygoodEnglish."Butthestudentanswered,"
Havingtakenaroomatthehotelwhichhehadbeeninstructedtostay,Smallwoodwentout;itwasalovelyday,earlyinAugust,
随机试题
Thirtyyearsago,whenChristianBoerwasfirstlearninghowtoreadwhilegrowingupintheNetherlands,hemadealotofmista
对于软组织损伤的治疗原则,下列哪项不恰当
A.法律B.行政法规C.部门规章D.地方性法规《药品管理法》属于
患儿,10个月。因发热、呕吐、惊厥来就诊。确诊为化脓性脑膜炎。本病最容易出现的并发症为
中同注册会计师协会是依据《注册会计师法》和《礼会团体登记条例》的有关规定设立的社会团体法人,是中国注册会计师行业的自律管理组织,成立于1988年11月。()
最重要的征信制度法规是()。
某矿山机械厂小批量生产矿山机械设备,采用分批法计算产品成本。201×年10月有关成本计算资料如下所示。(1)产量记录(台):(2)以前月份发生费用:(3)本月两批产品共同发生间接费用:原材料费用12500元
从所给的四个选项中,选择最合适的一个填入问号处,使之呈现一定的规律性:
在计算机中,每个存储单元都有一个连续的编号,此编号称为()。
微型计算机硬件系统中最核心的部位是()。
最新回复
(
0
)