首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exist
admin
2019-05-26
32
问题
More and more, the operations of our businesses, governments and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
It’ s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a flowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it’ s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled(诈骗)the most confidential(保密)records tight under the noses of the company’ s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
It is implied in the third paragraph that______.
选项
A、most computer criminals who are caught blame their bad luck
B、the rapid increase of computer crimes is a troublesome problem
C、most computer criminals are smart enough to cover up their crimes
D、many more computer crimes go undetected that are discovered
答案
C
解析
从第三段第二句可知,我们现在知道的计算机犯罪都是在很偶然的情况下发现的,而不是经过系统检测或是其他安全程序。由此可以推断,计算机犯罪者可以很狡猾地隐蔽其犯罪行为。
转载请注明原文地址:https://jikaoti.com/ti/oOb7FFFM
0
考研英语一
相关试题推荐
Writeanessayof160-200wordsbasedonthefollowingdrawing.Inyouressay,youshould1)describethedrawingbriefly,
Sevenyearsago,agroupoffemalescientistsattheMassachusettsInstituteofTechnologyproducedapieceofresearchwhichsh
[A]SetaGoodExampleforYourKids[B]BuildYourKids’WorkSkills[C]PlaceTimeLimitsonLeisureActivities[D]Talkab
Somehousesaredesignedtobesmart.Othershavesmartdesigns.AnexampleofthesecondtypeofhousewonanAwardofExcellen
Olderpeoplemustbegivenmorechancestolearniftheyaretocontributetosocietyratherthanbeafinancialburden,accordi
Writeanessaybasedonthefollowinggraph.Inyouressay,youshould1)interpretthegraph,and2)giveyourcomments.
Whenyouaskyoungpersontotellthenamesofsomefamousmoviesandthechancesarethatmanyofthosementionedwillbepopul
[A]Somearchaeologicalsiteshavealwaysbeeneasilyobservable—forexample,theParthenoninAthens,Greece;thepyramidsofGi
PlayersofFarmVille,anonlinegame,raisevirtualchickensonanimaginaryfarm.Yettheyarehappytoswaprealmoneyforvir
WhatdoestheauthorintendtoillustratewithAAAAcarsandZodiaccars?Whatcanweinferfromthefirstthreeparagraphs?
随机试题
人民检察院作出什么决定后,犯罪嫌疑人转变为刑事被告人
患者,男性,79岁。吸烟60年,肺心病患者,产生慢性肺源性心脏病形成肺动脉高压的最主要因素是
A.低渗性脱水B.等渗性脱水C.高渗性脱水D.低钾血症E.高钾血症粘连性肠梗阻患者,呕吐频繁,脉搏细弱,血压下降
槐花散的功用有
按照相关规定,商业、旅游、娱乐和商品住宅等各类经营性用地,必须以招标、拍卖或者挂牌方式出让,特殊情况下才允许以协议方式出让。各种出让方式的具体界定是()。
公安机关对人民检察院不批准逮捕的决定,认为有错误的时候,可以要求复议。如意见不被接受,可以向上一级人民检察院提请复核。在此期间,对被拘留的人应()。
赌博是指以营利为目的,以财物为赌注比输赢,达到非法转移财物所有权的一种行为。根据如上定义,以下属于赌博的一项是()。
数据流程图是系统分析中哪一个环节所产生的成果
下列关于生成树协议(STP)的描述中,错误的是()。
校摄影社团在今年的摄影比赛结束后,希望可以借助PowerPoint将优秀作品在社团活动中进行展示。这些优秀的摄影作品保存在考试文件夹中,并以Photo(1)jpg.Photo(12)jpg命名。现在,请你按照如下需求,在PowerPoint中完成制作工作
最新回复
(
0
)