首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
admin
2017-11-28
24
问题
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crime.
Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $ 2 million in damages as a result of a bombing.
Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
What would be the most appropriate title for the passage?
选项
答案
Crime in computer.
解析
主旨大意题。第一段第一句即点明了本文的主题,随着电脑科技的出现,新型的不寻常的犯罪形式出现了。随后举例说明了各种与电脑有关的犯罪:数据犯罪、服务窃取、与财产相关的犯罪、工业破坏、政治相关的破坏、故意破坏、针对个人的犯罪以及金融相关的犯罪。其后的几段针对几种犯罪做了较为详细的说明。由此可知,文章的主题与电脑犯罪有关。
转载请注明原文地址:https://jikaoti.com/ti/upwUFFFM
本试题收录于:
翻译硕士(翻译硕士英语)题库专业硕士分类
0
翻译硕士(翻译硕士英语)
专业硕士
相关试题推荐
TheNormanConquestof________isperhapsthebest一knowneventinEnglishhistory.
WilliamWordsworthisgenerallyknownasa________poet.
Notationgavewesternmusicameansofwrittenrecord,butatfirstonlyforakindofmusic,chant,thatwasbelievedtohaveo
Becausenoisesmodulateradiofrequency,radiostationsuseabandoffrequenciestopreventinterferencewithotherstations.
Crimesofviolenceappeartobequite______,butpsychologistscanusuallyfindamotivehiddenawayinthecriminal’schildhoo
TheNetisnolongeranovelty,aninterestingwaytopassthetime.Itsadventhasbroughtaboutarevolutioninpeople’swayo
Oneimportantoutcomeoftheworkontheexpressionofgenesindevelopingembryosissuretobeknowledgethatcanhelpp
Oneimportantoutcomeoftheworkontheexpressionofgenesindevelopingembryosissuretobeknowledgethatcanhelpp
Farfrombeing______,Patwasalways______toappearacquiescent.
DeconstructionInnovationsinlanguagearenevercompletelynew.Whenthewordsusedforfamiliarthingschange,orwordsfo
随机试题
著作权转让的对象是()
16,WoodmanRoad,TwoBridges,
颌骨骨折最具特征性的表现是
秦皮伪品核桃楸皮的水浸液在日光下
某公司写字楼地上7层,建筑高度为25m,耐火等级二级,每层建筑面积为945m2,设置1个防火分区。该建筑为“L”形外廊式建筑。“L”形建筑长边为45.60m,短边为22.20m,均采用不燃烧材料装修,办公场所设有计算机、复印机等办公用电子设备。
毛粘银枪大衣呢(按重量计含羊毛和马海毛50%,粘胶短纤50%;幅宽110cm)
丙公司在经营过程中因资金出现短缺,向某商业银行申请贷款,丙公司由该行办公室主任吴某的亲属投资。请你根据《商业银行法》的规定,判断该银行在贷款时的哪项做法违反了贷款的基本规则?()
某救助保护流浪青少年儿童中心“努力在今天,希望在明天;一切为了孩子,为了孩子的一切”的表述,反映了该机构的()。
大一班的李老师组织了一次教学活动——《水》。教学目标设定为:感知水的基本特性。活动步骤是:一、看一看:教师在一只脸盆里装满了水,另一只脸盆里装豆浆,里面分别放着几颗玻璃球,请小朋友们看一看,这两只脸盆里有什么?期望通过对比让小朋友感知“水是无色、透明的”。
下列有关社会策划模式的特点说法正确的是()。
最新回复
(
0
)