首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Laws about computer crimes are imperfect. B、There are many potential criminals hiding in the bank. C、Computer crimes committed
A、Laws about computer crimes are imperfect. B、There are many potential criminals hiding in the bank. C、Computer crimes committed
admin
2013-07-11
30
问题
In many businesses, computers have largely replaced paperwork, because they are fast, flexible, and do not make mistakes. Many banks advertise that their transactions are "untouched by human hands" and therefore safe from human temptation. Obviously, computers have no reason to steal money. But the growing number of computer crimes shows they can be used to steal.
Computer criminals don’t use guns. And even if they are caught, it is hard to punish them because there are no witnesses and often no evidence. A computer cannot remember who used it: it simply does what it is told. A clerk at a New York bank used a computer to steal more than $1,500,000,000 in just four years. No one noticed this theft because he moved the money from one account to another. Each time a customer he had robbed questioned the balance in his account, the clerk claimed a computer error, then replaced the missing money from someone else’s account. This clerk was caught only because he was a gambler. When the police broke up an illegal gambling operation, his name was in the records.
Most computer criminals have been minor employees. Now police wonder if this is "the tip of the iceberg." As one official says, "I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing—the ones who know how a computer works."
32. Why do many banks claim that their transactions are safe?
33. Why is it difficult to punish computer criminals?
34. How did the New York bank clerk cover up his crime?
35. What are the police officials concerned about?
选项
A、Laws about computer crimes are imperfect.
B、There are many potential criminals hiding in the bank.
C、Computer crimes committed by minor employees exist widely.
D、Computer crimes committed by real computer experts exist widely.
答案
D
解析
短文结尾处提到警方担忧的是那些了解电脑工作原理的电脑专家,D与此相符,故为正确答案。
转载请注明原文地址:https://jikaoti.com/ti/fnoFFFFM
0
大学英语四级
相关试题推荐
A、Thatdrugsshouldnotbeusedwithoutdoctorsadvice.B、Thatdrugsandsubstancesaredifferent.C、Thatsubstancesshouldbeu
Modernmass-productionmethodslowerthecostofmakinggoods,andthusgiveusbettervalues.Atthesametime,Americaningenu
A、Customerandsalesperson.B、Teacherandstudent.C、Bossendsecretary.D、Guestandwaitress.C
Childrenmodelthemselveslargelyontheirparents.Theydosomainlythroughidentification.Childrenidentifywithaparentwh
A、Theirsimilarsocialstatus.B、Theirinterdependence.C、Theircommoninterest.D、Theiridenticalcharacter.C短文中提到,艾琳和帕特都喜欢去剧院
A、Theeffectswereverygood.B、Theactingwasjustso-so.C、Theplotwastoocomplicated.D、Thecharacterswerelifelike.A男士表示
Youmayhavewonderedwhythesupermarketsareallthesame.Itisnotbecausethecompaniesthatoperatethemlackimagination.
Oneoftheearliestchangesexperiencedbynewlymodernizingcountriesisthereductionofinfectiousdiseasethediffusionofp
A、Thosewhoaresuccessfulintheirowncountry.B、Thosewhohavenohobbiesthattheyenjoyintheirowncommunity.C、Thosewho
Manypeoplethroughouttheworldareworriedabouttheircomputers.Theyfearthemachineshavebeen【B1】______byavirus.Aviru
随机试题
[2011年,第117题]按照《合同法》的规定,下列情形中要约不失效的是()。
以下项目的注册资本,必须由中方控股的有()。
海关监管的对象可分为()。
(2016年)福海公司是国内一家著名的肉类加工企业。为了保持业绩持续增长,福海公司近年来陆续收购了几家规模较大的养殖场、肉类连锁超市。福海公司采取的发展战略属于()。
我国现存最大、最完整的堡垒瓮城位于()。
过程评估提供有关服务过程的各种信息不包括()。
设F(x)=,试求:(Ⅰ)F(x)的极值;(Ⅱ)曲线y=F(x)的拐点的横坐标;(Ⅲ)∫—23x2F’(x)dx.
以下关于嵌入式处理器的说法正确的是()。
在窗体上绘制一个文本框和一个计时器控件,名称分别为Text1和Timer1,在属性窗口中把计时器的Interval属性设置为1000,Enadled属性设置为False。程序运行后,如果单击命令按钮,则每隔一秒钟在文本框中显示一次当前的时间。以下是实现上
私が半年ほど入院した、同じ病室に、完全に寝たきりになっていたKさんという人がいました。彼の毎日の楽しみは、看護婦さんに「息子から电话があったでしょうか。」と尋ね、「あったわよ」と言う看護婦さんの返事を闻くことでした。当初、私は、(1)オヤジの病症を毎日のよ
最新回复
(
0
)