首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
职称考试
More and more,the operations of our businesses,governments,and financial inst...
More and more,the operations of our businesses,governments,and financial inst...
admin
2020-12-24
45
问题
More and more,the operations of our businesses,governments,and financial institutions are controlled by information that exists only inside computer memories.Anyone clever enough to modify this information for his own purposes can reap big reward.Even worse,a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing.
But even if the crime is detected,the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course,we have no statistics on crimes that go undetected.But it's disturbing to note how many of the crimes we do know about were detected by accident,not by systematic inspections or other security procedures.The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers,who must leave the country,commit suicide,or go to jail,computer criminals sometimes escape punishment,demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits.All too often,their demands have been met.
WhyBecause company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused.They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives,accountants,and security staff.And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage is mainly about_______.
选项
A.why computer criminals are often able to escape punishment
B.why computer crimes are difficult to detect by systematic inspections
C.how computer criminals manage to get good recommendations from their former employers
D.why computer crimes can’t be eliminated
答案
D
解析
主旨大意题。选项A和D很相似,文章的很多地方也都讲的是computer criminals escape punishment,但这是表面的,正是因为他们容易逃脱惩罚,所以文章最后一句说他们可以到一个新地方继续从事犯罪活动,其结果自然是计算机犯罪消除不了,因此选D。
转载请注明原文地址:https://ti.zuoweng.com/ti/amT8KKKQ
相关试题推荐
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
()thesamemistakesintheannualfinancialreportagainmadehisbossvery...
随机试题
患者,女性,62岁,发现右乳外上象限肿块1年,近半月来增大明显而就诊。体格检查:
我国80%的卫生资源集中在城市,城市卫生资源的80%又集中在大医院,呈“倒三角”
某工程双代号网络计划如下图所示,图中已标出每个节点的最早时间和最迟时间,该计划表
具有强大的扩张冠状动脉作用对变异性心绞痛疗效最佳的药物是A.美托洛尔B.消心痛C.开搏通D.硫氮酮E.哌唑嗪
假设某项交易的期限为125个交易日,并且只在这段时间占用了所配置的经济资本,此项交易对应的RAROC为4%,则调整为年度比率的RAROC等于()。A、6.2
材料: 语文老师发现班上一名学习很用功的男同学在背诵课文时有些困难,想了解其中的原因,就问他:“你是怎样背诵课文的?”这名学生回答:“我就是反复地念。”...
当公共利益、他人或本人的人身或其他利益受到不法侵害时,行为人所采取的必要的防卫措施,称为紧急避险。( )
下列不属于系统性风险特点的是()。A.大多数资产价格变动方向往往是相同的B.无法通过分散化投资来回避C.可以通过分散化投资来回避D.由同一个因素导致大部分
对火灾报警系统的组件调试,()需要在30s内作出响应或发出报警信号或启动信号()。A.火灾报警控制器B.管线采样式吸气感烟火灾探测器C.可燃气体探测器
无须办理房屋所有权转移登记的是()。A.房屋租赁B.受遗赠房屋C.以房屋出资入股D.房屋分割导致所有权发生转移