首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
职称考试
More and more,the operations of our businesses,governments,and financial inst...
More and more,the operations of our businesses,governments,and financial inst...
admin
2020-12-24
23
问题
More and more,the operations of our businesses,governments,and financial institutions are controlled by information that exists only inside computer memories.Anyone clever enough to modify this information for his own purposes can reap big reward.Even worse,a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing.
But even if the crime is detected,the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course,we have no statistics on crimes that go undetected.But it's disturbing to note how many of the crimes we do know about were detected by accident,not by systematic inspections or other security procedures.The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers,who must leave the country,commit suicide,or go to jail,computer criminals sometimes escape punishment,demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits.All too often,their demands have been met.
WhyBecause company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused.They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives,accountants,and security staff.And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
Which of the following statements is mentioned in the passage
选项
A.A strict law against computer crimes must be enforced.
B.Companies usually hesitate to uncover computer crimes to protect their reputation.
C.Companies will guard against computer crimes to protect their reputation.
D.Companies need to impose restrictions on confidential information.
答案
B
解析
推理判断题。由最后一段的前两句话可知,因为公司的经理们害怕“the bad publicity”,即“bad reputation”,所以他们会在揭示计算机犯罪时犹豫。
转载请注明原文地址:https://ti.zuoweng.com/ti/0mT8KKKQ
相关试题推荐
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
()thesamemistakesintheannualfinancialreportagainmadehisbossvery...
随机试题
患者男性,40岁。体温39℃,口腔手术后1天,据病情应给予 A、普通饮食
某房地产,收益年限为40年,报酬率为8%,每年可以获得净收益40万元,则该房地产
根据中国结算公司上海分公司的规定,债券买断式回购发生融资方与融券方双方均无力履约
梁斜弯曲区别于平面弯曲的基本特征为()。 A.斜弯曲时的载荷沿斜向作用 B
“迁”是中国古代官吏调动常用词语,表示升官之意,常用“左迁、右迁”等词。()
既能凉血散瘀,又善清泻肝火的药物是A:石B:赤C:牡丹皮D:黄连E:栀子
医疗机构遴选和新引进抗菌药物品种,应当由临床科室提交申请报告,经哪个单位提出意见后,由抗菌药物管理工作组审议 A药剂部门B临床药学部门C药品供应部门...
热水浸泡后,水染成橘红色,加碱显猩红色,再加酸变成橙色的中药是A.西红花B.苏木C.秦皮D.葶苈子E.牵牛子
成为异质性资源必须具备的四个特性为()。A.有价值性B.稀缺性C.难以替代性D.难以模仿性E.竞争性
A股份有限公司(以下简称“A公司”)2019年的财务报告于2020年4月10日对外报出。2020年2月10日,A公司于2019年9月10日销售给B公司的一...