首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
职称考试
More and more,the operations of our businesses,governments,and financial inst...
More and more,the operations of our businesses,governments,and financial inst...
admin
2020-12-24
39
问题
More and more,the operations of our businesses,governments,and financial institutions are controlled by information that exists only inside computer memories.Anyone clever enough to modify this information for his own purposes can reap big reward.Even worse,a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing.
But even if the crime is detected,the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course,we have no statistics on crimes that go undetected.But it's disturbing to note how many of the crimes we do know about were detected by accident,not by systematic inspections or other security procedures.The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers,who must leave the country,commit suicide,or go to jail,computer criminals sometimes escape punishment,demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits.All too often,their demands have been met.
WhyBecause company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused.They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives,accountants,and security staff.And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
Which of the following statements is mentioned in the passage
选项
A.A strict law against computer crimes must be enforced.
B.Companies usually hesitate to uncover computer crimes to protect their reputation.
C.Companies will guard against computer crimes to protect their reputation.
D.Companies need to impose restrictions on confidential information.
答案
B
解析
推理判断题。由最后一段的前两句话可知,因为公司的经理们害怕“the bad publicity”,即“bad reputation”,所以他们会在揭示计算机犯罪时犹豫。
转载请注明原文地址:https://ti.zuoweng.com/ti/0mT8KKKQ
相关试题推荐
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
()thesamemistakesintheannualfinancialreportagainmadehisbossvery...
随机试题
38.邮政服务质量具有的特性包括()。 A.迅速 B.准确 C.安全
以玉米为主食的地区易发生 A、脂溢性皮炎 B、癞皮病 C、脚气病
宫颈活检的护理要点,正确的是 A、月经期不宜检查,月经前期可行检查 B、生
关于β系数,下列说法错误的是()。 A.β系数是由时间创造的 B.β系
有两个交流电压源分别为 将两个电源串接在一起,则新的电压源最大幅值
下列公路工程注册建造师施工管理签章文件中,属于施工组织管理文件类别的有( )。
有权解释宪法的国家机构是( )。 A.全国人大 B.全国人大常委会 C.
某女患者,40岁,企图自杀,服用大量巴比妥严重中毒,送来医院时,呼吸已经停止。马上对病人进行洗胃,无效。在没有其他对抗措施的条件下,采用了在当时还没有推广...
甲向乙借款10万元用于购买化肥,双方约定借期但未约定利息。期限届满,甲归还本金10万元,乙要求支付2000元利息遭到拒绝,对本案利息纠纷的处理,正确的是()。
关于单元格的引用类型,正确的有()。A:可以采用相对引用方式B:可以采用绝对引用方式C:一张工作表中只能采用相对引用或者绝对引用其中一种引用方式D:可以采