首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
职称考试
More and more,the operations of our businesses,governments,and financial inst...
More and more,the operations of our businesses,governments,and financial inst...
admin
2020-12-24
60
问题
More and more,the operations of our businesses,governments,and financial institutions are controlled by information that exists only inside computer memories.Anyone clever enough to modify this information for his own purposes can reap big reward.Even worse,a number of people who have done this and been caught at it have managed to get away without punishment.
It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing.
But even if the crime is detected,the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course,we have no statistics on crimes that go undetected.But it's disturbing to note how many of the crimes we do know about were detected by accident,not by systematic inspections or other security procedures.The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers,who must leave the country,commit suicide,or go to jail,computer criminals sometimes escape punishment,demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits.All too often,their demands have been met.
WhyBecause company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused.They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives,accountants,and security staff.And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
The passage is mainly about_______.
选项
A.why computer criminals are often able to escape punishment
B.why computer crimes are difficult to detect by systematic inspections
C.how computer criminals manage to get good recommendations from their former employers
D.why computer crimes can’t be eliminated
答案
D
解析
主旨大意题。选项A和D很相似,文章的很多地方也都讲的是computer criminals escape punishment,但这是表面的,正是因为他们容易逃脱惩罚,所以文章最后一句说他们可以到一个新地方继续从事犯罪活动,其结果自然是计算机犯罪消除不了,因此选D。
转载请注明原文地址:https://ti.zuoweng.com/ti/amT8KKKQ
相关试题推荐
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Moreandmore,theoperationsofourbusinesses,governments,andfinancialinst...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
Operationswhichleftpatients__________andinneedoflongperiodsofdisco...
()thesamemistakesintheannualfinancialreportagainmadehisbossvery...
随机试题
( )是受到水与空气交界面张力作用的自由水,它的存在对建筑工程防潮、土的浸湿和
气瘿在何种情况下不宜手术治疗?() A.肿块巨大 B.内治无效 C.青春期
关于战略和策略,说法正确的是()。 A.战略是策略的上位概念 B.策略应该
为了防止室内蒸汽渗入保温屋面的保温层中,通常应进行的处理作法是()。
.浅II度烧伤创面的临床表现是 A.轻度发红,轻痛,无水疱 B.痛觉敏感,创
患者,男,45岁,因右上颌肿物行右上颌骨切除+植皮术,术后所植皮片大部分坏死,遗留较大肉芽创面,准备再行皮肤移植消灭创面。此病例植皮时最好采用A.皮瓣B.全
下列选项中,包含矛盾双方相互依存和相互转化的辩证法思想的有( )。A.千里之堤,毁于蚁穴B.有无相生,难易相成C.月晕而风,础润而雨D.物极必反,
关于项目结构图、组织结构图、合同结构图和工作流程图的区别,下列说法正确的是()。A.项目结构图反映组成该项目的所有工作任务B.组织结构图反映一个组织系统中各工
关于风险和风险量的说法,错误的有()。A.风险量指的是不确定的损失程度和损失发生的概率B.若某个可能发生的事件其可能的损失程度大,发生概率小,则属于风险区B
在纽约外汇市场上,下列标价方法属于直接标价法的是()。A.1美元=1.7910/1.7920德国马克B.1美元=7.7536/7.7546人民币C.