皮皮学,免费搜题
登录
logo - 刷刷题
搜题
【简答题】
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment. It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers. Of course, we have no statistics on crimes that go undetected. But it’s disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may been the victims of uncommonly bad luck. For example, a certain keypunch ( 键盘打孔 ) operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off ( 向 ... 透露 ) the company that was being robbed. Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met. Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled ( 耍弄 ) the most confidential records right under the noses of the company’s executives, a accountant, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere. 21. It can be concluded from the passage that ________. A) it is still impossible to detect computer crimes today B) computer crimes are the most serious problem in the operation of financial institutions C) computer criminals can escape punishment because they can’t be detected D) people commit computer crimes at the request their company ( C ) 22. It is implied in the third paragraph that ________. A) many more computer crimes go undetected than are discovered B) the rapid increase of computer crimes is a troublesome problem C) most computer criminals are smart enough to cover up their crimes D) most computer criminals are smart enough to cover up their bad luck ( A ) 23. Which of the following is mentioned in the passage? A) A strict law against computer crimes must be enforced. B) Companies need to impose restrictions on confidential information. C) Companies will guard against computer crimes to protect their reputation. D) Companies usually hesitate to uncover computer crimes. ( D ) 24. What may happen to computer criminals once they are caught? A) With a bad reputation they can hardly find another job. B) They will be denied access to confidential records. C) They may walk away and easily find another job. D) They must leave the country or go to jail. ( C ) 25. The passage is mainly about ________. A) why computer crimes are difficult to detect by systematic inspections B) why computer criminals are often able to escape punishment C) how computer criminals manage to get good recommendation from their former employers D) why computer crimes can’t be eliminated ( C )
手机使用
分享
复制链接
新浪微博
分享QQ
微信扫一扫
微信内点击右上角“…”即可分享
反馈
参考答案:
举一反三
【单选题】1985年3月,()珠海分行发行了我国第一张银行卡。
A.
中国银行
B.
招商银行
C.
工商银行
D.
建设银行
【判断题】地钱的生殖托下长有精子器或颈卵器。
A.
正确
B.
错误
【多选题】假定采用交互分配法,下列说法正确的是( )。
A.
交互分配时,供电车间的分配率为 0.08
B.
交互分配时,机修车间的分配率为0.8
C.
对外分配时,供电车间的分配率为0.084
D.
对外分配时,机修车间的分配率为0.88
【多选题】儿童语言发生的准备主要包括()的准备。
A.
语言产生
B.
语言理解
C.
语言发音
D.
学习句子
E.
语法
【简答题】AutoCAD中,用移动命令“move”把一个对象向X轴的正方向移动8个单位,向Y轴的正方向移动5个单位,应该输入A. 第一点:0,0;第二点:8,5 B. 第一点:任意;第二点:@8,5 C. 第一点:(0,0);第二点:(8,5) D. 第一点:0<180;第二点:8,5 E. 第一点:[0,0];第二点:[8,5]
【多选题】遇( )时,将控制权由中心下放到设备集中站办理。
A.
调度员工作站有关控制命令无法下达时
B.
表示屏或调度员工作站失去复示作用或不能正确复示时
C.
实行电话闭塞法时
D.
发生必须由车站办理的作业时
【多选题】语言理解主要包括哪些方面( )
A.
声音理解
B.
言语理解
C.
听觉理解
D.
阅读理解
【简答题】阅读理解能力主要表现在哪些方面?
【简答题】理解书面语言的能力主要包括哪些方面?
【单选题】下列哪个不是数字水印的应用领域( )
A.
版权保护
B.
盗版跟踪
C.
保密通信
D.
复制保护
相关题目:
参考解析:
知识点:
题目纠错 0
发布
创建自己的小题库 - 刷刷题