[单选题]

Computer Crimes

More and more,theoperations of our businesses,governments,and financial institutions arecontrolled by information that exists only inside computer memories.Anyone

clever enough tomodify this information for his purpose can reap substantial rewards.Evenworse,________(46)

It's easy forcomputer crimes to go undetected if no one checks up on what the computer hdoing.________(47),the criminal may walk away not only unpunished but with a

growingrecommendation from his former employers.

Of course,we have nostatistics on crime that go undetected.But it's disturbing to note how many ofthe crimes we do know about were detected by accident,________(48)The

computer criminalswho have been caught may have been the victims of uncommonly bad luck.

Forexample,________(49)Investigation revealed that the extra cards she was beingasked to punch were for dishonest transactions.In another case,dissatisfiedemployees of

the thief tipped offthe company that was being robbed.

Unlike otherlawbreakers,who must leave the country,commit suicide,or go to jail,computercriminals sometimes escape punishment demanding not only that they not be

charged but thatthey be given good recommendations and perhaps other benefits.

All too often,theirdemands have been met. Why?________(50)that would result if the public foundout that their computer had been misused.They hesitate at the thought of a

criminal

boasting in opencourt of how he juggled the most confidential records right under the noses ofthe company's executives,accountants,and security staff. And so another

computer criminaldeparts with just the recommendations he needs to continue his crimeselsewhere._________(48)

A.a certain keypunchoperator complained of having to stay overtime to punch extra cards.

B.It goes withoutsaying that any one who breaks the law should be punished.

C.Because companyexecutives are afraid of the bad publicity

D.a number of peoplewho have done this and been caught at it have managed to get away withoutpunishment.

E.not by systematicinspections or other security procedures.

参考答案与解析:

相关试题

Computer Crimes<o:p></o:p></p><p class="MsoNormal ">More and more,

[单选题]Computer CrimesMore and more,theoperations of our businesses,governments,an

  • 查看答案
  • Computer Crimes<o:p></o:p></p><p class="MsoNormal ">More and more,

    [单选题]Computer CrimesMore and more,theoperations of our businesses,governments,an

  • 查看答案
  • Computer Crimes<o:p></o:p></p><p class="MsoNormal ">More and more,

    [单选题]Computer CrimesMore and more,theoperations of our businesses,governments,an

  • 查看答案
  • Computer Crimes<o:p></o:p></p><p class="MsoNormal ">More and more,

    [单选题]Computer CrimesMore and more,theoperations of our businesses,governments,an

  • 查看答案
  • Less Is More<o:p></o:p></p><p class="MsoNormal ">It sounds allwron

    [单选题]Less Is MoreIt sounds allwrong-drilling holes in a piece of wood to make it

  • 查看答案
  • Less Is More<o:p></o:p></p><p class="MsoNormal ">It sounds allwron

    [单选题]Less Is MoreIt sounds allwrong-drilling holes in a piece of wood to make it

  • 查看答案
  • Less Is More<o:p></o:p></p><p class="MsoNormal ">It sounds allwron

    [单选题]Less Is MoreIt sounds allwrong-drilling holes in a piece of wood to make it

  • 查看答案
  • Less Is More<o:p></o:p></p><p class="MsoNormal ">It sounds allwron

    [单选题]Less Is MoreIt sounds allwrong-drilling holes in a piece of wood to make it

  • 查看答案
  • Less Is More<o:p></o:p></p><p class="MsoNormal ">It sounds allwron

    [单选题]Less Is MoreIt sounds allwrong-drilling holes in a piece of wood to make it

  • 查看答案
  • Less Is More<o:p></o:p></p><p class="MsoNormal ">It sounds allwron

    [单选题]Less Is MoreIt sounds allwrong-drilling holes in a piece of wood to make it

  • 查看答案
  • Computer Crimes<o:p></o:p></p><p class="MsoNormal ">More and more,