Questions 26 to 30 are based on the following passage:
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that
exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big
reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.Its easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape
punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other
benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential (保密)records right under the noses of the companys executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
听力
26. It can be concluded from the passage that _______________.
A) it is still impossible to detect computer crimes today
B)people commit computer crimes at the request of their company
C) computer criminals escape punishment because they cant be detected
D) computer crimes are the most serious problem in the operation of financial institutions
27. It is implied in the third paragraph that _________________.
A) most computer criminals who are caught blame their bad luck
B)the rapid increase of computer crimes is a troublesome problem
C) most computer criminals are smart enough to cover up their crimes
D) many more computer crimes go undetected that are discovered
28. Which of the following statements is mentioned in the passage?
A) A strict law against computer crimes must be enforced
B) Companies usually hesitate to uncover computer crimes to protect their reputation
C) Companies will guard against computer crimes to protect their reputation
D) Companies need to impose restrictions on confidential information
29. What may happen to computer criminals once they are caught?
A) With a bad reputation they can hardly find another job.
B)They may walk away and easily find another job.
C) They will be denied access to confidential records
D) They must leave the country to go to jail.
30. The passage is mainly about _________________.
A) why computer criminals are often able to escape punishment
B)why computer crimes are difficult to detect by systematic inspections
C) how computer criminals mange to get good recommendations from their former employers
D) why computer crimes cant be eliminated
雅思写作佳句赏析
雅思写作:提高语言可从三方面入手
让人头疼的六大雅思写作问题剖析
短期突破雅思写作的可行性建议
雅思写作套句和模板可以有 使用方法需注意
浅谈雅思大作文写作中的造“势”
浅谈中国考生在雅思写作考试中的薄弱点
雅思G类写作范文:收音机方兴未艾
雅思写作的四个要点:用好连接词
雅思写作实用词组搭配和句型汇总
雅思写作需要做到的“四化”
浅谈连贯性在雅思写作中的重要性
雅思写作常用词汇:趋平/平稳
雅思写作中的几种多样化句式
雅思写作:开拓思维的十大原则
雅思写作高分语汇:挥霍遗产
雅思写作常用词汇:增加/增大
雅思写作范文:New Media
雅思写作常用词汇:下降至
雅思写作常用词汇:峰值/最低值/超过
浅谈雅思写作中连词的使用
雅思写作高梯度语汇
雅思写作必备语汇:公开无视
雅思写作中的高分语法结构介绍
雅思写作中的四类盲点及应对建议
雅思写作中的个性化表达方法指导
雅思写作必备语汇:公开反对
雅思写作指南:写作开头的多样化句型
雅思写作范文:学得深还是学得广
雅思写作必备语汇:令人气愤
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |