Questions 26 to 30 are based on the following passage:
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that
exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap big
reward. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.Its easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape
punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other
benefits. All too often, their demands have been met.
Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential (保密)records right under the noses of the companys executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
听力
26. It can be concluded from the passage that _______________.
A) it is still impossible to detect computer crimes today
B)people commit computer crimes at the request of their company
C) computer criminals escape punishment because they cant be detected
D) computer crimes are the most serious problem in the operation of financial institutions
27. It is implied in the third paragraph that _________________.
A) most computer criminals who are caught blame their bad luck
B)the rapid increase of computer crimes is a troublesome problem
C) most computer criminals are smart enough to cover up their crimes
D) many more computer crimes go undetected that are discovered
28. Which of the following statements is mentioned in the passage?
A) A strict law against computer crimes must be enforced
B) Companies usually hesitate to uncover computer crimes to protect their reputation
C) Companies will guard against computer crimes to protect their reputation
D) Companies need to impose restrictions on confidential information
29. What may happen to computer criminals once they are caught?
A) With a bad reputation they can hardly find another job.
B)They may walk away and easily find another job.
C) They will be denied access to confidential records
D) They must leave the country to go to jail.
30. The passage is mainly about _________________.
A) why computer criminals are often able to escape punishment
B)why computer crimes are difficult to detect by systematic inspections
C) how computer criminals mange to get good recommendations from their former employers
D) why computer crimes cant be eliminated
盘点2011-《时代》十大消费电子设备
“情人节”礼物——播种爱情
元旦文化:世界各国搞笑元旦新年的习俗盘点
上帝之国 Kingdom of God
最新研究:红衣男人对女人更具吸引力?
情人节约会指南:美眉们必须回避的四类型男
节日英语:元宵节的由来
清明节扫墓英语作文
吃3个菜要4000元 春节游客三亚被宰
水浒故事:倒拔垂杨柳
盘点2011年最受关注的英语词汇和名字(双语)
研究:发短信时爱撒谎 视频聊天更可信(双语)
资讯英语:姚明成上海最年轻最高政协常委
小驴儿
漫画图说:我的新年计划(双语)
瓦尔都窗前的一瞥
披着狮皮的驴The ass in the lions skin
盘点2011年国内外焦点事件(下)(中英文)
细数接吻的六大功效:今天你亲吻了吗?
为什么我们总记不住别人的名字?(双语)
口渴的乌鸦
伊索寓言7
意大利:近百岁夫妇因40年前婚外情闹离婚(双语)
盘点2011-年度奇闻异事
三只小猪和大灰狼
梁实秋译 莎士比亚全集1 暴风雨
蒙牛纯牛奶强致癌物:黄曲霉素病毒(中英文)
双语美文:西方情人节的传统
节日荷尔蒙 让我们的圣诞欢乐又疲惫(双语)
Facebook上市:扎克伯格的公开信(双语)
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |