閱讀理解詳解15篇(Passage 10)

        雕龍文庫 分享 時(shí)間: 收藏本文

        閱讀理解詳解15篇(Passage 10)

          More and more, the operations of our business, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.

          『Its easy for computer crimes to go undetected if no one checks up on what the computer is doing, but even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.』①

          Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.

          For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. 『In another case, dissatisfied employees of the thief tipped off the company that was being robbed.』②

          Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.

          Why? Because company executives are afraid of the bad publicity that would result if the public found out their computer had been misused. 『They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the companys executives, accountants, and security staff.』③ And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.

          1.It can be concluded from the passage that .

          A. it is still impossible to detect computer crimes today

          B. computer crimes are the one of most serious problem in the operation of financial institutions

          C. computer criminals can escape punishment because they cant be detected

          D. people commit computer crimes at the request of their company

          2.It is implied in the third paragraph that .

          A. many more computer crimes go undetected than are discovered

          B. the rapid increase of computer crimes is a troublesome problem

          C. most computer criminals are smart enough to cover up their crimes

          D. most computer criminals who are caught blame their bad luck

          3.Which of the following is mentioned in the passage?

          A. A strict law against computer crimes must be enforced.

          B. Companies need to impose restrictions on confidential information.

          C. Companies will guard against computer crimes to protect their reputation.

          D. Companies usually hesitate to uncover computer crimes.

          4. The underlying reason for the computer criminals to get recommendations he needs is that .

          A. they have skills formidably difficult for others to master

          B. the employers are afraid that they would take avenge if punished

          C. the employers are much afraid of bringing the public into disbelief towards them through the criminals words in open court

          D. those who commit crimes do not mean bad

          5.What may happen to computer criminals once they are caught?

          A. With bad reputation they can hardly find another job.

          B. They will be denied access to confidential records.

          C. They may walk away and easily find another job.

          D. They must leave the country or go to jail.

          More and more, the operations of our business, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.

          『Its easy for computer crimes to go undetected if no one checks up on what the computer is doing, but even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.』①

          Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.

          For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. 『In another case, dissatisfied employees of the thief tipped off the company that was being robbed.』②

          Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.

          Why? Because company executives are afraid of the bad publicity that would result if the public found out their computer had been misused. 『They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the companys executives, accountants, and security staff.』③ And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.

          1.It can be concluded from the passage that .

          A. it is still impossible to detect computer crimes today

          B. computer crimes are the one of most serious problem in the operation of financial institutions

          C. computer criminals can escape punishment because they cant be detected

          D. people commit computer crimes at the request of their company

          2.It is implied in the third paragraph that .

          A. many more computer crimes go undetected than are discovered

          B. the rapid increase of computer crimes is a troublesome problem

          C. most computer criminals are smart enough to cover up their crimes

          D. most computer criminals who are caught blame their bad luck

          3.Which of the following is mentioned in the passage?

          A. A strict law against computer crimes must be enforced.

          B. Companies need to impose restrictions on confidential information.

          C. Companies will guard against computer crimes to protect their reputation.

          D. Companies usually hesitate to uncover computer crimes.

          4. The underlying reason for the computer criminals to get recommendations he needs is that .

          A. they have skills formidably difficult for others to master

          B. the employers are afraid that they would take avenge if punished

          C. the employers are much afraid of bringing the public into disbelief towards them through the criminals words in open court

          D. those who commit crimes do not mean bad

          5.What may happen to computer criminals once they are caught?

          A. With bad reputation they can hardly find another job.

          B. They will be denied access to confidential records.

          C. They may walk away and easily find another job.

          D. They must leave the country or go to jail.

        周易 易經(jīng) 代理招生 二手車 網(wǎng)絡(luò)營銷 旅游攻略 非物質(zhì)文化遺產(chǎn) 查字典 精雕圖 戲曲下載 抖音代運(yùn)營 易學(xué)網(wǎng) 互聯(lián)網(wǎng)資訊 成語 詩詞 工商注冊 抖音帶貨 云南旅游網(wǎng) 網(wǎng)絡(luò)游戲 代理記賬 短視頻運(yùn)營 在線題庫 國學(xué)網(wǎng) 抖音運(yùn)營 雕龍客 雕塑 奇石 散文 常用文書 河北生活網(wǎng) 好書推薦 游戲攻略 心理測試 石家莊人才網(wǎng) 考研真題 漢語知識(shí) 心理咨詢 手游安卓版下載 興趣愛好 網(wǎng)絡(luò)知識(shí) 十大品牌排行榜 商標(biāo)交易 單機(jī)游戲下載 短視頻代運(yùn)營 寶寶起名 范文網(wǎng) 電商設(shè)計(jì) 免費(fèi)發(fā)布信息 服裝服飾 律師咨詢 搜救犬 Chat GPT中文版 經(jīng)典范文 優(yōu)質(zhì)范文 工作總結(jié) 二手車估價(jià) 實(shí)用范文 石家莊點(diǎn)痣 養(yǎng)花 名酒回收 石家莊代理記賬 女士發(fā)型 搜搜作文 鋼琴入門指法教程 詞典 讀后感 玄機(jī)派 企業(yè)服務(wù) 法律咨詢 chatGPT國內(nèi)版 chatGPT官網(wǎng) 勵(lì)志名言 文玩 語料庫 游戲推薦 男士發(fā)型 高考作文 PS修圖 兒童文學(xué) 工作計(jì)劃 舟舟培訓(xùn) IT教程 手機(jī)游戲推薦排行榜 暖通,電地暖, 女性健康 苗木供應(yīng) ps素材庫 短視頻培訓(xùn) 優(yōu)秀個(gè)人博客 包裝網(wǎng) 創(chuàng)業(yè)賺錢 養(yǎng)生 民間借貸律師 綠色軟件 安卓手機(jī)游戲 手機(jī)軟件下載 手機(jī)游戲下載 單機(jī)游戲大全 石家莊論壇 網(wǎng)賺 職業(yè)培訓(xùn) 資格考試 成語大全 英語培訓(xùn) 藝術(shù)培訓(xùn) 少兒培訓(xùn) 苗木網(wǎng) 雕塑網(wǎng) 好玩的手機(jī)游戲推薦 漢語詞典 中國機(jī)械網(wǎng) 美文欣賞 紅樓夢 道德經(jīng) 標(biāo)準(zhǔn)件 電地暖 鮮花 書包網(wǎng) 英語培訓(xùn)機(jī)構(gòu) 電商運(yùn)營
        亚洲国产精品综合久久20| 青青青国产色视频在线观看国产亚洲欧洲国产综合| 久久亚洲AV成人出白浆无码国产| 亚洲高清在线播放| 亚洲国产韩国一区二区| 国产精品亚洲一区二区无码 | 91亚洲性爱在线视频| 亚洲av永久中文无码精品| 亚洲综合在线另类色区奇米| 亚洲麻豆精品果冻传媒| 亚洲爆乳AAA无码专区| 亚洲高清专区日韩精品| 亚洲va久久久久| 亚洲熟妇无码八AV在线播放| 亚洲六月丁香六月婷婷色伊人 | 久久精品夜色噜噜亚洲A∨| 亚洲精品在线播放视频| www.亚洲一区| 在线观看亚洲人成网站| 精品久久久久亚洲| 亚洲国产一区在线| 日韩欧美亚洲国产精品字幕久久久| 国产亚洲美女精品久久久久狼 | 亚洲中文字幕无码爆乳| 亚洲日韩精品无码专区网址| 亚洲一卡2卡3卡4卡国产网站| 亚洲国产综合无码一区二区二三区| 久久综合亚洲鲁鲁五月天| 国产亚洲精品美女| 亚洲美女视频免费| 亚洲精品综合久久| 亚洲国产亚洲片在线观看播放| 亚洲精品A在线观看| 亚洲国产成人九九综合| 国产乱辈通伦影片在线播放亚洲 | 国产精品亚洲一区二区三区久久| 亚洲日本一区二区| 日韩亚洲国产二区| 亚洲美女免费视频| 亚洲真人日本在线| 亚洲三级在线观看|