阅读理解详解15篇(Passage 10)

雕龙文库 分享 时间: 收藏本文

阅读理解详解15篇(Passage 10)

  More and more, the operations of our business, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.

  『Its easy for computer crimes to go undetected if no one checks up on what the computer is doing, but even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.』①

  Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.

  For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. 『In another case, dissatisfied employees of the thief tipped off the company that was being robbed.』②

  Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.

  Why? Because company executives are afraid of the bad publicity that would result if the public found out their computer had been misused. 『They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the companys executives, accountants, and security staff.』③ And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.

  1.It can be concluded from the passage that .

  A. it is still impossible to detect computer crimes today

  B. computer crimes are the one of most serious problem in the operation of financial institutions

  C. computer criminals can escape punishment because they cant be detected

  D. people commit computer crimes at the request of their company

  2.It is implied in the third paragraph that .

  A. many more computer crimes go undetected than are discovered

  B. the rapid increase of computer crimes is a troublesome problem

  C. most computer criminals are smart enough to cover up their crimes

  D. most computer criminals who are caught blame their bad luck

  3.Which of the following is mentioned in the passage?

  A. A strict law against computer crimes must be enforced.

  B. Companies need to impose restrictions on confidential information.

  C. Companies will guard against computer crimes to protect their reputation.

  D. Companies usually hesitate to uncover computer crimes.

  4. The underlying reason for the computer criminals to get recommendations he needs is that .

  A. they have skills formidably difficult for others to master

  B. the employers are afraid that they would take avenge if punished

  C. the employers are much afraid of bringing the public into disbelief towards them through the criminals words in open court

  D. those who commit crimes do not mean bad

  5.What may happen to computer criminals once they are caught?

  A. With bad reputation they can hardly find another job.

  B. They will be denied access to confidential records.

  C. They may walk away and easily find another job.

  D. They must leave the country or go to jail.

  More and more, the operations of our business, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.

  『Its easy for computer crimes to go undetected if no one checks up on what the computer is doing, but even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.』①

  Of course, we have no statistics on crimes that go undetected. But its disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.

  For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. 『In another case, dissatisfied employees of the thief tipped off the company that was being robbed.』②

  Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.

  Why? Because company executives are afraid of the bad publicity that would result if the public found out their computer had been misused. 『They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the companys executives, accountants, and security staff.』③ And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.

  1.It can be concluded from the passage that .

  A. it is still impossible to detect computer crimes today

  B. computer crimes are the one of most serious problem in the operation of financial institutions

  C. computer criminals can escape punishment because they cant be detected

  D. people commit computer crimes at the request of their company

  2.It is implied in the third paragraph that .

  A. many more computer crimes go undetected than are discovered

  B. the rapid increase of computer crimes is a troublesome problem

  C. most computer criminals are smart enough to cover up their crimes

  D. most computer criminals who are caught blame their bad luck

  3.Which of the following is mentioned in the passage?

  A. A strict law against computer crimes must be enforced.

  B. Companies need to impose restrictions on confidential information.

  C. Companies will guard against computer crimes to protect their reputation.

  D. Companies usually hesitate to uncover computer crimes.

  4. The underlying reason for the computer criminals to get recommendations he needs is that .

  A. they have skills formidably difficult for others to master

  B. the employers are afraid that they would take avenge if punished

  C. the employers are much afraid of bringing the public into disbelief towards them through the criminals words in open court

  D. those who commit crimes do not mean bad

  5.What may happen to computer criminals once they are caught?

  A. With bad reputation they can hardly find another job.

  B. They will be denied access to confidential records.

  C. They may walk away and easily find another job.

  D. They must leave the country or go to jail.

信息流广告 网络推广 周易 易经 代理招生 二手车 网络营销 招生代理 旅游攻略 非物质文化遗产 查字典 精雕图 戏曲下载 抖音代运营 易学网 互联网资讯 成语 成语故事 诗词 工商注册 注册公司 抖音带货 云南旅游网 网络游戏 代理记账 短视频运营 在线题库 国学网 知识产权 抖音运营 雕龙客 雕塑 奇石 散文 自学教程 常用文书 河北生活网 好书推荐 游戏攻略 心理测试 石家庄人才网 考研真题 汉语知识 心理咨询 手游安卓版下载 兴趣爱好 网络知识 十大品牌排行榜 商标交易 单机游戏下载 短视频代运营 宝宝起名 范文网 电商设计 免费发布信息 服装服饰 律师咨询 搜救犬 Chat GPT中文版 经典范文 优质范文 工作总结 二手车估价 实用范文 爱采购代运营 古诗词 衡水人才网 石家庄点痣 养花 名酒回收 石家庄代理记账 女士发型 搜搜作文 石家庄人才网 铜雕 词典 围棋 chatGPT 读后感 玄机派 企业服务 法律咨询 chatGPT国内版 chatGPT官网 励志名言 河北代理记账公司 文玩 朋友圈文案 语料库 游戏推荐 男士发型 高考作文 PS修图 儿童文学 买车咨询 工作计划 礼品厂 舟舟培训 IT教程 手机游戏推荐排行榜 暖通,电采暖, 女性健康 苗木供应 主题模板 短视频培训 优秀个人博客 包装网 创业赚钱 养生 民间借贷律师 绿色软件 安卓手机游戏 手机软件下载 手机游戏下载 单机游戏大全 免费软件下载 网赚 手游下载 游戏盒子 职业培训 资格考试 成语大全 英语培训 艺术培训 少儿培训 苗木网 雕塑网 好玩的手机游戏推荐 汉语词典 中国机械网 美文欣赏 红楼梦 道德经 网站转让 鲜花 社区团购 社区电商