【简答题】
More and more, the operations of our businesses, governments, and (36)_________institutions are controlled by information that exists only inside computer memories. Anyone clever enough to (37) _________ this information for his own purposes can reap (收割) substantial rewards. Even worse, a number of people who have done this and been caught at it have (38)_________ to get away without punishment. It’’s easy for computer crimes to go (39)_________ if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing (40)_________from his former employers. Of course, we have no (41)_________on crimes that go undetected. But it’’s (42)_________to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other (43)_________procedures. The computer criminals who have been caught may be the victims of uncommonly bad luck. For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. (44) ____________________. Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, (45) ____________________. All too often, their demands have been met. Why (46) ____________________. They hesitate at the thought of a criminal boasting in open of how he juggled the most confidential records right under the noses of the company’’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.
手机使用
分享
复制链接
新浪微博
分享QQ
微信扫一扫
微信内点击右上角“…”即可分享
反馈
收藏
举报
参考答案:
参考解析: