首页
登录
职称英语
[originaltext] In many businesses, computers have largely replaced paperwork
[originaltext] In many businesses, computers have largely replaced paperwork
游客
2023-06-28
62
管理
问题
In many businesses, computers have largely replaced paperwork, because they are fast, flexible, and do not make mistakes. Many banks advertise that their transactions are "untouched by human hands" and therefore safe from human temptation. Obviously, computers have no reason to steal money. But the growing number of computer crimes shows they can be used to steal.
Computer criminals don’t use guns. And even if they are caught, it is hard to punish them because there are no witnesses and often no evidence. A computer cannot remember who used it: it simply does what it is told. A clerk at a New York bank used a computer to steal more than $1,500,000,000 in just four years. No one noticed this theft because he moved the money from one account to another. Each time a customer he had robbed questioned the balance in his account, the clerk claimed a computer error, then replaced the missing money from someone else’s account. This clerk was caught only because he was a gambler. When the police broke up an illegal gambling operation, his name was in the records.
Most computer criminals have been minor employees. Now police wonder if this is "the tip of the iceberg." As one official says, "I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing—the ones who know how a computer works."
22 Why do many banks claim that their transactions are safe?
23 Why is it difficult to punish computer criminals?
24 How did the New York bank clerk cover up his crime?
25 What are the police officials concerned about?
选项
A、Laws about computer crimes are imperfect.
B、There are many potential criminals hiding in the bank.
C、Computer crimes committed by minor employees exist widely.
D、Computer crimes committed by real computer experts exist widely.
答案
D
解析
短文结尾处提到警方担忧的是那些了解电脑工作原理的电脑专家,D与此相符,故为正确答案。
转载请注明原文地址:https://www.tihaiku.com/zcyy/2789314.html
相关试题推荐
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputers
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputers
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputers
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputers
Childrenmodelthemselveslargelyontheirparents.Theydoso【C1】______thro
Childrenmodelthemselveslargelyontheirparents.Theydoso【C1】______thro
Childrenmodelthemselveslargelyontheirparents.Theydoso【C1】______thro
Childrenmodelthemselveslargelyontheirparents.Theydoso【C1】______thro
Childrenmodelthemselveslargelyontheirparents.Theydoso【C1】______thro
Childrenmodelthemselveslargelyontheirparents.Theydoso【C1】______thro
随机试题
TheU.S.economyhasbeendraggingalonglately,buthere’sasmallshotin
Aftermakingaspeechabouttheschool,Mr.Whitewenton(show)________thevi
一般可以采用全数检验的情况有( )。A.批量大 B.破坏性检验 C.检查费
最新研究表明,玉米茎叶夹角由多对独立遗传的等位基因控制。假如玉米茎叶夹角由A(a
列宁对辩证唯物主义物质范畴的定义是通过()界定的A.个别和一般的关系
患者贫血临床表现,肝、脾肿大,血红蛋白74g/L,网织红细胞15%,白细胞、血小
()是一种通过一系列工具或手段将人的某些心理特征加以量化,从而衡量个体心理因素
从合同价格类型与支付方式来看,2017版红皮书属于()。A.单价合同 B
(2019年真题)工程施工质量验收的最小单位是( )。A.分项工程 B.检验批
基坑工程中,应由( )委托第三方监测。A.施工方 B.建设方 C.设计方
最新回复
(
0
)