首页
登录
职称英语
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
游客
2023-10-20
45
管理
问题
In many businesses, computers have largely replaced paperwork, because they are fast, flexible, and do not make mistakes. As one banker said, " Unlike humans, computers never have a bad day. " Also, they are honest. Many banks advertise that their transactions are " untouched by human hands" and therefore safe from human temptation. Obviously, computers have no reason to steal money, but they also have no conscience, and the growing number of computer crimes shows they can be used to steal.
Computer criminals don’t use guns, and even if they are caught, it is hard to punish them because there are no witnesses and often no evidence. A computer cannot remember who used it: it simply does what it is told. The head teller at a New York bank used a computer to steal more than one and a half billion dollars in just four years. No one noticed this theft because he moved the money from one account to another. Each time a customer he had robbed questioned the balance in his account, the teller claimed a computer error, then replaced the missing money from someone else’s account. This man was caught only because he was a gambler. When the police broke up an illegal gambling operation, his name was in the records.
Some employees use the computer’s power to get revenge on employers they consider unfair. Recently, a large insurance company fired its computer-tape librarian for reasons that involved her personal, rather than her professional, life. She was given thirty days notice. In those thirty days, she erased all the firm’s computerized records.
Most computer criminals are minor employees. Now police wonder if this is " the tip of the iceberg". As one official says, "I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing— the ones who know how computers really work. " [br] What did the computer-tape librarian have to do thirty days after she received notice from her company?
选项
答案
Leave her job./Quit.
解析
(从倒数第二段第二句可见,此人被公司解雇了,即她必须离任。)
转载请注明原文地址:https://www.tihaiku.com/zcyy/3113003.html
相关试题推荐
Sincetheearlynineties,thetrendinmostbusinesseshasbeentowardon-demand
[img]2012q2/ct_eyyjsdz2005a_eyyjsdreadc_0863_20121[/img]Enyawasbornin19
[img]2012q2/ct_eyyjsdz2005a_eyyjsdreadc_0863_20121[/img]Enyawasbornin19
[img]2012q2/ct_eyyjsdz2005a_eyyjsdreadc_0863_20121[/img]Enyawasbornin19
[img]2012q2/ct_eyyjsdz2005a_eyyjsdreadc_0863_20121[/img]Enyawasbornin19
[img]2012q2/ct_eyyjsdz2005a_eyyjsdreadc_0863_20121[/img]Enyawasbornin19
[img]2012q2/ct_eyyjsdz2005b_eyyjsdreadc_0941_20121[/img][br]Therugbyshirtis
[img]2012q2/ct_eyyjsdz2005b_eyyjsdreadc_0941_20121[/img][br]Theordernumberf
[img]2012q2/ct_eyyjsdz2005b_eyyjsdreadc_0941_20121[/img][br]Youwearthejeans
[img]2012q2/ct_eyyjsdz2005b_eyyjsdreadc_0941_20121[/img][br]Youcangettheme
随机试题
关于六西格玛组织的成员,下列论述错误的是( )。A.质量管理委员会由企业高级管
在使用网关来实现两个网络的高层互连时,两个网络的应用层及各层协议可以不同。()
错误推测法属于()。A.白盒测试 B.灰盒测试 C.黑盒测试 D.静
下列各项属于消费税征税范围的有()。A.以外购酒精为原料生产的白酒 B.果啤
女10岁,左腭部肿块半年,有溃破史。第一第二乳磨牙的腭侧可见一囊性肿块边界清,质
根据下图提供的信息回答 2007年1~8月,全国房地产开发投资增幅与1
由胰岛细胞分泌的激素是()A.生长素B.生长抑制素C.胰高血糖素D.促胰液肽E
如果你到一个新单位,单位的小金库发了400元,请问你该怎么办?
CBOE标准普尔500指数期权的乘数是()。A.100欧元 B.100美元
基础心理学是研究()。 (A)正常成人心理现象的心理学基础学科 (B
最新回复
(
0
)