首页
登录
职称英语
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
游客
2024-08-20
33
管理
问题
In many businesses, computers have largely replaced paperwork, because they are fast, flexible, and do not make mistakes. As one banker said, " Unlike humans, computers never have a bad day. " Also, they are honest. Many banks advertise that their transactions are " untouched by human hands" and therefore safe from human temptation. Obviously, computers have no reason to steal money, but they also have no conscience, and the growing number of computer crimes shows they can be used to steal.
Computer criminals don’t use guns, and even if they are caught, it is hard to punish them because there are no witnesses and often no evidence. A computer cannot remember who used it: it simply does what it is told. The head teller at a New York bank used a computer to steal more than one and a half billion dollars in just four years. No one noticed this theft because he moved the money from one account to another. Each time a customer he had robbed questioned the balance in his account, the teller claimed a computer error, then replaced the missing money from someone else’s account. This man was caught only because he was a gambler. When the police broke up an illegal gambling operation, his name was in the records.
Some employees use the computer’s power to get revenge on employers they consider unfair. Recently, a large insurance company fired its computer-tape librarian for reasons that involved her personal, rather than her professional, life. She was given thirty days notice. In those thirty days, she erased all the firm’s computerized records.
Most computer criminals are minor employees. Now police wonder if this is " the tip of the iceberg". As one official says, "I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing— the ones who know how computers really work. " [br] Computer criminals that police find difficult to catch are mostly______.
选项
答案
computer experts
解析
(根据最后一段后三句警方官员所说,实际的犯罪行为远多于警方所知,警方并不知道电脑专家在做什么。可见警方很难抓到的电脑罪犯主要是computer experts。)
转载请注明原文地址:https://www.tihaiku.com/zcyy/3727574.html
相关试题推荐
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
随机试题
(浙江大学2008年试题)Sincetheearly1930s,Swissbankshadpridedthemselvesonth
[originaltext]W:CanIhelpyou?M:Well.I’mlookingforsomethingIsawata
A—acceptancelettersJ—referencelettersB—adjustmentlettersK—saleslettersC—
建设工程合同包括( )。A.工程设计、监理、施工合同 B.工程勘察、设计、监
预防手术后感染的最重要的措施是( )A.提高机体抵抗力 B.术前、术中、术后
根据《中国证券登记结算有限责任公司证券账户管理规则》的规定,中国结算公司对证券账
无系列特异性的免疫标记是A.CD19B.CD33C.CD7D.CD41E.HLA
对社区社会组织的管理,主要体现在以下()个方面。A.加强党的领导 B.促进能
患者示指微屈,拇指不能对掌,掌中凹存在,诊断为 A.桡侧滑囊炎B.尺侧滑囊炎
知识点:肿瘤标志 前列腺癌患者血清中增高的物质是 A.酸性磷酸酶 B.碱性
最新回复
(
0
)