首页
登录
职称英语
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
游客
2024-08-20
44
管理
问题
In many businesses, computers have largely replaced paperwork, because they are fast, flexible, and do not make mistakes. As one banker said, " Unlike humans, computers never have a bad day. " Also, they are honest. Many banks advertise that their transactions are " untouched by human hands" and therefore safe from human temptation. Obviously, computers have no reason to steal money, but they also have no conscience, and the growing number of computer crimes shows they can be used to steal.
Computer criminals don’t use guns, and even if they are caught, it is hard to punish them because there are no witnesses and often no evidence. A computer cannot remember who used it: it simply does what it is told. The head teller at a New York bank used a computer to steal more than one and a half billion dollars in just four years. No one noticed this theft because he moved the money from one account to another. Each time a customer he had robbed questioned the balance in his account, the teller claimed a computer error, then replaced the missing money from someone else’s account. This man was caught only because he was a gambler. When the police broke up an illegal gambling operation, his name was in the records.
Some employees use the computer’s power to get revenge on employers they consider unfair. Recently, a large insurance company fired its computer-tape librarian for reasons that involved her personal, rather than her professional, life. She was given thirty days notice. In those thirty days, she erased all the firm’s computerized records.
Most computer criminals are minor employees. Now police wonder if this is " the tip of the iceberg". As one official says, "I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing— the ones who know how computers really work. " [br] Computer criminals that police find difficult to catch are mostly______.
选项
答案
computer experts
解析
(根据最后一段后三句警方官员所说,实际的犯罪行为远多于警方所知,警方并不知道电脑专家在做什么。可见警方很难抓到的电脑罪犯主要是computer experts。)
转载请注明原文地址:http://tihaiku.com/zcyy/3727574.html
相关试题推荐
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
随机试题
Readthearticlebelowaboutacompanythatsellshouseholdproducts.Ch
年末结账后应无余额的账户是:A:利润分配 B:应收账款 C:生产成本 D:
系统抽样包括()。A.定位系统抽样 B.等距抽样 C.散料抽样 D.分层
根据真实票据理论,以商业行为为基础的短期贷款的特点包括( )。[2009年6月
患者,男性,68岁,1个月前不慎从高处坠落后导致高位截瘫,目前患者长期卧床。护士
QDII可以投资于下面()金融产品或工具。 ①银行存款 ②政府债券 ③远
以借债的方法为标准,可以将公债分为()。A.国内债务 B.强制公债 C.国
“乐天知命”是我们常听到的一句话,长久以来更是道家、儒家、佛教或禅宗所推崇的人生
品编码的编排有一定的规律和含义的,其中()为我国子目。A.第1位和第2位 B
建设工程勘察合同管理中,勘察人更换项目负责人应事先得到发包人同意,并应在更换(
最新回复
(
0
)