首页
登录
职称英语
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
游客
2024-08-20
31
管理
问题
In many businesses, computers have largely replaced paperwork, because they are fast, flexible, and do not make mistakes. As one banker said, " Unlike humans, computers never have a bad day. " Also, they are honest. Many banks advertise that their transactions are " untouched by human hands" and therefore safe from human temptation. Obviously, computers have no reason to steal money, but they also have no conscience, and the growing number of computer crimes shows they can be used to steal.
Computer criminals don’t use guns, and even if they are caught, it is hard to punish them because there are no witnesses and often no evidence. A computer cannot remember who used it: it simply does what it is told. The head teller at a New York bank used a computer to steal more than one and a half billion dollars in just four years. No one noticed this theft because he moved the money from one account to another. Each time a customer he had robbed questioned the balance in his account, the teller claimed a computer error, then replaced the missing money from someone else’s account. This man was caught only because he was a gambler. When the police broke up an illegal gambling operation, his name was in the records.
Some employees use the computer’s power to get revenge on employers they consider unfair. Recently, a large insurance company fired its computer-tape librarian for reasons that involved her personal, rather than her professional, life. She was given thirty days notice. In those thirty days, she erased all the firm’s computerized records.
Most computer criminals are minor employees. Now police wonder if this is " the tip of the iceberg". As one official says, "I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing— the ones who know how computers really work. " [br] What was the bank teller’s excuse each time a customer complained about an incorrect balance in his or her account?
选项
答案
He or she claimed a computer error.
解析
(根据第二段倒数第三句,借口是电脑故障。)
转载请注明原文地址:https://tihaiku.com/zcyy/3727572.html
相关试题推荐
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
随机试题
ThisWednesday,GordonBrownwillreplaceTonyBlairasthenewheadofBrit
[originaltext]M:Hi,Sue,howarethings?W:Fine.M:OK,now,aboutthechange
在TCP/IP体系结构中,将IP地址转化为MAC地址的协议是();()属
男,42岁,胸片及CT检查发现纵隔肿瘤入院治疗。下列哪一种肿瘤一般不采用手术治疗
A.无先兆偏头痛 B.偏头痛 C.紧张型头痛 D.低颅压性头痛 E.颅内
以下哪项不是以减小扩散速度为主要原理制备缓控释制剂A.微囊 B.药树脂 C.
《城乡规划法》对城乡规划的主要规划内容作了明确的规定,其城乡规划的内容包括(
鸡冠花除收敛止血外,还有的功效是A.消肿生肌 B.止带止痢 C.散瘀消肿
A.开宣肺气 B.泻肺平喘 C.降气平喘 D.敛肺平喘 E.润肺下气款冬
以下有关现金流量表的描述中,说法不正确的是:A.财务现金流量表主要用于财务评价
最新回复
(
0
)