首页
登录
职称英语
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
[img]2012q2/ct_eyyjsdz2010b_eyyjsdreadc_0174_20121[/img] In many businesses,
游客
2024-08-20
14
管理
问题
In many businesses, computers have largely replaced paperwork, because they are fast, flexible, and do not make mistakes. As one banker said, " Unlike humans, computers never have a bad day. " Also, they are honest. Many banks advertise that their transactions are " untouched by human hands" and therefore safe from human temptation. Obviously, computers have no reason to steal money, but they also have no conscience, and the growing number of computer crimes shows they can be used to steal.
Computer criminals don’t use guns, and even if they are caught, it is hard to punish them because there are no witnesses and often no evidence. A computer cannot remember who used it: it simply does what it is told. The head teller at a New York bank used a computer to steal more than one and a half billion dollars in just four years. No one noticed this theft because he moved the money from one account to another. Each time a customer he had robbed questioned the balance in his account, the teller claimed a computer error, then replaced the missing money from someone else’s account. This man was caught only because he was a gambler. When the police broke up an illegal gambling operation, his name was in the records.
Some employees use the computer’s power to get revenge on employers they consider unfair. Recently, a large insurance company fired its computer-tape librarian for reasons that involved her personal, rather than her professional, life. She was given thirty days notice. In those thirty days, she erased all the firm’s computerized records.
Most computer criminals are minor employees. Now police wonder if this is " the tip of the iceberg". As one official says, "I have the feeling that there is more crime out there than we are catching. What we are seeing now is all so poorly done. I wonder what the real experts are doing— the ones who know how computers really work. " [br] Sometimes an unfairly-treated employee will use the computer to______on his employer.
选项
答案
get revenge
解析
(倒数第二段第一句指出,一些雇员利用电脑来报复雇主。)
转载请注明原文地址:https://tihaiku.com/zcyy/3727575.html
相关试题推荐
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2016m3x/ct_eyyjsdz2014c_eyyjsdreadc_0249_20163[/img]Ifyouunderstand
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009b_eyyjsdreada_0292_20121[/img]Doyoueverwonder
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
[img]2012q2/ct_eyyjsdz2009a_eyyjsdreada_0219_20121[/img]Theopeningofyour
随机试题
《秋水》中北海若对“自多”的态度是()A.反对 B.赞成 C.无所谓
事物总的量变过程中的局部性部分质变是()A.事物的本质属性与非本质属性之间变化
双母线的电流差动保护,当故障发生在母联断路器与母联TA之间时出现动作死区
真毛细血管不具有下列哪一项特点()A.管壁很薄、通透性大 B.微动脉阻力对
气管切开术后并发症有()A.出血 B.气胸 C.纵隔气肿 D.拔管困难
首先考虑为肝癌腹水的是()A.漏出液 B.渗出液 C.血性 D.脓性
按照《证券金融监督管理条例》,证券金融公司的设立和解散由( )决定。A.国务院
教师的根本任务是()。 A.发展学生智力B.教书育人C.班级管理D
下列方法不可以用来检验回归方程显著性的是()。 A.相关系数法。对于给定的显
男,40岁,患十二指肠溃疡,择期经上腹正中切口行胃大部切除术,并置切口内乳胶片引
最新回复
(
0
)