首頁(yè) 考試吧論壇 Exam8視線 考試商城 網(wǎng)絡(luò)課程 模擬考試 考友錄 實(shí)用文檔 求職招聘 論文下載
2013中考 | 2013高考 | 2013考研 | 考研培訓(xùn) | 在職研 | 自學(xué)考試 | 成人高考 | 法律碩士 | MBA考試
MPA考試 | 中科院
四六級(jí) | 職稱英語(yǔ) | 商務(wù)英語(yǔ) | 公共英語(yǔ) | 托福 | 托業(yè) | 雅思 | 專四專八 | 口譯筆譯 | 博思
GRE GMAT | 新概念英語(yǔ) | 成人英語(yǔ)三級(jí) | 申碩英語(yǔ) | 攻碩英語(yǔ) | 職稱日語(yǔ) | 日語(yǔ)學(xué)習(xí) |
零起點(diǎn)法語(yǔ) | 零起點(diǎn)德語(yǔ) | 零起點(diǎn)韓語(yǔ)
計(jì)算機(jī)等級(jí)考試 | 軟件水平考試 | 職稱計(jì)算機(jī) | 微軟認(rèn)證 | 思科認(rèn)證 | Oracle認(rèn)證 | Linux認(rèn)證
華為認(rèn)證 | Java認(rèn)證
公務(wù)員 | 報(bào)關(guān)員 | 銀行從業(yè)資格 | 證券從業(yè)資格 | 期貨從業(yè)資格 | 司法考試 | 法律顧問 | 導(dǎo)游資格
報(bào)檢員 | 教師資格 | 社會(huì)工作者 | 外銷員 | 國(guó)際商務(wù)師 | 跟單員 | 單證員 | 物流師 | 價(jià)格鑒證師
人力資源 | 管理咨詢師 | 秘書資格 | 心理咨詢師 | 出版專業(yè)資格 | 廣告師職業(yè)水平 | 駕駛員
網(wǎng)絡(luò)編輯 | 公共營(yíng)養(yǎng)師 | 國(guó)際貨運(yùn)代理人 | 保險(xiǎn)從業(yè)資格 | 電子商務(wù)師 | 普通話 | 企業(yè)培訓(xùn)師
營(yíng)銷師
衛(wèi)生資格 | 執(zhí)業(yè)醫(yī)師 | 執(zhí)業(yè)藥師 | 執(zhí)業(yè)護(hù)士
會(huì)計(jì)從業(yè)資格考試會(huì)計(jì)證) | 經(jīng)濟(jì)師 | 會(huì)計(jì)職稱 | 注冊(cè)會(huì)計(jì)師 | 審計(jì)師 | 注冊(cè)稅務(wù)師
注冊(cè)資產(chǎn)評(píng)估師 | 高級(jí)會(huì)計(jì)師 | ACCA | 統(tǒng)計(jì)師 | 精算師 | 理財(cái)規(guī)劃師 | 國(guó)際內(nèi)審師
一級(jí)建造師 | 二級(jí)建造師 | 造價(jià)工程師 | 造價(jià)員 | 咨詢工程師 | 監(jiān)理工程師 | 安全工程師
質(zhì)量工程師 | 物業(yè)管理師 | 招標(biāo)師 | 結(jié)構(gòu)工程師 | 建筑師 | 房地產(chǎn)估價(jià)師 | 土地估價(jià)師 | 巖土師
設(shè)備監(jiān)理師 | 房地產(chǎn)經(jīng)紀(jì)人 | 投資項(xiàng)目管理師 | 土地登記代理人 | 環(huán)境影響評(píng)價(jià)師 | 環(huán)保工程師
城市規(guī)劃師 | 公路監(jiān)理師 | 公路造價(jià)師 | 安全評(píng)價(jià)師 | 電氣工程師 | 注冊(cè)測(cè)繪師 | 注冊(cè)計(jì)量師
化工工程師 | 材料員
繽紛校園 | 實(shí)用文檔 | 英語(yǔ)學(xué)習(xí) | 作文大全 | 求職招聘 | 論文下載 | 訪談 | 游戲
英語(yǔ)四六級(jí)考試

新東方:大學(xué)英語(yǔ)四級(jí)考試閱讀講義(四)

  Unit 10

  Part Ⅱ Reading Comprehension

  (35 minutes)

  Directions: There are 4 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A), B), C) and D). You should decide on the best choice and mark the corresponding letter on the Answer Sheet with a single line through the centre.

  Passage One

  Questions 21 to 25 are based on the following passage:

  More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.

  It's easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers. Of course, we have no statistics on crimes that go undetected. But it's disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may be the victims of uncommonly bad luck.

  For example, a certain keypunch (鍵盤打孔) operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off (向……透露) the company that was being robbed.

  Unlike other lawbreakers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes escape punishment, demanding not only that they not be charged but that they be given good recommendations and perhaps other benefits. All too often, their demands have been met.

  Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled (耍弄) the most confidential records right under the noses of the company's executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes elsewhere.

  21. It can be concluded from the passage that .

  A) it is still impossible to detect computer crimes today

  B) computer crimes are the most serious problem in the operation of financial institutions

  C) computer criminals can escape punishment because they can't be detected

  D) people commit computer crimes at the request of their company

  22. It is implied in the third paragraph that .

  A) many more computer crimes go undetected than are discovered

  B) the rapid increase of computer crimes is a troublesome problem

  C) most computer criminals are smart enough to cover up their crimes

  D) most computer criminals who are caught blame their bad luck

  23. Which of the following is mentioned in the passage?

  A) A strict law against computer crimes must be enforced.

  B) Companies need to impose restrictions on confidential information.

  C) Companies will guard against computer crimes to protect their reputation.

  D) Companies usually hesitate to uncover computer crimes.

  24. What may happen to computer criminals once they are caught?

  A) With a bad reputation they can hardly find another job.

  B) They will be denied access to confidential records.

  C) They may walk away and easily find another job.

  D) They must leave the country or go to jail.

1 2 3 4 5 6 7 8 9 10  ... 下一頁(yè)  >> 
文章搜索
中國(guó)最優(yōu)秀四六級(jí)名師都在這里!
趙建昆老師
在線名師:趙建昆老師
   2003年初進(jìn)入新東方學(xué)校,開始接近7年講臺(tái)生涯。目前教授課程有:...[詳細(xì)]
版權(quán)聲明:如果英語(yǔ)四六級(jí)考試網(wǎng)所轉(zhuǎn)載內(nèi)容不慎侵犯了您的權(quán)益,請(qǐng)與我們聯(lián)系800@exam8.com,我們將會(huì)及時(shí)處理。如轉(zhuǎn)載本英語(yǔ)四六級(jí)考試網(wǎng)內(nèi)容,請(qǐng)注明出處。