求学快递网
  1. 找试卷
  2. 找答案
  3. 专业标签
原创试题专区 开通学校服务赚现金

[问答题]

  Although the actual extent of computer crime is difficult to measure,mostexperts agree that it is one of the fastest growing areas of illegal activity.The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft.Losses perincident thus tend to be higher than in other types of theft.

  __46.Once the computer criminal has compromised the system,it is just as easy tosteal a great sum as it is to steal a little,and to continue stealing long after the initial theft. _ Indeed, the computer criminal may find it moredifficul to stop his illicit activity than to start it.__47.Computer criminals are,for the most part,well-educated and highly intelligent,and have the analytical skills that make them valued employees.The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. __Being intelligent,theyhave fertile imaginations,and the variety of ways in which they use equipment to their advantage is constantly being extended.In addition to direct theft offunds,the theft of data

("program-napping")for corporate espionage orextortion is becoming widespread,and can obviously have a substantial effecton a company's finances.__48.Another lucrative scheme,often difficult to detect,involves accumulatingfractions of pence from individual payroll accounts,with electronic transferof the accumulated amount to the criminal's payroll. __Employers are hardly concerned with pence,much less fractions of pence.In addition,of course,the company's total payroll is unaffected.Guarding against computer abuse—whether deliberate or accidental—involvesattention to the following areas:(1)Protection of hardware from physicaldamage;(2)Protection of software and data. __49.The protection of hardware from accidental or intentional damage is afunction of the environment in which the equipment is kept.The computer mustbe isolated from other company facilities,and access should be strictly controlled.__ No unauthorized person should ever be admited to the computer area.Many insurance companies and security firms offer free evaluation of thephysical protection of computer installations.The protection of software is a more difficult problem. __50.Some risks are reduced by controlling physical access by unauthorized personnel,but mostdamage to software, accidental and intentional,is caused by those whose jobsrequire at least some access to the computer. __ The writer of the program is often the one responsible for its misuse.Programs devised exclusively for aparticular company are therefore far more vulnerable to abuse and accidentthan standard sofware packages produced by external suppliers.A unique program is both difficult and expensive to replace.Accidental erasure, sabotage,or physical removal of a single disk or tape could mean thata whole system has to be rebuilt,followed by a lengthy testing process. __51.Thecreators of a custom-made program are almost always company employees,who mayor may not have a vested interest in the program's function.Moreover,they canalter the program at will,and there is little management that one can do tomake sure that alterations in a unique  program are always legitimate. __

  Directions:In the following passage,there are six groups of underlined sentences.Read the passage carefully and translate these sentences into Chinese. Write the Chinese version on your Answer Sheet.

三项特权:

免验证、免广告、无限看题

四大优势:

考场题库丰富、科目种类广

答案准确率高、试题搜索快

立即开通会员
×
平台更新说明
更新版本:V.2 更新时间:2018年3月7日
更新内容:
1.修改若干Bug
2.完善页面逻辑,提高做题体验度
3.设立会员体系,为用户提供专属服务
4.增加外部出卷功能,学校用户开通学校服务后即可拥有自己的试卷库和学生测试中心,可自主出题组卷,为本校考生组织考试