[问答题]
Although the actual extent of computer crime is difficult to measure,mostexperts agree that it is one of the fastest growing areas of illegal activity.The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft.Losses perincident thus tend to be higher than in other types of theft.
__46.Once the computer criminal has compromised the system,it is just as easy tosteal a great sum as it is to steal a little,and to continue stealing long after the initial theft. _ Indeed, the computer criminal may find it moredifficul to stop his illicit activity than to start it.__47.Computer criminals are,for the most part,well-educated and highly intelligent,and have the analytical skills that make them valued employees.The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. __Being intelligent,theyhave fertile imaginations,and the variety of ways in which they use equipment to their advantage is constantly being extended.In addition to direct theft offunds,the theft of data
("program-napping")for corporate espionage orextortion is becoming widespread,and can obviously have a substantial effecton a company's finances.__48.Another lucrative scheme,often difficult to detect,involves accumulatingfractions of pence from individual payroll accounts,with electronic transferof the accumulated amount to the criminal's payroll. __Employers are hardly concerned with pence,much less fractions of pence.In addition,of course,the company's total payroll is unaffected.Guarding against computer abuse—whether deliberate or accidental—involvesattention to the following areas:(1)Protection of hardware from physicaldamage;(2)Protection of software and data. __49.The protection of hardware from accidental or intentional damage is afunction of the environment in which the equipment is kept.The computer mustbe isolated from other company facilities,and access should be strictly controlled.__ No unauthorized person should ever be admited to the computer area.Many insurance companies and security firms offer free evaluation of thephysical protection of computer installations.The protection of software is a more difficult problem. __50.Some risks are reduced by controlling physical access by unauthorized personnel,but mostdamage to software, accidental and intentional,is caused by those whose jobsrequire at least some access to the computer. __ The writer of the program is often the one responsible for its misuse.Programs devised exclusively for aparticular company are therefore far more vulnerable to abuse and accidentthan standard sofware packages produced by external suppliers.A unique program is both difficult and expensive to replace.Accidental erasure, sabotage,or physical removal of a single disk or tape could mean thata whole system has to be rebuilt,followed by a lengthy testing process. __51.Thecreators of a custom-made program are almost always company employees,who mayor may not have a vested interest in the program's function.Moreover,they canalter the program at will,and there is little management that one can do tomake sure that alterations in a unique program are always legitimate. __
Directions:In the following passage,there are six groups of underlined sentences.Read the passage carefully and translate these sentences into Chinese. Write the Chinese version on your Answer Sheet.