2011年最新六級閱讀理解練習(44)

雕龍文庫 分享 時間: 收藏本文

2011年最新六級閱讀理解練習(44)

  44

  New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes

  Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firms competitors to foreign nations.

  A competitor sabotages a companys computer system to destroy or cripple the firms operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.

  Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing.

  Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century.

  The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.

  1. How many kinds of crimes are mentioned in the passage?

  [A]. 7. [B]. 8. [C]. 9. [D]. 10

  2. What is the purpose of a competitor to sabotage a companys computer?

  [A]. His purpose is to destroy or weaken the firms operational ability.

  [B]. His purpose is to weaken firms competitive capability and get it.

  [C]. His purpose is to buy the rivals company at a relatively low price.

  [D]. His purpose is to steal important data.

  3. Which of the following can be labeled as a politically motivated sabotage of a computer system?

  [A]. Sabotage of a university computer.  [B]. Sabotage of a hospital computer.

  [C]. Sabotage of computer at a secret training base.  [D]. Sabotage of a factory computer.

  4. What does the author mean by Homicide could take a new form?

  [A]. There is no need to use a gun in killing a person.  [B]. Criminals can kill whoever they want by a computer.

  [C]. The computer can replace any weapons.  [D]. The function of a computer is just like a gun.

  參考答案:BBCB

  

  44

  New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes

  Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firms competitors to foreign nations.

  A competitor sabotages a companys computer system to destroy or cripple the firms operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.

  Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing.

  Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century.

  The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.

  1. How many kinds of crimes are mentioned in the passage?

  [A]. 7. [B]. 8. [C]. 9. [D]. 10

  2. What is the purpose of a competitor to sabotage a companys computer?

  [A]. His purpose is to destroy or weaken the firms operational ability.

  [B]. His purpose is to weaken firms competitive capability and get it.

  [C]. His purpose is to buy the rivals company at a relatively low price.

  [D]. His purpose is to steal important data.

  3. Which of the following can be labeled as a politically motivated sabotage of a computer system?

  [A]. Sabotage of a university computer.  [B]. Sabotage of a hospital computer.

  [C]. Sabotage of computer at a secret training base.  [D]. Sabotage of a factory computer.

  4. What does the author mean by Homicide could take a new form?

  [A]. There is no need to use a gun in killing a person.  [B]. Criminals can kill whoever they want by a computer.

  [C]. The computer can replace any weapons.  [D]. The function of a computer is just like a gun.

  參考答案:BBCB

  

信息流廣告 周易 易經 代理招生 二手車 網絡營銷 旅游攻略 非物質文化遺產 查字典 社區團購 精雕圖 戲曲下載 抖音代運營 易學網 互聯網資訊 成語 成語故事 詩詞 工商注冊 注冊公司 抖音帶貨 云南旅游網 網絡游戲 代理記賬 短視頻運營 在線題庫 國學網 知識產權 抖音運營 雕龍客 雕塑 奇石 散文 自學教程 常用文書 河北生活網 好書推薦 游戲攻略 心理測試 石家莊人才網 考研真題 漢語知識 心理咨詢 手游安卓版下載 興趣愛好 網絡知識 十大品牌排行榜 商標交易 單機游戲下載 短視頻代運營 寶寶起名 范文網 電商設計 免費發布信息 服裝服飾 律師咨詢 搜救犬 Chat GPT中文版 經典范文 優質范文 工作總結 二手車估價 實用范文 古詩詞 衡水人才網 石家莊點痣 養花 名酒回收 石家莊代理記賬 女士發型 搜搜作文 石家莊人才網 鋼琴入門指法教程 詞典 圍棋 chatGPT 讀后感 玄機派 企業服務 法律咨詢 chatGPT國內版 chatGPT官網 勵志名言 河北代理記賬公司 文玩 語料庫 游戲推薦 男士發型 高考作文 PS修圖 兒童文學 買車咨詢 工作計劃 禮品廠 舟舟培訓 IT教程 手機游戲推薦排行榜 暖通,電地暖, 女性健康 苗木供應 ps素材庫 短視頻培訓 優秀個人博客 包裝網 創業賺錢 養生 民間借貸律師 綠色軟件 安卓手機游戲 手機軟件下載 手機游戲下載 單機游戲大全 免費軟件下載 石家莊論壇 網賺 手游下載 游戲盒子 職業培訓 資格考試 成語大全 英語培訓 藝術培訓 少兒培訓 苗木網 雕塑網 好玩的手機游戲推薦 漢語詞典 中國機械網 美文欣賞 紅樓夢 道德經 標準件 電地暖 網站轉讓 鮮花 書包網 英語培訓機構 電商運營
主站蜘蛛池模板: 香蕉视频污在线观看| 无码办公室丝袜OL中文字幕| 里番acg全彩本子在线观看| 中文字幕一区二区三区视频在线| 免费观看的毛片手机视频| 国产麻豆综合视频在线观看| 日韩精品一区二区三区老鸦窝| 羞羞社区在线观看视频| 91福利小视频| 中文字幕不卡在线高清| 国产精品jizz在线观看直播| 无忧传媒在线观看| 欧美日韩中文国产一区二区三区| 高清国产美女一级毛片| 99在线精品视频在线观看| 久久人人爽人人爽人人片dvd| 免费A级毛视频| 国产伦精品一区二区三区免费迷| 天天干天天综合| 日本三浦理惠子中文字幕| 欧美野外疯狂做受xxxx高潮| 舌头伸进去里面吃小豆豆| 两个人看的视频播放www| www.日韩在线| 久久久久久久久影院| 亚洲一区二区三区欧美| 人禽无码视频在线观看| 国产97人人超碰caoprom| 国产精品久久久久9999高清| 天堂AV无码AV一区二区三区| 新梅金瓶1之爱奴1免费观| 暖暖免费高清日本一区二区三区| 欧美精品九九99久久在免费线| 精品欧美一区二区三区久久久 | 国产乱理伦片在线观看| 国产精品无码久久av不卡| 天天躁日日躁狠狠躁| 成人18免费网站在线观看| 日本三级香港三级久久99| 日韩精品无码久久一区二区三| 69无人区卡一卡二卡|