英语专八考试阅读练习及答案解析.docx
上传人:一只****ng 上传时间:2024-09-13 格式:DOCX 页数:13 大小:17KB 金币:10 举报 版权申诉
预览加载中,请您耐心等待几秒...

英语专八考试阅读练习及答案解析.docx

英语专八考试阅读练习及答案解析.docx

预览

免费试读已结束,剩余 3 页请下载文档后查看

10 金币

下载此文档

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

英语专八考试阅读练习及答案解析英语专八考试阅读练习及答案解析无论是身处学校还是步入社会,我们最少不了的就是试题了,试题可以帮助主办方了解考生某方面的知识或技能状况。一份好的试题都是什么样子的呢?下面是小编收集整理的英语专八考试阅读练习及答案解析,仅供参考,欢迎大家阅读。PassageSixteen(CrimeinComputer)Newandbizarrecrimeshavecomeintobeingwiththeadventofcomputertechnology.Organizedcrimetohasbeendirectlyinvolved;thenewtechnologyoffersitunlimitedopportunities,suchasdatacrimes,theftofservices,property-relatedcrimes,industrialsabotage,politicallyrelatedsabotage,vandalism,crimesagainsttheindividualandfinanciallyrelatedcrimes…Theftofdata,ordatacrime,hasattractedtheinterestoforganizedcriminalsyndicates.Thisisusuallythetheftorcopyingofvaluablecomputergrogram.Aninternationalmarketalreadyexistsforcomputerizeddata,andspecializedfencesaresaidtobeplayingakeyroleinthisrapidlyexpandingcriminalmarket.Buyersforstolenprogramsmayrangefromafirm’scompetitorstoforeignnations.Acompetitorsabotagesacompany’scomputersystemtodestroyorcripplethefirm’soperationalability,thusneutralizingitscompetitivecapabilityeitherintheprivateorthegovernmentsector.Thiscomputersabotagemayalsobetiedtoanattemptbyaffluentinvestorstoacquirethevictimfirm.Withthegrowingreliancebyfirmsoncomputersfortheirrecordkeepinganddailyoperations,sabotageoftheircomputerscanresultininternalhavoc,afterwhichthegroupinterestedinacquiringthefirmcaneasilybuyitatasubstantiallylowerprice.Criminalgroupscouldalsoresorttosabotageifthecompanyisacompetitorofabusinessownedorcontrolledbyorganizedcrime.Politicallymotivatedsabotageisontheincrease;politicalextremistgroupshavesproutedoneverycontinent.Sophisticatedcomputertechnologyarmsthesegroupswithawesomepowersandopenstechnologicallyadvancednationstotheirattack.Severalattemptshavealreadybeenmadetodestroycomputerfacilityatanairforcebase.Auniversitycomputerfacilityinvolvedinnationaldefenceworksufferedmorethan$2millionindamagesasaresultofabombing.Computervulnerabilityhasbeenamplydocumented.Onecongressionalstudyconcludedthatneithergovernmentnorprivatecomputersystemsareadequatelyprotectedagainstsabotage.Organizedcriminalsyndicateshaves