More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to (1) this information for his own purposes can reap big reward. Even (2) , a number of people who have done this and been caught at it have managed to get (3) without punishment. It’s easy for computer crimes to (4) undetected if no one checks up (5) what the computer is doing. (6) even if the crime is (7) , the criminal may walk away not only (8) but with a glowing recommenda- tion from his former employers. Of course, we have no statistics on crimes (9) go undetected. But it’s disturbing to note how many of the crimes we do know about were detected (10) accident, not by systematic inspections or other security procedures. The computer criminals who have been caught (11) have been the victims of uncommonly bad luck. Unlike other lawbreakers, (12) must leave the country, commit suicide, or go to jail, computer criminals sometimes (13) punishment, demanding not only that they not be charged but that they (14) given good recommendations and perhaps other benefits. All too often, their demands have been met. Why Because company executives are (15) of the bad publicity that would result if the public found out that their (16) had been misused. They hesitate (17) the thought of a (18) boasting in open court of (19) he juggled (诈骗) the most confidential (秘密的) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes (20) .
A. may
B. should
C. would
D. will
查看答案
More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to (1) this information for his own purposes can reap big reward. Even (2) , a number of people who have done this and been caught at it have managed to get (3) without punishment. It’s easy for computer crimes to (4) undetected if no one checks up (5) what the computer is doing. (6) even if the crime is (7) , the criminal may walk away not only (8) but with a glowing recommenda- tion from his former employers. Of course, we have no statistics on crimes (9) go undetected. But it’s disturbing to note how many of the crimes we do know about were detected (10) accident, not by systematic inspections or other security procedures. The computer criminals who have been caught (11) have been the victims of uncommonly bad luck. Unlike other lawbreakers, (12) must leave the country, commit suicide, or go to jail, computer criminals sometimes (13) punishment, demanding not only that they not be charged but that they (14) given good recommendations and perhaps other benefits. All too often, their demands have been met. Why Because company executives are (15) of the bad publicity that would result if the public found out that their (16) had been misused. They hesitate (17) the thought of a (18) boasting in open court of (19) he juggled (诈骗) the most confidential (秘密的) records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his crimes (20) .
A. that
B. this
C. what
D. those
Though by no means rich, ______(但他目前的境况比以往任何时候都要好).
Between now and 2010, personalized services will become commonplace, business and economy-class Web services will be introduced; and consumers will take control of their digital identities. Not only will the Net support a variety of new access devices, but it will also become the primary vehicle for voice, data and video transmission. Already, a group Of communication giants, including AT&T, has formed an alliance called Embedded Intemet, which aims to accelerate the market for globally networked, intelligent devices in homes, offices and factories worldwide. Putting everything and everyone on the Net will open up new commercial opportunities. For example, when you visit a new place, your mobile device, knowing your preferences will automatically suggest the restaurants that serve your favorite wines and foods, list the shows you might like to see, then provide you with maps for how to get there, says Joy, whose company is designing Jini, a networking system to automatically link computing devices. The new services electronically link up buyers and sellers who have had no prior contact and may want to do business with each other only once. These applications will take bandwidth(宽带) and lots of it. Some of the sector’s biggest companies are working on making the Internet 1,000 times faster and more reliable. Internet service providers will charge accordingly, just as travelers pay different fares for first or second class. The system is supposed to give consumers flexibility, allowing them to reserve bandwidth when they need it. According to Joy, what will give you a lot of helpful information when you visit a new place
Between now and 2010, personalized services will become commonplace, business and economy-class Web services will be introduced; and consumers will take control of their digital identities. Not only will the Net support a variety of new access devices, but it will also become the primary vehicle for voice, data and video transmission. Already, a group Of communication giants, including AT&T, has formed an alliance called Embedded Intemet, which aims to accelerate the market for globally networked, intelligent devices in homes, offices and factories worldwide. Putting everything and everyone on the Net will open up new commercial opportunities. For example, when you visit a new place, your mobile device, knowing your preferences will automatically suggest the restaurants that serve your favorite wines and foods, list the shows you might like to see, then provide you with maps for how to get there, says Joy, whose company is designing Jini, a networking system to automatically link computing devices. The new services electronically link up buyers and sellers who have had no prior contact and may want to do business with each other only once. These applications will take bandwidth(宽带) and lots of it. Some of the sector’s biggest companies are working on making the Internet 1,000 times faster and more reliable. Internet service providers will charge accordingly, just as travelers pay different fares for first or second class. The system is supposed to give consumers flexibility, allowing them to reserve bandwidth when they need it. Embedded Intemet is an alliance to______.