必胜高考网_全国高考备考和志愿填报信息平台

必勝高考網 > 外語類 > 英語四級 > 閱讀理解 >

英語四級閱讀選詞填空模擬練習及參考答案

時間: 焯杰2 閱讀理解

  N (for NO)if the statement contradicts the information given in the passage;

  NG (for NOT GIVEN)if the information is not given in the passage.

  For questions 8-10,complete the sentences with information given in the passage.

  Computer Crime

  A computer crime is generally defined as one that involves the use of computers and software for illegal purposes. This doesn’t mean that all the crimes are new types of crime. On the contrary, many of these crimes, such as embezzlement of funds, the alteration of records, theft, vandalism, sabotage, and terrorism, can be committed without a computer. But with a computer, these offenses can be carried out more quickly and with less chance that the person responsible for the crime will be discovered.

  Computer crimes are on the rise and have been for the last twelve years. Just how much these computer crimes cost the American public is in dispute, but estimates range from ?$3 billion to ?$5 billion annually. Even the FBI, which attempts to keep track of the growth or decline of all kinds of crimes, is unable to say precisely how large a loss is involved; however, it estimates that the average take from a company hit by computer crime is ?$600,000. A number of reasons are given for the increase in computer crime: (A) more computers in use and, thus, more people who are familiar with basic computer operation; (B) more computers tied together in satellite and other data—transmission networks; and (C) the easy access of microcomputers to huge mainframe data bases.

  The Criminal

  Movies and newspaper stories might lead us to believe that most computer crimes are committed by teenage “hackers”—brilliant and basically good children who let their imagination and technical genius get them into trouble. But a realistic look at the crimes reveals that the offender is likely to be an employee of the firm against which the crime has been committed, i.e., an “insider”.

  Difficulty of Detection and Prevention

  Given the kind of person who commits a computer crime and the environment in which the crime occurs, it is often difficult to detect who the criminal is. First of all, the crime may be so complex that months or years go by before anyone discovers it.

  Second, once the crime has been revealed, it is not easy to find a clear trail of evidence that leads back to the guilty party. After all, looking for “weapons” or fingerprints does not occur as it might in the investigation of more conventional crimes.

  Third, there are usually no witnesses to the computer crime, even though it may be taking place in a room filled with people. Who is to say if the person at the next terminal, calmly keying in data, is doing the company’s work or committing a criminal act?

  Fourth, not enough people in management and law enforcement know enough about computer technology to prevent the crimes. Authorities have to be familiar with the computer’s capabilities within a given situation to guard against its misuses. In some large cities, such as Los Angeles, police departments have set up specially trained computer crime units.

  But even when an offender is caught, the investigators, attorneys (律師), judges, or juries may find the alleged crime too complicated and perplexing to handle. More attorneys are specializing in computer law and studying the computer’s potential for misuse.

  After a computer crime has been discovered, many companies do not report it or prosecute (起訴) the person responsible. A company may not announce the crime out of fear that the pubic will find out the weaknesses of its computer system and lose confidence in its organization. Banks, credit card companies, and investment firms are especially sensitive about revealing their vulnerabilities (脆弱性) because they rely heavily on customer trust.

  To avoid public attention, cautious companies will often settle cases of computer tampering out of court. And if cases do go to trial and the offenders are convicted, they may be punished only by a fine or light sentence because the judge or jury isn’t fully trained to understand the nature and seriousness of the crime.

  Not all companies are timid in apprehending computer criminals. For example, Connecticut General Life Insurance Company decided it had to get tough on violators. So when the company discovered that one of its computer technicians had embezzled ?$200,000 by entering false benefit claims, it presented it findings to the state’s attorney and aided in the prosecution of the technician. The technician was found guilty and sentenced to prison, not just for the computer misuse, but also for grand theft and insurance fraud. Connecticut General now has a policy of reporting all incidents of theft or fraud, no matter how small.

  1. The FBI knows exactly how large a loss is involved in computer crimes.

  2. It has become easy for microcomputer owners to use huge mainframe data bases.

  3. It is implied in the Paragraph 3 that most computer criminals are the employees of the concerned companies.

  4. Many companies don?t report computer crimes because law procedures against computer crimes usually cost a lot of money.

  5. When computer crime takes place in a room filled with people, there are usually many witnesses to the crime.

  6. The passage is mainly about the increase of computer crimes in America and the difficulties in combating computer crimes.

  7. Computer crimes are on the rise because more cheap microcomputers are available.

  8. According to the passage, computer crimes has been on the rise for the

  last years.

  9. Connecticut General Life Insurance company is cited as of companies that took serious measures to fight against computer crimes.

  10. Banks, credit card companies, and investment firms are especially sensitive about revealing their vulnerabilities because they place too much reliance on .

  參考答案:

  1. N.該句句意為:美國聯邦調查局確切知道計算機犯罪造成了多大損失。本題解題依據為本文第二段 “Even the FBI,which attempts…is involved”,該句大意為:盡管FBI致力于對各種犯罪的上升和下降有清晰認識,但并不能精確說明損失多大,所以與原文之意不合。

  2. Y. 該句句意為:計算機擁有者很容易利用大量計算機數據庫,本題解題依據為第二段最后一段話“…the easy access of microcomputers to huge mainframe data bases.”與原文之義吻合。

  3. Y. 該句句意為: 本文第三段暗示大多數利用計算機犯罪者是相關公司雇員。本題解題依據為文章第三段最后一句話,其大意為: 現實情況表明很可能是該公司雇員內部人…,與原文所述之義吻合。

  4. N. 該句句意為: 許多公司不舉報計算機犯罪是因為法律訴訟通常花費很多錢。解題依據為本文第九段第一和第二句話,他們不舉報是害怕公眾發現其計算機系統的弱點而對其喪失信心。據此可確定與原文所述不符。

  5. N. 該句句意為: 當計算機犯罪在滿是人的房間里發生時,通常有很多證人指證犯罪。本題解題依據為本文第六段第一句話,該句大意為:即使計算機犯罪發生在滿是人的房間里,通常也無證人。據此可知該句所述之義與原文不符。

  6. Y. 該句句意為:本篇文章主要是關于計算機犯罪的增長及與之作斗爭的困難性,通覽全文,尤其根據小標題的提示,我們不難看出文章主要論述了計算機犯罪與日俱增及難于發覺和阻止諸方面的原因,即文章的中心思想,與原文所述主旨吻合。

  7. NG.該句句意為:計算機犯罪上升是因為有更多便宜的計算機。本文第二段用a,b,c列出了計算機犯罪增加的三大原因,其中并未提及計算機便宜這一點。

  8. twelve 答案依據為第二段第一句話。

  9. an example “…be cited as an example”,表示“引用…來作為一個例證”答案依據為文章最后一段第二句話。但原文沒有直接照抄的語言,只能根據理解完成此空。

  10. customer trust 答案依據為本文第九段最后一句話。

62563 主站蜘蛛池模板: TPE_TPE热塑性弹性体_TPE原料价格_TPE材料厂家-惠州市中塑王塑胶制品公司- 中塑王塑胶制品有限公司 | 双相钢_双相不锈钢_双相钢圆钢棒_双相不锈钢报价「海新双相钢」 双能x射线骨密度检测仪_dxa骨密度仪_双能x线骨密度仪_品牌厂家【品源医疗】 | 胶辊硫化罐_胶鞋硫化罐_硫化罐厂家-山东鑫泰鑫智能装备有限公司 意大利Frascold/富士豪压缩机_富士豪半封闭压缩机_富士豪活塞压缩机_富士豪螺杆压缩机 | 卫生纸复卷机|抽纸机|卫生纸加工设备|做卫生纸机器|小型卫生纸加工需要什么设备|卫生纸机器设备多少钱一台|许昌恒源纸品机械有限公司 | 钢丝绳探伤仪-钢丝绳检测仪-钢丝绳探伤设备-洛阳泰斯特探伤技术有限公司 | 精密五金冲压件_深圳五金冲压厂_钣金加工厂_五金模具加工-诚瑞丰科技股份有限公司 | 广州展台特装搭建商|特装展位设计搭建|展会特装搭建|特装展台制作设计|展览特装公司 | 芜湖厨房设备_芜湖商用厨具_芜湖厨具设备-芜湖鑫环厨具有限公司 控显科技 - 工控一体机、工业显示器、工业平板电脑源头厂家 | 不锈钢管件(不锈钢弯头,不锈钢三通,不锈钢大小头),不锈钢法兰「厂家」-浙江志通管阀 | 全钢实验台,实验室工作台厂家-无锡市辰之航装饰材料有限公司 | 单螺旋速冻机-双螺旋-流态化-隧道式-食品速冻机厂家-广州冰泉制冷 | 伟秀电气有限公司-10kv高低压开关柜-高低压配电柜-中置柜-充气柜-欧式箱变-高压真空断路器厂家 | 桁架楼承板-钢筋桁架楼承板-江苏众力达钢筋楼承板厂 | 壹车网 | 第一时间提供新车_资讯_报价_图片_排行! | 首页|光催化反应器_平行反应仪_光化学反应仪-北京普林塞斯科技有限公司 | 精准猎取科技资讯,高效阅读科技新闻_科技猎| 雨水收集系统厂家-雨水收集利用-模块雨水收集池-徐州博智环保科技有限公司 | 注塑_注塑加工_注塑模具_塑胶模具_注塑加工厂家_深圳环科 | 儿童语言障碍训练-武汉优佳加感统文化发展有限公司 | 破碎机_上海破碎机_破碎机设备_破碎机厂家-上海山卓重工机械有限公司 | 过滤器_自清洗过滤器_气体过滤器_苏州华凯过滤技术有限公司 | 山东成考网-山东成人高考网 | 转向助力泵/水泵/发电机皮带轮生产厂家-锦州华一精工有限公司 | 鼓风干燥箱_真空烘箱_高温干燥箱_恒温培养箱-上海笃特科学仪器 | LED灯杆屏_LED广告机_户外LED广告机_智慧灯杆_智慧路灯-太龙智显科技(深圳)有限公司 | 实验室pH计|电导率仪|溶解氧测定仪|离子浓度计|多参数水质分析仪|pH电极-上海般特仪器有限公司 | led太阳能路灯厂家价格_风光互补庭院灯_农村市政工程路灯-中山华可路灯品牌 | 温控器生产厂家-提供温度开关/热保护器定制与批发-惠州市华恺威电子科技有限公司 | 尚为传动-专业高精密蜗轮蜗杆,双导程蜗轮蜗杆,蜗轮蜗杆减速机,蜗杆减速机生产厂家 | MES系统工业智能终端_生产管理看板/安灯/ESOP/静电监控_讯鹏科技 | 翅片管换热器「型号全」_厂家-淄博鑫科环保 | 档案密集柜_手动密集柜_智能密集柜_内蒙古档案密集柜-盛隆柜业内蒙古密集柜直销中心 | 二手注塑机回收_旧注塑机回收_二手注塑机买卖 - 大鑫二手注塑机 二手光谱仪维修-德国OBLF光谱仪|进口斯派克光谱仪-热电ARL光谱仪-意大利GNR光谱仪-永晖检测 | 托盘租赁_塑料托盘租赁_托盘出租_栈板出租_青岛托盘租赁-优胜必达 | hc22_hc22价格_hc22哈氏合金—东锜特殊钢 | 焊缝跟踪系统_激光位移传感器_激光焊缝跟踪传感器-创想智控 | 硫化罐_蒸汽硫化罐_大型硫化罐-山东鑫泰鑫智能装备有限公司 | 番茄畅听邀请码怎么输入 - Dianw8.com | 胶原检测试剂盒,弹性蛋白检测试剂盒,类克ELISA试剂盒,阿达木单抗ELISA试剂盒-北京群晓科苑生物技术有限公司 | 铝板冲孔网,不锈钢冲孔网,圆孔冲孔网板,鳄鱼嘴-鱼眼防滑板,盾构走道板-江拓数控冲孔网厂-河北江拓丝网有限公司 | 主题班会网 - 安全教育主题班会,各类主题班会PPT模板 |