必胜高考网_全国高考备考和志愿填报信息平台

必勝高考網 > 外語類 > 英語四級 > 閱讀理解 >

英語四級閱讀選詞填空模擬練習及參考答案

時間: 焯杰2 閱讀理解

  N (for NO)if the statement contradicts the information given in the passage;

  NG (for NOT GIVEN)if the information is not given in the passage.

  For questions 8-10,complete the sentences with information given in the passage.

  Computer Crime

  A computer crime is generally defined as one that involves the use of computers and software for illegal purposes. This doesn’t mean that all the crimes are new types of crime. On the contrary, many of these crimes, such as embezzlement of funds, the alteration of records, theft, vandalism, sabotage, and terrorism, can be committed without a computer. But with a computer, these offenses can be carried out more quickly and with less chance that the person responsible for the crime will be discovered.

  Computer crimes are on the rise and have been for the last twelve years. Just how much these computer crimes cost the American public is in dispute, but estimates range from ?$3 billion to ?$5 billion annually. Even the FBI, which attempts to keep track of the growth or decline of all kinds of crimes, is unable to say precisely how large a loss is involved; however, it estimates that the average take from a company hit by computer crime is ?$600,000. A number of reasons are given for the increase in computer crime: (A) more computers in use and, thus, more people who are familiar with basic computer operation; (B) more computers tied together in satellite and other data—transmission networks; and (C) the easy access of microcomputers to huge mainframe data bases.

  The Criminal

  Movies and newspaper stories might lead us to believe that most computer crimes are committed by teenage “hackers”—brilliant and basically good children who let their imagination and technical genius get them into trouble. But a realistic look at the crimes reveals that the offender is likely to be an employee of the firm against which the crime has been committed, i.e., an “insider”.

  Difficulty of Detection and Prevention

  Given the kind of person who commits a computer crime and the environment in which the crime occurs, it is often difficult to detect who the criminal is. First of all, the crime may be so complex that months or years go by before anyone discovers it.

  Second, once the crime has been revealed, it is not easy to find a clear trail of evidence that leads back to the guilty party. After all, looking for “weapons” or fingerprints does not occur as it might in the investigation of more conventional crimes.

  Third, there are usually no witnesses to the computer crime, even though it may be taking place in a room filled with people. Who is to say if the person at the next terminal, calmly keying in data, is doing the company’s work or committing a criminal act?

  Fourth, not enough people in management and law enforcement know enough about computer technology to prevent the crimes. Authorities have to be familiar with the computer’s capabilities within a given situation to guard against its misuses. In some large cities, such as Los Angeles, police departments have set up specially trained computer crime units.

  But even when an offender is caught, the investigators, attorneys (律師), judges, or juries may find the alleged crime too complicated and perplexing to handle. More attorneys are specializing in computer law and studying the computer’s potential for misuse.

  After a computer crime has been discovered, many companies do not report it or prosecute (起訴) the person responsible. A company may not announce the crime out of fear that the pubic will find out the weaknesses of its computer system and lose confidence in its organization. Banks, credit card companies, and investment firms are especially sensitive about revealing their vulnerabilities (脆弱性) because they rely heavily on customer trust.

  To avoid public attention, cautious companies will often settle cases of computer tampering out of court. And if cases do go to trial and the offenders are convicted, they may be punished only by a fine or light sentence because the judge or jury isn’t fully trained to understand the nature and seriousness of the crime.

  Not all companies are timid in apprehending computer criminals. For example, Connecticut General Life Insurance Company decided it had to get tough on violators. So when the company discovered that one of its computer technicians had embezzled ?$200,000 by entering false benefit claims, it presented it findings to the state’s attorney and aided in the prosecution of the technician. The technician was found guilty and sentenced to prison, not just for the computer misuse, but also for grand theft and insurance fraud. Connecticut General now has a policy of reporting all incidents of theft or fraud, no matter how small.

  1. The FBI knows exactly how large a loss is involved in computer crimes.

  2. It has become easy for microcomputer owners to use huge mainframe data bases.

  3. It is implied in the Paragraph 3 that most computer criminals are the employees of the concerned companies.

  4. Many companies don?t report computer crimes because law procedures against computer crimes usually cost a lot of money.

  5. When computer crime takes place in a room filled with people, there are usually many witnesses to the crime.

  6. The passage is mainly about the increase of computer crimes in America and the difficulties in combating computer crimes.

  7. Computer crimes are on the rise because more cheap microcomputers are available.

  8. According to the passage, computer crimes has been on the rise for the

  last years.

  9. Connecticut General Life Insurance company is cited as of companies that took serious measures to fight against computer crimes.

  10. Banks, credit card companies, and investment firms are especially sensitive about revealing their vulnerabilities because they place too much reliance on .

  參考答案:

  1. N.該句句意為:美國聯邦調查局確切知道計算機犯罪造成了多大損失。本題解題依據為本文第二段 “Even the FBI,which attempts…is involved”,該句大意為:盡管FBI致力于對各種犯罪的上升和下降有清晰認識,但并不能精確說明損失多大,所以與原文之意不合。

  2. Y. 該句句意為:計算機擁有者很容易利用大量計算機數據庫,本題解題依據為第二段最后一段話“…the easy access of microcomputers to huge mainframe data bases.”與原文之義吻合。

  3. Y. 該句句意為: 本文第三段暗示大多數利用計算機犯罪者是相關公司雇員。本題解題依據為文章第三段最后一句話,其大意為: 現實情況表明很可能是該公司雇員內部人…,與原文所述之義吻合。

  4. N. 該句句意為: 許多公司不舉報計算機犯罪是因為法律訴訟通常花費很多錢。解題依據為本文第九段第一和第二句話,他們不舉報是害怕公眾發現其計算機系統的弱點而對其喪失信心。據此可確定與原文所述不符。

  5. N. 該句句意為: 當計算機犯罪在滿是人的房間里發生時,通常有很多證人指證犯罪。本題解題依據為本文第六段第一句話,該句大意為:即使計算機犯罪發生在滿是人的房間里,通常也無證人。據此可知該句所述之義與原文不符。

  6. Y. 該句句意為:本篇文章主要是關于計算機犯罪的增長及與之作斗爭的困難性,通覽全文,尤其根據小標題的提示,我們不難看出文章主要論述了計算機犯罪與日俱增及難于發覺和阻止諸方面的原因,即文章的中心思想,與原文所述主旨吻合。

  7. NG.該句句意為:計算機犯罪上升是因為有更多便宜的計算機。本文第二段用a,b,c列出了計算機犯罪增加的三大原因,其中并未提及計算機便宜這一點。

  8. twelve 答案依據為第二段第一句話。

  9. an example “…be cited as an example”,表示“引用…來作為一個例證”答案依據為文章最后一段第二句話。但原文沒有直接照抄的語言,只能根據理解完成此空。

  10. customer trust 答案依據為本文第九段最后一句話。

62563 主站蜘蛛池模板: 中空玻璃生产线,玻璃加工设备,全自动封胶线,铝条折弯机,双组份打胶机,丁基胶/卧式/立式全自动涂布机,玻璃设备-山东昌盛数控设备有限公司 | 自恢复保险丝_贴片保险丝_力特保险丝_Littelfuse_可恢复保险丝供应商-秦晋电子 | 水冷散热器_水冷电子散热器_大功率散热器_水冷板散热器厂家-河源市恒光辉散热器有限公司 | 亮化工程,亮化设计,城市亮化工程,亮化资质合作,长沙亮化照明,杰奥思【官网】 | 低温柔性试验仪-土工布淤堵-沥青车辙试验仪-莱博特(天津)试验机有限公司 | 欧美日韩国产一区二区三区不_久久久久国产精品无码不卡_亚洲欧洲美洲无码精品AV_精品一区美女视频_日韩黄色性爱一级视频_日本五十路人妻斩_国产99视频免费精品是看4_亚洲中文字幕无码一二三四区_国产小萍萍挤奶喷奶水_亚洲另类精品无码在线一区 | 东莞动力锂电池保护板_BMS智能软件保护板_锂电池主动均衡保护板-东莞市倡芯电子科技有限公司 | 澳门精准正版免费大全,2025新澳门全年免费,新澳天天开奖免费资料大全最新,新澳2025今晚开奖资料,新澳马今天最快最新图库 | 千淘酒店差旅平台-中国第一家针对TMC行业的酒店资源供应平台 | 广州迈驰新GMP兽药包装机首页_药品包装机_中药散剂包装机 | 富森高压水枪-柴油驱动-养殖场高压清洗机-山东龙腾环保科技有限公司 | 压滤机-洗沙泥浆处理-压泥机-山东创新华一环境工程有限公司 | 置顶式搅拌器-优莱博化学防爆冰箱-磁驱搅拌器-天津市布鲁克科技有限公司 | 流量卡中心-流量卡套餐查询系统_移动电信联通流量卡套餐大全 | 集装箱展厅-住人集装箱住宿|建筑|房屋|集装箱售楼处-山东锐嘉科技工程有限公司 | 专业生产动态配料系统_饲料配料系统_化肥配料系统等配料系统-郑州鑫晟重工机械有限公司 | 老城街小面官网_正宗重庆小面加盟技术培训_特色面馆加盟|牛肉拉面|招商加盟代理费用多少钱 | 温州食堂承包 - 温州市尚膳餐饮管理有限公司 | 连续油炸机,全自动油炸机,花生米油炸机-烟台茂源食品机械制造有限公司 | 钢托盘,钢制托盘,立库钢托盘,金属托盘制造商_南京飞天金属制品实业有限公司 | UV-1800紫外光度计-紫外可见光度计厂家-翱艺仪器(上海)有限公司 | 14米地磅厂家价价格,150吨地磅厂家价格-百科 | 小区健身器材_户外健身器材_室外健身器材_公园健身路径-沧州浩然体育器材有限公司 | 板式换热器_板式换热器价格_管式换热器厂家-青岛康景辉 | 上海刑事律师|刑事辩护律师|专业刑事犯罪辩护律师免费咨询-[尤辰荣]金牌上海刑事律师团队 | 清洁设备_洗地机/扫地机厂家_全自动洗地机_橙犀清洁设备官网 | 尾轮组_头轮组_矿用刮板_厢式刮板机_铸石刮板机厂家-双驰机械 | 北京发电车出租-发电机租赁公司-柴油发电机厂家 - 北京明旺盛安机电设备有限公司 | 中国在职研究生招生信息网 | 广西正涛环保工程有限公司【官网】 | 泥沙分离_泥沙分离设备_泥砂分离机_洛阳隆中重工机械有限公司 | 成都租车_成都租车公司_成都租车网_众行宝 | 北京宣传片拍摄_产品宣传片拍摄_宣传片制作公司-现像传媒 | 深圳善跑体育产业集团有限公司_塑胶跑道_人造草坪_运动木地板 | 臻知网大型互动问答社区-你的问题将在这里得到解答!-无锡据风网络科技有限公司 | 动力配电箱-不锈钢配电箱-高压开关柜-重庆宇轩机电设备有限公司 聚天冬氨酸,亚氨基二琥珀酸四钠,PASP,IDS - 远联化工 | 工业风机_环保空调_冷风机_工厂车间厂房通风降温设备旺成服务平台 | 工业洗衣机_工业洗涤设备_上海力净工业洗衣机厂家-洗涤设备首页 bkzzy在职研究生网 - 在职研究生招生信息咨询平台 | 日本东丽膜_反渗透膜_RO膜价格_超滤膜_纳滤膜-北京东丽阳光官网 日本细胞免疫疗法_肿瘤免疫治疗_NK细胞疗法 - 免疫密码 | 预制舱-电力集装箱预制舱-模块化预制舱生产厂家-腾达电器设备 | 无刷电机_直流无刷电机_行星减速机-佛山市藤尺机电设备有限公司 无菌检查集菌仪,微生物限度仪器-苏州长留仪器百科 |