Text 2
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment. A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyse company’s operations. Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and utilize it for his own purposes.
Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack
A. Damage to software is caused by those whose jobs require at least some access to the computer
B. The writer of the program is the one responsible for its misuse
C. Measures taken to 15rotect soft ware and data is useless
D. Programs written for an individual company are far more valuable to abuse and accident than standard software packages produced by external suppliers
Text 2
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment. A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyse company’s operations. Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and utilize it for his own purposes.
Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack
A. direct theft of funds
B. the theft of data for corporate espionage or extortion
C. accumulating fractions of pence from individual payroll accounts
D. all of the above
Education is compulsory and free for every child in the United States. Most children start school by the age of six.
They attend eight years of elementary school and four years of high school (or secondary school). The money for free public school comes from taxes, and each state is responsible for its own education system. State legislatures set the educational requirements but leave the management of the school in the hands of the local communities. Most states require their children to go to school until a certain age. This age varies from 16 to 18 years according to the law of the individual states. The Federal government contributes funds to the states for additional schools and school services.
After graduation from high school, a student can start his higher education in a two - year college, a four - year college, a university, or a specialized professional school -- either public or private. Most colleges admit students on the basis of their high
A. 18 years old.
B. 16 years old.
C. 6 years old.
D. 4 years old.
我来回答: