问题 选择题

下列句子加粗的成语运用不恰当的一项是[ ]

A.华灯初上,沂河湖心岛上的“蒙山沂水”大型水上实景演出令人叹为观止

B.可怜天下父母心,进入九年级,妈妈对小明生活上的照顾越来越具体而微

C.山东籍作家莫言先生在文学创作上精心钻研,持之以恒,与2012年荣获诺贝尔文学奖。

D.近日,游客在埃及神庙刻“到此一游”的事件在网络上引发热议,人们对这种不文明的行为深恶痛疾

答案

答案:B

填空题

Part 3


Questions 19-25


·Read the following passage and choose the correct answer from A, B, C and D.
More and more, the operation of our businesses, government, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purpose can reap substantial rewards. Even worse, a number of people who have done this and been caught by it have managed to get away without punishment.
It is easy for computers crime to go undetected if no one checks up what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a growing recommendation from his former employers.
Of course, we have no statistics on crimes that go undetected. But it is disturbing to note how many of the crimes we do know about were detected by accident, not by systematic inspections or other security procedures. The computer criminals who have been caught may have been the victims of uncommon bad luck.
For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigating revealed that the extra cards she was being asked were for dishonest transactions. In another case, dissatisfied employees of the thief tipped off the company that has been robbed.
Unlike other lawbreakers, who must leave the country, commit suicide or go to jail, computer criminals sometimes escape punishment, demanding or not only that they not be charged but that they be given good recommendations and perhaps other benefiting, their demands have been met.
Why Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They hesitate at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives, accountants, and security staff. And so another staff computer criminal departs with just the recommendation he needs to continue his crime elsewhere.

The passage is mainly about ______.

A.how computer criminals manage to get good recommendations from their former employers

B.why computer criminals are often able to escape punishment

C.why computer crimes can’t be eliminated

D.why computer crimes are difficult to detect by systematic inspection