The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology..
1、How many kinds of crimes are mentioned in the passage?
[A]. 7. [B]. 8. [C]. 9. [D]. 10
2、What is the purpose of a competitor to sabotage a companys computer?
[A]. His purpose is to destroy or weaken the firms operational ability.
[B]. His purpose is to weaken firms competitive capability and get it.
[C]. His purpose is to buy the rivals company at a relatively low price.
[D]. His purpose is to steal important data.
3、Which of the following can be labeled as a politically motivated sabotage of a computer system?
[A]. Sabotage of a university computer.
[B]. Sabotage of a hospital computer.
[C]. Sabotage of computer at a secret training base.
[D]. Sabotage of a factory computer.
4、What does the author mean by Homicide could take a new form?
【六级讲义阅读理解 Passage Sixteen (Crime in Computer)】相关文章:
★ 六级深度讲义的阅读理解Passage Ten 20101004
★ 六级深度讲义阅读的理解Passage Four 20100928
★ 六级深度讲义—阅读理解Passage Nine 20101003
最新
2016-10-18
2016-10-11
2016-10-11
2016-10-08
2016-09-30
2016-09-30