The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
1. How many kinds of crimes are mentioned in the passage?
[A]. 7. [B]. 8. [C]. 9. [D]. 10
2. What is the purpose of a competitor to sabotage a companys computer?
[A]. His purpose is to destroy or weaken the firms operational ability.
[B]. His purpose is to weaken firms competitive capability and get it.
[C]. His purpose is to buy the rivals company at a relatively low price.
[D]. His purpose is to steal important data.
3. Which of the following can be labeled as a politically motivated sabotage of a computer system?
[A]. Sabotage of a university computer. [B]. Sabotage of a hospital computer.
[C]. Sabotage of computer at a secret training base. [D]. Sabotage of a factory computer.
4. What does the author mean by Homicide could take a new form?
【2011年最新六级阅读理解练习(44)】相关文章:
最新
2016-10-18
2016-10-11
2016-10-11
2016-10-08
2016-09-30
2016-09-30