试题题干
Directions:
Read the following text. Choose the best word (s) for each numbered blank and mark A, B, C or D.
Given the advantages of electronic money, you might think that we would move quickly to the cashless society in which all payments are made electronically. , a true cashless society is probably not around the corner. Indeed, predictions have been
for two decades but have not yet come to fruition. For example, Business Week predicted in 1975 that electronic means of payment would soon "revolutionize the very
of money itself," only to
itself several years later. Why has the movement to a cashless society been so
in coming?
Although electronic means of payment may be more efficient than a payments system based on paper, several factors work the disappearance of the paper system. First, it is very
to set up the computer, card reader, and telecommunications networks necessary to make electronic money the
form of payment. Second, paper checks have the advantage that they
receipts, something that many consumers are unwilling to
. Third, the use of paper checks gives consumers several days of "float" — it takes several days
a check is cashed and funds are
from the issuer's account, which means that the writer of the check can earn interest on the funds in the meantime.
electronic payments are immediate, they eliminate the float for the consumer.
Fourth, electronic means of payment may security and privacy concerns. We often hear media reports that an unauthorized hacker has been able to access a computer database and to alter information
there. The fact that this is not an
occurrence means that dishonest persons might be able to access bank accounts in electronic payments systems and
from someone else's accounts. The
of this type of fraud is no easy task, and a new field of computer science is developing to
security issues. A further concern is that the use of electronic means of payment leaves an electronic
that contains a large amount of personal data. There are concerns that government, employers, and marketers might be able to access these data, thereby violating our privacy.