多选题
中等难度
企业所得税筹划
👁️ 浏览量:1562
📅 更新时间:2025-03-05
⭐ 收藏数:278
下载试题

试题题干

Vocabulary
Directions: Scan the following passage and find the words which have roughly the same meanings as those given below. The number in the brackets after each word definition refers to the number of paragraph in which the target word is.  

     Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft. Once the computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft.
     Computer criminals are, for the most part, well-educated and highly intelligent, and have the analytical skills that make them valued employees. The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent, they have fertile imaginations, and the variety of ways in which they use equipment to their advantages is constantly being extended. In addition to direct theft of funds, the theft of data for corporate espionage or extortion is being widespread, and can obviously have a substantial effect on a company’s finances. Another lucrative scheme, often difficult to detect, involves accumulating fractions pence from individual payroll accounts, with electronic transfer of the accumulated amount to the criminal’s payroll.
     Sabotage is also an increasingly common type of computer crime. Everyone in the computer business has heard of cases of a “time-bomb” being placed in a program. Typically, the programmer inserts an instruction that causes the computer to destroy an entire personnel data bank, for example, if the programmer’s employment is terminated. As soon as the termination data is fed into the system, it automatically erases the entire program. 

参考答案

试题解析