题目内容

Which of the following is very helpful in tracing the transnational hi-tech crime?

A. The use of e-mail of the criminal.
B. The intended target of the criminal.
C. The data record that is kept.
D. The illegal use of computer in distributing pornography:

查看答案
更多问题

Task 2
Directions: This task is the same as Task 1. The 5 questions or unfinished statements are numbered 41 through 45.
Cyber crime which is the illegal activity committed on the Internet is the fastest growing criminal activity in the world and is of major concern to the Government. From traditional crime on-line to new crimes that target information and communications networks, it covers a huge range of unlawful activities. UK and international agencies are working together to combat the threat of cyber crime.
Access to information and communications technology (ICT) is globally available and increasingly used. Most Internet and e-mail users are involved in lawful business. However, some use the technology for unlawful activities. Global and transnational crimes can now be committed far distant from the place (or places) where the impact of that crime is felt.
Transnational hi-tech crime involves the criminal's computer communicating by using a number of other machines to reach its intended target. This activity leaves a data record with the service provider. If the records are retained and the criminal has not concealed them, they can be used to trace the criminal. However, these data records are not permanent. In many cases when law enforcement officials attempt to gain lawful access to this data, it may have been deleted.
As lawful use of IT increases, criminals around the world increasingly use computers to commit traditional crimes. Computer hacking is also an area of concern.
According to the passage, cyber crime refers to ______.

A. the unlawful activities committed by the Internet
B. the illegal activities done by telephoning
C. the unlawful activities done by getting others' digital records
D. the illegal activities committed by hacking others' computers

Which of the following is NOT true about cyber crime?

A. It uses modern science and technology.
B. It may be difficult to seek the evidence.
C. It contains a huge variety of activities.
D. The law enforcement is weak in fighting against it.

听力原文: Arab governments have decided to maintain their trade and economic boycott of Israel. The United States and Israel had asked for it to be lifted. The decision to maintain the boycott was made at an Arab League meeting in Cairo. The League's secretary General Hismid Abdul Magid said the Arab countries wanted to lift the embargo but they could not do so until Israel's occupation of Arab lands ended and Israel recognized Palestinian rights.
The Arab governments have decided to______.

A. lift the economic boycott on Israel
B. establish relations with Israel
C. refuse to do business with Israel
D. recognize Israel's rights

听力原文:M: How much are the carnations and tile roses?
W: One dollar for each carnation and (9)one and a half for each red rose.
M: (9)Then I'd like a dozen red carnations and half a dozen red roses.
W: I bet it's for your mother, (8)as it's Mother's Day today.
M: Well, not completely true. (8)It happens to be her birthday.
W: Oh, really? I guess she must be very happy to receive these beautiful carnations from you.
M: Yeah, she will. She really likes flowers. So I buy her some every year. I'd just wish they would stay fresh longer than they do.
W: (10)Put a little sugar and vitamin C in the water. They'll stay fresh for days.
M: Really? I'll tell my mother. And thanks for your suggestion.
W: That's all right. Happy birthday to your mother!
(8)

A. Birthday of the man's mother.
B. Mother's Day.
C. Mother's Day and the birthday of the man's mother.
D. Mother's Day and the lady's birthday.

答案查题题库