【正文】
a website offered to sell Alphonso mangoes at a throwaway price. Distrusting such a transaction, very few people responded to or supplied the website with their credit card numbers. These people were actually sent the Alphonso mangoes. The word about this website now spread like wildfire. Thousands of people from all over the country responded and ordered mangoes(芒果) by providing their credit card numbers. The owners of what was later proven to be a bogus website then fled taking the numerous credit card numbers and proceeded to spend huge amounts of money much to the chagrin of the card owners. Cyber pornography This would include pornography(色情) websites, pornography magazines produced using puters (to publish and print the material) and the Inter (to download and transmit pornographic pictures, photos, writings, etc.) 新四級(jí)英語閱讀理解自測(cè)試卷 109 In Mumbai, a Swiss couple would gather slum children and then would force them to appear for obscene photographs to websites specially designed for paedophilia. The Mumbai police arrested the couple for pornography. Sale of illegal articles This would include sale of narcotics, weapons and wildlife, etc., by posting information on websites, auction websites, and bulletin boards of simply by using munication. Online gambling There are millions of websites, all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. Intellectual property crimes These include software piracy, copyright infringement, trademarks violations, theft of puter source code, etc. Email spoofing A spoofed is one that appears to originate from one source but actually has been sent from another source. . Lydia has an address . Her enemy, Sam spoofs her and sends her obscene messages to all her acquaintances. Since the s appear to have originated from Lydia, her friends could take offence and relationship could be spoiled for life. Email spoofing could also cause moary damage. In an American case, a teenager made millions of dollars by spreading false information about certain panies. This misinformation was spread by sending spoofed s, purportedly from news agencies like Reuters, to share brokers and investors who were informed that the panies were doing very badly. Even after the truth came out the values of the shares did not go back to the earlier levels and thousands of investors lost a lot of money. Fery Counterfeit currency notes, postage and revenue stamps, mark sheets, etc. can be fed using sophisticated puters, printers and scanners. Outside many colleges across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using puters, and high quality scanners and printers. In fact, this has bee a booming business involving thousands of Rupees being given to students gangs in exchange for these bogus but authentic looking certificates. Cyber defamation This occurs when defamation takes place with the help of puters or the Inter. . someone publishes defamatory matter about someone on a website or sends s containing defamatory information to all of that person’s friends. A famous cyber defamation occurred in America. All friends and relatives of a lady were beset with obscene messages appearing to originate from her account. These mails were giving the lady in question a bad name among her friends .The lady was an activists against pornography. In reality, a group of people displeased with her views and angry with her for 大學(xué)英語閱讀與理解 110 opposing them had decided to get back at her by using such underhanded methods. In addition to sending spoofed obscene s they also put up websites about her, that basically insulted her character that sent s to her family and friends containing matter defaming(詆毀) her. ( ) 1. The abacus was considered to be the earliest form of a puter, has been around since 3500 . in India, Japan and China. ( ) 2. The invention of looms caused a fear amongst Jacquard’s employees that their traditional employment and livelihood were being threatened. ( ) 3. Cyber crime appeared because some people are evil. ( ) 4. Cyber crime is totally the same with traditional crime. ( ) 5. There are millions of websites, all hosted on inland servers, that offer online gambling. ( ) 6. Using sophisticated puters, printers and scanners can fe counterfeit currency notes, postage and revenue stamps, mark sheets, etc. ( ) 7. A famous cyber defamation ever happened in America. 8. In a day and age when everything from _________ and _____to _______________ is being run on puters, cyber crime has assumed rather sinister implications. 9. Computer crimes can involve criminal activities that are traditional in nature, such as___, ___, ___, defamation and mischief, all of which are subject to the Indian Penal Code. 10. Financial crimes would include ___________, _____________, ____________, etc. Passage B Purpose of Life The purpose of life is a life of purpose. —— Robert Byrne The purposes of human life enpass the human being not only as an individual, but also as a social being and as a participant in the web of all life. We find identity, meaning, and fulfillment in relationships of family and munity. Thus religions define correct social roles and promote the ideals of social harmony, justice, and peace. Furthermore, human beings have a purpose in relation to nature. We must protect and enhance our environment while at the same time cultivating it and harvesting its riches. ― To me, there is only one form of human depravity—the man without a purpose.‖ Those are rather harsh words by Ayn Rand. However, I can understand her point. After all, a life without purpose is a life wasted. Kenh Hilder Brand eloquently explains the p