首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
admin
2013-11-24
21
问题
Computer Virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction"The Adolescence of P—l"writ-ten by Thomas J . Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi—user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So —called "benign" viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting.
Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don’t modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
If the development of computers was controlled there will be no computer virus.
选项
A、Right
B、Wrong
C、Not mentioned
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/3MUd777K
本试题收录于:
职称英语综合类A级题库职称英语分类
0
职称英语综合类A级
职称英语
相关试题推荐
StopSpamWhenIfirstgotane-mailaccounttenyearsago,Ireceivedcommunicationsonlyfromfamily,friends,andcolleagu
Geothermal(地热)Energy1Sinceheatnaturallymovesfromhotterregionstocoolerones,theheatfromtheearth’scenterflowsou
Accordingtothepassage,parentsshouldhelptheirchildrenwiththeirhomework.Itisveryimportantthatyouletyourchildr
TVShowsandLongBusTripsLongbusridesareliketelevisionshows.Theyhaveabeginning,amiddle,andanend-withcommerc
IntegratingAllCommunications1.Haveyoueverfeltfrustratedwhenyouhavetocontactyourfriends,butcannotreachtheme
Migrant(移民的)WorkersInthepasttwentyyears,therehasbeenanincreasingtendencyforworkerstomovefromonecountryto
Duringthepasttenyearstherehavebeendramaticchangesintheinternationalsituation.
SavingaCity’sPublicArtAvoidingtrafficjamsinLosAngelesmaybeimpossible,butthecity’scolorfulfreewayrau-rals(
Theseareourmotivesfordoingit.
Theriverwidensconsiderablyasitbeginstoturnwest.
随机试题
距骨下关节面呈切线位显示的摄影体位是
患者,男,56岁,患肝病反复发作20余年,近日出现乏力、嗜睡、厌食、脾肿大、脾功能亢进、腹水,应首先考虑诊断为
新产后伤于寒治疗不可以发汗的解释哪一种理由不正确
根据《建设项目环境影响评价文件分级审批规定》,对地方政府财政性投资项目,其环境影响评价文件的审批权限由省、自治区、直辖市环境保护行政主管部门提出建议,报()确定。
工程建设照片和声像资料收文登记后,应交给项目总监理工程师或( )进行处理,重要文件内容应在监理目标中记录。
1982年1月,( )在日本债券市场发行了100亿日元的私募债券,这是我国国内机构首次在境外发行外币债券。
对记入所有者权益的可供出售债券公允价值正变动可计入附属资本的部分,不得超过正变动的()。
HassanK,TürkeiIchbin39Jahrealtundschonseit15JahreninDeutschland.VerheiratetwarichschonvormeinerAbreiseaus
Whatdoesthemanwanttodo?
A、InacommercialareaB、Inaresidentialdistrict.C、Inaschoolzone.D、Onawindingtrail.A男士说完"Herewego!”之后,女士说“这个商业区的限速…
最新回复
(
0
)