首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、It can cause no damages at all. B、It can cause damages to the computer systems. C、It can copy your files in computers. D、It ca
A、It can cause no damages at all. B、It can cause damages to the computer systems. C、It can copy your files in computers. D、It ca
admin
2013-11-21
27
问题
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction "The Adolescence of P-l" written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multiuser system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So called "benign" or the harmless viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 22 to 25 are based on the passage you have just heard.
22. How did the name of "computer virus" come into being?
23. What is the way that the computer viruses infect the computer system?
24. What is a "benign" virus?
25. What can a "malignant" virus do to your computer?
选项
A、It can cause no damages at all.
B、It can cause damages to the computer systems.
C、It can copy your files in computers.
D、It can format your hard drive.
答案
B
解析
细节题。文章在最后提到恶性病毒能够破坏电脑系统。
转载请注明原文地址:https://kaotiyun.com/show/6jS7777K
0
大学英语四级
相关试题推荐
Itiseasiertonegotiateinitialsalaryrequirementbecauseonceyouareinside,theorganizationalconstraints(约束)influencew
A、Thelongwait.B、Thebroken-downcomputer.C、Themistakesinhertelephonebill.D、Thebadtelephoneservice.A
TheSky’sLimitAirtravelisarapidlygrowingsourceofgreenhousegases.Butitisalsoanindispensablewayoftravel.T
Globalwarmingreferstoanincreaseinglobalsurfacetemperatureresultingfromanincreaseintheamountofcarbondioxide,m
OurFutureinSpace:ItHasAlreadyBegun!Weareallspacetravelers.Butwe’vestayedclosetohomeuntilnow.Oneday,we
A、History.B、French.C、ComputerScience.D、HotelManagement.C细节题。四个选项都是表示学科的名词,因此听到学科时要记录相关信息。A(历史)对话中没有提及。B(法语)和C(计算机科学)对话中都提到
A、Themanshouldseeadoctor.B、Shewillhelpthemanchangehisdiet.C、Sheunderstandswhythemanseemsunhappy.D、Thedocto
Foodwastehasbeenachronicproblemforrestaurantsandgrocerystores—withmillionsoftonslostalongthewayascropsare
Heredity(遗传)isnottheonlythingthatinfluencesourcolour.Whereandhowweliveafterwearebornisimportanttoo.Forinst
随机试题
按照OSI七层模型的划分标准,ADSL的功能从理论上应该属于模型中的()层。
欲用统计图比较1994—2003年城市和农村3岁以下儿童贫血患病率的变化趋势,最为合适的统计图是
水泥砂浆踢脚线,合格的质量标准是:高度一致,与墙面结合牢固,局部空鼓长度不于()mm,且在一个检查范围内不多于处。
完成系统的配置和安装,属于开发会计信息系统全过程中的()阶段。
来料加工与进料加工的相同之处在于()。
信用公司债属于无担保证券范畴。()
哈斯汀斯挛缩是一种一只手或两只手的连接组织的失调,这通常会导致行动能力的丧失。一项对几千份医疗保障索赔的调查表明,一只手进行过哈斯汀斯挛缩手术的人中有30%在三年内会对该种失调进行第二次手术。因此,显而易见,对哈斯汀斯挛缩进行一次性手术治疗通常对于长期矫正
保持政策稳定性的最根本途径是()。
下列哪一项不属于布鲁姆的教育目标分类的三个领域
ACL是利用交换机实现安全管理的重要手段。利用ACL不能实现的功能是______。
最新回复
(
0
)