首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
admin
2013-11-24
41
问题
Computer Virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction"The Adolescence of P—l"writ-ten by Thomas J . Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi—user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So —called "benign" viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting.
Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don’t modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
Computer virus spread more quickly when it infects a LAN than a multi—user system.
选项
A、Right
B、Wrong
C、Not mentioned
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/CMUd777K
本试题收录于:
职称英语综合类A级题库职称英语分类
0
职称英语综合类A级
职称英语
相关试题推荐
SingingAlarmsCouldSavetheBlindIfyoucannotsee,youmaynotbeabletofindyourwayoutofaburningbuilding—andth
StopSpamWhenIfirstgotane-mailaccounttenyearsago,Ireceivedcommunicationsonlyfromfamily,friends,andcolleagu
DetoxbeginsafterChristmaswhenpeoplethinkthattheyhavebeenovereatingduringtheChristmasseasonandhavetakeninmany
Theriverwidensconsiderablyasitbeginstoturneast.
TheattackonFortSumternearCharlestonprovokedasharpresponsefromtheNorth,whichledtotheAmericanCivilWar.
ManandComputerWhatmakespeopledifferentfromcomputerprograms?Whatisthemissingelementthatourtheoriesdon’tyet
OnBritishNewspapersBesidesthedailynewspapers,thereareanumberofSundaynewspapersinBritain.Manyofthemarecon
Hewaspersuadedtogiveuptheidea.
Apetitionneedstobesigned.ItisimpossibleforthePrimeMinistertohearalloftheopinions.
Hehasn’tthefundstocarryouthisdesign.
随机试题
什么是“异读词”?下面各词语中加着重号的字,哪些是属于异读范围的,哪些不是,为什么?凡不规范的注音要改正。
用统计方法分析铸件缺陷时,记录、统计务求详细,还应记录缺陷的特点及可疑之处、()或其他生产条件的变化与时间等。
Morethanfortythousandreaderstolduswhattheylookedforinclosefriendships,whattheyexpected【C1】______friends,whatth
下列哪一种构件的代号是不正确的?[2003年第159题]
从所给的选项中,选择最合适的一项填在问号处,使之呈现一定的规律性。()
对“人民警察的义务直接决定于国家的任用行为”的正确理解是()。
一副扑克牌除大小王之外有52张,从中取三张,使得三张点数之和为26,且第三张点数不小于前两张点数之和。若A=1点,B=2点,……,J=11点,Q=12点,K=13点,点数相同花色不同为不同取法,那么共有多少种不同取法?
1.当颁发向河道内排放化学物质的许可证时,它们是以每天可向河道中排放多少磅每种化学物质的形式来颁发的。通过对每种化学物质单独计算来颁发许可证,这些许可证所需的数据是基于对流过河道的水量对排放到河道内的化学物质的稀释效果的估计。因此河道在许可证的保护之下,
Ingeneral,thetestsworkmosteffectivelywhenthequalitiestobemeasuredcanbemostpreciselydefinedandleasteffectivel
颐和园(theSummerPalace)始建于清朝,是中国规模最大、保存最完好的皇家园林(imperialgarden)之一。
最新回复
(
0
)