首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How did the name of "computer virus" come into being?
How did the name of "computer virus" come into being?
admin
2014-01-27
24
问题
How did the name of "computer virus" come into being?
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction The Adolescence of P-\ written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So called "benign" or the harmless viruses might simply display a message, like the one that infected IBM’ s main computer system last Christmas with a season’ s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk. There are several kinds of anti-virus software providing the services for prevent the virus from attacking your computer. So you should install the anti-virus software before your access to the Internet. It will be no use to install the software after you’ ve got infected.
选项
A、It resembles the biological virus.
B、It works the same way as the human virus.
C、It influences the human as the biological viruses do.
D、It spreads to people who use the infected computers.
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/Ffjd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
Whydoesthewomanwanttogotothemovie?
Theperiodofadolescence,i.e.,theperiodbetweenchildhoodandadulthood,maybelongorshort,dependingonsocialexpecta
Youhaven’tcontactedyourAmericanfriendJamesforalongtime,andnowyouneedtowritealettertoinvitehimtodelivera
Applecomputerintroduceditspioneering,user-friendlyMackintoshcomputerin1984.The"Mac"quicklybecamepopularandappear
Applecomputerintroduceditspioneering,user-friendlyMackintoshcomputerin1984.The"Mac"quicklybecamepopularandappear
Whatistheprobablerelationshipbetweenthetwospeakers?
Moreandmorestudentswanttostudyin"hot"major.【C1】______aresult,manystudentswantto【C2】______theirinterestsandstudy
Whatistherelationshipbetweenthetwospeakers?
Whatwillthemandotonight?
随机试题
对稳定蛋白质构象通常不起作用的化学键是
对于招标采购的货物,合同价款应根据()确定。
制订班轮船期表是班轮营运组织工作的一项重要内容。()
在教学计划之外,利用课余时间对学生实施的各种有目的、有计划、有组织的教育活动是()。
马克思主义把科学看作()。
金融术语CAMEL是指()。
某公司为便于员工在家里访问公司的一些数据,允许员工通过Internet访问公司的FTP服务器,如图6-11所示。为了能够方便地实现这一目标,决定在客户机与FTP服务器之间采用TLS对数据进行加密。客户机与FTP服务器之间协商相互认可的密码发生在(41)。
Notafraidof
______vastnessoftheGrandCanyon,itisdifficulttocaptureitinasinglephotograph.
—Writetomewhenyougethome.
最新回复
(
0
)