首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of this term is the likeness between the bio
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of this term is the likeness between the bio
admin
2010-09-25
23
问题
The computer virus is an outcome of the computer overgrowth in
the 1980s. The cause of this term is the likeness between the biological
virus and the evil program infected with computers. The origin of this
term came an American science fiction "The Adolescence of P-1" written 【S1】______
by Thomas J. Ryan published in 1977. Human viruses invade a living
cell and turn them into a factory for manufacturing viruses. 【S2】______
Therefore, computer viruses are small programs. They replicate by attaching 【S3】______
a copy of themselves to another program.
Once attached by host program, the viruses then look for other programs 【S4】______
to" infect". In this way, the virus can spread quickly throughout a
hard disk or an entire organization. At some points, the situation will be 【S5】______
totally determined by how the virus was programmed. The timing of the
attack can be linked to a number of situations, included a certain time 【S6】______
or date, the presence of a particular file, the security privilege level of
the user and the number of times a file is used. So-called" benign" viruses
might simply display a message, like the one that infected IBM’s
main computer system last Christmas with a season’s greeting. Malignant
viruses are designed to damage the system. The attack is to wiping 【S7】______
out data, to delete files or to format the hard disk.
There are two main types of viruses: shell and intrusive system.
Shell viruses wrap themselves around a host program and don’t modify
the original program. Shell programs are easy to write, that is why about 【S8】______
half of viruses are of this type. Intrusive viruses invade an existing program
and actual insert a portion of themselves into the host program. 【S9】______
Intrusive viruses are hard to write and very difficult to remove with 【S10】______
damaging the host file.
【S4】
选项
答案
by→to
解析
搭配错误。attach表示“依附,依附于某物”,应当加介词to。
转载请注明原文地址:https://kaotiyun.com/show/Jtz7777K
0
大学英语六级
相关试题推荐
A、Tradedthemwithneighboringfamilies.B、Soldthemtopeopleincitiesandtown.C、Keptthemselvesfedandclothed~D、Nourishe
TwinsThesamefactorsthatgiverisetouncannyphysicalsimilaritiesbetweentwins--similaritiesaremirroredingenetics
A、ItoftensnowsheavilyintheScottishHighlands.B、Itneversnowsheavilyineverypartofthecountry.C、Trainsandbusesar
Face-to-facecontactisbynomeanstheonlyformofcommunicationandduringthelasttwohundredyearstheartofmasscommuni
Face-to-facecontactisbynomeanstheonlyformofcommunicationandduringthelasttwohundredyearstheartofmasscommuni
Whensomebodycalls,firstofall,thehostwouldofferhimacigaretteandacupoftea.Inthecountryside,【B1】______,oldme
Whensomebodycalls,firstofall,thehostwouldofferhimacigaretteandacupoftea.Inthecountryside,【B1】______,oldme
Poetsdieyoung—youngerthannovelists,playwrightsandotherwriters,aU.S.researchersays.Itcouldbebecausepoetsaretor
Poetsdieyoung—youngerthannovelists,playwrightsandotherwriters,aU.S.researchersays.Itcouldbebecausepoetsaretor
A、ShethinksHenryisnotfunnyenough.B、SheenjoysHenry’shumoragreatdeal.C、ShemustlearntounderstandHenry’shumorbe
随机试题
A.清热泻火、除烦止渴B.清热泻火、滋阴润燥C.清热泻火、泻火解毒D.清热泻火、退虚热E.清热泻火、泻下除积
相对记载事项未在票据上记载的,票据无效。()
某公司在现时条件下重新购入一项全新状态的资产,其重置全价为40000元,综合贬值为5000元,如果使用成本法进行估值,其综合成新率为()。
根据外汇管理法律制度的规定,下列各项中,属于境内机构资本项目外汇支出的有()。
方针目标的动态管理最重要的环节是()。
下列关于公安政策的作用说法正确的是()。
农民甲外出打工前,其妻为了能让他自己在外做饭吃,特意在其行李内放入了菜刀、碗筷等,而甲对此并不知情。甲到外地之后,钱包被人盗窃,饥饿难耐之下,甲强行夺取了路人的苹果手机并因用力过猛导致该路人摔倒在地造成重伤。事后,调查人员在甲随身携带的行李中发现了上述菜刀
在内存固定分区管理方案中,已分配区可能会有未用空间,通常称之为(257)。
IsthereenoughoilbeneaththeArcticNationalWildlifeRefuge(保护区)(ANWR)tohelpsecureAmerica’senergyfuture?PresidentObama
Schoolsoutsidecities[A]Withitssandybeaches,charmingruinsandoccasionallybluewaters,theIsleofWightisaperfects
最新回复
(
0
)