首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How did the name of "computer virus" come into being?
How did the name of "computer virus" come into being?
admin
2019-01-10
71
问题
How did the name of "computer virus" come into being?
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction The Adolescence of P-\ written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So called "benign" or the harmless viruses might simply display a message, like the one that infected IBM’ s main computer system last Christmas with a season’ s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk. There are several kinds of anti-virus software providing the services for prevent the virus from attacking your computer. So you should install the anti-virus software before your access to the Internet. It will be no use to install the software after you’ ve got infected.
选项
A、It is a virus that causes great damage.
B、It is a virus that once infected the IBM’ s computer system.
C、It is a virus that carries a Christmas greeting.
D、It is a virus that causes no harm to the computer systems.
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/MsNd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
Thebiggestsafetythreatfacingairlinestodaymaynotbeaterroristwithagun,butthemanwiththeportablecomputerinbus
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputerswork,justasweexpectthematleasttounderstand
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputerswork,justasweexpectthematleasttounderstand
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputerswork,justasweexpectthematleasttounderstand
Thereisnodenyingthatstudentsshouldlearnsomethingabouthowcomputerswork,justasweexpectthematleasttounderstand
Whatwillthemandotonight?
Whatwillthemandotonight?
Whatwillthemandotonight?
随机试题
张三、李四各出资20万元共同购买一辆汽车,双方约定轮流使用,每次时间为半年。在张三使用期间,因为股市行情看涨,张三向善意的王五借款10万元用于炒股,并自行将该车交付给王五设定质押担保并进行登记。不料股市一落千丈,张三所购买的股票已遭停牌。因张三无力还款,王
下列()不属于路堤边坡病害的常见防治措施。
关于财务预算,下列说法错误的是()。
华生认为环境在学习过程中起着极其重要的作用,他是一个环境决定论者。()
有价证券是指标有票面金额,证明持有人有权按期取得一定收入并可自由转让和买卖的所有权或债权凭证。有价证券是虚拟资本的一种形式,它本身没价值,但有价格。根据上述定义,下列不属于有价证券的是()。
若长度为n的线性表采用顺序存储结构,在其第i个位置插入一个新元素的算法的时间复杂度为()(1≤i≤n+1)。
关于职务侵占罪。下列说法正确的是()。
谭嗣同在戊戌维新时期撰写的宣传变法维新主张的著作是()。
社会历史观的基本问题是()
战略数据规划方法中,一般将产品、服务及资源的生命周期划分为几个阶段,它们分别是:计划、获得、管理和【】。
最新回复
(
0
)