首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How did the name of "computer virus" come into being?
How did the name of "computer virus" come into being?
admin
2017-05-31
34
问题
How did the name of "computer virus" come into being?
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction The Adolescence of P-1 written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So called "benign" or the harmless viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’ s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk. There are several kinds of anti-virus software providing the services for prevent the virus from attacking your computer. So you should install the anti-virus software before your access to the Internet. It will be no use to install the software after you’ve got infected.
选项
A、It is a virus that causes great damage.
B、It is a virus that once infected the IBM’ s computer system.
C、It is a virus that carries a Christmas greeting.
D、It is a virus that causes no harm to the computer systems.
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/S3Vd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
Didyoueverhavesomeone’snameonthetipofyourtongueandyetyouwereunabletorecallit?【C1】______thishappensagain,do
Didyoueverhavesomeone’snameonthetipofyourtongueandyetyouwereunabletorecallit?【C1】______thishappensagain,do
Didyoueverhavesomeone’snameonthetipofyourtongueandyetyouwereunabletorecallit?【C1】______thishappensagain,do
SupposeyouaretheChairmanoftheStudentAssociationinchargeofthetreatmentofagroupofvisitingstudentfromCanada.W
Corporationsasagroupofferavarietyofjobs.Mostlargecompaniessendpeopletocollegestointerviewgraduatingstudentsw
Corporationsasagroupofferavarietyofjobs.Mostlargecompaniessendpeopletocollegestointerviewgraduatingstudentsw
Whatwillthemandotonight?
Whatwillthemandotonight?
Whatwillthemandotonight?
随机试题
具有清热化痰功效的药组是
选用FIDIC编写的“雇主/咨询工程师标准协服务议书”的合同文本的“一般条件”包括哪些内容?
在账簿选项中,可修改的是()。
十六届三中全会提出了要建立健全国有资产管理和监督体制,主要内容有( )。
集团项目组还应当确定参与组成部分注册会计师工作的性质、时间安排和范围。集团项目组确定对组成部分财务信息拟执行工作的类型以及参与组成部分注册会计师工作的程度,受下列()因素影响。
在学校中设经义斋和治事斋的人物是
防火墙是隔离内部和外部网的一类安全系统。通常防火墙中使用的技术有过滤和代理两种。路由器可以根据(47)进行过滤,以阻挡某些非法访问。(48)是一种代理协议,使用该协议的代理服务器是一种(49)网关。另外一种代理服务器使用(50)技术,它可以把内部网络中的某
Jeanwastravellingbycarinthecountry.Onedayshestoppedinfrontofabeautifuloldhouse.Shegotoutandtookacareful
A、Travelingbecameeasier.B、Theinventionofwheel.C、ThestagecoachinAmerica.D、Thereasonofroadsdevelopmcnt.A
FromOurDarkestDay,OurBrightestHopeThatawfulSeptembermorning,whenjet-linersrainedfromthesky,andtheworstan
最新回复
(
0
)