首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How did the name of "computer virus" come into being?
How did the name of "computer virus" come into being?
admin
2016-06-24
39
问题
How did the name of "computer virus" come into being?
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction The Adolescence of P-\ written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So called "benign" or the harmless viruses might simply display a message, like the one that infected IBM’ s main computer system last Christmas with a season’ s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk. There are several kinds of anti-virus software providing the services for prevent the virus from attacking your computer. So you should install the anti-virus software before your access to the Internet. It will be no use to install the software after you’ ve got infected.
选项
A、It is a virus that causes great damage.
B、It is a virus that once infected the IBM’ s computer system.
C、It is a virus that carries a Christmas greeting.
D、It is a virus that causes no harm to the computer systems.
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/YnVd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
TheGovernmenthasalmostdoubleditsspendingoncomputereducationinschools.Mr.WilliamShelton,juniorEducationMinister,
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Belowisagraphshowingtheaveragenumberofhoursastudentspendsonthecomputerperweek.Lookatthegraphandwriteane
Writeanessayofabout120wordson"AdvantagesandDisadvantagesofHomeComputer".Refertothefollowingpoints:(1)The
Forthispart,youarerequestedtowriteanessayonthetopicComputerNetworksinthreeparagraphs.Thefirstsentenceofeac
Whatwillthemandotonight?
Whatwillthemandotonight?
随机试题
科举制(科举、科举制度)
计算机上使用的光盘存储器,以下说法错误的是_______。
[*]
A.门静脉内等回声团,其与管壁间血流变细,局部门静脉管壁规整清晰B.门静脉内稍强回声团,门静脉管壁残缺或不清楚C.门静脉主干为条索样强回声,周围可显示网络状管道,可见门静脉血流D.肝实质内纺锤形或卵圆球状无回声,与门静脉相通,内可见门静脉血流E.门
张某窃得同事一张银行借记卡及身份证,向丈夫何某谎称路上所拾。张某与何某根据身份证号码试出了借记卡密码,持卡消费5000元。关于本案,下列哪一说法是正确的?(2010年卷二14题)
某双代号网络计划如下图(时间单位:天),计算工期是()天。
港口与航道工程混凝土的耐久性是指()。
下列各项中,属于战略控制与预算控制的不同点的有()。
进程控制块(PCB)的内容一般可以分成调度信息和现场信息两大部分,下列哪一个属于现场信息?()
BecauseSouthAfricansaregenerallysobubbly(热情奔放的)andtalkative,silencesaysalot.Theyarepoliteaswellandifyouare
最新回复
(
0
)