首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
admin
2013-11-24
35
问题
Computer Virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction"The Adolescence of P—l"writ-ten by Thomas J . Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi—user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So —called "benign" viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting.
Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don’t modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
You have to damage the host file if you want to remove Intrusive virus.
选项
A、Right
B、Wrong
C、Not mentioned
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/xMUd777K
本试题收录于:
职称英语综合类A级题库职称英语分类
0
职称英语综合类A级
职称英语
相关试题推荐
RenewableEnergySourcesTodaypetroleumprovidesaround40%oftheworld’senergyneeds,mosdyfuellingautomobiles.Coali
FreezingtoDeathforBeautyPeopleinBeijingwearalotofclothingduringwintertofendoffthecold.IntheUnitedStates,
FreezingtoDeathforBeautyPeopleinBeijingwearalotofclothingduringwintertofendoffthecold.IntheUnitedStates,
Traditionalworkersshowednointerestinmanagement.Sincepolicydecisionsarebusinesssecretsofafirm,workersshouldnot
ThepowersoftheEuropeanCommissiontoregulatecompetitionintheCommunityareincreasing.
ComputersTheinitialimpactofcomputerswasintheareaofentertainment.Ifyouwalkedbyavideoarcadeintheearly19
LifeConnectedwithComputerAftertoolongontheNet,evenaphonecallcanbeashock.Myboyfriend’sLiverpudlianaccent
Atuningforkisanarrow,two-prongedsteelbarthatwhentunedtoaspecificmusicalpitchretainsitstuningalmostindefinit
It’simpossibletopredictwhethershe’llbewellenoughtocomehomefromhospitalnextmonth.
SavingaCity’sPublicArtAvoidingtrafficjamsinLosAngelesmaybeimpossible,butthecity’scolorfulfreewayrau-rals(
随机试题
已知|α|=3,|β|=26,|α×β|=72,则|α.β|=()
A.东北B.河南C.内蒙古D.河北安国E.云南祁白芷主产于()
某股份有限公司依照法定程序设立,根据法律规定,()为该公司取得民事主体资格的日期。
某膨胀土场地有关资料如下表,若大气影响深度为4.0m,拟建建筑物为两层,基础埋深为1.2m,按《膨胀土地区建筑技术规范》(GBJ112—87)的规定,计算膨胀土地基胀缩变形量最接近下列哪个选项中的值?()
期货经纪机构作为交易者与期货交易所之间的桥梁和纽带,一般具有的职能包括()。
一、注意事项1.申论考试是对应考者阅读理解能力、综合分析能力、提出和解决问题能力、文字表达能力和贯彻执行能力的测试。2.仔细阅读给定资料,按照后面提出的“作答要求”依次作答。二、给定资料1.2008年红网的“百姓呼声”,2009
坐在餐桌前,举筷享用食物,我们早已司空见惯,却浑然不知盘中美餐在全球范围内______的利害关系。现代社会高度分工,我们远离春耕秋收,只有食品价格飙升的时候,粮食生产才会引起我们关注。去年,粮价一路攀升,为我们的长期______敲响了警钟。
平面上有4个点A、B、C、D,已知AB、AC、AD、BC、BD的长度分别为25厘米、24厘米、12.5厘米、7厘米、12.5厘米。则CD的长度为多少厘米?
请用200字以内的文字,说明双机冗余热备方式主要解决的是系统运行中的哪些问题,以及在选择双机冗余热备产品时通常需要考虑哪些问题。请用300字以内的文字,分析公司向备份中心备份数据的时间间隔的选取、公司日常业务系统的运行性能,以及在灾难发生时数据损失情况
Someoneorsomethingthatis______looksstrongandisunlikelytobeeasilydamagedorinjured.
最新回复
(
0
)