首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
admin
2013-11-24
25
问题
Computer Virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction"The Adolescence of P—l"writ-ten by Thomas J . Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi—user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So —called "benign" viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting.
Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don’t modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
You have to damage the host file if you want to remove Intrusive virus.
选项
A、Right
B、Wrong
C、Not mentioned
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/xMUd777K
本试题收录于:
职称英语综合类A级题库职称英语分类
0
职称英语综合类A级
职称英语
相关试题推荐
RenewableEnergySourcesTodaypetroleumprovidesaround40%oftheworld’senergyneeds,mosdyfuellingautomobiles.Coali
SingingAlarmsCouldSavetheBlindIfyoucannotsee,youmaynotbeabletofindyourwayoutofaburningbuilding—andth
Itislogicalthatadetailedlearningofplantsandtheirpropertiesmustbeextremelyancient.Peoplecannotsurvivewithout
InterestsandStudyActivitiesAnarrowingofyourworkinterestsisimpliedinalmostanytransitionfromastudyenvironm
IntegratingAllCommunications1.Haveyoueverfeltfrustratedwhenyouhavetocontactyourfriends,butcannotreachtheme
ADoctorintheHouseBrushingyourteethtwiceadayshouldkeepthedentistaway.Butifagroupofscientificresearchers
Writtenrecordsseldomtellsocialscientistsallthattheywanttoknowaboutpastcultures.
Theriverwidensconsiderablyasitbeginstoturnwest.
随机试题
在电子商务产品创新的产品定义阶段,提供操作手册、电话支持等服务,属于产品三个构成层次中的()
某病人要做腰穿检查,有恐惧感。从医德要求考虑,临床医生应向病人做的主要工作是
患儿,2岁。既往确诊先心病室缺,近1周发热、咳嗽、近3天喘,听诊双肺可闻及中小水泡音,胸骨左缘3、4肋间闻及Ⅲ级收缩期杂音,肝肋弓下4cm,下述哪项处置是错误的
初产妇,女性,28岁。妊娠37周,因阴道流血就诊,诊断为前置胎盘,拟急行剖宫产收入院。护士首先应为患者做的是
下列关于目前规划的环境影响分析与评价中所用方法的叙述,正确的有()。
下列各项中,不属于会计计量属性的是()。
下列各项控制活动中,属于检查性控制的有()。
出版物不同于一般商品的最重要的特殊性,是出版物()。
2018年N省规模以上工业增加值比上年增加7.1%,增速比上年提高4.0个百分点。其中,新产品增长强劲。石墨及碳素制品增长42.8%,单晶硅增长1.2倍,多晶硅增长47.1%,汽车增长26.6%。1—11月,N省规模以上工业企业实现利润总额达到1
ITU标准OC一12的传输速率为()。
最新回复
(
0
)