首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
admin
2013-11-24
16
问题
Computer Virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction"The Adolescence of P—l"writ-ten by Thomas J . Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi—user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So —called "benign" viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting.
Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don’t modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
You have to damage the host file if you want to remove Intrusive virus.
选项
A、Right
B、Wrong
C、Not mentioned
答案
A
解析
转载请注明原文地址:https://jikaoti.com/ti/a1NsFFFM
本试题收录于:
职称英语综合类A级题库职称英语分类
0
职称英语综合类A级
职称英语
相关试题推荐
SingingAlarmsCouldSavetheBlindIfyoucannotsee,youmaynotbeabletofindyourwayoutofaburningbuilding—andth
SingingAlarmsCouldSavetheBlindIfyoucannotsee,youmaynotbeabletofindyourwayoutofaburningbuilding—andth
FreezingtoDeathforBeautyPeopleinBeijingwearalotofclothingduringwintertofendoffthecold.IntheUnitedStates,
Practicallyallspeciesofanimalscommunicateeitherthroughsoundsorthroughalargerepertoryofsoundlesscodes.
IseldomwatchTV.
ATheWideUseofEnglishBHistoricalAccountofEnglishandItsCommunityCTheAdvantagesofLearningaSecondLanguageDThe
LifeConnectedwithComputerAftertoolongontheNet,evenaphonecallcanbeashock.Myboyfriend’sLiverpudlianaccent
Apetitionneedstobesigned.ItisimpossibleforthePrimeMinistertohearalloftheopinions.
Thesearethemotivesfordoingit.
WhatdidtheteamwithNOAAandSeaGrantaimtodoattheNationalPressClubin2002?Scientistsaregreatlyastonishedby___
随机试题
车辆上坡行驶,要提前观察路况、坡道长度,及时减挡使车辆保持充足的动力。
共同配送是以提高经济效益为目标,由几个配送企业联合起来集小量为大量,共同利用同一配送设施或____________进行配送的方式。
A.WhendoyouneeditB.DoyouhaveanyavailableC.WhatdoyoumeanD.MayIcomeovertomorrowtotakealook
A.抗体B.补体C.抗菌肽E.干扰素D.穿孔素由B淋巴细胞转化为浆细胞产生的免疫分子是()
不应安装在可燃基座上的灯具有()
货币期货业务是按照成交单位与交割时间由()原则来进行的。
根据材料,回答下面问题总体看来,2004年世界各国的石油探明储量基本变化不大。但是由于BP公司修正了前苏联、哈萨克斯坦、伊朗、利比亚和苏丹等国的数据,特别是哈萨克斯坦从12亿吨修正到54亿吨,从而使各国在全球石油储量分布中所占的比例发生了一些变化。
曲线在t=1处的曲率k=__________.
打开考生文件夹下的演示文稿yswg.pptx,按照下列要求完成对此文稿的修饰并保存。将第一张幻灯片版式改为“两栏内容”,标题为“电话管理系统”,将考生文件夹下的图片文件pptl.jpg插入到第一张幻灯片右侧内容区,左侧文本动画设置为“进入”、“下拉”
Withvariouspressuresinsocietyincreasingdaybyday,manypeoplearesufferingfrommentalproblems.However,fewofthemvo
最新回复
(
0
)