首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
admin
2013-11-24
21
问题
Computer Virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction"The Adolescence of P—l"writ-ten by Thomas J . Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi—user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So —called "benign" viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting.
Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don’t modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
You have to damage the host file if you want to remove Intrusive virus.
选项
A、Right
B、Wrong
C、Not mentioned
答案
A
解析
转载请注明原文地址:https://jikaoti.com/ti/a1NsFFFM
本试题收录于:
职称英语综合类A级题库职称英语分类
0
职称英语综合类A级
职称英语
相关试题推荐
SingingAlarmsCouldSavetheBlindIfyoucannotsee,youmaynotbeabletofindyourwayoutofaburningbuilding—andth
FreezingtoDeathforBeautyPeopleinBeijingwearalotofclothingduringwintertofendoffthecold.IntheUnitedStates,
DetoxbeginsafterChristmaswhenpeoplethinkthattheyhavebeenovereatingduringtheChristmasseasonandhavetakeninmany
Examinationpapersoftheclassweremarkedwithoutbias.
IntegratingAllCommunications1.Haveyoueverfeltfrustratedwhenyouhavetocontactyourfriends,butcannotreachtheme
ManandComputerWhatmakespeopledifferentfromcomputerprograms?Whatisthemissingelementthatourtheoriesdon’tyet
ProblemsoftheElderlyGerontologists(老年人问题学者)studyhowoldpeoplearetreatedwithinasocietyandhowtheelderlydeal
Hewaspersuadedtogiveuptheidea.
Theriverwidensconsiderablyasitbeginstoturnwest.
随机试题
脑疝的治疗原则。
根据沪、深证券交易所现行的资金清算规则,交易资金采用T+3日交割制度。( )
从证券公司证券部管理要求上看,风险管理是一证券公司证券营业部的管理核心。( )
甲公司系2016年12月成立的股份有限公司,对所得税采用资产负债表债务法核算,适用的企业所得税税率为25%,计提的各项资产减值准备均会产生暂时性差异,当期发生的可抵扣暂时性差异预计能够在未来期间转回。甲公司每年年末按净利润的10%计提法定盈余公积。(1)
形成性评价的根本目的是()。
全国人民代表大会代表或县级以上地方人民代表大会代表,如果因为是现行犯被拘留,执行拘留的公安机关应当立即向该级人民代表大会主席团或者常务委员会报告。()
近些年来。有许多政府官员开通实名制微博,和网友进行在线交流。对于这件事情,你怎么看?
根据以下资料,回答116-120题。与2004年相比,2008年货物进出口总额的增长幅度约为()。
威尼斯商人马可-波罗游历中国大地后的游记,为西方世界揭开了东方国度的神秘面纱。
(1)Afarcryfromthepiratesandprincessesoftoday,costumesduringHalloween’sprecursorcenturiesagoincludedanimalskin
最新回复
(
0
)