首页
登录
职称英语
[originaltext] The computer virus is an outcome of the computer overgrowth i
[originaltext] The computer virus is an outcome of the computer overgrowth i
游客
2023-07-02
80
管理
问题
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction "The Adolescence of P-l" written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multiuser system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So-called "benign" or the harmless viruses might simply display a mes-sage, like the one that infected IBM’s main computer system last Christmas with a season’s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 22 to 25 are based on the passage you have just heard.
22. How did the name of "computer virus" come into being?
23. What is the way that the computer viruses infect the computer system?
24. What is a "benign" virus?
25. What can a "malignant" virus do to your computer?
选项
A、They invade the computer and make it a place for manufacturing.
B、They spread throughout the whole system by quickly copying themselves.
C、They infect the hard disc and the whole system.
D、They spread viruses inside the computer system.
答案
B
解析
细节题。文章先介绍了人类病毒的工作方式,然后用一个however引出了本题的答案,即计算机病毒通过将副本附属到另一个程序上而进行扩散。
转载请注明原文地址:http://tihaiku.com/zcyy/2800566.html
相关试题推荐
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
随机试题
WhichofthefollowingwillNOTpossiblyleadtoheartdisease?[br][originalt
[originaltext]TheNationalAssociationofCollegesandEmployers(NACE)colle
若有带外数据需要传送,TCP报文中()标志字段置“1”。A.PSH B.FI
政府引导基金对创业投资基金支持方式中的融资担保说法正确的是( )。A.是指政府
早幼粒细胞具有的特点是()。A.胞质中颗粒大小和形态不一,呈紫红色或者蓝黑色,
A.0.3 B.0.95~1.05 C.1.5 D.6 E.10含量均匀
站用电I类负荷:短时停电可能影响人身或设备安全,使生产运行停顿或主变压器减载的负
企业各职能部门集中制订生产计划,这体现了MRPⅡ的()特点A.数据的共享性
投资项目决策分析与评价的基本要求包括贯彻落实科学发展观、资料数据准确可靠和()
2013年9月8日7时58分,某矿业有限公司的金属非金属矿山尾矿库左岸的坝顶下方
最新回复
(
0
)