首页
登录
职称英语
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
游客
2023-09-09
49
管理
问题
The computer virus is an outcome of the computer overgrowth in
the 1980s. The cause of this term is the likeness between the biological
virus and the evil program infected with computers. The origin of this
term came an American science fiction "The Adolescence of P-1" written 【S1】______
by Thomas J. Ryan published in 1977. Human viruses invade a living
cell and turn them into a factory for manufacturing viruses. 【S2】______
Therefore, computer viruses are small programs. They replicate by attaching 【S3】______
a copy of themselves to another program.
Once attached by host program, the viruses then look for other programs 【S4】______
to" infect". In this way, the virus can spread quickly throughout a
hard disk or an entire organization. At some points, the situation will be 【S5】______
totally determined by how the virus was programmed. The timing of the
attack can be linked to a number of situations, included a certain time 【S6】______
or date, the presence of a particular file, the security privilege level of
the user and the number of times a file is used. So-called" benign" viruses
might simply display a message, like the one that infected IBM’s
main computer system last Christmas with a season’s greeting. Malignant
viruses are designed to damage the system. The attack is to wiping 【S7】______
out data, to delete files or to format the hard disk.
There are two main types of viruses: shell and intrusive system.
Shell viruses wrap themselves around a host program and don’t modify
the original program. Shell programs are easy to write, that is why about 【S8】______
half of viruses are of this type. Intrusive viruses invade an existing program
and actual insert a portion of themselves into the host program. 【S9】______
Intrusive viruses are hard to write and very difficult to remove with 【S10】______
damaging the host file. [br] 【S7】
选项
答案
wiping→wipe
解析
非谓语动词误用。be+ to do系动词+不定式结构表示“将要做某事”,to后面要接动词原形。
转载请注明原文地址:http://tihaiku.com/zcyy/2998827.html
相关试题推荐
[originaltext]Althoughthefirstcomputerswereproducedforuseingovernm
[audioFiles]audio_eusm_0218(20106)[/audioFiles]A、Hiscomputerdoesn’tworkwell
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
[audioFiles]audio_eusm_0127(20106)[/audioFiles]A、Aschoolmaster.B、Acomputer
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
随机试题
Voca
Weather______,we’llhaveanoutingtomorrow.A、permitsB、permittedC、permittin
[originaltext]Wouldyoumindclosingthedoor?[/originaltext][audioFiles]2017m
下列关于贷款组合信用风险的说法,不正确的有( )。A.贷款组合内的单笔贷款之间
按成本项目进行的成本分析有()。 A、工期成本分析 B、资金成本分析
社会工作者在成长小组的下列做法中,能体现与组员沟通的技巧的是()。A.在小组中
党的十九大报告指出:“我国经济已由高速增长阶段转向高质量发展阶段”。2018年1
固定桥修复中,不是影响基牙数目确定的因素是A.咬合情况 B.邻牙牙槽骨情况
( )是指某项测评指标(因素)在决定该项目成功与否的各因素中所占的权重,这一权
根据FIDIC《施工合同条件》,履约保函担保承包商合同约定履行义务的期限为()A
最新回复
(
0
)