首页
登录
职称英语
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
游客
2023-09-09
36
管理
问题
The computer virus is an outcome of the computer overgrowth in
the 1980s. The cause of this term is the likeness between the biological
virus and the evil program infected with computers. The origin of this
term came an American science fiction "The Adolescence of P-1" written 【S1】______
by Thomas J. Ryan published in 1977. Human viruses invade a living
cell and turn them into a factory for manufacturing viruses. 【S2】______
Therefore, computer viruses are small programs. They replicate by attaching 【S3】______
a copy of themselves to another program.
Once attached by host program, the viruses then look for other programs 【S4】______
to" infect". In this way, the virus can spread quickly throughout a
hard disk or an entire organization. At some points, the situation will be 【S5】______
totally determined by how the virus was programmed. The timing of the
attack can be linked to a number of situations, included a certain time 【S6】______
or date, the presence of a particular file, the security privilege level of
the user and the number of times a file is used. So-called" benign" viruses
might simply display a message, like the one that infected IBM’s
main computer system last Christmas with a season’s greeting. Malignant
viruses are designed to damage the system. The attack is to wiping 【S7】______
out data, to delete files or to format the hard disk.
There are two main types of viruses: shell and intrusive system.
Shell viruses wrap themselves around a host program and don’t modify
the original program. Shell programs are easy to write, that is why about 【S8】______
half of viruses are of this type. Intrusive viruses invade an existing program
and actual insert a portion of themselves into the host program. 【S9】______
Intrusive viruses are hard to write and very difficult to remove with 【S10】______
damaging the host file. [br] 【S10】
选项
答案
with→without
解析
用词不当。本句详细描述侵入性病毒,根据上一句的含义“这种病毒侵入主程序”,因此可以推断不破坏主程序是很难将其清除的,with表示肯定,应当用反义词without。
转载请注明原文地址:http://tihaiku.com/zcyy/2998830.html
相关试题推荐
[originaltext]Althoughthefirstcomputerswereproducedforuseingovernm
[audioFiles]audio_eusm_0218(20106)[/audioFiles]A、Hiscomputerdoesn’tworkwell
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
随机试题
__________(只有通过实践你才)beabletoimproveyourspokenEnglishandgraduallyspeak
消防控制设备对自动喷水和水喷雾灭火系统应有( )等控制、显示功能。A.控制系统
图示桁架,在结点C处沿水平方向受P力作用。各杆的抗拉刚度相等。若结点C的铅垂位移
含有毒性及刺激性强的药物宜制成() A、水丸 B、蜜丸 C、水蜜丸 D
三仁汤与八正散两方组成中均含有的药物是A.栀子B.滑石C.木通D.竹叶E.车前子
新生儿第一次接种乙肝疫苗在出生后A:8小时 B:1O小时 C:12小时 D
1840年鸦片战争后,随着资本一帝国主义的入侵,中国的社会性质发生了质的变化,“
对于追求成长战略的企业来说,其薪酬管理的指导思想是()。A.追求效率最大化
变动成本法下,产品成本包括()。A.直接材料 B.直接人工 C.变动性
根据《建设工程质量管理条例》,关于设计单位权利的说法,正确的是()。A.为
最新回复
(
0
)