首页
登录
职称英语
[originaltext] The computer virus is an outcome of the computer overgrowth i
[originaltext] The computer virus is an outcome of the computer overgrowth i
游客
2023-07-02
54
管理
问题
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction "The Adolescence of P-l" written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multiuser system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So-called "benign" or the harmless viruses might simply display a mes-sage, like the one that infected IBM’s main computer system last Christmas with a season’s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 22 to 25 are based on the passage you have just heard.
22. How did the name of "computer virus" come into being?
23. What is the way that the computer viruses infect the computer system?
24. What is a "benign" virus?
25. What can a "malignant" virus do to your computer?
选项
A、They invade the computer and make it a place for manufacturing.
B、They spread throughout the whole system by quickly copying themselves.
C、They infect the hard disc and the whole system.
D、They spread viruses inside the computer system.
答案
B
解析
细节题。文章先介绍了人类病毒的工作方式,然后用一个however引出了本题的答案,即计算机病毒通过将副本附属到另一个程序上而进行扩散。
转载请注明原文地址:https://tihaiku.com/zcyy/2800566.html
相关试题推荐
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
随机试题
Johnstayeduplateindefianceofthecoach’sorder.Theunderlinedpartmeans
FindingYourExcellence:BecomingWhoYouAre1.Be【T1】______
Forthispart,youareallowed30minutestowriteashortessay.Youshouldsta
若将1L常温的水(20℃)喷洒到火源处,使水温升到100℃,则要吸收热量()
档案信息开发利用工作的目的是最大限度满足本单位的档案信息需求。()
IP分组首部中,TTL的初始值会根据发送数据的源主机的系统会有所不同,TTL初始
患儿,3个月。易激惹,烦躁多哭,夜寐不安,多汗,摇头擦枕,生长发育与同龄儿相同。
利血平的不良反应包括A、注意力不集中、神经紧张、焦虑 B、柏油样黑色大便、呕血
消防救援机构对辖区内多家单位开展消防监督检查,根据现行国家标准《重大火灾隐患判定
坚决整治侵害群众利益、基层党组织软弱涣散、对黄赌毒和黑恶势力听之任之甚至充当__
最新回复
(
0
)