首页
登录
职称英语
[originaltext] The computer virus is an outcome of the computer overgrowth i
[originaltext] The computer virus is an outcome of the computer overgrowth i
游客
2023-07-02
32
管理
问题
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction "The Adolescence of P-l" written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multiuser system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So-called "benign" or the harmless viruses might simply display a mes-sage, like the one that infected IBM’s main computer system last Christmas with a season’s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 22 to 25 are based on the passage you have just heard.
22. How did the name of "computer virus" come into being?
23. What is the way that the computer viruses infect the computer system?
24. What is a "benign" virus?
25. What can a "malignant" virus do to your computer?
选项
A、It can cause no damages at all.
B、It can cause damages to the computer systems.
C、It can copy your files in computers.
D、It can format your hard drive.
答案
B
解析
细节题。文章在最后提到恶性病毒能够破坏电脑系统。
转载请注明原文地址:https://tihaiku.com/zcyy/2800568.html
相关试题推荐
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
Childrenwhospendmorethantwohoursadayatacomputerorwatchingtelev
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
PreparingforComputerDisastersSummaryA)Whenhomeofficecomp
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
[originaltext]M:Didyoureallygiveawayallyourfurniturewhenyoumovedint
随机试题
[originaltext]ThenumberofspeakersofEnglishinShakespeare’stimeises
TheCultureDebateintheUS:WhoseCultureIsThis,Anyway?
[originaltext]M:It’ssocoldnow,butthismorningitwassohotandsunny.I
银行业监督管理机构依法实施行政处罚,对()具有重要作用。A.提升银行业务依
下列不属于新课程结构特点的是__________。A.均衡性 B.综合性 C
混凝土入仓铺料采用斜层浇筑法时,浇筑块高度一般限制在()m左右。A、1.0 B
不属于中成药处方审查项目的是A.处方用药与临床诊断是否相符B.含有剧毒药的中成药
在设计施工总承包合同模式下,承包人设计文件提交监理人后,由( )组织设计审查,自
下列可以列入集合资产管理计划费用的是()。A:集合资产管理计划推广期间的费用B
经营机构应当了解所销售产品或者所提供服务的信息,根据风险特征和程度,对销售的产品
最新回复
(
0
)