首页
登录
职称英语
[originaltext] The computer virus is an outcome of the computer overgrowth i
[originaltext] The computer virus is an outcome of the computer overgrowth i
游客
2023-07-08
34
管理
问题
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction "The Adolescence of P-l" written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multiuser system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So called "benign" or the harmless viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 22 to 25 are based on the passage you have just heard.
22. How did the name of "computer virus" come into being?
23. What is the way that the computer viruses infect the computer system?
24. What is a "benign" virus?
25. What can a "malignant" virus do to your computer?
选项
A、They invade the computer and make it a place for manufacturing.
B、They spread throughout the whole system by quickly copying themselves.
C、They infect the hard disc and the whole system.
D、They spread viruses inside the computer system.
答案
B
解析
细节题。文章先介绍了人类病毒的工作方式,然后用一个however引出了本题的答案,即计算机病毒通过将副本附属到另一个程序上而进行扩散。
转载请注明原文地址:https://tihaiku.com/zcyy/2818053.html
相关试题推荐
[originaltext]Cottonvilleisanewprisonspeciallydesignedforwomencrim
[originaltext]M:WhocameupwiththeideaofFather’sDay?W:HernamewasSon
[originaltext]M:WhocameupwiththeideaofFather’sDay?W:HernamewasSon
[originaltext]AsmorewomenintheUnitedStatesmoveuptotheprofessiona
[originaltext]AsmorewomenintheUnitedStatesmoveuptotheprofessiona
[originaltext]M:Excuseme,areyouwaitingforbuyingtheconcertticket?W:Y
[originaltext]M:Excuseme,areyouwaitingforbuyingtheconcertticket?W:Y
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
[originaltext]SomestudentsattheOpenUniversityleftschool20yearsago
[originaltext]Australia,thelastcontinenttobe"discovered",wassighted
随机试题
[originaltext]M:IhavepassedthetestofspokenEnglishandIwonderifIcan
关于沥青面料的选择,错误的是( )。A.改性沥青可单独或复合采用高分子聚合物.天
决策是一项复杂的管理活动,有其自身的规律性,需要遵循科学的程序。下列选项正确的是
下列不属于弱电工程的是( )。A.通讯系统 B.广播系统 C.消防报警的供
对一50岁男性面瘫病人进行神经兴奋性试验(NET),NET为多少毫安提示神经变性
商业银行应当根据报告内容、业务及组合种类、风险特征等差异,合理确定报告层级和报告
操作风险评估过程一般从业务管理和风险管理两个层面开展,其遵循的原则一般包括()。
影响建筑材料单价变动的因素包括()。A.定额材料消耗量 B.材料生产成本
建筑安装工程概算中工程量计算的评审内容不包括()。A、审查工程量计算规则的选用
A.1个 B.2个 C.3个 D.4个 E.5个PKA中的每个调节亚基可
最新回复
(
0
)