首页
登录
职称英语
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
游客
2023-09-09
9
管理
问题
The computer virus is an outcome of the computer overgrowth in
the 1980s. The cause of this term is the likeness between the biological
virus and the evil program infected with computers. The origin of this
term came an American science fiction "The Adolescence of P-1" written 【S1】______
by Thomas J. Ryan published in 1977. Human viruses invade a living
cell and turn them into a factory for manufacturing viruses. 【S2】______
Therefore, computer viruses are small programs. They replicate by attaching 【S3】______
a copy of themselves to another program.
Once attached by host program, the viruses then look for other programs 【S4】______
to" infect". In this way, the virus can spread quickly throughout a
hard disk or an entire organization. At some points, the situation will be 【S5】______
totally determined by how the virus was programmed. The timing of the
attack can be linked to a number of situations, included a certain time 【S6】______
or date, the presence of a particular file, the security privilege level of
the user and the number of times a file is used. So-called" benign" viruses
might simply display a message, like the one that infected IBM’s
main computer system last Christmas with a season’s greeting. Malignant
viruses are designed to damage the system. The attack is to wiping 【S7】______
out data, to delete files or to format the hard disk.
There are two main types of viruses: shell and intrusive system.
Shell viruses wrap themselves around a host program and don’t modify
the original program. Shell programs are easy to write, that is why about 【S8】______
half of viruses are of this type. Intrusive viruses invade an existing program
and actual insert a portion of themselves into the host program. 【S9】______
Intrusive viruses are hard to write and very difficult to remove with 【S10】______
damaging the host file. [br] 【S7】
选项
答案
wiping→wipe
解析
非谓语动词误用。be+ to do系动词+不定式结构表示“将要做某事”,to后面要接动词原形。
转载请注明原文地址:https://tihaiku.com/zcyy/2998827.html
相关试题推荐
[originaltext]Althoughthefirstcomputerswereproducedforuseingovernm
[audioFiles]audio_eusm_0218(20106)[/audioFiles]A、Hiscomputerdoesn’tworkwell
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
[audioFiles]audio_eusm_0127(20106)[/audioFiles]A、Aschoolmaster.B、Acomputer
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
随机试题
Whywasthespeedlimitsetat55milesperhourinthefirstplace?[originalte
[originaltext]W:I’vegotafewthingsforCathy.M:Afew?Itseemsthatyou
测定矿粉的密度及相对密度,用于检验矿粉的质量,为()配合比设计提供必要的参数。
用2检验法,作双边统计假设检验时,如果是拒绝了H0,其判定的依据必是()。A.
腹部最易损伤的空腔脏器是A.结肠 B.胃 C.小肠 D.直肠 E
国务院证券监督管理机构可以要求下列()单位或者个人,在指定的期限内提供与证券公
A.补骨脂B.骨碎补C.葳蕤D.潼蒺藜E.天冬沙苑子又称
A.人参B.黄芪C.白术D.防风E.茯苓生脉散的君药是()。
简述我国法律责任的归责原则。
如果既定的配置状态能够在其他人福利水平不下降的情况下,通过资源重新配置使至少一个
最新回复
(
0
)