首页
登录
职称英语
[originaltext] The computer virus is an outcome of the computer overgrowth i
[originaltext] The computer virus is an outcome of the computer overgrowth i
游客
2024-02-05
38
管理
问题
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction "The Adolescence of P-1" written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multiuser system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So-called "benign" or the harm-less viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 22 to 25 are based on the passage you have just heard.
22. How did the name of "computer virus" come into being?
23. What is the way that the computer viruses infect the computer system?
24. What is a "benign" virus?
25. What can a "malignant" virus do to your computer?
选项
A、They invade the computer and make it a place for manufacturing.
B、They spread throughout the whole system by quickly copying themselves.
C、They infect the hard disc and the whole system.
D、They spread viruses inside the computer system.
答案
B
解析
细节题。文章先介绍了人类病毒的运作方式,然后用一个however引出了本题的答案,即计算机病毒通过将副本附属到另一个程序上而进行扩散。
转载请注明原文地址:https://tihaiku.com/zcyy/3423175.html
相关试题推荐
[originaltext]M:Excuseme.Ineedsomeinformationaboutsomeofthetownsnea
[originaltext]Advertisingisthetoolthathasalwaysbeenusedtoconvince
[originaltext]Advertisingisthetoolthathasalwaysbeenusedtoconvince
[originaltext]Advertisingisthetoolthathasalwaysbeenusedtoconvince
[originaltext]ThelatestreportfromtheInstituteforInternationalEducat
[originaltext]ThelatestreportfromtheInstituteforInternationalEducat
[originaltext]Thevastoceansoftheworldaredark,deepandmysteriouspl
[originaltext]W:I’vebeenreadingaboutnewhealthysnackfood.It’smadefrom
[originaltext]W:Whatareyoureadingnow?M:I’mlookingatthisbeautyinthe
[originaltext]W:Whatareyoureadingnow?M:I’mlookingatthisbeautyinthe
随机试题
Peopleappeartobeborntocompute.Thenumericalskillsofchildrendevelo
[originaltext]M:Mathdepartment,DoctorWebsterspeaking.W:Hello,Professor
Theyinsistedthat______(生存权优先于对其他事的考虑).therighttolivetakepriorityovera
典型的特色菜有( )。A.双人套餐及其他各式套餐 B.家庭套餐 C.海味特
卫生服务研究侧重于研究().().()三者之间的关系。
产品成本计算期必须与产品的生产周期一致。()
患者,男,腹腔手术后,麻醉完全清醒后应取哪种卧位( )A.屈膝仰卧位 B.去
高等学校社会服务的原则有()。A.培养人才与研究开发相结合 B.学术价值
正方体切掉一块后剩余部分如下图左侧所示,右侧哪一项是其切去部分的形状? A
学生最主要的权利是()。 A.人身自由权 B.人格尊严权 C.名誉权 D
最新回复
(
0
)