首页
登录
职称英语
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
游客
2024-06-01
10
管理
问题
The computer virus is an outcome of the computer overgrowth in
the 1980s. The cause of this term is the likeness between the biological
virus and the evil program infected with computers. The origin of this
term came an American science fiction "The Adolescence of P-1" written 【S1】______
by Thomas J. Ryan published in 1977. Human viruses invade a living
cell and turn them into a factory for manufacturing viruses. 【S2】______
Therefore, computer viruses are small programs. They replicate by attaching 【S3】______
a copy of themselves to another program.
Once attached by host program, the viruses then look for other programs 【S4】______
to" infect". In this way, the virus can spread quickly throughout a
hard disk or an entire organization. At some points, the situation will be 【S5】______
totally determined by how the virus was programmed. The timing of the
attack can be linked to a number of situations, included a certain time 【S6】______
or date, the presence of a particular file, the security privilege level of
the user and the number of times a file is used. So-called" benign" viruses
might simply display a message, like the one that infected IBM’s
main computer system last Christmas with a season’s greeting. Malignant
viruses are designed to damage the system. The attack is to wiping 【S7】______
out data, to delete files or to format the hard disk.
There are two main types of viruses: shell and intrusive system.
Shell viruses wrap themselves around a host program and don’t modify
the original program. Shell programs are easy to write, that is why about 【S8】______
half of viruses are of this type. Intrusive viruses invade an existing program
and actual insert a portion of themselves into the host program. 【S9】______
Intrusive viruses are hard to write and very difficult to remove with 【S10】______
damaging the host file. [br] 【S4】
选项
答案
by→to
解析
搭配错误。attach表示“依附,依附于某物”,应当加介词to。
转载请注明原文地址:https://tihaiku.com/zcyy/3615090.html
相关试题推荐
[originaltext]Althoughthefirstcomputerswereproducedforuseingovernm
[originaltext]Althoughthefirstcomputerswereproducedforuseingovernm
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
随机试题
赵之谦《拙政园月到风来亭联》“爽()清风明()月;动()流水静()山”中空处正确
近年来,我国浙江省的特色小镇建设迅速。这些特色小镇既有茶叶、丝绸、黄酒等历史经典
某工作的总时差为3天,自由时差为2天,施工过程中只有该工作延误了2天,则下列说法
可引起24h尿17-羟皮质类固醇降低的是A.肾上腺皮质功能亢进病 B.甲状腺功
在药物利用分析中首先要确定DDD(限定日剂量)值的是A、购药数量分析 B、处方
A.第二产程延长 B.潜伏期延长 C.第二产程停滞 D.活跃期停滞 E.
对门静脉高压症的诊断最有价值的表现是A.脾大,脾功能亢进 B.黄疸、腹水 C
每月末,在最后一张记账凭证填制后,应在编号旁加注()字,以免凭证散失。A
图示的桥式整流电路中,已知Ui=100sinωt(V),Ri=1kΩ,若忽略二极
简述侵犯商业秘密罪的具体行为表现。
最新回复
(
0
)