首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How did the name of "computer virus" come into being?
How did the name of "computer virus" come into being?
admin
2016-06-24
60
问题
How did the name of "computer virus" come into being?
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction The Adolescence of P-\ written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They expand by attaching a copy of themselves to another program. Once attached to the host program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So called "benign" or the harmless viruses might simply display a message, like the one that infected IBM’ s main computer system last Christmas with a season’ s greeting. Malignant or the harmful viruses are designed to damage the system. The attack is to wipe out data, to delete files, or to format the hard disk. There are several kinds of anti-virus software providing the services for prevent the virus from attacking your computer. So you should install the anti-virus software before your access to the Internet. It will be no use to install the software after you’ ve got infected.
选项
A、It is a virus that causes great damage.
B、It is a virus that once infected the IBM’ s computer system.
C、It is a virus that carries a Christmas greeting.
D、It is a virus that causes no harm to the computer systems.
答案
D
解析
转载请注明原文地址:https://www.kaotiyun.com/show/YnVd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
TheGovernmenthasalmostdoubleditsspendingoncomputereducationinschools.Mr.WilliamShelton,juniorEducationMinister,
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Belowisagraphshowingtheaveragenumberofhoursastudentspendsonthecomputerperweek.Lookatthegraphandwriteane
Futuristslovecomputers.Afterall,40yearsagoelectronicdigitalcomputersdidn’texist;todaymicrochipsastinyasababy’s
Thepotentialofcomputersforincreasingthecontroloforganizationsorsocietyovertheirmembersandforinvadingtheprivac
Whatwillthemandotonight?
Whatwillthemandotonight?
随机试题
中华全国文学艺术工作者代表大会(第一次文代会)召开的时间是()
A、肾小球B、近球小体C、近球小管D、髓袢E、远曲小管和集合管原尿生成的部位是
根据《岩土工程勘察规范3(GB50027-2001)(2009年版),当标准贯入试验锤击数为45击时,花岗岩的风化程度应判定为下列哪一个选项?()
“预提费用”账户的贷方余额表示()。
下列各项中,符合我国《仲裁法》的规定,可以申请仲裁解决的是()。
你认为怎样才能提高监狱警察在教育改造中的作用?
一人去商店买东西钱不够,跟商店商量先把手表押这,过两天再来还钱,则商店对手表享有()。
设随机变量X的密度函数为f(x)=(-∞<x<+∞).求Cov(X,|X|),问X,|X|是否不相关?
请说出图9-1的拓扑结构名称与特点。根据IP地址与子网掩码,请判断它们是否属于同一个网段?如果不是,请说出他们分别属于哪个网段。
软件测试自动化是指利用好的测试工具以自动运行测试用例。软件测试自动化的好处在于______。
最新回复
(
0
)