首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
Computer Virus The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer vir
admin
2013-11-24
0
问题
Computer Virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction"The Adolescence of P—l"writ-ten by Thomas J . Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi—user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So —called "benign" viruses might simply display a message, like the one that infected IBM’s main computer system last Christmas with a season’s greeting.
Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don’t modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
There are two kinds of attack modes.
选项
A、Right
B、Wrong
C、Not mentioned
答案
A
解析
转载请注明原文地址:https://www.kaotiyun.com/show/tMUd777K
本试题收录于:
职称英语综合类A级题库职称英语分类
0
职称英语综合类A级
职称英语
相关试题推荐
TightenedVisaRegulationsAccordingtoSouthKorea’snewvisaregulations,nativespeakersofEnglishinSouthKoreawillb
"...thesearecitiesconcernedwiththepast"inthefirstparagraphrefertocitiesthatPsychologistsfindtheliftagoodpl
Hundredsofbuildingswerewreckedbytheearthquake
IntegratingAllCommunications1.Haveyoueverfeltfrustratedwhenyouhavetocontactyourfriends,butcannotreachtheme
Iwasastonishedatthenewsofhisescape.
Duringthepasttenyearstherehavebeendramaticchangesintheinternationalsituation.
CementwasseldomusedinbuildingtheMiddleAges.
Agreatdealhasbeendonetoremedythesituation.
Duringthepasttenyearstherehavebeendramaticchangesintheinternationalsituation.
随机试题
简述我国货币政策目标的意义。
特许经营
应用硝酸甘油缓解心绞痛,正确的护理是
按现行《房产测量规范》,房屋层高()m以下不计算建筑面积。
关于疏散楼梯最小净宽度的说法,符合现行国家技术标准的有()。
未经()批准,任何公司和个人不得委托或者接受他人委托持有或者管理期货公司的股权。
网络计划调整时,非关键工作在其时差范围内进行调整的目的有()。
公安赔偿中的损害是客观上已经发生的对人身权、财产权的损害,还包括可能造成的损害和仅形成危险的情况。()
对于一个真正的作家来说,成为新闻人物是一种灾难。_________,两者在本性上是互相敌对的。福克纳称文学是“世界上最孤寂的职业”,写作如同一个遇难者在大海上挣扎,永远是孤军奋战,谁也无法帮助一个人写他要写的东西。这是一个真正有自己的东西要写的人的心境,这
已知函数y=f(x)对一切x均满足xf(x)+3x[f’(x)]2=1-e-x,若f’(x0)=0(x0≠0),则()
最新回复
(
0
)