首页
登录
职称英语
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
The computer virus is an outcome of the computer overgrowth inthe 1980s. T
游客
2023-09-09
35
管理
问题
The computer virus is an outcome of the computer overgrowth in
the 1980s. The cause of this term is the likeness between the biological
virus and the evil program infected with computers. The origin of this
term came an American science fiction "The Adolescence of P-1" written 【S1】______
by Thomas J. Ryan published in 1977. Human viruses invade a living
cell and turn them into a factory for manufacturing viruses. 【S2】______
Therefore, computer viruses are small programs. They replicate by attaching 【S3】______
a copy of themselves to another program.
Once attached by host program, the viruses then look for other programs 【S4】______
to" infect". In this way, the virus can spread quickly throughout a
hard disk or an entire organization. At some points, the situation will be 【S5】______
totally determined by how the virus was programmed. The timing of the
attack can be linked to a number of situations, included a certain time 【S6】______
or date, the presence of a particular file, the security privilege level of
the user and the number of times a file is used. So-called" benign" viruses
might simply display a message, like the one that infected IBM’s
main computer system last Christmas with a season’s greeting. Malignant
viruses are designed to damage the system. The attack is to wiping 【S7】______
out data, to delete files or to format the hard disk.
There are two main types of viruses: shell and intrusive system.
Shell viruses wrap themselves around a host program and don’t modify
the original program. Shell programs are easy to write, that is why about 【S8】______
half of viruses are of this type. Intrusive viruses invade an existing program
and actual insert a portion of themselves into the host program. 【S9】______
Intrusive viruses are hard to write and very difficult to remove with 【S10】______
damaging the host file. [br] 【S10】
选项
答案
with→without
解析
用词不当。本句详细描述侵入性病毒,根据上一句的含义“这种病毒侵入主程序”,因此可以推断不破坏主程序是很难将其清除的,with表示肯定,应当用反义词without。
转载请注明原文地址:https://www.tihaiku.com/zcyy/2998830.html
相关试题推荐
[originaltext]Althoughthefirstcomputerswereproducedforuseingovernm
[audioFiles]audio_eusm_0218(20106)[/audioFiles]A、Hiscomputerdoesn’tworkwell
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Computershavebeentaughttoplaynotonlycheckers,butalsochampionship
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Navigationcomputers,nowsoldbymostcar-makers,cost$2,000andup.Nos
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
Mostpeople’sjobsarelikelytobeeffectedbycomputers【S1】______
随机试题
Humansaresocial【B1】______Theyliketoliveandworkingroups,andtherefor
与汗法无关的方剂类别是A.表里双解剂 B.治风剂 C.祛湿剂 D.利水剂
指导与管理项目工作过程的输出不包括( )。A.工作绩效数据 B.批准的变更请
下列选项中,不属于基金服务业务范畴的是()A.销售支付 B.业务系统维护
下列属于侵犯患者隐私权的是()A.未经患者许可对其体检时让医学生观摩 B
环吡酮胺属于A.抗生素类 B.唑类 C.丙烯胺类 D.吗啉类 E.吡啶酮
下列有关职业判断的相关说法中,错误的是()。A.职业判断贯穿于注册会计师执业的
计算输电线路对邻近电信线路感应产生的磁危险影响,应考虑()年电力系统发展的规划容
在实行招标的工程合同价款应在中标通知书发出之日起的一定时间内,由发承包双方依据招
不定期财产清查适用于()。A、更换财产物资保管人员 B、有关部门进行的临时性检
最新回复
(
0
)