首页
登录
职称英语
Computer Virus and Virus Scan A computer
Computer Virus and Virus Scan A computer
游客
2024-07-01
36
管理
问题
Computer Virus and Virus Scan
A computer virus is a software program that attaches itself to another program in computer memory or on a disk, and spreads from one program to another. Viruses can damage data, cause computers to crash, display offending or bothersome messages, or lie dormant (保持静止的状态) until such time they are set to "awaken". In today’s industry, scanning is no longer considered to be an extravagance--but a necessity. Computer viruses no longer attack your computing environment only but all other computing environments which you contact. Computer viruses can attach themselves to the files being used and later propagate (复制) themselves through disks and files. Important information and hardware losses could plague (瘟疫,烦扰) your computing environment should you not take the proper precautions.
Many anti-virus products, such as Virus Scan, hold up the list of proper precautions. Scheduled periodic scans of your computing environment can offer you that added assurance that you are practicing "safe computing".
Means of spreading: A computer virus often attaches itself to another program or hides itself on computer (46) , and then duplicates themselves through (47) .
Measures taken: The main device to prevent important information and hardware being damaged is to (48) . Now among many anti-virus products, (49) are regarded as good software to provide proper precautions.
To add assurance for your computer, (50) of your computer environment is necessary for you.
选项
答案
memory or disk
解析
病毒附着于其他程序中或藏于存储器或磁盘中。
转载请注明原文地址:https://www.tihaiku.com/zcyy/3658477.html
相关试题推荐
[originaltext]Man:Honey,whereismypen?Woman:Whynotuseyourcomputer?Wr
Computerdatebaseandelectronicmailsystemshavebeenaroundsincethelate1
Duringthelastdecadecomputershavedevelopedatsuchanenormousspeedin
Thereissomethingwrongwiththecomputer.You’dbetterhaveit______.A、repair
Theelectroniccomputerischieflycharacterizedbyitsaccurateandrapidcompu
Computerdatabasesandelectronicmailsystemshavebeenaroundsincethelate
Michaelfailedtheexam.He______havespentsomuchtimeplayingcomputergame
I’lllendyoumycomputer______youpromisetotakecareofit.A、unlessB、while
Expandeduseofcomputertechnology,developmentofstrongerandlightermate
Computerscandoalotofthings,which______tellingthetime.A、includesB、is
随机试题
Completethelecturenotes.UseNOMORETHANTHREEWORDSforeachanswer.Purpos
下列网络互连设备中,属于物理层的是( ),属于网络层的是( )。 问题1选
内部审计师必须能够仔细地区分范围限制和审计中的其他限制的区别,以下哪项不属于范围
并购基金通常的运行模式的内容包括()。Ⅰ.以控股或参股的方式获得目标企业股权Ⅱ.
女性,45岁,乏力半年,白细胞2.3X109/L,血红蛋白76g/L,血小板88
下列说法中,正确的是( )。A.大赦既赦其刑,又赦其罪B.特赦只赦其刑
班级规模对课堂管理的影响表现在哪些方面?
某工程主体结构混凝土工程量约3200m3,预算单价550元/m3,计划4个月内均
根据《安全生产事故报告和调查处理条例》,建筑工地事故发生后,事故现场有关人员应当
最新回复
(
0
)