a我考网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

查看: 134|回复: 0

[理工类英语] 2013年职称英语理工类B级模拟训练(40)

[复制链接]
发表于 2012-8-16 00:07:50 | 显示全部楼层 |阅读模式
2013年职称英语理工类B级模拟训练(40)6 Q6 C& N1 T8 E4 k8 F
Computer Virus
* [8 r  t7 }7 ~0 b1 K: q  The computer virus is an outcome of the computer overgrowth in the 1980s.The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction〝The Adolescence of P-1〞written by Thomas J·Ryan, published in 1977.Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program. , ^- N5 j( B* a  \& P) M' _4 u
  Once attached to host Program, the viruses then look for other programs to "infect". In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So-called "benign" viruses might simply display a message, like the one that infected IBM's main computer system last Christmas with a season's greeting. - ]9 c0 L# R5 I1 l. n
  Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies or to format the hard disk.
2 S1 t4 o; n) I& \$ W4 r6 k+ u  What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don't modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file. : X4 ~* Q& F1 p( \$ K8 K) \
  16 The term "computer virus" came from an American science fiction "The Adolescence of P-1" % u" |9 u$ {0 u& ?5 K
  A Right B Wrong C Not mentioned
1 C! I6 E+ p$ _3 Q* |1 w; V7 k  17 The virus that infected IBM's main computer system last Christmas was designed to damage the system
; E- }: r4 w# K0 m: w0 e3 C9 O2 H  A Right B Wrong C Not mentioned 1 X& w1 T8 C0 [+ K
  18 There are two kinds of attack modes
7 i- M' L+ S; y2 A9 Y, g  A Right B Wrong C Not mentioned ! c, I& @5 j5 g: |- E" B5 Q5 W, r2 W
  19 If the development of computers was controlled there will be no computer virus.
6 X' O9 J( h: d' K7 p. m  A Right B Wrong C Not mentioned
8 Z9 m2 V; L. p  20 Computer virus spread more quickly when it infects a LAN than a multi-user system
+ Z; p0 h7 G7 v- u$ x  A Right B Wrong C Not mentioned 转自:考试网 - [Examw.Com]
7 _' g2 a. v$ E  21 Four main types of viruses are illustrated in detail.
2 |8 z, L. m- H3 T: H  A Right B Wrong C Not mentioned
  G8 `5 _+ o0 k  22 You have to damage the host file if you want to remove Intrusive virus.
0 i; n9 S( M: u, j$ K% k  A Right B Wrong C Not mentioned / e: h4 |+ U1 C0 o5 X4 ]
  参考答案:
/ T# C7 c0 H  A& m  16 A17 B18 A19 C20 C  21 B  22 A
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|Woexam.Com ( 湘ICP备18023104号 )

GMT+8, 2024-11-15 10:44 , Processed in 0.278931 second(s), 21 queries .

Powered by Discuz! X3.4 Licensed

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表