您现在的位置:在线题库 >> 英语 >> 计算机专业英语
  • ID:8141-12016
    Using Microsoft Word 2000 we can create .
    a. personal communication b. business documents
    c. spreadsheets d. academic reports

  • 相关试题查看更多

  • ID:8141-1775

    functional testing ( )
    a.字处理器 b.交换机 c.多媒体 d.局域网 e.结构化程序设计 f.软件生命周期 g.功能测试
    h.
    代码窗口 i.黑客 j.防火墙

    查看解析

  • ID:8141-2563

    网络协议

    查看解析

  • ID:8141-1776

    word processor( )
    a.字处理器 b.交换机 c.多媒体 d.局域网 e.结构化程序设计 f.软件生命周期 g.功能测试
    h.
    代码窗口 i.黑客 j.防火墙

    查看解析

  • ID:8141-2590
    (阅读选择)

    A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.

    Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:

    Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.

    Trojan Horses - This is a program that doesn't replicate when entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.

    Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.

    Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.


    Choose the best answer according to the passage

    1)A computer virus is a computer program that is created to make and spread of itself.

    Aprograms Bvirus Ccopies Dfiles

    2)Worm spread itself except by

    Anetwork BE-mail Cprogram Dhardware

    3)Antivirus program can scan and virus.

    Aclean Bproduce Creplicate Dmake

    4)Trojan Horses .

    Aquickly replicate itself and gradually attache to files, programs or the hard drive.

    Binfect the computer without even having to click open email attachment or any program.

    Callow hackers to take control over a particular system or to steal very important data.

    Davoid the virus to attack computer.

    5)According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous year's total number .

    A 86,404 B 76,404 C56,354 D34,876

    查看解析

  • ID:8141-11999
    The attributes of the stack are .
    a. FIFO b. LIFO c. queue d. built into their circuitry

    查看解析