您现在的位置:在线题库 >> 英语 >> 计算机专业英语
  • ID:8141-2584
    Hardware components are used for the purpose of _____.
    A. input B. output C. central processing D. all of the above

  • 相关试题查看更多

  • ID:8141-2590
    (阅读选择)

    A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.

    Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:

    Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.

    Trojan Horses - This is a program that doesn't replicate when entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.

    Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.

    Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.


    Choose the best answer according to the passage

    1)A computer virus is a computer program that is created to make and spread of itself.

    Aprograms Bvirus Ccopies Dfiles

    2)Worm spread itself except by

    Anetwork BE-mail Cprogram Dhardware

    3)Antivirus program can scan and virus.

    Aclean Bproduce Creplicate Dmake

    4)Trojan Horses .

    Aquickly replicate itself and gradually attache to files, programs or the hard drive.

    Binfect the computer without even having to click open email attachment or any program.

    Callow hackers to take control over a particular system or to steal very important data.

    Davoid the virus to attack computer.

    5)According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous year's total number .

    A 86,404 B 76,404 C56,354 D34,876

    查看解析

  • ID:8141-1778
    LAN( )
    a.字处理器 b.交换机 c.多媒体 d.局域网 e.结构化程序设计 f.软件生命周期 g.功能测试
    h.
    代码窗口 i.黑客 j.防火墙


    查看解析

  • ID:8141-1780

    (翻译)1.Four common storage devices are a floppy disk drive, a hard disk drive, a CD-ROM drive, and a DVD-ROM drive.

    2.Four commonly used input devices are the keyboard, the mouse, a microphone, and a PC camera.

    3.An optical scanner reads printed text and graphics and then translates the results into a form computer can use.

    4.Resolution typically is measured in dots per inch (dpi), and is stated as the number of columns and rows of dots..

    5. Display devices include CRT monitors, flat-panel displays.

    查看解析

  • ID:8141-11995
    SQL Server .
    a. is a client/server RDBMS
    b. consists of the physical storage of data
    c. consists of the SQL Server’s services
    d. is a file server

    查看解析

  • ID:8141-2582
    software crisis

    查看解析