● A (75) infected computer may lose its data.(75)A. fileB. data baseC. virusD. program

● A (75) infected computer may lose its data.

(75)

A. file

B. data base

C. virus

D. program


相关考题:

● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory

● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.(75)A. analysisB. designC. installationD. upgrade

Computer(75)is a complex consisting of two or more connected computing units,it iS used for the purpose of data communication and resource Sharing.A.storageB.deviceC.networkD.processor

Service(71)Architecture aims to provide a model for the creation of service components in a wide range of languages and a model for assembling service components into a business solution -activities which are at the heart of building applications using a(72)architecture.Service Data Objects aims to provide consistent means of handling(73)within applications, whatever its source or(74)may be. SDO provides a way of unifying data handling for databases and for services. SDO also has mechanisms for the handling of data while(75)from its source.A.OrientedB.LevelC.ComponentD.Conference

● Computer (72) is used to temporarily store data.(72)A. CPUB. diskC. memoryD. I/O

A(75) infected computer may lose its data.A.fileB.databaseC.VirusD.program

Computer(75)is a complex consisting of two or moreconnected computing units, it is used for the purpose of data communication and resource sharing.A.storageB.deviceC.networkD.processor

● Computer(75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.(75)A. storage B. device C. network D. processor

Most(75)measures involve data encryption and password.A.securityB.hardwareC.displayD.program

● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.A.obviousB.secretC.importantD.easy

Viruses can't be transmitted by(74)and(75)is not a common route for virus infiltration.A.booting a PC from an infected mediumB.accessing to ROMC.opening an infected fileD.executing an infected program

A ______ infected computer may lose its data.A.fileB.data baseC.virusD.ProgramA.B.C.D.

Digital computer is controlled by internally stored programs and(66) of using common storage for all or part of a program and also for all or part of the data necessary for the execution of the programs; executing user-written or user-designated programs; performing user-designated manipulation of digitally represented discrete data, including.(67) operations and logic operations; and executing programs that(68) themselves during their execution.Analog computer's operations are analogous to the(69) of another system and that accepts, processes, and produces analog data.(70) computer integrates analog computer components and digital computer components by interconnection of digital-to-analog converters and analog-to-digital converters.A.qualifiedB.competentC.capableD.able

Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

An analog signal's characteristic quantity representing data may 66). at any instant, any value within a continuous(67). For example, an analog signal may follow continuously the values of another physical quantity representing data.A discrete signal is composed of(68)elements in time, each element having one or more characteristic quantities which can represent data. Examples of characteristic quantities are amplitude, waveform,(69), and position in time. A digital signal is a special case of discrete signals, in which data are represented by a(70)number of well-defined discrete values that one of its characteristic quantities may take in time.A.acquireB.collectC.assumeD.fetch

Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

The program and the data are kept inside the computer in a place called______.A.busB.cacheC.CPUD.memory

program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions

● A(75) is a device that enables data from one computer to travel to another computer by using telephone lines.(75) A. modemB. diskC. printerD. CPU

● Most (75) measures involve data encryption and password.(75)A. securityB. hardwareC. displayD. program

A( )infected computer may lose its datA.A.fileB.data baseC.virusD.program

Which statement is true about a worm attack?()A、Human interaction is required to facilitate the spread.B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.C、Extremely large volumes of requests are sent over a network or over the Internet.D、Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.

Which of the following is a sign that a computer has been infected by a worm?()A、Screensaver changed on its ownB、Unauthorized outgoing emails being sentC、Desktop background changed on its ownD、Left and right mouse buttons have been flipped

单选题Which statement is true about a worm attack?()AHuman interaction is required to facilitate the spread.BThe worm executes arbitrary code and installs copies of itself in the memory of the infected computer.CExtremely large volumes of requests are sent over a network or over the Internet.DData or commands are injected into an existing stream of data. That stream is passed between a client and server application.