Viruses usually have two phases to their execution, the infection phase and the(75)phase. The later phase is optional, since stone viruses simply reproduce.A.reproduceB.proliferationC.defendD.attack

Viruses usually have two phases to their execution, the infection phase and the(75)phase. The later phase is optional, since stone viruses simply reproduce.

A.reproduce

B.proliferation

C.defend

D.attack


相关考题:

Network schedules are prepared during the _____ phase and updated during the _____ phase.A.Conceptual, execution.B.Development, implementation.C.Development, close-out.D.Implementation, close-out.E.Planning, finishing.

148 Network schedules are prepared during the _____ phase and updated during the _____ phase. A. Conceptual, execution.B. Development, implementation.C. Development, close-out.D. Implementation, close-out.E. Planning, finishing

30 Network schedules are prepared during the _____ phase and updated during the _____ phase. A. Conceptual, execution.B. Development, implementation.C. Development, close-out.D. Implementation, close-out.E. Planning, finishing

● Network schedules are prepared during the _____ phase and updated during the _____ phase.A Conceptual, execution.B Development, implementation.C Development, close-out.D Implementation, close-out.E Planning, finishing.

The(71) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several(72). In a workflow system, a process is specified using the process definition tool. Usually, processes are defined in terms of a(73), which consists of(74) indicated using a circle, and(75) shown as a rectangle. These two components can be linked by means of a directed arc.A.waterfall modelB.workflow reference modelC.evolutionary modelD.spiral model

Duringwhichbootphaseistherootvgfirstactivated() A.Phase1B.Phase2C.Phase3D.POSTPhase

File infectors are also called______viruses.A.filterB.parasailC.parasiticD.attack

在华为BSS/RXCDR参数中,“A接口阶段标志”的参数取值范围是() A.GSM_PHASE_1B.GSM_PHASE_1、GSM_PHASE_2、GSM_PHASE_2+C.GSM_PHASE_2、GSM_PHASE_2+D.GSM_PHASE_1、GSM_PHASE_2+E.GSM_PHASE_2+

3、下列关于PIE模型的说法错误的是A.PIE模型刻画了测试人员观测到一个Failure所需要的客观条件B.E(Execution)要求测试通过所有的待测代码C.I(Infection)要求测试触发错误的中间状态D.P(Propagation)要求错误的中间状态传播到最后的输出