A( )infected computer may lose its datA.A.fileB.data baseC.virusD.program

A( )infected computer may lose its datA.

A.file
B.data base
C.virus
D.program

参考解析

解析:感染病毒的计算机可能使数据丢失。

相关考题:

When a majority of team members must agree before a decision is reached _____.A some team members may become alienatedB future group effectiveness may become damaged.C the PM may lose credibilityD the project manager will most likely have to utilize a conflict resolution techniqueE All of the above.

22 When a majority of team members must agree before a decision is reached _____.A. some team members may become alienatedB. future group effectiveness may become damaged.C. the PM may lose credibilityD. the project manager will most likely have to utilize a conflict resolution techniqueE. All of the above

() , it is always possible to find out its volume. A.Whatever the shape of a body may beB.The shape of a body may be whateverC.May whatever the shape of a body beD.Whatever may the shape of a body be

The text suggests that in the future we _______.A. may have to fight against more new diseasesB. may easily get infected by diseases from dogsC. should not be allowed to have petsD. should stop buying pets from Africa

● Computer (72) is used to temporarily store data.(72)A. CPUB. diskC. memoryD. I/O

A(75) infected computer may lose its data.A.fileB.databaseC.VirusD.program

Computer hardware engineers research, design, develop, and test computer hardware and supervise its manufacture and(73). Hardware refers to computer(74), circuit boards, computer systems, and related equipment such as keyboards, modems, and printers.A.fixingB.buildingC.settingD.installation

● A (75) infected computer may lose its data.(75)A. fileB. data baseC. virusD. program

Pay attention not to tell the plaintiff's lawyer too much, ______we may lose teh case. A.butB.otherwiseC.so

This shirt will lose its colour( )it's washed.A. asB. untilC. afterD. before

Remote administration types are an example of one kind of(71)malicious software, the Trojan horse, or more simply Trojan. The purpose of these programs isn't replication,(72)to penetrate and control. That masquerade as one thing when in fact they are something else, usually something destructive. There are a number of kinds of Trojans, including spybots, (73) report on the Web sites a computer user visits, and keybots or keyloggers, which record and report the user's keystrokes in order to discover passwords and other confidential information.RATS attempt to give a remote intruder administrative control of an infected computer. They work as(74)pairs. The server resides on the infected machine, while the client resides elsewhere, across the network, where it's available to a remote intruder. Using standard TCP/IP or UDP protocols, the client sends instructions to the server. The server does(75) it's told to do on the infected computer.A.nonviralB.unviralC.inviralD.abviral

infected computer may lose its data.A.fileB.data baseC.virusD.program

A ______ infected computer may lose its data.A.fileB.data baseC.virusD.ProgramA.B.C.D.

An analog signal's characteristic quantity representing data may 66). at any instant, any value within a continuous(67). For example, an analog signal may follow continuously the values of another physical quantity representing data.A discrete signal is composed of(68)elements in time, each element having one or more characteristic quantities which can represent data. Examples of characteristic quantities are amplitude, waveform,(69), and position in time. A digital signal is a special case of discrete signals, in which data are represented by a(70)number of well-defined discrete values that one of its characteristic quantities may take in time.A.acquireB.collectC.assumeD.fetch

program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

With all its advantages,the computer is by no means without its( ).A.boundariesB.limitationsC.confinementsD.restraints

Though the ideal cure for noise is to stop it at its source,this may in many( )be impossible.The next remedy is to absorb it on its way to the ear.Domestic noises may by controlled by forethought and courtesy and industrial noises by good planning and technical improvement.A.casesB.conditionsC.presentationsD.circumstances

()of the rooms has its own computer.AAllBEveryCEachDWhole

Which of the following is a sign that a computer has been infected by a worm?()A、Screensaver changed on its ownB、Unauthorized outgoing emails being sentC、Desktop background changed on its ownD、Left and right mouse buttons have been flipped

A HDD is almost full and constantly reads and writes data. Which of the following tools may repair files on the HDD?()A、MSCONFIGB、EFSC、CHKDSKD、DEFRAG

A technician is working on a PC that may have malware. Which of the following should thetechnician try FIRST?()A、Educate the end user about how a computer becomes infected.B、Perform a clean install of the OS.C、Boot the PC in Safe Mode.D、Quarantine all infected files.

单选题A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()AReplace the computer.BRun chkdsk /f.CUpdate the virus signatures.DRun scandisk.

单选题When fruit is carried as refrigerated cargo,the most frequent cause of its being infected at the discharge port is().Aleaks in the ship's refrigeration systemBimproper cleaning of the cargo spacesCcarriage at the wrong temperatureDimproper precooling of the cargo spaces

单选题Which of the following is an appropriate title for this passage?ABreastfeeding May Enhance Babies' Chances of Survival.BBreastfeeding May Lower Moms' Diabetes Risk.CBreastfeeding May Become Very Fashionable in Near Future.DBreastfeeding May Help Women Lose Weight.

单选题()of the rooms has its own computer.AAllBEveryCEachDWhole

单选题Which statement is true about a worm attack?()AHuman interaction is required to facilitate the spread.BThe worm executes arbitrary code and installs copies of itself in the memory of the infected computer.CExtremely large volumes of requests are sent over a network or over the Internet.DData or commands are injected into an existing stream of data. That stream is passed between a client and server application.

单选题A user reports that their computer suddenly will not boot. When the technician arrives, they discover that the user is very worried they will not be able to complete a research paper theyve been working on which is due by the end of the day. Which of the following is an appropriate response to the users concerns? ()AA Trojan may have infected the OS or worked its way into the MBR. What did you download recently that caused the problem?BI understand your concern, and will try to have your computer working again as quickly as possible so that you can finish your report.CIf the paper was so important to you, you should have created a backup copy so you could finish it on another computer.DI do not understand why you are upset. I am sure your professor will understand and you will be able to turn in the paper tomorrow.

单选题The engine may lose power or slow down during running, when this occurs, the first cause possible may be hot bearings and () of the pistons in the cylinders.AcrackBknockingCleakingDseizure