●Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an (66) from a friend who asks you to open it.This is what happens with Melissa and several other similar email (67) .Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book,previous emails, web pages (68) .As administrators seek to block dangerous email attachments through the recognition of well-known (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (70) access to your network.(66) A.attachmentB.packetC.datagramD.message(67) A.virtualB.virusC.wormsD.bacteria(68) A.memoryB.cachesC.portsD.registers(69) A.namesB.cookiesC.softwareD.extensions(70) A.crackerB.userC.customerD.client

●Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an (66) from a friend who asks you to open it.This is what happens with Melissa and several other similar email (67) .Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book,previous emails, web pages (68) .

As administrators seek to block dangerous email attachments through the recognition of well-known (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (70) access to your network.

(66) A.attachment

B.packet

C.datagram

D.message

(67) A.virtual

B.virus

C.worms

D.bacteria

(68) A.memory

B.caches

C.ports

D.registers

(69) A.names

B.cookies

C.software

D.extensions

(70) A.cracker

B.user

C.customer

D.client


相关考题:

She _ the doctor a list of the medical items she needed. A.made … write outB.makes … writes outC.made … wroteD.had made … written

A decision must be ______immediately _______stop the factory ______waste water without being treated.A. made, to, pouringB. made,不填, to pourC. done,不填, pouringD. had, to, to pour

20.A. friendB. a friendC. studentD. friends

Whichdeterminesif“prefs”isadirectoryandexistsonthefilesystem?() A.Booleanexists=Directory.exists(“prefs”);B.Booleanexists=(newFile(“prefs”)).isDir();C.Booleanexists=(newDirectory(“prefs”)).exists();D.Booleanexists=(newFile(“prefs”)).isDirectory();E.Booleanexists=true;Try{Directoryd=newDirectory(“prefs”);} catch(FileNotFoundExceptione){exists=false;}

I ()supper when I()someone knocking at the door.A、made . . . HeardB、made . . .was heardC、was making . . . was hearingD、was making . . . heard

关于下面函数,哪一个是错误描述?defcount_letter_number(string):letter_count=0digit_count=0forchinstring:if'a'returnletter_count,digit_countA.函数能统计字符串中英文字母出现的次数B.letter_count+=1可以写做letter_count=letter_count+1C.letter_count+=1可以写做letter_count++D.函数能统计字符串中数字出现的次数

9.A.WritersB.ChildrenC.CompaniesD.Friends

如果定义谓词love(x,y)表示某一个人x喜爱运动项目y,那么以下表示“每个人都有自己喜爱的运动项目”知识的谓词公式是?A.("x)($y)love(x,y)B.($y)("x)love(x,y)C.($x)("y)love(x,y)D.("y)($x)love(x,y)

14、1=formal 2=informal 答案填写数字1或2 “Love” can be used to end a(n) ________ letter.

9、如果定义谓词love(x,y)表示某一个人x喜爱运动项目y,那么以下表示“每个人都有自己喜爱的运动项目”知识的谓词公式是?A.("x)($y)love(x,y)B.($y)("x)love(x,y)C.($x)("y)love(x,y)D.("y)($x)love(x,y)