program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.

A.Worm

B.Virus

C.Disaster

D.Demon


相关考题:

Program that can destroy another computer’s programs are called () . A、bugsB、bugsC、virusesD、games

●A computer virus is a computer program that is created to make and spread (72) of itself.(72) A.programsB.virusC.copiesD.files

, also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software

software, also called end-user program, includes database programs, word processors, spreadsheets etc.A.ApplicationB.SystemC.CompilerD.Utility

The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

The relational database model requires the data be(110)through programs that don't rely on the position of the data in the database. This is in direct(111)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(112)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(113)the information. The(114)on how the search is done are specific to the DBMS and vary from product to product.A.accessedB.movedC.readD.wrote

An embedded operating system is the(71)program that manages all the other programs in an embedded device after initial load of programs by a(an)(72). It normally guarantees a capability within a specified(73)size and(74)constraint as well as with application programs. It also n0rmalty has small foot print including initial boot loader, OS kernel, required device drivers,(75)for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.A.hardwareB.businessC.softwareD.external

The most accurate and most boring way to(105)Java is that it is a new computer programming language developed by Sun Microsystems that creates(106)independent programs that can be distributed and nm remotely. To run Java programs, a computer must have a Java interpreter. Currently(107)Java programs are small "applets" that are(107)as part of web pages.When you use a Java(108)browser to view a Web page that includes a Java applet, the browser loads the applet onto your computer through your modem or network. Then the Java interpreter runs the applet, which could include animation or sound, on your computer rather than transmitting the code bit by bit over Internet. A few thousand bytes of Java code can tam into a powerful program on your computer.So an applet could include(109)with Java interpreter.A.commandB.commentC.describeD.discover

Program( )describes programs objectives, desired output, input data required, processing requirement, and documentation.A.specification B.flowchart C.structure D.address

A computer virus is a computer program that is created to make and spread(71)of itself.A.programsB.virusC.copiesD.files

Passage TwoQuestions 26 to 30 are based on the following passage.Online learning is also called distance education, which helps students who take classes by computer over the Internet to learn certain courses and earn a degree. And it has become more and more popular with both young people and educational institutions.The School of Continuing and Professional Studies of New York University in Manhattan began online classes in 1992. Its Virtual School has taught more than 10,000 students from across the United States and other countries.Last year,the school launched NYU Online. It offers NYU's first online Programs for a bachelor's degree. Programs are offered in three areas; leadership And management, information systems management and social sciences. The classes are highly interactive where students communicate with each other and their teachers. Some classes require students to log in at the same time so they can attend live lectures by a professor Students can also ask questions and work together on team projects.The cost to attend NYU Online depends on how many classes a student is to take It costs as much as fifteen thousand dollars a year. NYU offers no financial aid for international students in this program. If you are interested in the program, you can gel more details at the website: www..nyu.edu. Many other schools, too, offer online education. Students should be especially careful of programs that offer a degree in return for little or no work. These are known as diploma mills, and are illegal in the United States.Educational advisers also say that before you enter any program, make sure the work will be recognized in your country. You should also make sure the schools you are considering are officially approved.26. The third paragraph is mainly about the __ of the programs of the School.A. academic goal and systemB. courses and learning modeC. learning methods and classesD. courses and requirements

A good program should be(74)by programmers other than the person who wrote it.A.reliableB.understandableC.structuredD.blockeD

In computing,a device driver(commonly referred to as simply a driver)is acomputer program that operates or controls a particular type of device that is attached to a computer.A driver provides______to hardware devices,enabling operating systems and other computer programs to access hardware functions without needing to know precise details of the hardware being used。A.a software interfaceB.a programming languageC.a functionD.an Internal Bus

The Hypertext Transfer Protocol , the Web's ( ) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by (请作答此空) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.exchangingB.changingC.decliningD.removing

The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.transport-layerB.application-layerC.network-layerD.link-layer

The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.A.transport-layerB.application-layerC.network-layerD.link-layer

You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()A、Reinstall the application to another location.B、Restore the program from the Quarantined Items list.C、Remove the program from the Quarantined Items list.D、Repair the program from the Programs option in Control Panel.

Within a 64-bit Windows desktop OS, by default where are the program files for 64-bit programs located?()A、C:/Program FilesB、C:/Windows/C、C:/Windows/System32D、C:/Program Files (x86)

Within a 64-bit Windows desktop OS, by default where are the program files for 32-bit programs located?()A、C:/WindowsB、C:/Program Files (x86)C、C:/Program FilesD、C:/Windows/System32

How do objects pass messages in Java?()   A、They pass messages by modifying each other’s member variablesB、They pass messages by modifying the static member variables of each other’s classesC、They pass messages by calling each other’s instance member methodsD、They pass messages by calling static member methods of each other’s classes.

What are four capabilities of the mysql client program?()A、Creating, dropping, and modifying tables and indexesB、Initiating a binary backup of the database by using the START BACKUP commandC、Displaying replication status informationD、Shutting down the server by using the SHUTDOWN commandE、Creating and dropping databasesF、Creating and administering users

单选题The characteristics of good distance learning programs are the following EXCEPT _____.Astudents don’t have to travel away from home to take a testBthe content of distance learning program is the same as that of the full time program in colleges and universitiesCthe good distance learning programs include courses that are not taught in average universitiesDthe relationship between students and professors are one-to-one

单选题Within a 64-bit Windows desktop OS, by default where are the program files for 64-bit programs located?()AC:/Program FilesBC:/Windows/CC:/Windows/System32DC:/Program Files (x86)

单选题Within a 64-bit Windows desktop OS, by default where are the program files for 32-bit programs located?()AC:/WindowsBC:/Program Files (x86)CC:/Program FilesDC:/Windows/System32

多选题What are four capabilities of the mysql client program?()ACreating, dropping, and modifying tables and indexesBInitiating a binary backup of the database by using the START BACKUP commandCDisplaying replication status informationDShutting down the server by using the SHUTDOWN commandECreating and dropping databasesFCreating and administering users

单选题How do objects pass messages in Java?()AThey pass messages by modifying each other’s member variablesBThey pass messages by modifying the static member variables of each other’s classesCThey pass messages by calling each other’s instance member methodsDThey pass messages by calling static member methods of each other’s classes.

单选题You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()AReinstall the application to another location.BRestore the program from the Quarantined Items list.CRemove the program from the Quarantined Items list.DRepair the program from the Programs option in Control Panel.