计算机专业英语Unit 9

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Unit 9 Computer Virus

Text 1 Virus Introduction

Exercises

1. Multiple choices.

(1)A virus is a ( A ).

A. program

B. computer

C. bad man

D. beast

(2)A virus is a program that reproduces its own code by ( ABC ).

A. adding to the end of a file

B. inserting into the middle of a file

C. simply placing a pointer

D. replacing another program

(3)( AD )is a type of executable file .

A. COM file

B. TXT file

C. JPG file

D. EXE file

(4)Similar to viruses, you can also find malicious code in ( ABC ).

A. Trojan Horses

B. worms

C. logic bombs

D. Microsoft Word Documents

2. Fill in the blanks.

(1)A virus is a program that reproduces its own code by attaching itself to other

executable files in such a way that the virus code is executed when the infected

executable file is executed .

(2)To attach might mean physically adding to the end of a file, inserting into the middle of

a file, or simply placing a pointer to a different location on the disk somewhere where

the virus can find it.

(3)Similar to viruses, you can also find malicious code in Trojan Horses, worms, and

logic bombs.

3. Translate and analyze the following sentences.

(1)These self-replicating codes, when caused by some event, may do a potentially harmful

a ct to your computer.

句子组成:when引导时间状语从句做插入语,当…的时候.

翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行为.

(2)M ore recently, scripts written for Internet web sites and/or included in E-mail can also

b e executed and infected.

句子组成:scripts written…省略的定语从句完整形式scripts which were writtened….

翻译:现在,为网站编写的或者包括在E-mail中的脚本也能够被执行和感染。

4. Reading comprehension.

Unit 9 Computer V

irus

2 Viruses can infect any type of executable code, not just the files that are commonly called

―program files‖. V iruses can be spread by:

∙Executable code in the boot sector of infected floppy disks

∙Executable code in the system area of infected hard drives

∙Word processing and spreadsheet documents that use infected macros Infected HTML documents that contain JavaScript or other types of executable code

Since virus code must be executed (run) to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, etc., as well as plain text in .txt files. For example, just viewing picture files won't infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file, that the computer will actually try to execute.

Answer the following questions according to the article above.

(1)What kind of files can be infected by a virus?

A virus can infect the executable files such as .exe or .com or .doc files,etc.

(2)How about viruses can be spread?

Executable code in the boot sector of infected floppy disks or in the system area of

infected hard drives, word processing and spreadsheet documents that use infected

macros Infected HTML documents that contain JavaScript or other types of executable

code.

Text 2 Virus Behavior – Infection Phase Exercises

1. Multiple choices.

(1)V iruses all have two phases to their execution, the ( A )and the ( C ).

A. infection phase

B. delete phase

C. attack phase

D. create phase

(2)( ABCD ) maybe a certain cause that some viruses infect upon.

A. a day

B. a time

C. an external event on your PC

D. a counter within the virus

(3)Many viruses go resident in the memory like a ( C ).

A. .exe file

B. .com file

C. tsr program

D. data file

(4)Y ou want to ( ABC ) maybe wake up a virus that has residented in memory.

A. copy a file

B. access a diskette

C. execute a program

D. delete a file

(5)Some viruses use ( A ) and ( B ) techniques to hide their existence.

A. stealth

B. polymorphic

C. quickly spread

D. replace a part of system software

相关文档
最新文档