計(jì)算機(jī)專業(yè)英語修訂考試系統(tǒng)2011chapt_第1頁
計(jì)算機(jī)專業(yè)英語修訂考試系統(tǒng)2011chapt_第2頁
計(jì)算機(jī)專業(yè)英語修訂考試系統(tǒng)2011chapt_第3頁
計(jì)算機(jī)專業(yè)英語修訂考試系統(tǒng)2011chapt_第4頁
計(jì)算機(jī)專業(yè)英語修訂考試系統(tǒng)2011chapt_第5頁
已閱讀5頁,還剩9頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

6.2 Computer

VirusesWordsattachv.附加,隸屬anti-virusa.防病毒的,抗病毒的backupn.后備,備份cautiousadj.細(xì)心的,謹(jǐn)慎的detectv.發(fā)覺,發(fā)現(xiàn),偵測(cè)duplicateadj.復(fù)制的drivern.驅(qū)動(dòng)程序detectionn.發(fā)覺,偵察infectv.傳染,侵染,感染invadev.侵入,侵犯intrusiveadj.侵入的,闖入的IDn.身份標(biāo)識(shí)manufacturev.加工,制造moden.方式,樣式multiplyv.增加,成倍的增加malignantadj.惡意的,有害的privilegen.特權(quán),特許potentiallyadv.

潛在地purchasen.購(gòu)買,購(gòu)置preventionn.

預(yù)防,防止replicatev.復(fù)制,重復(fù)reputableadj.聲譽(yù)好的,可尊敬的residentadj.常駐的,居留的removaln.移動(dòng),除掉regularlyadv.有規(guī)律的,有規(guī)則的situationshellsubstantiallyn.adv.位置,地位,情況,局面n.

外殼潛在地upgraden./v.升級(jí),使升級(jí)wipewrapv.v.

擦去,去除包,裹,隱藏,偽裝6.2 Computer

Viruses[1]

Just

as

human

viruses

invade

a

living

cell

and

then

turn

itinto

a

factory

for

manufacturing

viruses,

computer

viruses

aresmall

programs

that

replicate

by

attaching

a

copy

of

themselves

toanother

program.

Once

attached

to

the

host

program,

the

virusthen

look

for

other

programs

to

"infect".

In

this

way,

the

virus

canspread

quickly

throughout

a

hard

disk

or

an

entire

organization

ifit

infects

a

LAN

(Local

Area

Network)

or

a

multi-users

system.分析:本句是復(fù)合句,just

as引導(dǎo)的是比較狀語從句。主句中又包含定語從句that

replicate

by

attaching

a

copy

ofthemselves

to

another

program,修飾programs。計(jì)算機(jī)病毒正如人的病毒侵害活細(xì)胞,然后將它變成制造病毒的工廠一樣,計(jì)算機(jī)病毒是小程序,通過將該程序本身的拷貝附加到另一個(gè)程序上來進(jìn)行復(fù)制。病毒一旦附加在主程序上,就會(huì)尋找其他程序進(jìn)行“感染”。以這種方式,病毒迅速傳播到整個(gè)硬盤,如果病毒感染了局域網(wǎng)或多用戶系統(tǒng),則會(huì)迅速傳染整個(gè)機(jī)構(gòu)。分析:簡(jiǎn)單句。skillful

written

是過去分詞短語作定語,修飾viruses。分析:復(fù)合句。a

file

is

used是一個(gè)定語從句,修飾

the

number

of

times。[2]

Skillfully

written

viruses

can

infect

and

multiply

for

weeks

ormonths

without

being

detected.

During

that

time,

system

backupsduplicate

the

viruses,

or

copies

of

data

or

programs

made

and

passedto

other

systems

to

infect.

At

some

point—determined

by

how

thevirus

was

programmed—the

virus

attacks.

[3]The

timing

of

theattack

can

be

linked

to

a

number

of

situations,

including:

a

certaintime

or

date;

the

presence

of

a

particular

user

ID;

the

use

or

presenceof

a

particular

file;

the

security

privilege

level

of

the

user;

and

thenumberof

timesof

a

fileisused.巧妙地編寫的病毒會(huì)在數(shù)周或數(shù)月內(nèi)進(jìn)行傳染并倍增,而不會(huì)被人們發(fā)現(xiàn)。在這一段時(shí)間內(nèi),系統(tǒng)的備份復(fù)制此病毒,或者數(shù)據(jù)或程序的拷貝被制造出來并傳遞到其他系統(tǒng)進(jìn)行傳染。病毒在某一點(diǎn)開始攻擊,“某一點(diǎn)”取決于該病毒的編程方式。攻擊的時(shí)刻可能與許多情況有關(guān),包括:某一特定時(shí)間或日期、特定用戶身份的出現(xiàn)、特定文件的使用或出現(xiàn)、用戶的安全優(yōu)先級(jí)別以及某一文件被使用的次數(shù)。Likewise,

the

mode

of

attack

varies,

so-called

"being"viruses

might

simply

display

a

message,

like

the

one

thatinfected

IBM's

main

computer

system

last

Christmas

with

aseason's

greeting.Malignant

viruses,

on

the

other

hand,

are

designed

todamage

your

system.

One

common

attack

is

to

wipe

out

data,to

delete

files,

or

to

perform

a

format

of

disk.同樣,攻擊模式變化多端。所謂“生物”病毒,可能只顯示一條信息;就像去年圣誕節(jié)曾經(jīng)傳染了IBM主計(jì)算機(jī)系統(tǒng)的病毒,它顯示的信息是節(jié)日問候。另一方面,致命的病毒是設(shè)計(jì)用來破壞計(jì)算機(jī)系統(tǒng)的。一種常見的攻擊是擦除數(shù)據(jù)、刪除文件或?qū)τ脖P進(jìn)行格式化There

are

four

main

types

of

viruses:

shell,

intrusive,

operatingsystem,

and

source

code.Shell

viruses

wrap

themselves

around

a

host

and

do

not

modifythe

original

program.

Shell

program

are

easy

to

write,

which

is

whyabout

half

of

all

viruses

are

of

this

type.

In

addition,

shell

viruses

areeasy

for

programs

like

Data

Physician

toremove.Intrusive

viruses

invade

an

existing

program

and

actually

inserta

portion

of

themselves

into

the

host

program.

Intrusive

viruses

arehard

to

write

and

difficult

to

remove

without

damaging

the

host

file.共有四種主要類型的病毒:殼型、侵入型、操作系統(tǒng)型和源代碼型。殼型病毒將自己捆綁在主程序上,并不修改原始程序。殼型程序易于編寫,這是大約一半的病毒均屬于這種類型的原因。此外,對(duì)于像“數(shù)據(jù) 醫(yī)生”這樣的程序來說,殼型病毒是易于清除的。侵入型病毒侵害現(xiàn)有的程序。實(shí)際上,它們把自己的一部分插入到宿主程序中。侵入型病毒難以編寫,而且在不破壞主文件的情況下難以清除。Shell

and

intrusive

viruses

most

commonly

attack

executableprogram

file—those

with.

COM

or.

EXE

extension—although

dataare

also

at

somerisk.s分析:復(fù)合句。從句once

booted

up是once

they

are

bootedup的省略形式,作插入語。Operating

system

viruses

work

by

replacing

parts

of

operatingystem

with

their

own

logic.

[4]Very

difficult

to

write,

these

viruseshave

the

ability,

once

booted

up,

to

take

total

control

of

yoursystem.

According

to

Digital

Dispatch,

known

versions

of

operatingsystem

viruses

have

hidden

large

amounts

of

attack

logic

in

falselymarked

bad

disk

sectors.

Others

install

RAM-resident

programs

ordevice

drivers

to

perform

infection

or

attack

functions

invisiblyfrom

memory.殼型和侵入型病毒最常攻擊的是可執(zhí)行文件——即帶有.COM或.EXE擴(kuò)展名的文件——雖然數(shù)據(jù)文件也有某種危險(xiǎn)。操作系統(tǒng)型病毒用自己的邏輯替換操作系統(tǒng)(OS)的某些部分。這種病毒很難編寫,而一旦被引導(dǎo),它們就能夠完全控制整個(gè)系統(tǒng)。根據(jù)

DigitalDispatch的說法,已知的操作系統(tǒng)型病毒版本在虛假標(biāo)記為壞的磁盤扇區(qū)內(nèi)隱藏了大量的攻擊邏輯。這一類型的其他病毒安裝RAM駐留程序或設(shè)備驅(qū)動(dòng)程序,以便不被覺察的從內(nèi)存執(zhí)行感染或攻擊功能。Source

code

viruses

are

intrusive

programs

that

areinserted

into

a

source

program

such

as

those

written

inPascal

prior

to

the

program

being

compiled.

These

are

theleast

common

viruses

because

they

are

not

only

hard

towrite,

but

also

have

a

limited

number

of

hosts

compared

tothe

other

types.源代碼型病毒是一種侵入式程序,在源程序被編譯之前,這種程序被插入到例如用Pascal編寫的源程序中。這些病毒最不常見,這是因?yàn)樗鼈儾粌H難以編寫,而且與其他類型的病毒相比,其宿主的數(shù)量很有限。新病毒一直都有人在編寫,了解系統(tǒng)是如何暴露給病毒的以及做什么能夠保護(hù)計(jì)算機(jī)很重要。按照下列建議,可以大大減少某種潛在的計(jì)算機(jī)病毒感染給計(jì)算機(jī)系統(tǒng)造成的危險(xiǎn)。當(dāng)來源不明的磁盤插入計(jì)算機(jī)時(shí),要非常小心。在打開任何文件之前,總是掃描一下磁盤文件。New

computer

viruses

are

written

all

the

time,

and

it'simportant

to

understand

how

your

system

can

be

exposed

tothem

and

what

can

do

to

protect

your

computer.

Follow

thesuggestions

listed

below

to

substantially

decrease

the

dangerof

infecting

your

computer

system

with

a

potentiallydangerous

computer

virus.Be

very

cautious

about

inserting

disks

from

unknownsources

into

your

computer.Always

scan

the

disk's

files

before

operating

any

of

them.Only

download

Internet

files

from

reputable

sites.Do

not

open

e-mail

attachments

(especially

executablefiles)

from

strangers.TPurchase,

install,

anduse

an

anti-virus

software

program.he

program

you

choose

must

provide

three

functions:Detection.Prevention.Removal.As

new

viruses

are

created

everyday,

upgrade

your

anti-virus

software

regularly.僅從信譽(yù)好的網(wǎng)站下載文件。不打開來自陌生人的電子郵件的附件(特別是可執(zhí)行的文件)。購(gòu)買、安裝及使用防病毒軟件程序,所選擇的程序必須提供三種功能:檢測(cè)、預(yù)防、清除。因?yàn)槊刻於加行虏《井a(chǎn)生,所以要定期地升級(jí)防病毒軟件。習(xí)題6.2Ⅰ.

Put

“true”

or

“false”

in

the

brackets

for

the

following

statements

according

tothe

passage.( )

Computer

viruses

can

replicate

copies

of

themselves

attaching

to

anotherprogram.( )

There

are

four

main

types

of

viruses:

shell,

intrusive,

operating

system,

andsource

code.( )

Intrusive

viruses

wrap

themselves

around

a

host

and

do

not

modify

theoriginal

program.( )

In

order

to

protect

your

computer

you

should

only

download

Internet

filesfrom

reputable

sites.( )

Be

very

cautious

about

inserting

disks

from

unknown

sources

into

yourcomputer.( )

We

may

download

Internet

files

from

any

site

in

order

to

decrease

thedanger

of

infecting

your

computer

system.( )

Do

not

open

e-mail

attachments

(especially

executable

files)

from

strangers.( )

Intrusive

viruses

are

hard

to

write

and

difficult

to

remove

without

damagingthe

host

file.習(xí)題6.2Ⅱ.

Fill

in

the

blanks

according

to

the

passage.Once

attached

to

the

host

program,

the

virus

then

look

for

other

programs

to“

”.The

timing

of

the

attack

can

be

linked

to

a

number

of

situations,

including:

acertain

time

or

date;

the

presence

of

a

particular

;

the

use

orpresence

of

a

;

the

security

privilege

level

of

the

user;

and

th

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論