正在加载图片...
Since it is very difficult to avoid the virus,your best defense is a powerful antivirus program.In order to fight with such viruses,the software vendors should focus on making their products more robust.This may ask for a trade-off between user-friendliness and security.In specific cases it may require line-by-line inspection,code retooling and even systems automation to defend the installed programs. (三)choose the best answer according to the passage B.(根据上文的内容选择正确的答案。10 分,每题2分)】 41.A computer virus is a computer program that is created to make and spread of itself. A.programs B.virus C.copies D.files 42.Worm spread itself except by A.network B.E-mail C.program D.hardware 43.Antivirus program can scan and virus. A.clean B.produce C.replicate D.make 44.Trojan Horses A.quickly replicate itself and gradually attache to files,programs or the hard drive. B.infect the computer without even having to click open email attachment or any program C.allow hackers to take control over a particular system or to steal very important data. D.avoid the virus to attack computer. 45.According to BusinessWeek,the attacks reported in the first half of 2003 nearly match previous year's total number. A.86,404 B.76,404 C.56,354 D.34,876 1195Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require 1ine- by-1ine inspection, code retooling and even systems automation to defend the installed programs. {三)choose the best answer according to the passage B. (根据上文的内容选择正确的答案。 分,每题 2分} 41. A computer virus is a computer program that is created to make and spread of itself. A. programs C. copies 42. Worm spread itself except by A. network C. program 43. Antivirus program can scan and A. clean C. replicate B. virus D. files B. E-mail D. hardware vIrus. BDMAmoadkuece 44. Trojan Horses A. quickly replicate itself and gradually attache to files , programs or the hard drive. B. infect the computer without even having to click open email attachment or any program. C. allow hackers to take control over a particular system or to steal very important data. D. avoid the virus to attack computer. 45. According to BusinessWeek , the nearly match previous year's total number. attacks reported in the first half of 2003 A. 86,404 C.56 ,354 B. 76,404 D.34 ,876 1195
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有