友情提示:本站提供全國400多所高等院校招收碩士、博士研究生入學考試歷年考研真題、考博真題、答案,部分學校更新至2012年,2013年;均提供收費下載。 下載流程: 考研真題 點擊“考研試卷””下載; 考博真題 點擊“考博試卷庫” 下載
計算機病毒
The computer virus is an outcome of the computer overgrowth in the 1980s. The
cause of the term computer virus is the likeness between the biological virus
and the evil program infected with computers. The origin of this term came from
an American science fiction The Adolescence of P-1written by Thomas J. Ryan,
published in 1977. Human viruses invade a living cell and turn it into a factory
for manufacturing viruses. However, computer viruses are small programs. They
replicate by attaching a copy of themselves to another program.
Once attached to the host Program, the viruses then look for other programs
to infect.In this way, the virus can spread quickly throughout a hard disk or an
entire organization when it infects a LAN or a multi-user system. At some point,
determined by how the virus was programmed the virus attacks. The timing of the
attack can be linked to a number of situations, including a certain time or
date, the presence of a particular file, the security privilege level of the
user, and the number of times a file is used. Likewise, the mode of attack
varies. So-called benign viruses might simply display a message, like the one
that infected IBM's main computer system last Christmas with a season's
greeting. Malignant viruses are designed to damage the system. The attack is to
wipe out data, to delete flies, or to format the hard disk.
What Kind of Viruses Are There? There are two main types of viruses: shell,
intrusive. Shell viruses wrap themselves around a host program and don't modify
the original program. Shell programs are easy to write, which is why about half
of viruses are of this type. Intrusive viruses invade an existing program and
actually insert a portion of themselves into the host program. Intrusive viruses
are hard to write and very difficult to remove without damaging the host
file.
參考譯文:
計算機病毒是八十年代計算機飛速發展帶來的結果,計算機病毒這一名詞起因于在計算機上傳染的有害程序與生物學中病毒的相似性,該名詞起源于1977年出版的、由ThomasJ.Ryan寫的一本美國科幻小說《p-1的青春》。人體病毒入侵活的細胞后,就把它轉變成制造病毒的工廠。而計算機病毒是一些小程序,它們把自己的一個副本附加到另一個程序上面進行復制。
病毒程序一旦附加到一個主程序上,就開始尋找其他可以進行“感染”的程序。這樣,病毒就很快地布滿整個硬盤,如果病毒感染了一個局域網或者一個多用戶系統,那么就在整個組織內進行擴散。只有在某個點上病毒程序才會發作(這是由病毒程序的設計所決定的)。攻擊的時間與多種情況有關,包括:某個時間或日期、特定用戶識別符的出現、用戶的安全保密等級和一個文件使用的次數。同樣,攻擊的方式也是各種各樣的。所謂的“良性”病毒可能只是簡單地顯示一個消息,如在去年圣誕節時,受感染的IBM公司的主要計算機系統顯示節日問候。惡性病毒被設計出來破壞系統。常見的攻擊方式是消除數據、刪除文件或者格式化硬盤。
病毒的種類有哪些?主要有兩種病毒:shell病毒和instrusive病毒。Shell病毒把自己盤繞在主程序周圍,它并不修改原程序。這種病毒容易復制因此它的數量占了所有病毒的一半。Instrusive病毒入侵現有程序并且把自己的一部分插入主程序。這種病毒不易復制,但是很難在不損傷主程序的情況下被刪除。
重點單詞:
1、virus 病毒
2、outcome 結果
例句: I think there can be but one outcome to this affair.
我認為這件事只能有一種結局。
3、program [電腦]程序
4、replicate 復制,折疊,復制品
5、host [電腦]主機
6、at some point 某時, 某種情況下
7、so-called 所謂的
8、malignant 邪惡的,極有害的
9、data 數據
10、wipe out 消滅;徹底摧毀
例句: They have wipe out the enemy's major military target.
他們已經徹底摧毀了敵人的主要軍事目標。
句型分析:
1、The cause(of the term computer virus)is the likeness(between the biological
virus and the evil program [infected with computers].)
2、The timing(of the attack)can be linked to a number(of situations),
including [1]a certain time or date, [2]the presence of a particular file,
[3]the security privilege level of the user, [4]and the number of times a file
is used.
[1]、[2]、[3]、[4]是在including下的并列短句。
免責聲明:本文系轉載自網絡,如有侵犯,請聯系我們立即刪除,另:本文僅代表作者個人觀點,與本網站無關。其原創性以及文中陳述文字和內容未經本站證實,對本文以及其中全部或者部分內容、文字的真實性、完整性、及時性本站不作任何保證或承諾,請讀者僅作參考,并請自行核實相關內容。