The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term computer virus is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction The Adolescence of P-1written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer viruses are small programs. They replicate by attaching a copy of themselves to another program.
Once attached to the host Program, the viruses then look for other programs to infect.In this way, the virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So-called benign viruses might simply display a message, like the one that infected IBM's main computer system last Christmas with a season's greeting. Malignant viruses are designed to damage the system. The attack is to wipe out data, to delete flies, or to format the hard disk.
What Kind of Viruses Are There? There are two main types of viruses: shell, intrusive. Shell viruses wrap themselves around a host program and don't modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
參考譯文:
計算機病毒是八十年代計算機飛速發展帶來的結果,計算機病毒這一名詞起因于在計算機上傳染的有害程序與生物學中病毒的相似性,該名詞起源于1977年出版的、由ThomasJ.Ryan寫的一本美國科幻小說《p-1的青春》。人體病毒入侵活的細胞后,就把它轉變成制造病毒的工廠。而計算機病毒是一些小程序,它們把自己的一個副本附加到另一個程序上面進行復制。
病毒程序一旦附加到一個主程序上,就開始尋找其他可以進行“感染”的程序。這樣,病毒就很快地布滿整個硬盤,如果病毒感染了一個局域網或者一個多用戶系統,那么就在整個組織內進行擴散。只有在某個點上病毒程序才會發作(這是由病毒程序的設計所決定的)。攻擊的時間與多種情況有關,包括:某個時間或日期、特定用戶識別符的出現、用戶的安全保密等級和一個文件使用的次數。同樣,攻擊的方式也是各種各樣的。所謂的“良性”病毒可能只是簡單地顯示一個消息,如在去年圣誕節時,受感染的IBM公司的主要計算機系統顯示節日問候。惡性病毒被設計出來破壞系統。常見的攻擊方式是消除數據、刪除文件或者格式化硬盤。
病毒的種類有哪些?主要有兩種病毒:shell病毒和instrusive病毒。Shell病毒把自己盤繞在主程序周圍,它并不修改原程序。這種病毒容易復制因此它的數量占了所有病毒的一半。Instrusive病毒入侵現有程序并且把自己的一部分插入主程序。這種病毒不易復制,但是很難在不損傷主程序的情況下被刪除。
重點單詞:
1、virus 病毒
2、outcome 結果
例句: I think there can be but one outcome to this affair.
我認為這件事只能有一種結局。
3、program [電腦]程序
4、replicate 復制,折疊,復制品
5、host [電腦]主機
6、at some point 某時, 某種情況下
7、so-called 所謂的
8、malignant 邪惡的,極有害的
9、data 數據
10、wipe out 消滅;徹底摧毀
例句: They have wipe out the enemy's major military target.
他們已經徹底摧毀了敵人的主要軍事目標。
句型分析:
1、The cause(of the term computer virus)is the likeness(between the biological virus and the evil program [infected with computers].)
2、The timing(of the attack)can be linked to a number(of situations), including [1]a certain time or date, [2]the presence of a particular file, [3]the security privilege level of the user, [4]and the number of times a file is used.
[1]、[2]、[3]、[4]是在including下的并列短句。
特別聲明:①凡本網注明稿件來源為"原創"的,轉載必須注明"稿件來源:育路網",違者將依法追究責任;
②部分稿件來源于網絡,如有侵權,請聯系我們溝通解決。
25人覺得有用
19
2009.06
一、寫作格式 1、稱呼 (1)機構 A、不認識負責人 Dear Sir or Madam, Dear Sir / Madam, To ......
19
2009.05
生物與環境平衡的危機 The history of life on earth has been a history of interaction between......
19
2009.05
SEVEN SKILLS FOR QUALIFIED EMPLOYEES IN 21ST CENTURY Technical and technological skills will......
19
2009.05
2009年英語復習詳細計劃 2008年考研英語試題在一片毀譽參半的聲音中被考生和眾多專家們評議著,準備......
19
2009.05
從考查要求來看,寫作部分既考查了考生對詞匯、語法、搭配和句型的運用能力,又要求考生從審題、......
19
2009.05
還有整整一個30天就要考研了,在這段時間里,建議英語專業考研的考生要把主要任務放在“查漏補缺,......