program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.
A.Worm
B.Virus
C.Disaster
D.Demon
第1题:
The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).
A.hub
B.center
C.core
D.nucleus
第2题:
An embedded operating system is the(71)program that manages all the other programs in an embedded device after initial load of programs by a(an)(72). It normally guarantees a capability within a specified(73)size and(74)constraint as well as with application programs. It also n0rmalty has small foot print including initial boot loader, OS kernel, required device drivers,(75)for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.
A.hardware
B.business
C.software
D.external
第3题:
Program( )describes program&39;s objectives, desired output, input data required, processing requirement, and documentation.
A.specification B.flowchart C.structure D.address
第4题:
Passage Two
Questions 26 to 30 are based on the following passage.
Online learning is also called distance education, which helps students who take classes by computer over the Internet to learn certain courses and earn a degree. And it has become more and more popular with both young people and educational institutions.
The School of Continuing and Professional Studies of New York University in Manhattan began online classes in 1992. Its Virtual School has taught more than 10,000 students from across the United States and other countries.
Last year,the school launched NYU Online. It offers NYU's first online Programs for a bachelor's degree. Programs are offered in three areas; leadership And management, information systems management and social sciences. The classes are highly interactive where students communicate with each other and their teachers. Some classes require students to log in at the same time so they can attend live lectures by a professor Students can also ask questions and work together on team projects.
The cost to attend NYU Online depends on how many classes a student is to take It costs as much as fifteen thousand dollars a year. NYU offers no financial aid for international students in this program. If you are interested in the program, you can gel more details at the website: www..nyu.edu. Many other schools, too, offer online education. Students should be especially careful of programs that offer a degree in return for little or no work. These are known as diploma mills, and are illegal in the United States.
Educational advisers also say that before you enter any program, make sure the work will be recognized in your country. You should also make sure the schools you are considering are officially approved.
26. The third paragraph is mainly about the __ of the programs of the School.
A. academic goal and system
B. courses and learning mode
C. learning methods and classes
D. courses and requirements
第5题:
第6题:
第7题:
You run a Windows Defender scan on your computer. You notice a valid program listed in Quarantined Items. You need to use this program on your computer. What should you do?()
第8题:
Within a 64-bit Windows desktop OS, by default where are the program files for 32-bit programs located?()
第9题:
What are four capabilities of the mysql client program?()
第10题:
C:/Program Files
C:/Windows/
C:/Windows/System32
C:/Program Files (x86)
第11题:
Creating, dropping, and modifying tables and indexes
Initiating a binary backup of the database by using the START BACKUP command
Displaying replication status information
Shutting down the server by using the SHUTDOWN command
Creating and dropping databases
Creating and administering users
第12题:
Reinstall the application to another location.
Restore the program from the Quarantined Items list.
Remove the program from the Quarantined Items list.
Repair the program from the Programs option in Control Panel.
第13题:
The relational database model requires the data be(110)through programs that don't rely on the position of the data in the database. This is in direct(111)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(112)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(113)the information. The(114)on how the search is done are specific to the DBMS and vary from product to product.
A.accessed
B.moved
C.read
D.wrote
第14题:
The most accurate and most boring way to(105)Java is that it is a new computer programming language developed by Sun Microsystems that creates(106)independent programs that can be distributed and nm remotely. To run Java programs, a computer must have a Java interpreter. Currently(107)Java programs are small "applets" that are(107)as part of web pages.When you use a Java(108)browser to view a Web page that includes a Java applet, the browser loads the applet onto your computer through your modem or network. Then the Java interpreter runs the applet, which could include animation or sound, on your computer rather than transmitting the code bit by bit over Internet. A few thousand bytes of Java code can tam into a powerful program on your computer.So an applet could include(109)with Java interpreter.
A.command
B.comment
C.describe
D.discover
第15题:
A computer virus is a computer program that is created to make and spread(71)of itself.
A.programs
B.virus
C.copies
D.files
第16题:
第17题:
第18题:
第19题:
Within a 64-bit Windows desktop OS, by default where are the program files for 64-bit programs located?()
第20题:
How do objects pass messages in Java?()
第21题:
students don’t have to travel away from home to take a test
the content of distance learning program is the same as that of the full time program in colleges and universities
the good distance learning programs include courses that are not taught in average universities
the relationship between students and professors are one-to-one
第22题:
C:/Windows
C:/Program Files (x86)
C:/Program Files
C:/Windows/System32
第23题:
They pass messages by modifying each other’s member variables
They pass messages by modifying the static member variables of each other’s classes
They pass messages by calling each other’s instance member methods
They pass messages by calling static member methods of each other’s classes.