已阅读5页,还剩4页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
How Serious are Viruses?Unit 9 Computer VirusText 1 Virus IntroductionExercises 1. Multiple choices.(1) A virus is a ( A ).A. programB. computerC. bad manD. beast(2) A virus is a program that reproduces its own code by ( ABC ).A. adding to the end of a file B. inserting into the middle of a fileC. simply placing a pointer D. replacing another program(3) ( AD )is a type of executable file .A. COM fileB. TXT fileC. JPG fileD. EXE file(4) Similar to viruses, you can also find malicious code in ( ABC ).A. Trojan HorsesB. wormsC. logic bombsD. Microsoft Word Documents2. Fill in the blanks.(1) A virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed .(2) To attach might mean physically adding to the end of a file, inserting into the middle of a file, or simply placing a pointer to a different location on the disk somewhere where the virus can find it.(3) Similar to viruses, you can also find malicious code in Trojan Horses, worms, and logic bombs.3. Translate and analyze the following sentences.(1) These self-replicating codes, when caused by some event, may do a potentially harmful act to your computer.句子组成: when引导时间状语从句做插入语,当的时候 .翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行为.(2) More recently, scripts written for Internet web sites and/or included in E-mail can also be executed and infected.句子组成:scripts written省略的定语从句 完整形式scripts which were writtened.翻译:现在,为网站编写的或者包括在E-mail中的脚本也能够被执行和感染。4. Reading comprehension.Viruses can infect any type of executable code, not just the files that are commonly called “program files”. Viruses can be spread by: Executable code in the boot sector of infected floppy disks Executable code in the system area of infected hard drives Word processing and spreadsheet documents that use infected macros Infected HTML documents that contain JavaScript or other types of executable code Since virus code must be executed (run) to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, etc., as well as plain text in .txt files. For example, just viewing picture files wont infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file, that the computer will actually try to execute.Answer the following questions according to the article above.(1) What kind of files can be infected by a virus?A virus can infect the executable files such as .exe or .com or .doc files,etc.(2) How about viruses can be spread? Executable code in the boot sector of infected floppy disks or in the system area of infected hard drives, word processing and spreadsheet documents that use infected macros Infected HTML documents that contain JavaScript or other types of executable code.Text 2 Virus Behavior Infection PhaseExercises 1. Multiple choices.(1) Viruses all have two phases to their execution, the ( A ) and the ( C ).A. infection phaseB. delete phaseC. attack phaseD. create phase(2) ( ABCD ) maybe a certain cause that some viruses infect upon.A. a dayB. a timeC. an external event on your PC D. a counter within the virus(3) Many viruses go resident in the memory like a ( C ).A. .exe fileB. .com fileC. tsr programD. data file(4) You want to ( ABC ) maybe wake up a virus that has residented in memory.A. copy a fileB. access a disketteC. execute a program D. delete a file(5) Some viruses use ( A ) and ( B ) techniques to hide their existence.A. stealthB. polymorphicC. quickly spreadD. replace a part of system software2. Fill in the blanks.(1) Viruses come in a great many different forms, but they all potentially have two phases to their execution, the infection phase and the attact phase.(2) For those not old enough to remember tsr, they were programs that executed under system but stayed in memory instead of ending.(3) Note that worms often take the opposite approach and spread as fast as possible.3. Translate and analyze the following sentences.(1) When the virus executes it has the potential to infect other programs.句子组成:when引导时间状语从句 当,时 .翻译:病毒在执行时,能够感染其他程序 .(2) Some viruses infect other programs each time they are executed; other viruses infect only upon a certain cause.句子组成:someother引导两个并列句子,一些其他.。翻译:一些病毒会在每次被执行时,都感染其他程序;另一些病毒只是在一些特定的触发原因下才能感染其他程序.(3) Resident viruses frequently take over portions of the system software on the PC to hide their existence.句子组成:to hide their existence不定式做目的状语 take over 代替.翻译:驻留内存病毒常常代替PC系统文件的一部分来掩饰它的存在 .4. Reading comprehension.Polymorphic viruses use encryption (密码术) or other methods to change how they look. This strategy of changing their appearance helps to defeat antivirus scanning software. Stealth viruses attempt to hide any modifications they have made from antivirus scanning software. For example, stealth viruses sometimes substitute unaltered files and directory table entries for the virus-altered ones, in an attempt to fool antivirus scanning software. Fast infector viruses are capable of infecting any file which is opened, rather than only executed files. Slow infectors only modify files as the files are being created or altered for legitimate reasons, a practice which fools some antivirus software. Sparse infectors only infect at certain intervals dictated by their programming, lessening their chance of creating suspicion on the part of the user.Choose the best answer.(1) How can polymorphic viruses defeat antivirus scanning software?(B)A. resident in memoryB. use encryptionC. hide in other programsD. use the unaltered files to replace the virus-altered ones(2) How can stealth viruses fool antivirus scanning software?(C)A. resident in memoryB. use encryptionC. hide in other programsD. use the unaltered files to replace the virus-altered ones(3) Which kind of virus can only alter files, as the files are being created or altered for legitimate reasons?(D)A. polymorphic virusB. stealth virusC. fast virusD. slow virus(4) A few of viruses only infect at certain intervals dictated by their programming, because of _?(A)A. Dont let user notice them.B. They wait for some special programs to infect.C. No special reason.D. They want to change how they look.Text 3 Virus BehaviorAttack Phase9Exercises 1. Multiple choices.(1) Many viruses do harmful things such as ( ABCD ).A. deleting filesB. changing random data on your diskC. simulating typosD. slowing your PC down(2) Viruses can delay their attack for ( ABCD ).A. daysB. weeksC. monthsD. years(3) If a virus simply reproduce and have no cause for an attack phase, but it will still ( AB ) without your permission.A. stealing storageB. pilfer CPU cyclesC. delete filesC. play music(4) Some viruses, with no attack phase, often damage the programs or disks they infect because they ( AB ).A. have bugs in themB. contain poor quality codeC. steal storageD. show messages on your screen2. Fill in the blanks.(1) Many viruses do unpleasant things such as deleting files or changing random data on your disk.(2) Most viruses have bugs in them and these bugs often cause unintended negative side effects.(3) In addition, even if the virus is perfect, it still steals system resources.(4) The attack phase is optional, many viruses simply reproduce and have no cause for an attack phase.(5) An example, one of the most common past viruses, Stoned, is not intentionally harmful.3. Translate and analyze the following sentences.(1) Just as the infection phase can be caused by some event, the attack phase also has its own cause.句子组成:as引导状语从句.翻译:如同感染阶段需要一些事件触发一样,攻击阶段也有它自己的触发条件.(2) In addition, even if the virus is perfect, it still steals system resources.句子组成:even if 即使,引导条件状语从句;in addition 另外.翻译:此外,即使病毒设计完美,它仍会盗用系统资源。(3) This is made worse since viruses that just infect, with no attack phase, often damage the programs or disks they infect.句子组成:since引导原因状语从句 with no attact phase 插入语.翻译:有些病毒只会“感染”而没有攻击阶段,但它们会破坏被它们感染的程序或磁盘,这反而更有害.(4) The original virus tried to hide its own code in an area of 1.2MB diskettes that resulted in corruption of the entire diskette (this bug was fixed in later versions of the virus).句子组成:that引导主语从句表示the originalin an area of 1.2MB diskettes.翻译:最初的病毒试图把它自身隐藏在1.2MB的磁盘中从而导致整张磁盘变坏.4. Reading comprehension.When you start a program thats infected by a virus, the virus code will execute (run) and try and infect other programs. This can infect the same computer or other computers connected to it on a network. The newly infected programs will try to infect more programs and computers. When you share a copy of an infected file with other computer users, opening the file may also infect their computers; and files from those computers may spread the infection to yet more computers. If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and then the virus on the computer will try to infect more floppies inserted into it.Answer the following two questions according to the article above.(1) Did you meet any viruses before?(2) If you have met a virus, do you remember how the virus infected your computer?Text 4 Number of VirusesExercises1. Multiple choices.(1) In 2000, the number of viruses topped ( D ).A. 500B. 1000C. 7500D. 50000(2) What make it is difficult to agree on how to count viruses?(ABCD)A. new virus arise from an existing virusB. some viruses can create different versions when they infect other programsC. some viruses can use polymorphic techniqueD. just a trivial change may create a new virus(3) The Whale will create ( D ) different versions of itself when it infects files.A. 30B. 31C. 32D. 33(4) Now, about ( C ) different viruses account for all the viruses that actually spread in the wild.A. 30B. 150C. 180D. 500002. Fill in the blanks.(1)In late 1992, estimates were ranging from 1,000 to 2,300 viruses.(2)But, this is a trivial change that can be done in less than two minutes resulting in yet another new virus.(3)Another problem comes from viruses that try to conceal themselves from scanners by mutating.3. Translate and analyze the following sentences.(1) The confusion exists partly because its difficult to agree on how to count viruses.句子结构:its difficult中it为形式主语代替后面真正的主语to agree on .翻译:由于在怎样计算病毒上很难达成一致,所以现在还存在一些混乱.(2) But, this is a trivial change that can be done in less than two minutes resulting in yet another new virus.句子结构:that引导定语从句修饰change.翻译:但是,一个在两分钟内可以完成的细微的改动就产生了一种“新”病毒.(3) Many of the large number of viruses known to exist have not been detected in the wild but probably exist only in someones virus collection.句子结构:notbut 不是而是.翻译:很多病毒虽然还没有被公众检测到,但可能已经在某个人的病毒收集夹中了.(4) Although the actual number of viruses will probably continue to be hotly debated, what is clear is that the total number of viruses is increasing, although the active viruses not quite as rapidly as the numbers might suggest.句子结构:although表转折,连接词,引导句子.翻译:虽然关于病毒的实际数量可能会继续进行激烈的争论,但一个很清楚的事实就是病毒的总数在增加。4. Reading comprehension.Viruses are software programs; the actual effect of a virus depends on how it was programmed by the person who wrote the virus.Some viruses are designed to overwrite boot sectors and interfere with your computers operation (boot viruses), others damage your computers memory operation then try and spread themselves around by picking up e-mail or network addresses off your computer (worm viruses). Still others will wipe files from the hard drive and destroy system files (Trojan viruses) and finally there are ones that infect document files, electronic spreadsheets and databases of several popular software packages (Macro viruses). Viruses cant do any damage to hardware: they wont melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. Warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.Make some choices after reading the article above.(1) The actual effect of a virus depends on ( A ).A. the person who wrote the virusB. how much your computer isC. how to use your computerD. a special cause(2) What kind of virus may overwrite boot sectors and interfere with your computers operation (boot viruses), others damage?( A )A. boot virusB. worm virusC. Trojan virusD. Macro virus(3) A macro virus can not infect ( C ).A. document filesB. electronic spreadsheetsC. overwrite boot sectorsD. databases of several popular software packagesText 5 How Serious are Viruses?Exercises 1. Fill in the blanks.(1) While serious if you have one, viruses are only one way your data can be damaged.(2) Its still clear that there are many dangerous occurrences of data corruption from causes other than from viruses.(3) One just has to take protective steps with anti-virus software and use some common sense when dealing with unknown files.(4) Because viruses and worms are deliberately written to invade and possibly damage your PC, they are the most difficult threat to guard against.2. Translate and analyze the following sentences.(1) While serious if you have one, viruses are only one way your data can be damaged.句子结构:while引导原因状语从句,表转折关系.翻译:虽然如果你的机器被病毒感染会许多威协带来很严重的后果,但那只是你的数据被破坏的其中一种方式.(2) It just means that its foolish to spend much money and time on addressing the threat of viruses if youve done nothing about the other more
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年度金融服务合同标的及服务内容详细描述2篇
- 二零二五年度北方林业生态修复桉树种植承包合同3篇
- 二零二五版农业现代化建设分期贷款合同样本
- 专业液压技术支持与服务合同书版B版
- 二零二五年网络小说保密协议书6篇
- 二零二五年度夫妻离婚后子女教育资助及费用承担协议3篇
- 个人2024年按揭贷款还款合同
- 二零二五年度水库水面冬季冰上娱乐项目承包合同2篇
- 二零二五年度广州企业劳务派遣及社会保障一体化协议3篇
- 二零二五版个人股权置换与转让专项合同3篇
- 病例报告表(CRF)模板
- 2024年重庆市中考数学试卷(AB合卷)【附答案】
- 2024届高考语文作文备考:立足材料打造分论点 教学设计
- 幼儿园大班数学练习题100道及答案解析
- 对讲机外壳注射模设计 模具设计及制作专业
- 2024年四川省德阳市中考道德与法治试卷(含答案逐题解析)
- 施工现场水电费协议
- SH/T 3046-2024 石油化工立式圆筒形钢制焊接储罐设计规范(正式版)
- 六年级数学质量分析及改进措施
- 一年级下册数学口算题卡打印
- 【阅读提升】部编版语文五年级下册第三单元阅读要素解析 类文阅读课外阅读过关(含答案)
评论
0/150
提交评论