Организация стока поверхностных вод: Наибольшее количество влаги на земном шаре испаряется с поверхности морей и океанов (88‰)...

Историки об Елизавете Петровне: Елизавета попала между двумя встречными культурными течениями, воспитывалась среди новых европейских веяний и преданий...

Ex.6 Say if the following statements are true or false:

2024-02-15 80
Ex.6 Say if the following statements are true or false: 0.00 из 5.00 0 оценок
Заказать работу

Вверх
Содержание
Поиск

1. Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs.

2. Spyware programs can not collect various types of personal information.

3. A true virus can not spread from one computer to another when its host is taken to the target computer.

4. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

5. Worms and Trojans, like viruses, may cause harm only to a computer system's data.

6. In order to avoid detection by users, some viruses employ different kinds of deception.

7. Some viruses can infect files without increasing their sizes or damaging the files.

Ex.7   Answer the following questions. Find answers in the text.  Put down the number of the paragraph

1. What is a computer virus?

2. What is term “virus” also commonly used to?

3. What types of viruses do you know?

4. Where does malware comes from?

5. What is spyware?

6. How can viruses damage files?

7. How do viruses spread to other computers?

 

III Oral Practice

Ex. 8 Explain the difference between Trojan horses and worms.

Ex. 9 Describe the influence of viruses on the work of the computer.

Ex. 10Give the classification of computer viruses.

Ex. 11 Discuss the text according to the points:

1. The term computer virus

2. Malware, adware and spyware programs

3. The spreading of viruses

4. The harmful actions of viruses.

 

IV Reading and comprehension

Ex. 12. Read the text and translate it

Nonresident and resident viruses

New word

nonresident viruses – не постійні віруси

resident viruses – віруси компаньйони

replication - копіювати

finder module – файлові віруси

eplication module – загрузочні віруси

 

1. Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file.

Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. However, this module is not called by a finder module. Instead, the virus loads the replication module into memory when it is executed and ensures that this module is executed each time the operating system is called to perform a certain operation. For example, the replication module can be called each time the operating system executes a file. In this case, the virus infects every suitable program that is executed on the computer.

3. Resident viruses are sometimes subdivided into a category of fast infectors and a category of slow infectors. Fast infectors are designed to infect as many files as possible. For instance, a fast infector can infect every potential host file that is accessed. This poses a special problem to anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory, the virus can scanner it and in this way infect all files that are scanned.

 4. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software.

5. Slow infectors, on the other hand, are designed to infect hosts infrequently. For instance, some slow infectors only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably, and will at most infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach does not seem very successful.

 


Поделиться с друзьями:

Наброски и зарисовки растений, плодов, цветов: Освоить конструктивное построение структуры дерева через зарисовки отдельных деревьев, группы деревьев...

Историки об Елизавете Петровне: Елизавета попала между двумя встречными культурными течениями, воспитывалась среди новых европейских веяний и преданий...

История создания датчика движения: Первый прибор для обнаружения движения был изобретен немецким физиком Генрихом Герцем...

Таксономические единицы (категории) растений: Каждая система классификации состоит из определённых соподчиненных друг другу...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.009 с.