Melissa and LoveLetter made use of the trust that exists between friends orcolleagues.Imagine receiving an (71) from a friend who asks you to open it.This is whathappens with Melissa and several other similar email (72) .Upon running,such wormsusually proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages (73) . A.virtual B.virus C.worm D.bacteria
As administrators seek to block dangerous email attachments through the recognition ofwell—known (74) ,virus writers use other extensions to circumvent such protection.Executable(.exe)files are renamed to.bat and.cmd plus a whole list of other extensions and wilt still runand successfully infect target users.
B. Frequently,hackers try to penetrate networks by sending an attachment that
C. looks like a flash movie,which,while displaying some cute animation,simultaneouslyruns commands in the background to steal your passwords and give the (75) access to yournetwork.
D. 供选择答案:
查看答案
Windows XP是一种 (56) 操作系统,为了支持网络通信的功能,在它的网络体系中包含了网络API、传输驱动程序接口(TDI)、TDI传送器、NDIS小端口驱动程序和 (57) ,同时NDIS库也为 (58) 的使用提供了函数接口。
A. 单用户、多进程
B. 多用户、多进程
C. 单用户、单进程
D. 多用户、单进程
不同计算机中, (18) 的长度是固定不变的。设计算机的字长是4个字节,意味着 (19) 。
A. 该机最长可使用4个字节的字符串
B. 该机在CPu中一次可以处理32位的数据
CPU可以处理的最大数是2的32次
D. 该机以4字节为一个单位将信息存放在软盘上
计算机内存的容量大小受到 (11) 位数的限制。若该总线为20位,则可以寻址的内存空间为 (12) B。
A. 地址总线
B. 数据总线
C. 控制总线
D. 通信总线
Melissa and LoveLetter made use of the trust that exists between friends orcolleagues.Imagine receiving an (71) from a friend who asks you to open it.This is whathappens with Melissa and several other similar email (72) .Upon running,such wormsusually proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages (73) . A.cracker B.user C.customer D.client
As administrators seek to block dangerous email attachments through the recognition ofwell—known (74) ,virus writers use other extensions to circumvent such protection.Executable(.exe)files are renamed to.bat and.cmd plus a whole list of other extensions and wilt still runand successfully infect target users.
B. Frequently,hackers try to penetrate networks by sending an attachment that
C. looks like a flash movie,which,while displaying some cute animation,simultaneouslyruns commands in the background to steal your passwords and give the (75) access to yournetwork.
D. 供选择答案: