Example: a computer program; an E-mail address
A
|
B
|
computer
|
|
program
|
|
E-mail
|
|
address
|
|
companion
|
file
|
bomb
|
spreadsheets
|
time
|
Logic
|
sector
|
databases
|
boot
|
data
|
loss
|
reformatting
|
system
|
new-age
|
crash
|
application
|
Excel
|
Access
|
browser
|
memory
|
web
|
hard disk
|
virus
|
software
|
Macro
|
|
|
|
EXERCISE EXERCISE 5
Look through the text about viruses again. Write questions to the answers.
____________________________________ ?
a. To replicate itself and execute itself.
____________________________________ ?
b. Like a real biological virus.
____________________________________ ?
c. In January, 2004.
____________________________________ ?
d. Trojan horses and worms.
____________________________________ ?
e. It doesn’t affect files.
____________________________________ ?
f. A combination of boot sector viruses and file viruses.
____________________________________ ?
g. It lies inert until specific conditions are met.
____________________________________ ?
h. ‘Friday the 13th’ virus.
____________________________________ ?
i. They are known to be platform-independent.
_ ___________________________________ ?
j. To destroy and delete files.
____________________________________ ?
k. It is the method in which they reproduce and spread.
EXERCISEEXERCISE 6
Open brackets. Use the correct form of an adverb (Present Participle or Past Participle).
A computer virus is a computer program (written/writing) to alter the way a computer operates.
Multipartite viruses come in through (infected/infecting) media and reside in memory.
With the (increased/increasing) capabilities of macro languages in applications, macro viruses are major threats.
The user often finds the banners (annoying/annoyed).
Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information (storing/stored) on a computer.
The first PC virus was a boot sector virus (calling/called) (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi from Pakistan.
Traditional computer viruses emerged in the 1980s, (driven/driving) by the spread of personal computers.
If a user tries to start an (infecting/infected) program, the virus code may be executed first.
Some viruses try to avoid detection by killing the tasks (associated/associating) with antivirus software before it can detect them.
As computers and operating systems grow larger and more complex, old hiding techniques need to be (updated/updating) or (replaced/replacing).
EXERCISEEXERCISE 7
Достарыңызбен бөлісу: |