![]() |
Главная Случайная страница Контакты | Мы поможем в написании вашей работы! | |
|
1. What is the function of the Jump instruction?
2. What are the main parts of the virus code?
3. What is the last act of the virus?
4. How are computer viruses like biological viruses?
5. What is the effect of a virus patching the operating system?
6. Why are some viruses designed to be loaded into memory?
7. What examples of payload does the writer provide?
8. What kind of programs do viruses often attach to?
9. How does Trojan differ from a virus?
10. Enumerate all the crimes you know that can be committed in computing.
14. Using information from the text, mark the following as True or False:
True | False | ||
A message encrypted with a public key can be decrypted by anyone. | |||
To send a secure message you must know the recipient’s public key. | |||
Secure messages are normally encrypted using a private key before they are sent. | |||
A message can be reconstructed from its MAC. | |||
Two messages can often have the same MAC. | |||
A digital certificate should be signed by a trusted digital-certificate issuer. | |||
A MAC is used to check that a message has not been tampered with. |
15. Make up the plan of the text and then retell it using the following phrases:
- different crimes;
- computer virus;
- host computer system;
- infected program;
- first instruction;
- a reproduction routine.
16. Learn the meaning of the following words and phrases:
Measures – меры;
Protect – защищать, предохранять;
Implement – выполнять, осуществлять;
Firewall – брандмауэр;
Encrypting – шифрование;
Disconnect – разъединять;
Remote – отдаленный, удаленный;
Verification – проверка подтверждение;
Fingerprint – отпечаток пальца;
Electricitysource – источник электричества;
Equipment – оборудование, аппаратура;
Currency – денежное обращение, валюта, деньги;
Withdraw – забирать, изымать;
Incremental – возрастающий.
Дата публикования: 2015-03-29; Прочитано: 1174 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!