Unit 9 Computer virus Text 1 Virus Introduction Exercises us is a(A A. program B D. beast (2)A virus is a program that reproduces its own code by( ABc A. adding to the end of a file B nserting into the middle of a file C. simply placing D. replacing another program (3)(AD )is a type of executable file A. COM file B. TXTfile C. JPG file D. EXE file (4) Similar to viruses, you can also find malicious code in( ABC A. Trojan hor B C. logic bombs D Microsoft Word documents 2. Fill in the blanks (1)A virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed (2) To attach might mean physically adding to the end of a file, inserting into the middle of a file, or simply placing a pointer to a different location on the disk somewhere where the virus can find it can also find malicious code in Trojan Horses, worms, and 3. Translate and analyze the following sentences (1) These self-replicating codes, when caused by some event, may do a potentially harmful act to your computer 句子组成:when引导时间状语从句做插入语,当的时候 翻译:当这些自复制代码被一些事仼触发时,或许会做岀一些对你的计算机有潜在危害的行 (2)More recently, scripts written for Internet web sites and/or included in E-mail can also be executed and infected 句子组成: scripts written.省略的定语从句完整形式 scripts 翻译:现在,为网站编写的或者包括在E-mai中 4. Reading comprehension
Unit 9 Computer Virus Text 1 Virus Introduction Exercises 1. Multiple choices. (1) A virus is a ( A ). A. program B. computer C. bad man D. beast (2) A virus is a program that reproduces its own code by ( ABC ). A. adding to the end of a file B. inserting into the middle of a file C. simply placing a pointer D. replacing another program (3) ( AD )is a type of executable file . A. COM file B. TXT file C. JPG file D. EXE file (4) Similar to viruses, you can also find malicious code in ( ABC ). A. Trojan Horses B. worms C. logic bombs D. Microsoft Word Documents 2. Fill in the blanks. (1) A virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed . (2) To attach might mean physically adding to the end of a file, inserting into the middle of a file, or simply placing a pointer to a different location on the disk somewhere where the virus can find it. (3) Similar to viruses, you can also find malicious code in Trojan Horses, worms, and logic bombs. 3. Translate and analyze the following sentences. (1) These self-replicating codes, when caused by some event, may do a potentially harmful act to your computer. 句子组成: when 引导时间状语从句做插入语,当…的时候 . 翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行 为. (2) More recently, scripts written for Internet web sites and/or included in E-mail can also be executed and infected. 句子组成:scripts written…省略的定语从句 完整形式 scripts which were writtened…. 翻译:现在,为网站编写的或者包括在 E-mail 中的脚本也能够被执行和感染。 4. Reading comprehension
Viruses can infect any type of executable code, not just the files that are commonly called program files'". Viruses can be spread by Executable code in the boot sector of infected floppy disks Executable code in the system area of infected hard drives Word processing and spreadsheet documents that use infected macros Infected HTML documents that contain JavaScript or other types of executable code Since virus code must be executed(run) to have any effect, files that the computer treats data are safe. This includes graphics and sound files such as gif, jpg, mp3,. wav, etc,as plain text in. txt files. For example, just viewing picture files won't infect your computer with a virus The virus code has to be in a form, such as an exe program file or a Word. doc file, that the computer will actually try to execute Answer the following questions according to the article above (1) What kind of files can be infected by a virus? a virus can infect the executable files such as exe or com or doc files . etc (2) How about viruses can be spread? Executable code in the boot sector of infected floppy disks or in the system area of infected hard drives, word processing and spreadsheet documents that use infected macros Infected html documents that contain JavaScript or other types of executable Text 2 Virus behavior-Infection Phase Exercises 1. Multiple choices (1) Viruses all have two phases to their execution, the( a )and the(c) A. infection phase B. delete phase C. attack phase D. create phase (2)(ABCD)maybe a certain cause that some viruses infect upon B. a tim C. an external event on your PC d a counter within the virus (3)Many viruses go resident in the memory likea(C) A B. com file C. tsr program D. data file 4)You want to( ABC )maybe wake up a virus that has residented in memory A. copy a file B. access a diskette execute a program D. delete a file (5)Some viruses use(A )and(B)techniques to hide their existence A. stealth B. polymorphic quickly spread D. replace a part of system software
Unit 9 Computer Virus 2 Viruses can infect any type of executable code, not just the files that are commonly called “program files”. Viruses can be spread by: • Executable code in the boot sector of infected floppy disks • Executable code in the system area of infected hard drives • Word processing and spreadsheet documents that use infected macros Infected HTML documents that contain JavaScript or other types of executable code Since virus code must be executed (run) to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, etc., as well as plain text in .txt files. For example, just viewing picture files won't infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file, that the computer will actually try to execute. Answer the following questions according to the article above. (1) What kind of files can be infected by a virus? A virus can infect the executable files such as .exe or .com or .doc files,etc. (2) How about viruses can be spread? Executable code in the boot sector of infected floppy disks or in the system area of infected hard drives, word processing and spreadsheet documents that use infected macros Infected HTML documents that contain JavaScript or other types of executable code. Text 2 Virus Behavior – Infection Phase Exercises 1. Multiple choices. (1) Viruses all have two phases to their execution, the ( A ) and the ( C ). A. infection phase B. delete phase C. attack phase D. create phase (2) ( ABCD ) maybe a certain cause that some viruses infect upon. A. a day B. a time C. an external event on your PC D. a counter within the virus (3) Many viruses go resident in the memory like a ( C ). A. .exe file B. .com file C. tsr program D. data file (4) You want to ( ABC ) maybe wake up a virus that has residented in memory. A. copy a file B. access a diskette C. execute a program D. delete a file (5) Some viruses use ( A ) and ( B ) techniques to hide their existence. A. stealth B. polymorphic C. quickly spread D. replace a part of system software
Virus belay Infec 2. Fill in the blanks (1)Viruses come in a great many different forms, but they all potentially have two phases to their execution, the infection phase and the attact phase (2) For those not old enough to remember tsr, they were programs that executed under system but stayed in memory instead of ending (3) Note that worms often take the opposite approach and spread as fast as possible 3. Translate and analyze the following sentences (1)When the virus executes it has the potential to infect other programs 句子组成:when引导时间状语从句当时 翻译:病毒在执行时,能够感染其他科 (2) Some viruses infect other programs each time they are executed; other viruses infect only upon a certain cause 句子组成: some. other引导两个并列句子,一些。其他。。 翻译:二些病毒会在每次被执行时,都感染其他程序;另一些病毒只是在一些特定的触发 原因下才能感染其他程序 (3) Resident viruses frequently take over portions of the system software on the PC to hide their existence 句子组成: to hide their existence不定式做目的状语 take over代替 翻译: 内存病毒 替PC系统文件的一部分来掩饰它的存在 4. Reading comprehension Polymorphic viruses use encryption (A)or other methods to change how they look. This strategy of changing their appearance helps to defeat antivirus scanning software. Stealth viruses attempt to hide any modifications they have made from antivirus scanning software. For example stealth viruses sometimes substitute unaltered files and directory table entries for the virus-altered ones, in an attempt to fool antivirus scanning software. Fast infector viruses are capable of infecting any file which is opened, rather than only executed files. Slow infectors only modify files as the files are being created or altered for legitimate reasons, a practice which fools some antivirus software Sparse infectors only infect at certain intervals dictated by their programming lessening their chance of creating suspicion on the part of the user Choose the best answer (1) How can polymorphic viruses defeat antivirus scanning software? (B) A. resident in memory B C. hide in other programs the unaltered files to replace the virus-altered ones can stealth viruses fool antivirus scanning software? (C) A. resident in B. use encryption C. hide in other programs
Virus Behavior – Infection Phase 3 2. Fill in the blanks. (1) Viruses come in a great many different forms, but they all potentially have two phases to their execution, the infection phase and the attact phase. (2) For those not old enough to remember tsr, they were programs that executed under system but stayed in memory instead of ending. (3) Note that worms often take the opposite approach and spread as fast as possible. 3. Translate and analyze the following sentences. (1) When the virus executes it has the potential to infect other programs. 句子组成:when 引导时间状语从句 当,,,时 . 翻译:病毒在执行时,能够感染其他程序 . (2) Some viruses infect other programs each time they are executed; other viruses infect only upon a certain cause. 句子组成:some…other…引导两个并列句子,一些…其他….。 翻译:一些病毒会在每次被执行时,都感染其他程序;另一些病毒只是在一些特定的触发 原因下才能感染其他程序. (3) Resident viruses frequently take over portions of the system software on the PC to hide their existence. 句子组成:to hide their existence 不定式做目的状语 take over 代替. 翻译:驻留内存病毒常常代替 PC 系统文件的一部分来掩饰它的存在 . 4. Reading comprehension. Polymorphic viruses use encryption (密码术) or other methods to change how they look. This strategy of changing their appearance helps to defeat antivirus scanning software. Stealth viruses attempt to hide any modifications they have made from antivirus scanning software. For example, stealth viruses sometimes substitute unaltered files and directory table entries for the virus-altered ones, in an attempt to fool antivirus scanning software. Fast infector viruses are capable of infecting any file which is opened, rather than only executed files. Slow infectors only modify files as the files are being created or altered for legitimate reasons, a practice which fools some antivirus software. Sparse infectors only infect at certain intervals dictated by their programming, lessening their chance of creating suspicion on the part of the user. Choose the best answer. (1) How can polymorphic viruses defeat antivirus scanning software?(B) A. resident in memory B. use encryption C. hide in other programs D. use the unaltered files to replace the virus-altered ones (2) How can stealth viruses fool antivirus scanning software?(C) A. resident in memory B. use encryption C. hide in other programs
Unit9 Computer Virus D. use the unaltered files to replace the virus-altered ones ()Which kind of virus can only alter files, as the files are being created or altered for legitimate ns? (D) virus B. stealth virus C. fast virus D. slow virus (4)A few of viruses only infect at certain intervals dictated by their programming because A. Don't let user notice them B. They wait for some special programs to infect C. No special reason D. They want to change how they look Text 3 Virus behavior- Attack Phase Exercises 1. Multiple choices (1)Many viruses do harmful things such as( ABCD A. deleting files B. changing random data on your C. simulating typos D. slowing your PC down (2) Viruses can delay their attack for( ABCD A. days B. weeks C. months D.years (3) If a virus simply reproduce and have no cause for an attack phase, but it will still AB )without your permission A. stealing storage B. pilfer CPU cycles C. delete files C. play music (4) Some viruses, with no attack phase, often damage the programs or disks they infect because they( AB A. have bugs in them contain poor quality code D. show messages on your screen 2. Fill in the blanks (1) Many viruses do unpleasant things such as deleting files or changing random data on (2)Most viruses have bugs in them and these bugs often cause unintended negative side In addition, even if the virus is perfect, it still steals system resources The attack phase is optional, many viruses simply reproduce and have no cause for an attack phas (5) An example, one of the most common past viruses, Stoned, is not intentionally harmful 3. Translate and analyze the following sentences
Unit 9 Computer Virus 4 D. use the unaltered files to replace the virus-altered ones (3) Which kind of virus can only alter files, as the files are being created or altered for legitimate reasons?(D) A. polymorphic virus B. stealth virus C. fast virus D. slow virus (4) A few of viruses only infect at certain intervals dictated by their programming, because of ___?(A) A. Don’t let user notice them. B. They wait for some special programs to infect. C. No special reason. D. They want to change how they look. Text 3 Virus Behavior-Attack Phase Exercises 1. Multiple choices. (1) Many viruses do harmful things such as ( ABCD ). A. deleting files B. changing random data on your disk C. simulating typos D. slowing your PC down (2) Viruses can delay their attack for ( ABCD ). A. days B. weeks C. months D. years (3) If a virus simply reproduce and have no cause for an attack phase, but it will still ( AB ) without your permission. A. stealing storage B. pilfer CPU cycles C. delete files C. play music (4) Some viruses, with no attack phase, often damage the programs or disks they infect because they ( AB ). A. have bugs in them B. contain poor quality code C. steal storage D. show messages on your screen 2. Fill in the blanks. (1) Many viruses do unpleasant things such as deleting files or changing random data on your disk. (2) Most viruses have bugs in them and these bugs often cause unintended negative side effects. (3) In addition, even if the virus is perfect, it still steals system resources. (4) The attack phase is optional, many viruses simply reproduce and have no cause for an attack phase. (5) An example, one of the most common past viruses, Stoned, is not intentionally harmful. 3. Translate and analyze the following sentences
nber of viruses (1)Just as the infection phase can be caused by some event, the attack phase also has its own cause 句子组成:as引导状语从包 翻译:如同感染阶段需要一些事件触发一样,攻击阶段也有它自已的触发条件 (2) In addition, even if the virus is perfect, it still steals system resources 句子组成: even if即使,引导条件状语从句; in addition另外 翻译:此 病毒设计完美,它仍会盗用系统资 ( This is made worse since viruses that"just infect, with no attack phase, often damage the programs or disks they infect 句子组成: since引导原因状语从甸 with no attact phase插入语 翻译:有些病毒只会“感染”而没有攻击阶段,但它们会破坏被它们感染的程序或磁盘, 这反而更有害 (4) The original virus tried to hide its own code in an area of 1. 2MB diskettes that resulted in corruption of the entire diskette(this bug was fixed in later versions of the virus) 句子组成:that引导主语从句表示 the oris an area of l 2mb diskette 翻译:最初的病毒试图把它自身隐藏在12MB的磁盘中从而导致整张磁盘变坏 4. Reading comprehension in When you start a program that's infected by a virus, the virus code will execute(run) and try and ct other programs. This can infect the same computer or other computers connected to it on a network. The newly infected programs will try to infect more programs and computers. When you share a copy of an infected file with other computer users, opening the file may also infect their computers;and files from those computers may spread the infection to yet more computers. If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and then the virus on the computer will try to infect more floppies inserted into it. Answer the following two questions according to the article above (1)Did you meet any viruses before? (2) If you have met a virus, do you remember how the virus infected your computer? Text 4 Number of viruses Exercises 1. Multiple choices (1) In 2000, the number of viruses topped(d) A.500 B C.7500 D.50000 (2)What make it is difficult to agree on how to count viruses? (ABCD) A. new virus arise from an existing virus B. some viruses can create different versions when they infect other programs
Number of Viruses 5 (1) Just as the infection phase can be caused by some event, the attack phase also has its own cause. 句子组成:as 引导状语从句. 翻译:如同感染阶段需要一些事件触发一样,攻击阶段也有它自己的触发条件. (2) In addition, even if the virus is perfect, it still steals system resources. 句子组成:even if 即使,引导条件状语从句;in addition 另外. 翻译:此外,即使病毒设计完美,它仍会盗用系统资源。 (3) This is made worse since viruses that "just infect," with no attack phase, often damage the programs or disks they infect. 句子组成:since 引导原因状语从句 with no attact phase 插入语. 翻译:有些病毒只会“感染”而没有攻击阶段,但它们会破坏被它们感染的程序或磁盘, 这反而更有害. (4) The original virus tried to hide its own code in an area of 1.2MB diskettes that resulted in corruption of the entire diskette (this bug was fixed in later versions of the virus). 句子组成:that 引导主语从句表示 the original…in an area of 1.2MB diskettes. 翻译:最初的病毒试图把它自身隐藏在 1.2MB 的磁盘中从而导致整张磁盘变坏. 4. Reading comprehension. When you start a program that's infected by a virus, the virus code will execute (run) and try and infect other programs. This can infect the same computer or other computers connected to it on a network. The newly infected programs will try to infect more programs and computers. When you share a copy of an infected file with other computer users, opening the file may also infect their computers; and files from those computers may spread the infection to yet more computers. If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and then the virus on the computer will try to infect more floppies inserted into it. Answer the following two questions according to the article above. (1) Did you meet any viruses before? (2) If you have met a virus, do you remember how the virus infected your computer? Text 4 Number of Viruses Exercises 1. Multiple choices. (1) In 2000, the number of viruses topped ( D ). A. 500 B. 1000 C. 7500 D. 50000 (2) What make it is difficult to agree on how to count viruses?(ABCD) A. new virus arise from an existing virus B. some viruses can create different versions when they infect other programs