- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
科技英语翻译 Homework 02
Translate the following passage
executable adj. 可执行的interfere v. 干预;妨碍
replicate v. 重复,复制multiply v. 使增加
distort v. 歪曲,曲解,扭曲rescue v. 拯救
update n. 更新configure v. 配置,设定
back-up n. 备份patch n. 补丁
anti-virus software 反病毒软件cripple v. 丧失、损坏或削弱…的功能
wreak v. 带来,引起havoc n. 破坏;混乱
nuisancen. 损害propagate v. 传播,扩散
vaccine n. 疫苗;防疫accelerate v. 加速,促进
overtakev. 赶上,追上extract v. 去除;根除
immunize v. 使免疫;使成为无害spread to 传播
pick up 识别;发现be linked to 传递,传输
Computer Virus
Computer viruses are executable program that are deliberately designed to attack a computers. Depending on the nature of a virus, it may cause damage of the hard disk contents, and/or interfere normal operation of the computer.
A virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be “infected” by the same virus.
A virus program contains some instructions which can lead to negative e effects ranging from harmless to devastating. For example:
Files and data are deleted;
The computer takes longer to load programs/applications;
Items and images on computer screen are distorted and unusual images and texts appear;
Disk space and filenames change for no reason;
System tools such as Scandisk return incorrect values.
A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come form downloading files through FTP (file transfer protocol), or referencing email attachments. When a virus is introduced to a computer system , it can attach itself to, or sometimes even replace, an existing program. Thus, when the user runs the program in question, the virus is also executed. This usually happens without the user b
文档评论(0)