Malignant or the harmful viruses are designed to damage the system.
The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 32 to 35 are based on the passage you have just heard.
The attack is to wipe out data, to delete files, or to format the hard disk.
Questions 32 to 35 are based on the passage you have just heard.
32. How did the name of “computer virus come into being?
33. What is the way that the computer viruses infect the computer systems?
32. How did the name of “computer virus come into being?
33. What is the way that the computer viruses infect the computer systems?
34. What is a “benign virus?
35. What can a “malignant virus do to your computer?
34. What is a “benign virus?
35. What can a “malignant virus do to your computer?
Section C
Directions:
Section C
Directions:
In this section, you will hear a passage three times.
When the passage is read for the first time,
In this section, you will hear a passage three times.
When the passage is read for the first time,
you should listen carefully for its general idea.
When the passage is read for the second time,
you should listen carefully for its general idea.
When the passage is read for the second time,
you are required to fill in the blanks numbered from 36 to 43
with the exact words you have just heard.
【2008年6月四级预测卷听力(星火)第9课】相关文章:
最新
2017-01-16
2016-10-21
2016-10-08
2016-10-08
2016-10-08
2016-10-08