Melissa and LoveLetter made use of the tru

题型:单项选择题

问题:

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .

As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.

10()

A.cracker

B.user

C.customer

D.client

考点:计算机软件水平考试中级电子商务设计师电子商务设计师
题型:单项选择题

一个等腰三角形的一个底角是40°,它的顶角是(    ),如果它的顶角是50°,那么它的底角是(    )。

题型:单项选择题

某甲抢劫某乙,结果某乙是武术学校的教练,某甲不是对手,遂跪地求饶,某乙仍气愤不过。继续对乙拳打脚踢,某甲哀求不得,摸到地上的一块砖头向某乙砸过去,将某乙砸伤。则某甲行为属于( )。

A.正当防卫

B.紧急避险

C.故意犯罪

D.防卫过当

题型:单项选择题

登革热

题型:单项选择题

通用固定资产核算软件的卡片样式一般不能由用户自己定义。( )

题型:单项选择题

属于国际网球联合会主办的比赛是?()

A.巴黎大师赛

B.戴维斯杯

C.年终大师赛

D.温布尔顿锦标赛

更多题库