Exercício complementar 02

download Exercício complementar 02

of 1

Transcript of Exercício complementar 02

  • 8/12/2019 Exerccio complementar 02

    1/1

    CEP- TECNOLOGIA DA INFORMAO E COMUNICAO CURSO: OPERADOR DE COMPUTADOR

    PROFESSOR: RAIMUNDO LIMA

    NOME: ________________________________________________

    DATA: ____ / ____ / _____

    A computer virus is a computer program that can copy itself and infect a computer without permissionor knowledge of the user. A virus can only spread from one computer to another when its host is takento the uninfected computer, for instance by a user sending it over a network or carrying it on aremovable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to othercomputers by infecting files on a network file system or a file system that is accessed by anothercomputer. iruses are sometimes confused with computer worms and !ro"an horses. A worm, however,can spread itself to other computers without needing to be transferred as part of a host. A !ro"anhorse is a file that appears harmless until e#ecuted $any personal computers are now connected to the%nternet and to local&area networks, facilitating their spread. !oday's viruses may also take advantageof network services such as the (orld (ide (eb, e&mail, and file sharing systems to spread, blurring

    the line between viruses and worms.

    1. Cite 05 exemplos de cognatos encontrados no texto: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________

    2. Indique a linha em que os tpicos aparecem no texto:a) Hoje os vrus se aproveitam de servi os como a Internet! emails! entre outros! o que torna di"cil adistin #o entre vrus e $orms% & )

    ') (m vrus de computador um programa que pode se copiar e in"ectar um computador e pode seespalhar em pcs atrav s da Internet! disquetes! C*s ou (+, drives% & )

    c) -irus podem ser con"undidos com $orms e trojans% (m $orm pode se espalhar em outroscomputadores sem precisar ser trans"erido como parte de um host% & )

    d) -rus tam' m podem se espalhar atrav s de arquivos in"ectados! atrav s da Internet ou atrav sde um sistema de arquivos in"ectados e acessados em outro computador% & )

    e) . /rojan um arquivo que parece ino"ensivo! at ser executado! e se espalham atrav s dainternet& )

    3. /radu a as seguintes express1es:a ) personal computer :__________________________________________

    ') a computer virus : ______________________________________ c) /rojan horse: _________________________________________ d) remova'le medium: _______________________________________________ e) net$or2 service: ))))))))))))))))))))))))))))))))

    4 . 3rocure no texto a que se re"erem os seguintes pronomes:a) that __________________________________

    ') it ____________________________________

    c) itsel" _________________________________