18. Professional English 18.1 Example analysis one
DOM is a Platform-and language-($) API that allows programs and scripts to dynamically access and update the CONTENT,STR Ucture and style of WWW documents (currently, definitions for HTML and XML documents is part of the specification). The document can be further processed and the results of that processing can is incorporated back into the presented (67) . DOM is a (-based) APIs to Documents,which requires the whole document to being represented in () while processing it. A simpler alternative to DOM are the event-based Sax,which can be used to process very large (all) documents that does not fit Info the memory available for processing.
(A). Specific B. Neutral C. Contained D. Related
(+) A. Text B. Image C. Page D. Graphic
(A). Table B. Tree C. Control D. Event
(A). Document B. Processor C. Disc D. Memory
(b) A. XML B. HTML C. Script D. Web
Reference translation
Dom is a platform-and language-independent application interface (API) that dynamically accesses programs and scripts, updates its content, structure, and the style of the WWW document (currently, HTML and XML documents are defined through the Description section). The document can be processed further and the results of the processing can be added to the current page. Dom is a tree-based API document that requires the entire document to be represented in storage during processing. Another simple API is event-based sax, which can be used to handle very large XML documents, because of the large, so it is not suitable for all in memory processing.
Reference answer
(A) b (+) C (a) b (+) D (+) A
18.2 Analysis of two examples
Melissa and Loveletter made use of the trust, that exists Betweenfriends or colleagues. Imagine receiving an (in) from a friend who asks you to open it. Thisis what happens with Melissa and several other similar email (72). Upon Running,such worms usually proceed to sendthemselves off to e-mail addresses from the victim ' s address book,previousem Ails,web pages (73).
As administrators seek to blockdangerous email attachments through the recognition of well-known (in), Virus writers use OT She extensions to circumvent such protection. Executable (. exe) filesare renamed to. bat And.cmd plus a whole list of other extensions and Willstill run and successfully Infect target users.
Frequently,hackers try Topenetrate networks by sending an attachment the looks like a flash movie,which and while displaying Some cute animation,simultaneously runs commands in Thebackground to steal your passwords and give the (*) access to you R network.
() A. Attachment B. Packet C. Datagram D. Message
(A). Virtual B. Virus C. Worms D. Bacteria
(A). Memory B. Caches C. Ports D. Registers
() A. Names B. Cookies C. Software D. Extensions
(+) A. Cracker B. User C. Customer D. Client
Reference translation
Melissa and Loveletter took advantage of the trust between friends and colleagues. Imagine that you have received an attachment that a friend asks you to open it. This is the way Melissa and other similar e-mail worms harm. Once run, the worm often discovers email addresses from the victim's address book, previous emails, web page buffers, and so on, and sends them out.
When managers attempt to block dangerous email attachments by identifying well-known extensions, the virus's authors use other extensions to break this protection. The executable file (. exe) is renamed. bat and. cmd, plus other extensions, and can still be run to successfully compromise the target user.
Hackers often try to penetrate the Web to send an attachment like a flash image, and when the Flash demonstrates a compelling animation, it also runs commands in the background to steal your password, giving the decryption guru the opportunity to access your network.
Reference answer
(+) A (+) C (A) B (() D () a
National Computer technology and software Professional technical qualification (level) exam "software Evaluator"-Test content Summary (18) Professional English