b2科目四模拟试题多少题驾考考爆了怎么补救
b2科目四模拟试题多少题 驾考考爆了怎么补救

kaspersky lab zao_kaspersky os下载_kaspersky密码(14)

电脑杂谈  发布时间:2017-06-03 06:09:36  来源:网络整理

Examples of necessary resources are at least the processor, the working memory, the permanent memory (in other words, space on the hard disk) and the traffic capacity of the network。 By time is meant the time for performance of each method of antivirus checking, also including the time needed for data entry/output when accessing the hard disk of the host machine 110 or the time needed to exchange data on the network, for example, with the security service 195。

In one particular aspect, yet another criterion for prioritization is the effectiveness and reliability of each method of antivirus check. By effectiveness is meant the speed of performance of the antivirus check method along with the level of detection. The level of detection is the percentage of false alarm to a true verdict delivered by the methods.

After establishing the priorities for the methods, the control module 160 forms a queue of the selected methods of antivirus check that perform the task of the antivirus check。 A priority is formed according to the following criteria; the fewer resources and the less time spent on carrying out the corresponding check method and the greater the effectiveness of the antivirus check method, the higher the priority。 For example, two check methods have been determined: request to a security service 195 and the method of checking with the aid of a signature ysis。

The signature ysis requires continual accessing of the hard disk of the host machine 110 to check files and, consequently, it uses a labor-intensive operation of data entry/output from the hard disk, which also influences the productivity of the other VMs 150。 However, the request to the security service 195 requires minimal resource costs and, further, the speed of a response to the request is high。 Consequently, the priority for the method of checking by a request is higher than that for the method of checking by signatures。


本文来自电脑杂谈,转载请注明本文网址:
http://www.pc-fly.com/a/jisuanjixue/article-50822-14.html

相关阅读
    发表评论  请自觉遵守互联网相关的政策法规,严禁发布、暴力、反动的言论

    • 姬胡齐
      姬胡齐

      不过如果美国不是没完没了地纠缠

    • 张岩
      张岩

      美国要想占领时间长点

    • 陈凤仪
      陈凤仪

      我们也希望为他筹多点钱去治疗

    热点图片
    拼命载入中...