3. Copies itself repeatedly and spreads
throughout a single computer or an
entire network.
Use up hard disk space or memory
resources.
Shutdown a computer or network.
4. A program that hides within or looks
like a legitimate program.
Triggered by certain condition or
action.
Does not replicate itself.
5.
6. Protects your computer by identifying
and removing viruses found in your
computer’s memory, storage media, and
incoming files.
Needs to be updated regularly.