………… are self replicating malicious code independent of the action of the user but slow down the processes on entering a network.

Options:

A) Viruses
B) Worm
C) Trojan Horse
D) None Of These

Leave a Reply

Your email address will not be published. Required fields are marked *