A potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission
B copies itself repeatedly using up system resources and possibly shutting the system down
C saves any open documents and programs to a hard disk before removing power from the computer
D hides within or looks like a legitimate program such as a screen saver
E saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state
F an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once