Q.
1

 

 

  • Software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity

     

  • Legitimate software that allows companies to monitor and supervise the computers of their employees from a central location

     

  • Software used to disrupt computer operation or gain access to private computer systems

     

  • A computer program hidden within another seemingly harmless program that produces copies of itself and inserts them into another programs of files