ICT (7th Grade)

Computer Security

Which of the following is a form of malicious software?