ICT (Year 7)

Cybersecurity

Which of the following is an example of malicious software?