Fill in the blanks with the correct form of the word in brackets. USE THE FULL FORMS.
There are many different types of malicious software, or malware, each with ... \(it\) own purpose and methods of attack. Understanding the various types can help you ... \(well\) protect your devices and data.
A computer virus attaches itself to a legitimate program or file. When the infected file is executed, the virus spreads to other files, programs, or even other computers.
Worms are more dangerous than viruses because they ... \(not need\) host program to spread. The ... \(one\) computer worm appeared in 1988, and since then, they ... \(become\) even more advanced.
A Trojan horse, or simply Trojan, disguises ... \(it\) as a legitimate file and can give hackers unauthorized access to a victim’s system.
Ransomware locks files on a victim’s computer and demands a ransom in exchange for the decryption key. Even if the ransom is paid, there is no guarantee that the files ... \(restore\). Today's ransomware attacks ... \(be\) more sophisticated than before, making them harder to stop.
Spyware secretly gathers information about a users’ activities without ... \(they\) consent. It can track browsing habits and capture sensitive personal information. Many people discover too late that spyware ... \(steal\) the data for weeks or even months.
To protect yourself, it’s essential to install antivirus software and keep it updated. By being careful online, you can make your devices much ... \(safe\) from these threats.