Answers
Disguises itself as a different or useful file to deceive users
Gets a user to download or operate it by pretending to be legitimate
Can self-replicate without human interaction
Can be spread by opening an infected file from a USB drive
Requires human interaction to spread like sending emails
Spreads from one computer to another on a local network
Infects files and runs when the user operates the file