Answers
Spreads from one computer to another on a local network
Disguises itself as a different or useful file to deceive users
Infects files and runs when the user operates the file
Can self-replicate without human interaction
Requires human interaction to spread like sending emails
Can be spread by opening an infected file from a USB drive
Gets a user to download or operate it by pretending to be legitimate