Answers
Requires human interaction to spread like sending emails
Gets a user to download or operate it by pretending to be legitimate
Can self-replicate without human interaction
Infects files and runs when the user operates the file
Can be spread by opening an infected file from a USB drive
Disguises itself as a different or useful file to deceive users
Spreads from one computer to another on a local network