____________are designed to attach themselves (or piggyback) on files or programs and are passed on by a computer user s activity such as opening up an e-mail attachment?
A. Viruses
B. Botnets
C. Spyware
D. Malware
E. Not listed