Establish a correspondence between the types of malware and the actions they perform

Polymorphic virus (mutant) – viruses that modify their code every time a new copy of the virus is created.
A Trojan horse is a program that disguises itself as legitimate software, but at the same time performs various malicious actions.
Spyware is a product installed or infiltrated on a computer without the consent of its owner, with the aim of gaining almost complete access to the computer, collecting and tracking personal or confidential information.
Phishing is a mailing list aimed at obtaining confidential financial information. Such a letter, as a rule, contains a link to a website that is an exact copy of the Internet bank or other financial institution.
Stealth virus (invisible) – viruses that hide their presence in the system.
Macrovirus – viruses that infect documents in office applications.
A network worm is a type of virus that carries no harmful load other than self-replication, thereby
littering memory and, as a result, slowing down the operation of the operating system.
A zombie is a virus that, after penetrating a computer connected to the Internet, is controlled from the outside and used by cybercriminals to organize attacks on other computers.

Remember: The process of learning a person lasts a lifetime. The value of the same knowledge for different people may be different, it is determined by their individual characteristics and needs. Therefore, knowledge is always needed at any age and position.