-They attach themselves to files or programs.
-Install themselves in a computer system without permission.
-They replicate (multiply) themselves occupying large space in memory.
-Some amend files or operations of a program without permission.
-Some delete files or programs in a computer