what lies dormant until a predefined condition is met; the program then triggers an unauthorized act.
i)rootkit
ii)worm
iii)logic bomb
iv)keylogger