Which one of the following would be considered as a way that a computer virus enters into a computer system?