The document discusses computer viruses and worms, defining them as small software programs that spread from computer to computer (viruses), and programs that replicate over networks by exploiting security vulnerabilities (worms). It describes how viruses can damage systems by corrupting or deleting files, or using email to spread, while worms primarily consume computer resources as they rapidly copy themselves. The document also outlines the dormant, propagation, triggering, and execution phases of how viruses and worms typically operate on infected systems.