Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
Select the correct option from below list
a)Rootkit
b)Adware
c)Viruses
d)All the options