YES! stay away from them...
A Trojan Horse can carry malicious code in it. Not all Trojans have malicious code
Cookies are not malicious code. They are just text files that save data for the sites you use. While cookies can be used maliciously, they are not malicious in and of themselves.
ICMP
is a worm a malicious code
A file with the extension ".exe" is most likely to contain malicious code. This extension indicates an executable file, which can run programs on your computer. Malicious actors often use executable files to deliver harmful software such as viruses, trojans, or ransomware. It is important to exercise caution when opening files with the ".exe" extension, especially if they are from unknown or untrusted sources.
Actually they aren't. Computer viruses and Trojan horses are two different types of malware, i.e., malicious software.The type known as "Trojan horses" are named after the horse which, according to legend, was given as a "gift" by the Greeks, to the Trojans - their enemies. Just like the horse in the legend, the malware called "Trojan horses" also have a malicious intention. For more information about the legend, check the Wikipedia article on "Trojan horse".
Malicious mobile code, or various viruses, worms, trojans, and other Internet predators, is a very real danger on the Internet. In order to protect yourself from such danger, be wary when responding to emails. Do not accept emails from unknown senders, and make sure your email provider has an up-to-date spam filter.
Some examples of malicious code would be Computer Viruses, logic bombs, spyware, and adware.
Yes.
Trojan Horses
Malicious code
Trojan horses, worms, and malicious scripts are spread several ways. The most common ways to acquire these are through questionable websites, social media, and in e-mails.