Concept: Computer malware refers to malicious software designed to harm, disrupt, or gain unauthorized access to computer systems. Virus, worm, and Trojan horse are common types of malware with different behaviors and methods of spreading.
Difference Between Virus, Worm, and Trojan Horse: \[ \begin{array}{|c|c|c|c|} \hline {Basis} & {Virus} & {Worm} & {Trojan Horse} \\ \hline \text{Definition} & \text{Malicious code attached to files} & \text{Self-replicating standalone malware} & \text{Malicious program disguised as useful software} \\ \hline \text{Dependency} & \text{Needs a host file/program} & \text{Independent, no host needed} & \text{Appears as legitimate software} \\ \hline \text{Replication} & \text{Spreads when infected file runs} & \text{Spreads automatically across networks} & \text{Does not self-replicate} \\ \hline \text{User Action} & \text{Requires user execution} & \text{Spreads without user action} & \text{User installs unknowingly} \\ \hline \text{Damage} & \text{Corrupts files or system} & \text{Consumes bandwidth, slows systems} & \text{Steals data or gives unauthorized access} \\ \hline \end{array} \]
Explanation:
Conclusion: A virus requires a host file and user action, a worm spreads independently across networks, and a Trojan horse disguises itself as legitimate software to deceive users and gain unauthorized access.
A racing track is built around an elliptical ground whose equation is given by \[ 9x^2 + 16y^2 = 144 \] The width of the track is \(3\) m as shown. Based on the given information answer the following: 
(i) Express \(y\) as a function of \(x\) from the given equation of ellipse.
(ii) Integrate the function obtained in (i) with respect to \(x\).
(iii)(a) Find the area of the region enclosed within the elliptical ground excluding the track using integration.
OR
(iii)(b) Write the coordinates of the points \(P\) and \(Q\) where the outer edge of the track cuts \(x\)-axis and \(y\)-axis in first quadrant and find the area of triangle formed by points \(P,O,Q\).