JINRHAY8446IN JINRHAY8446IN Science Answered A trojan horse embeds itself within another program or file, and when that program or file is activated, it copies itself and attacks other files on the system.