eva downloaded an audio file from a file-sharing website. the download contained a file that recorded her computer usage without her knowledge or consent. what should eva do to remove the offending program, and prevent future attacks?