They can corrupt data giving away confidential information, which in some cases is a violation of customer privacy and should be taken very seriously. Also it can slow the machine down exponentially. Some malware can delete files required for the machine to run and ultimately render it useless.
<span>"in a point to point network, a dedicated communications path is established between two stations through the nodes of the network. the telephone network is the most common example."</span>