UNDERSTANDING THE PURPOSE OF KMS PICO IN COMPUTER SOFTWARE PIRACY